News
- Launched on July 27, 2025, a new VPN service seeks to fix issues with providers' trust
- VP.net uses Intel SGX hardware to supposedly deliver "cryptographically verifiable privacy"
- Researchers uncovered some vulnerabilities with Intel SGX systems in the past
A new VPN service has just landed in the market, promising to take a completely different technical approach to users' privacy.
Short for Verified Privacy, VP.net claims to be built in a way that physically separates users' identities from their browsing activity at the hardware level. By doing so, the provider seeks to fix issues linked to virtual private network (VPN) providers' trust. So, forget no-log VPN policies and welcome "cryptographically verifiable privacy."
The provider launched the app on June 27, 2025, across all major platforms, namely Windows, macOS, Linux, Android, and iOS, and now strives to become the VPN of the future. Yet, not without some controversy.
The problem with no-log policies(Image credit: VP.NET LLC)All the best VPN services currently offer strict no-log policies. These guarantee that the provider never stores any of your identifiable data and are regularly checked with independent no-log audits.
The problem is that even third-party VPN audits require a dose of trust.
"An audit only proves that something was true at that moment in time. This is why we're bringing math and verifiable cryptography back into the mix so that when we say you're private, you're actually private," one of VP.net's founders, Andrew Lee, told TechRadar.
The founder of Private Internet Access (PIA), a popular no-log VPN provider, Lee later realized that many users now need a level of privacy that's not based on trust. He then teamed up with other privacy-committed developers to build a new type of VPN service.
That said, it's worth noting that PIA is among the companies that have proved their no-log claims in real life over the years, doing so not once but twice in court. Another example is Mullvad, which left a police raid empty-handed in Sweden back in 2023.
What VP.net does differentlyThe big novelty with VP.net lies in its tech. The company uses Intel SGX hardware, which promises to deliver "cryptographically verifiable privacy."
For the less techie out there, all you need to know is that all the sensitive operations, those that could somehow reveal your identity, occur in some so-called encrypted enclaves. These are secure and isolated spaces within the software infrastructure that physically prevent the VPN provider from accessing the activities happening inside.
Put it simply, this mechanism should make it "technically impossible to associate your identity with what you do online," explains the provider.
Not only encryption, though; the system also claims to use SGX attestation. This is a security mechanism that assures the encrypted enclaves work as they should, preventing the provider or any other third party from accessing the activities occurring inside. This is "verifiable by clients using Intel's attestation services," said the provider. You can see all VP.net's technical details here.
Crucially, VP.net also offers some protection against the tracking of metadata, meaning all the details that aren't the content. Echoing what NymVPN's innovative mixnet network and Mullvad's DAITA tool do, VP.net also employs some techniques to prevent traffic analysis and obscure actual usage patterns.
(Image credit: VP.NET LLC.)Beyond the novel infrastructure, VP.net also includes all the classic features you'd expect from a VPN.
These include support for the secure and speedy WireGuard protocol, alongside security features like a kill switch and DNS leak protection. Adding post-quantum encryption support is also in the pipeline.
All the apps are fully open-source as well, so that anyone with the technical knowledge can check the code to see if the software behaves as it should. You can take a look at the provider's public repositories by heading to the VP.net GiftHub page.
Is it really bullet-proof?Despite the good premises on paper, Intel SGX tech is certainly not without flaws.
In 2019, for example, a team of researchers discovered a way to run and hide malware on Intel systems. Worse still, this malicious software was undetectable by antivirus tools at the time.
This may be among the reasons why Intel patched multiple security holes in 2023, addressing many existing flaws and vulnerabilities.
Such a security fix certainly doesn't fully convince everyone in the industry, including the CEO of NymVPN, which is another VPN provider seeking to challenge issues with VPN providers' trust. "I prefer decentralization and advanced cryptography rather than believing Intel has produced a silver bullet," NymVPN's CEO, Harry Halpin, told TechRadar.
Another contentious point lies behind the VP.net team. Well-known names from the Bitcoin world, both Roger Ver and Mark Karpelès have had some legal issues in the past.
Commenting on the latter point, Karpelès told TechRadar: "For the way we build the system, there is no need to trust the team behind VP.net. We provide independent systems that verified by itself, as a connection if everything is safe. So, even if I wanted to connect or do anything like that, there's no way I could do anything."
You might also like- Ghost of Yōtei will take around the same time to beat as Ghost of Tsushima
- The game's creative director, Jason Connell, has said both games are "a similar experience" and expects both to be the same "in terms of the time commitment"
- Ghost of Tsushima's main story takes 25 hours to beat, suggesting Ghost of Yōtei will be roughly the same length
Sucker Punch has confirmed that Ghost of Yōtei will take around the same time to beat as Ghost of Tsushima.
That's according to Ghost of Yōtei's creative director, Jason Connell, who told VGC (thanks, GamesRadar) that both games are comparable in length, depending on one's playstyle, because the studio decided to stick with a similar scope to the first game.
"We designed the game with some of the similar numbers, in terms of scale and scope of the last experience, in mind," Connell said. "In that way, we actually found it to be quite satisfying, and there were some good numbers to jump off of."
He continued, saying, "We feel that the experience of playing through Ghost of Yōtei, whether you're just ripping through the story, or you're somebody that likes to just go through the whole world and explore, or you're that hardcore platinum chaser – that it is a similar experience [to that of Ghost of Tsushima], we expect, in terms of the time commitment."
According to How Long to Beat, on average, it takes around 25 hours to beat Ghost of Tsushima's main story, while it takes 62 hours to 100% complete the game, including all side quests and exploration.
Jason Connell's latest comments suggest that Ghost of Yōtei will take around the same time to beat.
Ghost of Yōtei launches on October 2, 2025, exclusively for PS5 and PS5 Pro.
Ghost of Yōtei pre-orders are now live, along with Ghost of Yōtei PS5 bundle pre-orders. If you're looking to get your hands on the exclusive PS5 controller, here's where you can buy the Ghost of Yōtei DualSense.
You might also like...- ExpressVPN issued an update to patch an RDP leak bug discovered by an independent researcher
- The leak in the Windows ExpressVPN client was found in April, in code rolled out in March, so its recent audit could not have spotted the bug
- ExpressVPN considers that "the likelihood of real-world exploitation was extremely low"
The ExpressVPN Windows client app has been updated to patch a leak vulnerability, discovered in April by an independent security researcher.
In a detailed blog post dated July 18, 2025, ExpressVPN – considered one of the best VPNs – confirmed the RDP bug that could have leaked users' real IP addresses, despite stating that "the likelihood of real-world exploitation was extremely low."
Nonetheless, a fix was issued in an update a few days later, meaning the bug should no longer exist, and cannot now be exploited.
What is an RDP leak?(Image credit: sarayut Thaneerat/ via Getty Images)RDP (Remote Desktop Protocol) allows a remote connection from one device to another (typically PC to PC, or PC to server). When an RDP connection is established with a virtual private network (VPN) enabled, the expectation is that the data travels through the encrypted VPN tunnel.
When the data is not encrypted and bypasses the tunnel, it is referred to as a leak. Besides RDP, other encryption-dodging leaks can occur with VPNs, such as DNS leaks.
With this bug, the RDP connection could have been observed by an ISP (Internet service provider), or anyone with network access. Not only was the target IP address not encrypted – enabling an observer to see that a connection to ExpressVPN was running – but it would have been clear that remote servers were being accessed over RDP.
The attack, as demonstrated by researcher Adam-X, would result in the user’s actual IP address being revealed, but not their browsing activity.
The value of a VPN is that all data should be encrypted between the user’s device and the VPN server. While it is possible to manually exclude some apps from the VPN connection, that didn’t happen here. Note, however, that this was a bug in the Windows version of the ExpressVPN desktop client, and did not affect other versions.
Should ExpressVPN's no-log audit have found the leak?This news was announced soon after ExpressVPN published the details of its latest successful no-log audit by KPGM. Should the bug have been detected in the audit, and should users have been informed sooner?
ExpressVPN has stated: “The problem was traced to a piece of debug code (originally intended for internal testing) that mistakenly made it into production builds (versions 12.97 to 12.101.0.2-beta).” They also confirm that Adam-X reported the bug on April 25.
ExpressVPN was audited in February 2025, and solely to ensure that its TrustedServer infrastructure never collects users’ logs as claimed.
Meanwhile, according to Uptodown’s repository of version updates, ExpressVPN production builds 12.97 to 12.101.0.2-beta were issued between March and May.
In short, KPMG’s audit of ExpressVPN’s servers could not have found the bug – even if it was tested for – as this did not exist at the time.
How many users were affected?Most users typically won’t connect to a VPN before establishing an RDP session, so it is unlikely that this affected many users.
ExpressVPN is used mostly by individuals, rather than organizations, so the attack surface of this vulnerability should be minimal. Exploiting the bug also required an attacker to know about it, and to find a way to direct the victim to a malicious website.
The VPN provider has, however, stated that it is introducing more checks to find issues like this before builds are released, and improving automated testing.
ExpressVPN’s response to the bug report – just five days between filing by Adam-X and the first patch – is impressive. But why take so long to share the information publicly? Well, it’s a security matter.
You might also like- Researchers found a new spyware campaign mainly targeting Iranian Android VPN users
- DCHSpy is leveraged by the Iranian cyber espionage group MuddyWater, which is thought to have links with Iran's Ministry of Intelligence and Security
- The campaign started one week after the Israel-Iran conflict began, while VPN demand skyrocketed across the country
Researchers have discovered a new Iran-linked spyware campaign that mostly targets Android VPN users.
The team at security software provider, Lookout, found a new version of DCHSpy, an Android spyware that masquerades as legitimate VPN apps or other applications. This includes Starlink, a satellite internet connection service offered by SpaceX.
The malware campaign, according to experts' findings, was deployed by the hacking group MuddyWater only a week after the Israel-Iran conflict began – exactly when VPN demand skyrocketed in Iran as citizens looked for ways to bypass new internet restrictions.
DCHSpy 2025 – what are the risk?A virtual private network (VPN) is security software that encrypts all internet connections while spoofing a user's real IP address location. The latter skill is exactly what's needed to bypass geo-restrictions like those in place in Iran right now. (Image credit: Shutterstock / HTGanzo)As experts explain, DCHSpy is an intrusive piece of software that can collect users' sensitive information like WhatsApp data, contacts, SMS, files, location, and call logs, while even recording audio and taking photos.
First detected in July 2024, DCHSpy is maintained by MuddyWater hackers, a group thought to have links with Iran's Ministry of Intelligence and Security.
Experts have now discovered four new samples of DCHSpy.
"These new samples show that MuddyWater has continued to develop the surveillanceware with new capabilities – this time exhibiting the ability to identify and exfiltrate data from files of interest on the device as well as WhatsApp data," explains Lookout.
Specifically, hackers appear to be using two malicious VPN services, called EarthVPN and ComodoVPN, as a way to spread the malware.
HideVPN was another fake VPN app previously used to deploy DCHSpy.
These are the malicious VPN apps used by MuddyWater hackers to inject DCHSpy spyware (Image credit: Lookout)According to Iranian Information Security Analyst, Azam Jangrevi, the latest findings are a stark reminder of how sophisticated and targeted mobile surveillance has become.
"What’s especially concerning is its use of trusted platforms like Telegram to distribute malicious APKs, often under the guise of tools meant to protect privacy," Jangrevi told TechRadar.
The risk for Iranians is especially high, considering that, as mentioned earlier, citizens have been increasingly turning to the best VPN apps as the internet becomes increasingly restricted.
How to stay safeJangrevi recommends anyone looking to download a new VPN service, or any other application for that matter, to be vigilant.
"Avoid downloading apps from unofficial sources, even if they appear to offer enhanced privacy. Stick to verified app stores, scrutinize app permissions, and use mobile security solutions that can detect threats like DCHSpy," said Jangrevi.
If you’re in a high-risk region or profession such as journalism or activism, Jangrevi also suggests using hardware-based security keys and encrypted messaging apps vetted by independent researchers.
She said: "This incident underscores the need for greater awareness around mobile threat vectors and the importance of digital hygiene in an increasingly hostile cyber landscape."
You might also like- A signing key that many Linux distributions use to support Secure Boot is about to expire
- Sytems that fail to recognize the new key might fail to boot Linux securely
- Users might need to disable Secure Boot to install or run Linux
A signing key used to support Secure Boot on many Linux distros is about to expire, which could open up devices to all sorts of cybersecurity risks.
Secure Boot is a security feature built into modern computers. It is part of the Unified Extensible Firmware Interface (UEFI), which makes sure that only trusted software can run when the system starts up. This helps block malware such as bootkits, and it relies on digital signatures and keys stored in the computer’s firmware.
In short - UEFI boots up, checks the right software is in place, and hands things over to the operating system.
Locking the database downNow, Microsoft has a signing key that many Linux distributions use to support Secure Boot, and that key is set to expire on September 11, 2025.
A replacement key has existed since 2023, but apparently - many systems don’t support it yet, and for those that don’t recognize the new key, it could mean Linux will not boot securely.
Fixing this problem requires firmware updates from original equipment manufacturers (OEM) but there is a risk that not all OEMs will issue updates - especially those for older, or less popular devices.
There is also a tool called “shim”, which some Linux distros use to work with Microsoft’s Secure Boot infrastructure. It is signed with Microsoft’s (soon-to-expire) key, and if it doesn’t get replaced on time, Secure Boot may break those distros entirely.
As a result, some users might need to disable Secure Boot to install or run Linux, while others may need to manually update firmware, or generate their own keys (which is rather complex and could be risky for those without extensive technical knowledge).
All of this could push people to either stick with Windows, or avoid Secure Boot entirely, which opens up an entirely new can of worms.
Via Tom's Hardware
You might also like- Dior fashion brand hit by cyberattack and customer data leaked - here's what we know
- Take a look at our guide to the best authenticator app
- We've rounded up the best password managers
- Predator: Badlands now has a full length trailer
- It reveals that Elle Fanning's protagonist character is a Weyland-Yutani synth
- This is exciting news for those wanting more Alien vs Predator in their life
Predator: Badlands just dropped a new trailer that has delighted fans, including myself, as it incorporates elements of both the Alien and Predator franchises.
Since the original Alien vs Predator movie was released in 2004, we've seen a lot of spinoffs that solely focus on one of the two creatures but now it seems the two universes are properly merging once again.
Xenomorphs are set to reappear in Hulu's upcoming Alien: Earth. Meanwhile, Predator was last seen in Predator: Killer of Killers (check our ranking of every chapter in the animated anthology movie) and before that Prey, which senior entertainment reporter Tom Power called "the best Predator movie since the 1987 original" in his Prey review.
Prey's director Dan Trachtenberg is also directing Predator: Badlands, so many are expecting it to be another very strong entry into the series. Take a look at the trailer for one of this year's new movies below.
What is Predator: Badlands about?The official plot reads: "In the future on a remote planet, a young Predator, outcast from his clan, finds an unlikely ally in Thia and embarks on a treacherous journey in search of the ultimate adversary."
So, this confirms that a Predator and a Weyland-Yutani synth are indeed teaming up in Predator: Badlands, and it's very exciting to see these two worlds colliding again.
Predator: Badlands does have some serious sci-fi vibes in its first trailer, which I'm a huge fan of, and I'm sure there'll be plenty of action and thrills to enjoy whether or not you're team Alien or Predator.
Confirmed cast so far include Elle Fanning as Thia and Dimitrius Schuster-Koloamatangi as Dek (the Predator), and they are definitely shaping up to be one very cool duo.
You might also like- Everything new on Hulu in August 2025 – stream 104 new movies and 68 new TV shows, including Alien: Earth
- I watched Brick on Netflix so you don’t have to – here’s a far superior sci-fi thriller I recommend streaming instead
- Shudder’s new indie sci-fi shocker is one of the most unsettling horror movies I’ve seen in years
- Microsoft reveals new Surface Laptop 5G
- Business customers targeted with reliable connectivity on the move
- Three editions are available, with orders open now
Microsoft has unveiled a new edition of its Surface Laptop designed specifically with business users in mind as it looks for a stronger foothold in the enterprise hardware market.
The new Surface Laptop 5G features AI-powered processing with a 40+ TOPS Neural Processing Unit (NPU) and Intel Core Ultra (Series 2) processors, day-long battery life, and an integrated 5G modem to stay connected to collaboration tools such as Microsoft 365.
There will be three distinct business laptop models available, with a flagship 5G-enabled edition sporting a 13.8in display available from August 26, joined by 13in and 12in editions, which are available now.
Surface Laptop 5GMicrosoft says the releases come as adding 5G to the Surface Laptop has become "one of the most requested features from our business customers".
The addition should mean greater support and more reliable connections for video conferencing calls when out and about, or for workers out in the field needing to contact the rest of their team.
To ensure consistent connectivity, Microsoft says the new Surface Laptop 5G features a "dynamic antenna system" which continuously adjusts to its environment, using six antennas to automatically adjust signal paths and power based on how the device is being held or used.
The company says these antennas are placed higher than usually situated in other laptop devices, reducing interference and allowing for a stronger connection through an entirely newly-designed, multi-layered laminate for the device.
(Image credit: Microsoft)It can also switch between Wi-Fi and 5G networks depending on location, making sure the user stays connected, and can act as a mobile hotspot wherever Wi-Fi is unavailable, with NanoSIM and eSIM options also available.
Microsoft says it tested the devices with over 100 mobile operators across 50 countries, along with real-world enterprise environments, meaning IT admins can deploy and deliver updates and enforce company policies - wherever their users are.
This is also aided by the Surface Management Portal within the Intune Admin Center, which can provide visibility into device health, compliance, and usage - and thanks to Security Copilot, admins can use AI-powered tools to act fast to detect issues, assess risk, and respond accurately.
"Surface Laptop 5G represents Microsoft’s end-to-end innovation in action," Microsoft's Nancie Gaskill wrote in a blog post announcing the release.
"Hardware, software, and cloud services come together to deliver intelligent, secure, and connected experiences for today’s mobile workforce. The Surface for Business portfolio offers a complete solution for every user scenario, from tablet-first flexibility to high-performance laptops, all supported by Microsoft’s modern management and industry-leading security.
You may also like- We've also rounded up the best mini PC options around
- And these are the best mobile workstations on offer right now
- Microsoft's new Surface for Business PCs have AI firmly at the core
- Powerful Ryzen AI Max+ 395 APU could debut in new Minisforum mini-PC
- Up to 128GB RAM expected in Strix Halo-based Minisforum X1 series device
- Unannounced mini-PC surfaces in Geekbench with familiar naming conventions
Minisforum appears to be working on a new high-end mini PC powered by AMD's latest Strix Halo chip.
The device, which has yet to be officially named, is expected to launch as part of the company’s AI X1 series.
It reportedly features the Ryzen AI Max+ 395, a powerful APU which builds on the Zen 5 architecture. The chip combines strong CPU performance with a potent iGPU and may be paired with up to 128GB of RAM.
Geekbench scoresAs spotted by ITHome, several entries referring to “Micro Computer (HK) Tech Limited AI Series” have surfaced on Geekbench, suggesting a Minisforum link.
Benchmark results from Geekbench show multi-core scores above 21,000 and single-core results around 2,900. These place the device ahead of Minisforum’s existing AI 9 HX 370-based models, which typically score closer to 19,000 and 2,300 respectively.
There are already a number of mini-PCs powered by the Ryzen AI Max+ 395, including the Colorful Smart 900, Beelink AI Mini, and AOOSTAR NEX395. So far, most of the mini PCs have come from lesser known or regional brands, rather than big names like Dell, Asus, and MSI.
Minisforum’s current AI X1 and N5 Pro lines already offer strong CPU performance. But the iGPU in the 395 delivers a more noticeable jump in graphics tasks.
That gap is especially clear when compared with models like the Ryzen AI Max+ 395 powered GMKtec EVO-X2, which is already on sale.
Although Minisforum has not confirmed anything officially, the leaked device names closely match those used across the AI X1 Pro series.
We’re excited to see what Minisforum comes up with, as its devices are consistently among the best mini PCs you can buy. We've previously seen hints of a 2U rackmount server powered by AMD’s Ryzen AI Max+ 395 processor from Minisforum, but the MS-S1 Max is an entirely different beast.
Via Notebookcheck
You might also like- These are the best business laptops around right now
- And these are the best workstations available today
- There are 14 AMD Ryzen AI MAX+ 395 mini PCs in the world right now, this is where to buy them