Is PPTP trustable

Point to Point Tunneling Protocol also known as PPTP is VPN implementation method that is no longer implemented. There are many reasons for this and the main one is the security flaws that were detected over time. This leads us to ask question that whether PPTP is secure? The answer is simply no. With the development of new and more advanced technologies in VPN field PPTP is obsolete. Today cyber security is directly related to VPN and both are incomplete without each other. However when developed it was considered to be the securest protocol of its time. Some protocols that are used to make up PPTP are as follows:

  • MS-CHAP V1
  • MPPE or Microsoft Point to Point Encryption
  • RC4
  • DES keys

On the special websites with reviews and guides like those articles about best VPN services on there is info on different kind of protocols and difference between them.

Development and implementation

VPN is not a new phenomenon at all. It has remained in one form or another and development is done to take it to the next level. It was Windows 95 and NT where PPTP was encrypted by Microsoft. However it was not until 1998 that the vulnerabilities in PPTP were discovered. In November same year during the ACM conference it was revealed that PPTP is not secure anymore. At this conference Bruce Schneier demonstrated how CHAP and MPPE that is an RC4 encryption protocol may be broken.

It is all about security not communication

Cyber security is a hot topic and it has remained so in the past years. When it comes to PPTP the fact is that people completely forget about communication and all they want is their privacy secured. It was in 2012 that live demonstration of decryption of PPTP was once again done. It was shown that tools available to anyone can be used to destroy PPTP completely. One of the major issues with this protocol was that once issues caused were never fixed and therefore the vulnerabilities exposed remain as they are.

Vulnerabilities with PPTP

There are many issues and flaws with PPTP and the main ones are listed as under:

  • MS-CHAP V1 is used as the base protocol of PPTP. Common and most importantly free tools can be used to obtain the desired information from an exchange and implement it to hack into the network.
  • Dictionary attacks can be performed on the network by processing the information packets captured. The tools that are required to perform the actions are largely available and are becoming fatal.
  • Bit flipping is another attack that can be performed with ease. It can be regarded as the deadliest attack. The information flowing through the stream can be manipulated as required. The worst part is that attacker can never be identified at all.


There are many new VPN technologies that can be used to get the work done. PPTP should be dumped as it is vulnerable can bring in serious dangers. From authentication to implementation this protocol is no worth it and therefore it should be disregarded. SSTP, open VPN and L2TP/IPSec are the other forms of VPN that should be used and they get the best results overall. These VPN terminologies are also regarded as safe and secure.