P2P VPN and Proxy Solutions

Audience: Faculty, Researchers, Staff and Students

This KB Article References: Cyber Security
This Information is Intended for: Faculty, Researchers, Staff, Students
Last Updated: November 29, 2017

The basic premise of these solutions is that network traffic is directed through different hosts or nodes before reaching the internet. Although these methods attempt to improve anonymity, they are not wholly effective. Further, the security of these networks are completely reliant upon the unknown network nodes your traffic is travelling through, which puts your computer and the network your on at risk.

Much research has been done on many of these solutions, and findings reveal that true anonymity is not fully possible. In addition, solutions such as Hola VPN, may allow unauthorized traffic from other users to flow through your computer, using your own computing resources for unknown purposes. This can put your computer and the network your on at risk for compromise, reputational damage and liability. Therefore, these technologies should be avoided in most cases.

If you choose to use these services for personal use despite the aforementioned risks, please note that when using Stony Brook IT Systems, use of these services are prohibited by Stony Brook Policy P109, Appropriate User of Information Technology:

4.A.iii.h. Disguised use. Users must not conceal their identity when using IT Systems, except when the option of anonymous access is explicitly authorized. Users are also prohibited from masquerading as or impersonating others or otherwise using a false identity.

Therefore, please uninstall or disable these services while connected to the Stony Brook Network.

Additional Information

Getting Help

The Division of Information Technology provides support on all of our services. If you require assistance please submit a support ticket through the IT Service Management system.

Submit A Ticket

For More Information Contact

Customer Engagement and Support