How to acquire and use VPN in Malaysia


If you are travelling, having a reliable VPN on your smartphone or laptop also offers protection when using public Wi-Fi in airports, restaurants, and hotels. – The Malaysian Insight pic, June 18, 2020.

PARTNER CONTENT

YOU don’t have to fly across the world to get an IP address in Malaysia. You can do that by signing up for a virtual private network through VPN servers in Malaysia. With remote VPN access, you can:

● Log in through a Malaysian IP address.

● Access the fast local servers.

● Get an extra layer of online privacy.

● Access international content not available locally.

Your best choice for surfing the Malaysian web is a VPN that is the most private and secure. The old adage that you get what you pay for applies. There are free VPN services that are hit and miss. Some cannot unlock premium Malaysian streaming services like Astro GO, Unifi TV or iFix.

Then there’s the security angle: If you are travelling, having a reliable VPN on your smartphone or laptop also offers protection when using public Wi-Fi in airports, restaurants, and hotels.

What a VPN does and how it works

Essentially a VPN protects a user’s privacy while web browsing through a virtual encrypted “tunnel.” As the data migrates through the tunnel, it remains secure from prying eyes. Most importantly, the VPN conceals its “return address,” shielding the user’s identity and location against trackers and surveillance.

The word “virtual” in virtual private network denotes the software controls and tunnelling that make up the end-to-end connection—rather than using hardware and dedicated lines. “Tunneling” is the term referring to enclosing an encrypted packet of data within another packet.

The VPN employs deception and shows the user’s IP (internet provider) address as the VPN server, in Malaysia, for example. The VPN also establishes a secure encrypted connection between the VPN server and the user. As the data migrates back and forth, it cannot be read by hackers or anyone else monitoring the user’s traffic.

Additionally, when the user plugs into the public web, the data remains secure, provided the website address begins with “HTTPS.” Even if the site is not secure, there is still a greater difficulty in tracing the user, because, as previously mentioned, the data appears to originate from a location other than the user’s.

Caution: VPNs are not malware protection, nor are they virus hunters.

Premium VPN services have encryption protocols and security features. However, they do not provide full protection against virus infection through phishing or links at unsecured web sites. Users should always rely on regularly updated anti-virus programs, along with web malware detectors with real-time updates staying abreast of current cyber security threats.

For example, a VPN cannot prevent a user from downloading a cleverly concealed piece of malware from an insecure website or compromising a password as a result of poor password management or a phishing attack.

Remember that a VPN is an invisible mobile shield, which hides the user’s IP address and actual login location. In the user’s tool kit of online safety tools, a VPN is another bit of insurance—in addition to anti-malware protection, a good password strategy, file encryption and common sense security practices.

Speaking of security…

You are enjoying a snack and coffee at your local café, which provides a free public Wi-Fi connection. If you log on to that connection without a VPN, that ordinary looking person at the far table, head down on his laptop, may have been waiting for you. He wants to launch a man-in-the-middle (MITM) attack and do serious damage to your personal privacy and online security.

MITM hackers launch their attacks by hijacking an unprotected live user’s session. One popular method of live MITM attacks consists of “evil-twin” hijacking. This is the deployment of rogue Wi-Fi networks.

As the user logs into an unsecured public Wi-Fi network, the MITM intercepts the connection. The victim is routed to a bogus network, which begins gathering the user’s credentials. To carry that out, hijackers must use the following tactics:

● Domain Name System (DNS) spoofs to send the user to fake websites.

● a “web pineapple” device to detect nearby unsecured networks and log in in tandem.

● “Sidejacking,” which is the stealing of session cookies. Session cookies consist of unencrypted login information. For example, a user might log into a webmail account and the intruder intercepts a browser login cookie. The user’s webmail account is compromised.

● Spyware and using open-sourced software to spy on the user. Malicious software can look for and track online activity and then intercept the data going to and from the unsuspecting user.

● Spoofing a realistic looking web application. The MITM redirects the victim to a fake web application controlled by the attacker.

So, the best safeguard against MITM attacks is to never connect to public Wi-Fi routers. When public Wi-Fi is the only alternative, using a premium VPN service will mask the user’s activity. Even if the hacker detects the usage, what the hacker sees is encrypted gibberish.

Free VPNs v premium services

Free VPNs aren’t really free.

There are many free VPN services available. The best ones are stripped-down versions of premium products, and a few should be avoided. According to VPN Mentor, free VPN providers “need to cover costs and turn a profit” so, they “generate revenue from their customers using hidden tools and tricks.

Rather than charging users a monthly subscription fee, many free VPN services employ revenue-raising tactics, which can actually exploit their users. In some cases, those VPNs, ironically, make the user less secure. For example, free VPNs:

● track the user’s online activity – One study cited by VPN Mentor showed that over 70% of free VPNs have embedded web trackers. Those trackers collect data on the user’s online destinations and habits and can send the user’s browser tailored ads.

● sell collected data to marketers – Google and Amazon have made millions selling anonymised user data to marketers and advertisers. ISPs and free VPN providers want to get in on that action and they do it by tracking their users.

● slow down the user’s internet connection – Free VPN providers typically shunt their nonpaying customers to the back of the queue when allocating bandwidth. Likewise, since free VPNs are supported by internet advertisers, they seek out tailored ad popups for their users. Popup ads slow browser performance as they load in the background, make the screen change positions, while providing an unsatisfactory user experience.

● are a tempting target for hackers – Free VPNs have been found to be more prone to contain malware than their paid counterparts. Ads and image files are the ideal vectors for hidden malware. They hide in plain sight. When the user clicks on them, the damage begins.

Finally, one VPN provider brazenly admitted making money by selling the free customers’ device processing power to paying customers. That same provider subjected customers to a botnet attack. Its free VPN users had their networks taken over by cyber-criminals.

Why premium VPNs are a better choice

For just a few dollars a month, a premium VPN service offers the following advantages:

● A premium VPN can guarantee a “no-logs” policy. This ensures that the user is never tracked online. The service maintains no connection nor activity logs – other than anonymous network maintenance data – on any user.

● A premium VPN service employs the best-in-class 256-bit encryption.

● A premium VPN is constantly on the alert for data leakage. Look for a “kill switch” that will close the user’s connection if the VPN server goes down.

● A paid VPN service can provide attractive extras. For example, a web app called CleanWeb™ blocks ads, trackers, malware and phishing attempts.

● A premium VPN is most effective in defeating geo-blocking. Users can log on to overseas streaming services, which routinely block free VPN proxies.

Speaking of geo-blocking…

A VPN can thwart internet censorship.

Geo-blocking is the practice of limiting your access to the internet, based on your geographic location, because of restrictions involving copyrights, or simply political censorship. A premium VPN is especially effective in circumventing geographical restrictions, which:

● block streaming services to outside users – Geo-blocking can impose local web restrictions to limit access based on geographical location. For example, popular streaming services like Netflix vary programme availability from region to region. So what is available in the US is not always available in the UK, and vice versa. A VPN bypasses those restrictions.

● promote abusive sales practices – Some online vendors use geo restrictions to charge more affluent customers higher prices. Those vendors could, for example, display higher product prices for more affluent areas. Smart shoppers can use a VPN for price comparisons as well as to sign on with a local VPN server to access special pricing and discounts.

● employ differential pricing for travellers – Similar pricing practices are also employed by ticketing companies, airlines, car rental agencies, as well as hotels hosting international customers. Frequently a customer will see a variety of ticket prices for the same trip, depending on the sign-in location. Smart travellers will first log into a VPN server at the flight destination to begin comparison shopping.

Summary and conclusion

Malaysia is an internet-friendly country. Log into a Malaysian VPN with a premium VPN service for the best online anonymity and privacy.

A premium VPN is an encrypted, secure connection. It hides the user’s ISP address and masks the user’s geographical location. VPNs, however, are not virus hunters. Use a VPN as part of an overall cybersecurity strategy. A VPN will, however, hide a user from a man-in-the-middle attack on an unsecured Wi-Fi network.

When choosing a VPN, the best option is a premium service. Free VPNs frequently come with intrusive, performance-crippling ads and other disadvantages. Premium VPNs, on the other hand, ensure complete privacy with a “no-logs” policy where the user can never be tracked.

Finally, use a premium VPN to bypass net censorship and geo-blocking. – June 18, 2020.

* Surfshark is an award-winning, secure VPN that encrypts your online data.


Sign up or sign in here to comment.


Comments


  • As a tech newbie, I have to say I didn't know almost half of the facts about VPNs listed here. It's good to read articles like that every once in a while. I saw Surfshark recommended here, so I'm going to read more reviews about it, but I have a feeling that I'll end up with this provider.

    Posted 3 years ago by Christina Gamble · Reply