Daniel Cho

Daniel Cho

Contributing Security Researcher

OSCP certified, HackerOne Top 500, 3 CVEs in VPN software

About

Daniel is the reason three major VPN providers quietly patched their kill switches in 2023 — he disclosed the vulnerabilities through responsible channels, waited the 90-day window, then published the technical teardowns anyway when two of them didn't fix it fast enough. He's a HackerOne Top 500 bug bounty hunter who got into VPN security after discovering his own provider was leaking DNS queries during a Wireshark session he ran out of pure paranoia. His leak testing methodology involves 23 different failure scenarios including the 'yank the ethernet cable while streaming' test that most reviewers skip. He contributes to VPNVerdict between penetration testing contracts, usually from a laptop running three operating systems simultaneously.

7 years of experience in VPN and privacy.

Expertise

  • Protocol security audits
  • Leak testing
  • Encryption analysis
  • Server infrastructure review

Articles by Daniel Cho