P2P VPN and Proxy Solutions

This KB Article References: VPN
This Information is Intended for: Instructors, Researchers, Staff, Students
Created: 02/03/2016 Last Updated: 05/07/2024

The basic premise of these solutions is that network traffic is directed through different hosts or nodes before reaching the internet. Although these methods attempt to improve anonymity, they are not wholly effective. Further, the security of these networks are completely reliant upon the unknown network nodes your traffic is travelling through, which puts your computer and the network your on at risk.

Much research has been done on many of these solutions, and findings reveal that true anonymity is not fully possible. In addition, solutions such as Hola VPN, may allow unauthorized traffic from other users to flow through your computer, using your own computing resources for unknown purposes. This can put your computer and the network your on at risk for compromise, reputational damage and liability. Therefore, these technologies should be avoided in most cases.

If you choose to use these services for personal use despite the aforementioned risks, please note that when using Stony Brook IT Systems, use of these services are prohibited by Stony Brook: Responsible Use of Information Technology Resources Policy

4.A.iii.h. Disguised use. Users must not conceal their identity when using IT Systems, except when the option of anonymous access is explicitly authorized. Users are also prohibited from masquerading as or impersonating others or otherwise using a false identity.

Therefore, please uninstall or disable these services while connected to the Stony Brook Network.

For More Information Contact


Customer Engagement and Support

Related Information