Wait, so that means you must be doing some sort of packet inspection, right? Even if you aren't keeping logs I still don't really like the idea of a third party inspecting the data I'm passing to a second party.
Or am I misunderstanding how this is done?
level 4
FreedomeVPN
5 points ·
4 years ago
Correct – quite obviously, clairvoyance aside, there's no other way to do it. We have a bit of software doing packet header inspection and traffic pattern analysis to figure out if an user is running BitTorrent, and when it's detected, that session gets a "slightly" restricted firewall profile. It doesn't need to inspect the data payload, just headers. Traffic pattern analysis is needed to detect encrypted BitTorrent.
The Antitracking and Browsing protection features also need to, quite naturally, look up the requested URLs from our URL reputation database, so that it knows which requests to block, or when to trim HTTP cookies. A bit of inspection is needed to implement all these features, but it doesn't need to go into the data being passed.