Risk
7/19/2012
04:39 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

BartVPN.com, A Guard Of Your Privacy, Launched

Bart VPN guarantees its users total Internet anonymity

SZCZECIN, Poland, July 17, 2012 /PRNewswire/ -- After recent controversies over signing of the ACTA treaty, over arresting and prosecuting the founder of MegaUpload, and passing extremely rigorous regulations against Internet piracy in the United States, Red Sky launches a new VPN service: Bart VPN, branded Bart the Guard - Privacy Hero.

Bart VPN guarantees its users total Internet anonymity. Bart tightly guards online privacy: by changing visible IPs and tunneling all your communication through secure and stable servers located all around the world it effectively hides its users' identities online. One of its many important features is the so called "P2P friendly" mode which allows safe and anonymous downloading of files wherever you are, even in countries like the United States.

BartVPN.com also guarantees its users safety while surfing online and using online services. As intended by its creators, Bart will ensure total anonymity when registering or logging to Internet services such as YouTube, Facebook, Hulu etc.

Bart has numerous significant advantages that makes it unique among other VPN Software. Using Bart the Guard lets you bypass any Internet geographical limitations and political restrictions. Its special privacy policy and using IP addresses in "P2P friendly" locations allow secure and anonymous file downloads. Bart VPN is compatible with every type of Internet connection and uses only high speed 100 Mb/s servers. It also offers unlimited transfer for every user and the ability to connect using 100 different IP addresses in 8 different countries (1000 IP addresses in 20 different countries in the near future).

While working on the application, creators of Bart the Guard emphasized simplicity. This is why the software is user friendly and easily accessible to everyone, including people with little knowledge about the Internet.

http://en.red-sky.pl/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Pattern_Juggled
50%
50%
Pattern_Juggled,
User Rank: Apprentice
8/15/2012 | 4:45:27 PM
re: BartVPN.com, A Guard Of Your Privacy, Launched
Well, there's other VPN providers that have been doing such things for years... long before the MegaUpload fiasco. That's not to say that new entrants can't provide useful services or enhancements - but it's pretty disingenuous to claim that they're doing something new when, in fact, they're just copying the market leaders who have already established the framework for such services.

Hence the claim that it's "unique among VPN software" just isn't true.

As an example (there are others): Cryptocloud - http://www.cryptocloud.com - has been P2P friendly for five years, and doesn't log customer traffic, and doesn't turn over information to LEO, and has servers 'round the world, and uses 100mbps (or gigabit) machines, and "routes around geographical limitations" - so there's that.

Unfortunately, the VPN market is currentlty flooded with me-too, Johnny-come-lately entrants who tend to engage in marketing hype in an attempt to get a foot in the door. That's to be expected in a growing market, but it's still sort of sad when journalists don't do any background work before touting the latest newbie as "revolutionary" or unique, when they're not. It remids of the iPredator fisaco from back in 2009, when a VPN service launched with loads of marketing hype about their "new" technology... only to be unmasked as a rebranding of an old, broken, PPTP-based service that folks were wisely avoiding. iPredator was also hyped by journalists who didn't ask basic questions about the service - and then had egg on their face when the scam was exposed.

Anyway, perhaps this latest VPN service is doing a good job of matching the established, entrenched, proven industry leaders. If so, good on 'em. But that's a far cry from doing something genuinely new, or offering service enhancements, or in generally moving the industry forward. Riding the coattails of the market leaders is certainly a viable business strategy, but let's not call it what it's not.

Pt_Jd
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-4988
Published: 2014-07-09
Heap-based buffer overflow in the xjpegls.dll (aka JLS, JPEG-LS, or JPEG lossless) format plugin in XnView 1.99 and 1.99.1 allows remote attackers to execute arbitrary code via a crafted JLS image file.

CVE-2014-0207
Published: 2014-07-09
The cdf_read_short_sector function in cdf.c in file before 5.19, as used in the Fileinfo component in PHP before 5.4.30 and 5.5.x before 5.5.14, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted CDF file.

CVE-2014-0537
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-0539
Published: 2014-07-09
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via uns...

CVE-2014-3309
Published: 2014-07-09
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.