At LogMeIn, we take the security and protection of your important files, data, and personal information very seriously. Our products are architected with security being the most important design objective. As part of this commitment our datacenters and source code are continually reviewed by independent, accredited third party audit firms to ensure data that your information remains confidential.
All communications by LogMeIn products use industry-standard algorithms and protocols for encryption and authentication. Nobody will be able to see or access the data transmitted between your computers - not even us.
LogMeIn Hamachi's security is end-to-end: two Hamachi nodes exchange information with each other after mutual authentication and session key agreement. While node-to-node traffic (that is, regular VPN flow) typically bypasses LogMeIn's servers and is sent directly from one point to the other, even traffic that has to be relayed through a server is secured and encrypted at the endpoints.
Authentication, in short, is the process of verifying endpoint, user and server identities. This step, at the beginning of a connection, ensures that data is only exchanged between the correct parties.
Encryption is a method that scrambles and unscrambles various pieces of information so that it can be sent securely from one location to another.
When any two entities exchange data with each other, a key exchange protocol takes place in conjunction with the obligatory authentication phase outlined above. The key exchange protocol is Diffie-Hellman with the 2048-bit MODP group as defined in RFC 3526.
Every LogMeIn Hamachi node has administrative options to help maintain the security of Hamachi networks. The following facilities are available for client-based networks:
With Hamachi, the recommended way to manage virtual networks is with LogMeIn.com. One account (such as a company) can own multiple nodes and multiple networks. The standard network controls, described above, are available through the web interface as well. With LogMeIn Central, it is possible to define multiple users who may log on to administer the network(s).