Hi

. I've read carefully through your posts

.
First of all let me address the Peerblock question.
This kind of behavior by Peerblock is not new and honestly it isn't in itself a reason for concern.
Peerblock is a program and as every program has bugs and unintended behaviors.
The fact that it blocks Tunngle on your PC and, more importantly the reason it gives for it, does not actually say anything on the security of Tunngle source code.
It could be a false positive, a bug, an improper detection or it could be that your PC was already infected with a malware/rootkit that is hijacking the standard Operating System API calls for all the software that you have installed on your machine (Tunngle just being one of them).
In this case it seems to be that PeerBlock or some other application doesn't like the Tunngle network range and that this triggers this false alarm.
This doesn't mean anything (it only means that peerblock is misleading you with wrong information and that you believe it rather than us).
We didn't buy 7.x.x.x ranges, they are unofficial allocations. You can set up a network in your home with these addresses under the same premise, PeerBlock could go nuts about your little sister (if you have one) PC but this network wouldn't still be more malicious than an icecream...
Tunngle does the same the same thing using these 7.x.x.x for its network (actually the fact that they conflict with DoD tells you that we're not partnering with them but rather "blocking" theirs when we route this range via our adapter).
Sometimes these "Protection" programs just cause more issues than they fix. I am afraid that you've just found one of these cases

.
I've seen several different behaviors when Peerblock is installed and I am lead to believe that we're not responsible for this (if someone can prove otherwise we will be happy to fix).
Some users report no problems and some, as you, get this strange DoD issue.
Everything seems to hint that there is more to the matter than it meets the eye and that this question should be raised to the Peerblock development team rather than us.
...
However simple logic can help you sorting out your irrational fears about Tunngle.
Tunngle is a German software made in Europe by Europeans so it doesn't really make sense that it sends data to the American DoD center, don't you think?
Also Tunngle is checked by Kaspersky labs which is Russian and it makes no sense that they would grant us the clean mark for every new version of Tunngle if this wasn't really true

.
If that is not enough you can also verify with every Antivirus program in the word

.
It would be nice to control the world but last time I checked I was a young guy working as a slave for virtually no revenue

.
So much for Brioche's word domination :/

.
That said always download from our site and verify the MD5.
...
Now let's come to Tunngle security which is the security of VPN technology.
When you join a network, Tunngle behaves like a smart cable that connects the two virtual network cards installed on your PC and the remote PC.
Your computer uses your virtual network card and Tunngle only pipes data through this virtual cable using UDP port 11155.
These virtual cards use ips that are 7.x.x.x which have scope only in our internal system (actually you know that, when Tunngle is installed, connections to 7.x.x.x will go through Tunngle and not elsewhere, since if it went to DoD you wouldn't be seeing games unless they host some and play with you

).
Tunngle, unlike some competitors, does not hook into your running softwares (like games) to redirect network traffic but provides Virtual Private Network connectivity.
It works by installing and connecting a standard virtual adapter which is universally recognized and tested.
This adapter is then independently and autonomously used by your programs.
This means that third-party games and other softwares (including firewalls and antivirus) use this network adapter
the way it is meant to be (that is to say under the same conditions that third-party software developers used at development time).
In other words your games, your firewall and antivirus are put in the condition to operate with the same scenario in which they were designed.
By comparison another gaming program which works by redirecting (or hooking into) your network traffic, would require permissive rules on your firewall and antivirus giving up virtually every control on what is happening.
In other words a malware could use this kind of redirections for the wrong purposes without your firewall and antivirus noticing, because the traffic would be hosted by the gaming program which is "trusted" by your firewall (and because some home firewalls are permissive with what goes on locally in the loopback zone of your machine).
When using Tunngle the traffic goes through the adapter and this is very reassuring because your antivirus and firewall will notice (sometimes too much as some users experienced).
As for the security of the Tunngle client itself and the trust that you need to have when you run it, it is equivalent to the one you need for any other software (Windows and Peerblock too, you seem to trust the second one a lot).
I think that in this case you can easily guess that people, like us, that are working hard through the day to bring you a quality service, have the greatest interest in delivering to you good software.
It would make no sense to work countless hours a day (even beyond our paid work time), put our face on it and then ruin everything

.
After all trusting the program, means trusting the people that are developing it.
That's exactly why we work this hard: we do this to give you the opportunity to trust us.
What comes after depends on your choice, and, trust me, we are the first happy to know that you have this kind of freedom

!
It's good to know that all the people that choose us, trust us and love what we do for them

!
This is what gives us reason to go on

!