VyprVPN company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.


About VyprVPN

VyprVPN provides virtual private network services. The company is based in Austin, Texas.

VyprVPN Headquarter Location

2500 Bee Cave Road Suite 400

Austin, Texas, 78746,

United States

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Latest VyprVPN News

VyprVPN and TurboVPN have been found to be using dubious root certificates, according to new study

Apr 19, 2022

Posted On: Last Updated on April 19, 2022 Surfshark, TurboVPN and VyprVPN are among six well-known VPN companies who are being slammed for a hazardous behaviour that might compromise customer security. During the course of its Deceptor programme , security research company AppEsteem discovered that app developers neglect to ask for permission before installing a trusted root certificate authority (CA) cert on consumers’ devices. AppEsteem has just included VPN providers to its research programme, looking for fraudulent and dangerous conduct that might affect users. Worst-case scenario Surfshark’s root CA certificate is installed on the user’s device even if the user cancels the installation, according to AppEsteem. Surfshark openly states that it uses its own trusted root certificate “solely to connect to VPN servers via the IKEv2 protocol”. A second root certificate may be installed, but what are the pitfalls? Authentication and internet security rely heavily on root CA certificates. Basically, they’re a way to confirm that the person behind the programme or website is who they claim to be. The insertion of a root CA certificate compromises the security of your programme and communications in general if it is done incorrectly. It is possible for a third-party to access practically all of your device’s data if you install a fresh root certificate on your device. Additionally, an attacker who obtains the private key of a trusted root certificate authority has the ability to produce certificates for his own use and sign them using the private key obtained from the authority.. Software, websites, and email all fall within the umbrella of this rule. As shown by breaches in Mongolia in 2021 and Vietnam in 2020 when CAs were infiltrated, everything from a man-in-the-middle assault to the installation of malware is feasible. States like Russia have pushed individuals to install their new root CA because of the power it has over a user’s device. The Electronic Frontier Foundation (EFF) calls this step “paving the way for a decade of digital monitoring.” It was discovered that six VPN service providers have installed root CA certificates on customer devices: Surfshark, AtlasVPN, VyprVPN, TunnelBear, and VPN Proxy Master. There are two well-known providers on the list, Surfshark and Atlas VPN, who joined the parent company of NordVPN. However, NordVPN did not make the cut. An important question is why a VPN service would wish to use a trusted root certificate. IKEv2 compatibility doesn’t need this, and most of the best-rated VPNs don’t do it either. It’s just the VPN provider’s encryption and authentication checks that you can trust, since an extra root CA cert added by the provider may replace the actual service you’re using’s encryption and authentication tests (e.g. Mozilla Firefox, WhatsApp). VPN service providers may now potentially intercept and track almost all of your online activity. When we hear back from Surfshark, Atlas VPN, and VyprVPN, we’ll make sure to update this post.

VyprVPN Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

VyprVPN Rank

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.