Private Internet Access Version History

2 views
Skip to first unread message

Favio Cassidy

unread,
Aug 3, 2024, 5:23:44 PM8/3/24
to osalnapor

After I was forced to install the Premium version of Malwarebytes, yes, forced, as there is no option of being able to use it without trying it for two weeks. It kind of rubbed me the way at first but realize I didn't have to put in an email address to try it. You did grab my computer name in your history but I will live.

My issue is that Real Time Protection (RTP) is blocking my Private Internet Access outbound calls that the program performs and labels them as being Compromised or Malware. I have been assured by PIA that neither of these is true. They also informed me that they have provided Malwarebytes with a list of IP address that should be whitelisted to avoid this problem but as I use your Premium version, have not done so.

I have added the files and folders to the exception list (image below) at PIA's recommendation because I am not the only customer who has inquired about this issue but I still receive messages that they are Compromised or Malware. I do noticed that when I put in the exception of file location C:\Program Files\Private Internet Access\pia-serivice.exe that Malwarebytes simply ignores because I still see the path in history. The fact that you have labeled an outbound call specially as malware, knowing that this is false, doesn't give me a lot of confidence in your software.

The new ones that I am noticing are coming from System, which is a little more concerning if they all didn't have Blocked website as an action. I am assuming every IP is a potential website? They get flagged by have no information to what System file is trying to make an outbound call. How am I supposed to decide if it is a legitimate issue or not? I don't even know what constitutes as a System file and am certainly not going to allow/block all outbound traffic for Windows 11. Since your exception list is ignoring my files and folders within PIA I am assuming you want me to add each individual IP address to the list? I am not sure if that is the case but I am only adding the IP's that have a direct path to PIA. If I wanted to be really sure, I would have to request that PIA validated each of the IP address individually because my software could be infected and allowing all traffic coming from these file and folder locations makes my computer a risk now. Oh, a big annoyance is not being able to copy the IP address and add it immediately to the exception list. I have to type it down on notepad and double check the numbers because if i type one number incorrect that itself is a entry point.

So, after entering in the IP address individually, it doesn't appear as though they are being repeated. I hope you do know the inconvenience and annoyance this provides to customers using both software? Every VPN has multiple IP address and PIA is no exception. Because I want to feel safe I will validate the IP address I add to the exception list and remove the File and Folders. My question to you is.....do you plan on adding the IP addresses that have been provided to your by PIA as whitelisted ever? I understand both software s point of view but every VPN will have this same issue. There will be users that maliciously use software in an illegal or malicious manner not intended by the software developer. I am sure they do the best that any VPN service can do. The users who use VPN's know that some sites wont allow access to it while using a VPN. I originally had that issue when I started but even my bank allows the IP addresses from PIA.

Any information on this fix would be great because its already tiring adding what seems to be infinite IP address. I may simply disable Malewarebytes until the two week trial ends but that would put me at risk. Help.

I'm having similar issues. It's good that malwarebytes is flagging these, but why is PIA pinging out to questionable ip addresses? Also, why is malwarebytes viewing pia-service.exe as a compromised event?

Please also refer to this support article which lists several known applications which conflict with the Web Protection in Malwarebytes currently, which includes Private Internet Access.

Appreciate the reply. That didn't work for me, it's still coming up with the notifications. If all this is safe - the outbound hits to the ip addresses and the "compromised" status of pia-service.exe - I'll turn off the windows notifications setting. I was using bitdefender before this and it didn't pick up on any of this. Any ideas as to why that may be?

I've submitted about this before, and the answer was for me to remove Malwarebytes, LOL! I don't understand why MB still flags activity if you'd entered the specific .exe in the exception list. Shouldn't that activity be allowed and ignored by MB?

Because that is a very good way to get infected. You're basically saying IGNORE EVERYTHING. What purpose is there to run any antivirus if you're going to set it to ignore VPN ? ALL traffic comes in over VPN when you have it enabled except perhaps were some allow local resources to not use VPN.

This article lists the versions and features of the Microsoft Entra private network connector. The Microsoft Entra ID team regularly updates the private network connector with new features and functionality. Microsoft Entra private network connectors are updated automatically when a new major version is released.

The new name is now the Microsoft Entra private network connector. The updated brand emphasizes the connector as a common infrastructure for accessing any private network resource. The connector is used for both Microsoft Entra Private Access and Microsoft Entra application proxy. The new name appears in the user interface components.

You must have .NET version 4.7.2 or higher to install, or upgrade, application proxy version 1.5.3437.0 or later. Windows Server 2012 R2 and Windows Server 2016 do not have this by default. For more information, see How to: Determine which .NET Framework versions are installed.

You must have .NET version 4.7.2 or higher to install, or upgrade, application proxy version 1.5.3437.0 or later. Windows Server 2012 R2 and Windows Server 2016 may not have this by default. For more information, see How to: Determine which .NET Framework versions are installed.

Extras range from the straightforward (built-in blocking of ads, trackers, and known malicious websites) to the more low-level and technical: a SOCKS5 proxy for extra speed, port forwarding support, the ability to select your preferred encryption, authentication, and handshaking methods, and more.

The MASA checks to see an app independently verified by a third-party lab to be following best practices in some aspects of data storage, privacy, cryptography, network communications, code quality, and more.

This isn't quite as comprehensive as it sounds, and MASA certification in itself doesn't guarantee that an app is safe or that the VPN isn't logging your data. But it's still a useful extra indicator, and we're glad to see PIA add this to its other audits and certifications.

PIA has made quite a few app updates recently, too, but they're very small. The most significant is that you can now opt to use your system DNS, rather than PIA's own. That could be handy if you're already using a third-party DNS such as Control D and would like to use it with the VPN, too.

PIA offers dedicated IPs in Australia, Canada, Germany, Singapore, the UK, and the US, and recently added Japan and Switzerland to the list. These give you the same IP address every time you log on and, because no one else shares it, you're less likely to find yourself on a block list due to someone else's dodgy activities. However, using the same IP also means there's more chance of being recognized by websites, so it's not an ideal option for everyone.

PIA's Terms and Services has another surprise (and unusually for small print, it's a good one). Many VPNs say customers are only allowed one refund, ever. Private Internet Access says that as long as you purchased your new account more than three months after the last refund, you're always eligible for another. Works for us.

The best providers also prove that they respect your privacy, and plenty of VPNs have the option to send anonymous troubleshooting data back to the company. Some turn this on by default, with the VPN presumably hoping users never realize what's happening. With PIA, however, nothing gets sent unless you head into the settings panel and enable the feature yourself (it's the 'Help improve PIA' option in the Help area, if you're curious).

Recently, PIA introduced a new incentive for experts to check its code with the announcement of a Bug Bounty program. If a researcher finds and reports a genuine vulnerability, they could receive up to $1,250. Some providers offer considerably more (ExpressVPN has a $100,000 bounty for critical flaws in its TrustedServer technology), but I'm glad to see the incentive take off: anything that encourages more experts to check the code is pretty awesome.

Every VPN promises a high-speed, ultra-reliable network, but the reality can be very different. That's why we look past the enthusiastic marketing and put every VPN we review through our own intensive tests.

I started by installing Private Internet Access' latest Windows app on systems in a UK data center and a US location, each with a 1 Gbps connection. I connected to my nearest location, then measured download performance using several speed testing sites and services (SpeedTest's website and command line app, Cloudflare, Measurement Lab, and more). Then, I ran tests using WireGuard and OpenVPN connections, and did it all again in an evening session.

WireGuard is enough for most users, but if you're setting up PIA on a router or other device then you may have to use OpenVPN. I tested OpenVPN speeds, too, and they reached a solid 270 Mbps. In comparison, NordVPN's OpenVPN connections only managed 110 Mbps, VyprVPN just about 145 Mbps.

c80f0f1006
Reply all
Reply to author
Forward
0 new messages