Nesstool uses VPN connection to prevent TutuApps from getting revoked.
First we need to understand how VPN works?
Home TutuApp For iOS Download NessTool for iOS Editorial Staff August 24, 2018 TutuApp For iOS No Comments If you download any paid application from third-party source and using it for free, the developer of the Application might trace it and block the usage. Apr 24, 2019 So, what’s the problem? The problem is, when you used NessTool ( a.k.a NessVPN ), all your ( data was routed via Chinese servers) and it soon became apparent that there were several issues with data privacy, the main one being that your data wasn’t all that private after all.Following some complaints, TutuApp pulled support for the VPN service.
The minimum standard that any good VPN should have today is Advanced Encryption Standard 256-bit encryption, which is currently the standard used by governments to protect classified information. It will protect you from just about anything cybercriminals can think of. Anything less could be vulnerable to an attack with enough power behind it. Anything more could be sluggish and difficult to use unless you have a specific need for it.
You will also want to keep in mind the tunneling protocol(s) used by the VPN to keep you safe. The tunneling protocol makes up much of what keeps you anonymous while using the service. While the science and details behind it can get complicated, you just need to know that for the sake of security that PPTP still has some security weaknesses and that L2TP (a great tunneling protocol) paired with IPsec (which encrypts the data) is a great option for any service. SSTP is also a great option, but is only available for Windows users.
Is it Possible to sniff on VPN Traffic?
Between two endpoints of a VPN connection that uses a properly-negotiated secure algorithm, one cannot decipher the encrypted traffic. Some things that can keep that from working right (in order of likelyhood):
- Your attacker got between you and your VPN or between your VPN and your destination allowing them access to the cleartext.
- Your VPN system didn’t authenticate the host on the other end. You setup a secure connection to your attacker.
- Your VPN system is configured in an insane manner, possibly allowing very weak keys or just encapsulation with no encryption.
Can we sniff VPN traffic just like you would a coffee shop?
It really depends on which VPN protocol is used and how the server is setup, but in general it’s not possible for people on the same VPN network to sniff all traffic from others.
You can do this on WiFi only because the airwaves is a shared medium and the protocol does not enforce peer-to-peer keys.
VPN uses peer-to-peer tunnels between the client and the server and normally with per session keys, so it’s actually equivalent to a switched wired network in terms of privacy and you cannot easily listen to other people’s traffic.
However, the same tricks that works on wired networks like ARP spoofing may still be effective on certain L2 VPNs and weakness in the protocol/implementation may allow the session key to be extracted by people who know the credentials used.
So the Questions Remains Is Nesstool Safe?
Yes, it is safe as long as the TutuApp is honest with their visitors and users. However you still need to be caution and while navigating through important tasks you need to turn off VPN connection.
If you still have questions post here: https://www.hacktoday.net/c/Operating-System-Talk/Mobile
TutuApp’s latest tool, Nesstool, has been hogging all the limelight lately. It provides a quick fix for a critical problem. Here’s how you can install it on your iPhone, iPad, and iPod touch.
Apple has been aggressively blocking TutuApp and other app installers of late. Once Apple revokes their enterprise certificate, your apps stop working. This is where this new tool comes in.
Nesstool is a VPN that bypasses Apple’s certificate revokes and keep your apps running. It is developed by the team behind TutuApp.
Although TutuApp is advertising it as a “protection” and “stability” tool, it’s still an app revoke bypass at its core.
It’s a viable alternative to Joseph Shenton’s AntiRevoke VPN utility that works in a similar manner.
Apple has now closed the security loophole that AntiRevoke was exploiting so it won’t work any longer. However, Nesstool is still working perfectly and I suggest you use that instead of going for other tools.
Here’s a brief explanation of how this tool works –
- Once the user activates Nesstool, it installs its VPN profile on the device.
- This special VPN profile redirects all requests originating from Apple’s authentication servers to an alternate server.
- This prevents Apple from communicating with the revoked enterprise certificate.
- Therefore, the user can use all installed apps for an indefinite period of time.
Since it’s an online service, there are no specific firmware requirements. Its utility is based on the versions your apps support.
Here’s the full list of supported versions.
iOS 9
- 9.0.1
- 9.0.2
- 9.1
- 9.2
- 9.2.1
- 9.3
- 9.3.1
- 9.3.2
- 9.3.3
- 9.3.4
- 9.3.5
iOS 10
- 10.0.2
- 10.0.3
- 10.1
- 10.1.1
- 10.2
- 10.2.1
- 10.3
- 10.3.1
- 10.3.2
- 10.3.3
iOS 11
- iOS 11 Golden Master
- iPhone, iPad, or iPod touch
- A compatible firmware version
- TutuApp
- Internet connection
Here’s how you can install it on your device for free.
1. Download Nesstool
- Firstly, you would want to open the official website of Nesstool. Simply, open Safari web browser on your device and go to this URL – nesstool.com
- Press the Download button to initiate the download process.
- The website will display prompt to asking for confirmation. Tap Install.
- Wait for it to install on your iOS device. Once it does, it will be present on your home screen but you still will not be able to open it before you “trust” its certificate.
- Go to Settings > General > Profiles & Device Management and trust the certificate associated with it.
2. Setting it up
- The installation process is now complete and we will need to set it up for usage. Open it to start the setup.
- Tap anywhere on the display to start the protection.
- It will now prompt you to install its VPN configuration. Tap Allow.
- Once you do that, it will start protecting all your applications and games from certificate revocations and crashing.
3. Testing
Now that the setup is over and everything is in place, you will need to test if it’s actually working or not. Here’s how to do that –
- Install any app from TutuApp.
- Wait for Apple to revoke TutuApp’s enterprise certificate. Once Apple does that, TutuApp will give you the “Untrusted Enterprise Developer” error.
- Check if your apps and games are still working.
That’s all there’s to it! All your apps will now remain protected from Apple’s revocations that happen almost on a daily basis. It’s working right now and I don’t know for how long it will work.
So go ahead and download it as soon as possible.
Are you going to give this app a try? If yes, leave a comment below.
For more sideloding goodness, like and follow us on Facebook and Twitter.