Get a Pentest and security assessment of your IT network.

Cyber Security

VPN Location Leak: Double VPN Security

TL;DR

Yes, your location can potentially be determined even when using a second VPN after connecting to the first. This happens due to DNS leaks, WebRTC leaks, or if the second VPN isn’t properly configured. We’ll cover how to prevent this.

Understanding the Risk

When you connect through one VPN server and then another (a ‘double VPN’), your traffic is encrypted twice. However, vulnerabilities can still exist:

  • DNS Leaks: Your device might still use your original ISP’s DNS servers instead of the second VPN’s, revealing your approximate location.
  • WebRTC Leaks: WebRTC (a communication protocol used in browsers) can bypass the VPN and reveal your real IP address.
  • Second VPN Configuration: If the second VPN isn’t set up correctly (e.g., doesn’t force all traffic through its tunnel), it won’t protect you fully.

How to Prevent Location Leaks with Double VPN

Here’s a step-by-step guide to securing your location when using two VPN connections:

Step 1: Choose Reputable VPN Providers

  1. Research: Select well-established VPN providers known for strong security and privacy features. Read reviews and check their logging policies.
  2. No Logs Policy: Ensure both VPNs have a strict no-logs policy, meaning they don’t record your browsing activity or IP address.

Step 2: Configure the First VPN Connection

  1. Connect: Connect to the first VPN server in a location of your choice.
  2. Verify: Check that your IP address has changed using an online tool like WhatIsMyIP.

Step 3: Configure the Second VPN Connection

  1. Connect: Connect to the second VPN server in a different location. This is your final exit point.
  2. Verify: Again, check your IP address with WhatIsMyIP. It should reflect the IP address of the second VPN server.

Step 4: Test for DNS Leaks

  1. Use a DNS Leak Test Tool: Visit a website like DNSLeakTest.
  2. Run the Standard Test: Perform a standard test to see if your ISP’s DNS servers are visible.
  3. Extended Test (Optional): Run an extended test for more thorough results.
  4. Fix Leaks: If leaks are detected, change your DNS settings in both VPN apps or on your operating system. Most VPN providers offer custom DNS server addresses. For example, Cloudflare’s public DNS servers are 1.1.1.1 and 1.0.0.1. You can set these manually in your network adapter settings.

Step 5: Disable WebRTC

WebRTC leaks are common. Here’s how to disable it:

  • Chrome/Edge: Type chrome://flags/#disable-webrtc in the address bar and set “Disable WebRTC” to ‘Disabled’. Restart your browser.
  • Firefox: Type about:config in the address bar, search for ‘media.peerconnection.enabled’, and set it to ‘false’. Restart Firefox.
  • Browser Extensions: Install a browser extension specifically designed to block WebRTC leaks (e.g., NoScript).

Step 6: Use a Kill Switch

  1. Enable in VPN App: Most reputable VPN apps have a ‘kill switch’ feature. Enable it. This automatically disconnects your internet connection if the VPN drops, preventing unencrypted traffic from being sent.

Step 7: Check for IPv6 Leaks

  1. Test: Visit test-ipv6.com to see if your IPv6 address is leaking.
  2. Disable IPv6: If leaks are detected, disable IPv6 on your operating system or router settings. The exact steps vary depending on your OS; search online for instructions specific to your setup.

Important Considerations

  • VPN Server Locations: Choose servers in different countries for maximum security and anonymity.
  • Regular Testing: Regularly test for DNS, WebRTC, and IPv6 leaks to ensure your configuration remains secure.
  • Firewall: Consider using a firewall to further protect your connection.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation