Obfuscation is also known as geo-spoofing or anonymization, and it refers to the process of concealing a user’s geographic location. Keeping one’s whereabouts and identity concealed, especially when connecting from untrusted locations, can be challenging. To further complicate matters, in many locations around the world the only available Internet access may be from an unsecure Open Location Network or through the use of a wireless IoT device. Obfuscation can be useful for mobile business executives, government representatives who handle sensitive data and military personnel who must transmit data while keeping their location concealed.
When online, Internet-enabled devices can be tracked by both GPS location and IP address. Some geo-spoofing techniques involve producing a false satellite signal to essentially create a decoy location for the device, but this technique can still leave the IP address exposed. There are also a number of commercially available geo-spoofing apps for both IoS and Android devices. These apps utilize a mock location API which factors in five criteria (altitude, speed, longitude, latitude and accuracy) to create a false location. Unfortunately, most of these apps only change the latitude and longitude but keep the other three criteria constant, making the false location less believable.
Network cloaking is another obfuscation technique – it attempts to provide wireless security by hiding the network name from public broadcast. But since the service set identifier (SSID) is transmitted in various ways, network cloaking is not considered to be a robust security measure. In fact, hiding the SSID broadcast on a router may inadvertently cause constant SSID disclosure by the network interface controller.
Consider a couple of scenarios in which obfuscation could be especially useful. A mobile corporate executive is at an airport waiting to board a flight and needs to transmit sensitive employee data. Or, due to an escalating foreign situation, a government employee who is overseas prefers to send communications from an alternate location. In both cases, only the most robust form of data protection is acceptable.
From any location in the world, the GoSilent VPN tunnel makes the user’s connection invisible to the wider Internet. The user can retain anonymity and location secrecy even when using public WiFi. GoSilent works seamlessly in the background without causing limits to browse or communications capabilities. Users can select any Silent Edge cloud server location in the world (see below dashboard), and the GoSilent VPN “tunnels” the data through this private server while encrypting the signal and changing the IP address so that the user appears to be in a different location. In this way, all private communications and data transfers remain protected within the GoSilent “IPSec tunnel”.
Having the actual location of one’s device unknown can help reduce the risk of exposure during the sending and receiving of data. GoSilent’s technology enables users to conduct business and perform normal day-to-day functions, even over public WiFi, with confidence that sensitive data is secure. Learn more about GoSilent’s advanced technology.