What is a VPN? Advantages and Disadvantages of Virtual Private Networks

For those new to studying or just stepping into the field of Information Technology, as well as for working professionals... they've probably heard the term VPN, or Virtual Private Network, many times. So, what exactly is a VPN, and what are its pros and cons? Let's discuss the definition of VPN and how this model and system can be applied in work with Gpwebmedia.net.

1. What is a Virtual Private Network (VPN)?

A VPN, or Virtual Private Network, is a network technology that helps create a secure network connection when participating in a public network like the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to allow remote users to securely connect to their private networks.

vpn

A VPN system can connect multiple sites based on geographical area, similar to a Wide Area Network (WAN) standard. Additionally, VPNs are used to "expand" and extend Intranet models for better information and data transmission. For example, schools still use VPNs to connect between campuses (or between branches and the main office).

To connect to a VPN system, each account must be authenticated (must have a Username and Password). These account credentials are used to grant access through a Personal Identification Number (PIN), which is typically valid for a limited time (30 seconds or 1 minute).

When connecting a computer or another device such as a phone or tablet to a VPN, the computer acts as if it is on the same local network as the VPN. All network traffic is sent through a secure connection to the VPN. This allows you to securely access internal network resources even when you are far away.

You can also use the Internet as if you were at the VPN's location, which is beneficial for using public WiFi or accessing geo-blocked websites.

When browsing the web with a VPN, the computer communicates with the website through the encrypted VPN connection. All requests, information, and data exchanged between you and the website are transmitted over a secure connection. If you use a VPN in the United States to access Netflix, Netflix will see your connection as coming from the United States.

While it sounds quite simple, VPNs are actually used for many different purposes:

  • Accessing business networks while traveling: VPNs are often used by business people to access their business networks, including all local network resources, while on the road or traveling. Internal network resources do not need to be directly exposed to the Internet, thereby increasing security.
  • Accessing home networks when away: You can set up a personal VPN to access your home network when you are not at home. This allows you to access remote Windows desktops over the Internet, use shared files on your local network, and play games on your computer over the Internet as if you were on the same LAN.
  • Browsing anonymously: If using public WiFi to browse non-https websites, your data exchange over the network can be easily exposed. To hide your browsing activity and secure your data, you should connect to a VPN. All information transmitted over the network will be encrypted.
  • Accessing geo-blocked websites, bypassing Internet censorship, and firewalls.
  • Downloading files: Downloading BitTorrent over a VPN can help increase file download speeds. This is also useful for traffic that your ISP might otherwise hinder.

2. Important Features of VPN

1. Encryption

One of the main functions of a VPN is to block unauthorized attempts to intercept, read, or alter the contents of your internet traffic. It achieves this by converting your actual data into an unreadable format through a process called encryption.

The data is protected with an encryption key that only the authorized user can set. To decrypt the data, you will need a similar decryption key. The VPN encrypts your data when it enters the VPN tunnel and then converts it back to its original format on the other end.

There are three types of encryption techniques that most VPNs use:

a. Symmetric Encryption

Symmetric encryption is an ancient form of cryptography that uses an algorithm to transform data. The “key” is an element in the algorithm that changes the entire outcome of the encryption. Both the sender and the receiver use the same key to encrypt or decrypt data.

These algorithms group data into a series of grids and then shift, swap, and shuffle the contents of the grids using the key. This technique is called block cipher and forms the basis of frequently used key encryption systems, including AES and Blowfish.

  • AES: Advanced Encryption Standard, or AES, is a block cipher authorized by the US government and is used by most VPN services worldwide. It breaks down data streams into a 128-bit array, equivalent to 16 bytes. The key can have a length of 128, 192, or 256 bits, while the blocks are 4x4 byte grids. If you are not familiar with data units, you should learn to distinguish between bits and bytes. The length of the key determines the number of encryption rounds or transformations. For example, AES-256 performs 14 encryption rounds, making it extremely secure.
  • Blowfish: Users who do not trust the security provided by AES may use Blowfish. It uses an open-source algorithm, which is why Blowfish is also included in the OpenVPN open-source system. However, on a technical level, Blowfish is weaker than AES because it uses 64-bit blocks - only half the size of AES grids. This is why most VPN services prefer AES over Blowfish.

b. Public Key Encryption

A clear vulnerability with symmetric encryption is that both the sender and the receiver need to have the same key. You will need to send the key to the VPN server to start communication. If interceptors somehow obtain the key, they can decrypt all data encrypted with that key. Public key encryption provides a solution to the security risk during key transmission. The public key encryption system uses two keys, one of which is public. Data encrypted with the public key can only be decrypted with the corresponding decryption key and vice versa.

c. Hashing

Hashing is the third encryption method used by VPNs. It uses the Secure Hash Algorithm (SHA) to preserve data integrity and confirm that the data originates from the original source.

2. Split Tunneling

Split tunneling is a popular VPN feature that allows you to choose which applications to secure with the VPN and which applications can operate normally. This is a useful feature that helps you keep part of your internet traffic private while routing the rest through the local network.

split tunneling

Split tunneling can be a useful tool for saving some bandwidth because it only sends part of your internet traffic through the tunnel. So, if you have sensitive data to transfer, you can protect that data without experiencing the unavoidable lag in other online activities caused by the VPN.

3. Data and Bandwidth Limits

Data and bandwidth limits define how much data you can transmit or the bandwidth you can use at a given time. VPN services use data and bandwidth limits to control the quantity and speed of data flow across the network.

data bandwidth limit

It is important for VPN service providers to maintain these limits to prevent network congestion and downtime. However, premium service providers with extensive infrastructure like ExpressVPN, NordVPN, PIA, and Surfshark do not impose any data or bandwidth limits on usage.

4. No-Log Policy

A no-log policy is a promise from the VPN service provider never to keep records of users' online activities. The no-log policy is a major selling point for VPNs because it is one of the main reasons people use VPNs in the first place.

Not many VPNs offer a complete no-log service, and even strict no-log services tend to store some logs. If you are unsure which VPN truly does not log, look for services that only use RAM servers. Such servers store temporary data that is erased when the hardware is powered off.

5. Simultaneous Connections

Simultaneous connections refer to the number of devices that can connect to the VPN at the same time. Most VPNs set limits on simultaneous connections, and only a few of them can accommodate unlimited connections at one time.

connect multiple devices

One thing to remember with multiple device connections is that you can install the VPN on as many devices as you like, but you cannot run it on all devices at the same time.

6. Kill Switch

A VPN kill switch is a feature that disconnects your device from the internet if the VPN connection is suddenly dropped. This is an important VPN feature that prevents you from sending data outside the secure VPN tunnel.

kill switch

7. IP Leak Protection

The main purpose of using a VPN is to hide your real IP address from prying eyes. But sometimes, your original IP address can leak, exposing your location, browsing history, and online internet activities. Such an issue is called an IP leak, and it defeats the purpose of using a VPN.

ip

Many top VPNs have built-in IP/DNS leak protection enabled by default. They also provide tools to check your real IP and the address assigned to you by the VPN. With an active VPN connection, the two IP addresses should not match.

8. IP Shuffle

IP Shuffle is a VPN security feature that randomizes your IP address. The VPN does this by reconnecting you to a different VPN server after a certain period. Most VPNs allow users to set the frequency of this random connection with a wide range of options, from every 10 minutes to once an hour or once a day.

Commonly Used VPN Protocols

VPN products often offer a wide range of convenience, efficiency, and security features. If security is a top concern, an organization must pay attention to the protocols that the VPN service supports. Some widely used protocols have significant weaknesses, while others provide the most advanced security. The best protocols today are OpenVPN and IKEv2.

Understanding VPN Protocols

The essence of a VPN protocol is a set of protocols. There are several functions that every VPN must address:

  • Tunneling: The basic function of a VPN is to distribute packets from one point to another without exposing them to anyone along the way. To do this, the VPN packages all the data in a format that both the client and server can understand. The sender puts the data into the tunneling format, and the receiver extracts it to get the information.
  • Encryption: Tunneling does not provide protection. Anyone can extract the data. The data also needs to be encrypted during transmission. The receiver will know how to decrypt the data from a specific sender.
  • Authentication: For security, the VPN must verify the identity of any client attempting to "communicate" with it. The client needs to confirm that it has reached the intended server.
  • Session Management: Once a user is authenticated, the VPN needs to maintain the session so the client can continue to "communicate" with it for a period.

Generally, VPN protocols treat tunneling, authentication, and session management as a package. Weaknesses in any function are potential security vulnerabilities in the protocol. Encryption is a specialty and is very complex, so instead of trying to create new ones, VPNs often use combinations of reliable encryption protocols. Below are common VPN protocols and their strengths and weaknesses.

Weak Protocols

1. Point-To-Point Tunneling Protocol (PPTP)

The oldest protocol still in use is PPTP (Point-to-Point Tunneling Protocol). PPTP was first used in 1995. PPTP does not specify an encryption protocol but can use several, such as the strong MPPE-128. The lack of standardization regarding strong protocols is a risk because it can only use the strongest encryption standard that both sides support. If one side only supports a weaker standard, the connection must use weaker encryption than expected.

pptp

However, the real issue with PPTP is the authentication process. PPTP uses the MS-CHAP protocol, which can be easily cracked today. Attackers can log in and impersonate an authorized user.

2. IP security (IPSec)

Used to secure communications and data streams in the Internet environment (outside the VPN). The key point is that the traffic through IPSec is mainly used by Transport mode or tunnels (a concept commonly used in Proxy, SOCKS) to encrypt data within the VPN.

The difference between these modes is:

  • Transport mode only encrypts the data inside the packets (data payload). In contrast, tunnels encrypt the entire data package.

transport

Therefore, IPSec is often considered a security overlay because IPSec uses security layers compared to other protocols.

3. L2TP

The L2TP protocol often works with the IPSec encryption algorithm. It is significantly stronger than PPTP but still raises user concerns. The main vulnerability in L2TP/IPSec is the public key exchange method. Diffie-Hellman public key exchange is a way for two parties to agree on the next encryption key without anyone else knowing about it. There is a method that can "break" this process, requiring significant computational power, but it then allows access to all communications on a particular VPN.

l2tp

4. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

Similar to IPSec, these two protocols also use passwords to ensure security between connections in the Internet environment.

ssl

In addition, these protocols use the Handshake mode - related to the authentication process between the client and server. For a connection to be considered successful, this authentication process uses certificates - the authentication keys stored on both the server and client.

More Secure Protocols

1. IKEv2 (Internet Key Exchange)

IKEv2 (Internet Key Exchange) is highly ranked for security among current protocols. IKEv2 uses IPSec tunneling and offers many encryption protocol options. IKEv2, when used with AES-256 encryption, is very difficult to crack. IKEv2 uses strong certificate-based authentication and can use the HMAC algorithm to verify the integrity of transmitted data. IKEv2 supports fast communication and is particularly strong in maintaining sessions, even when the Internet connection is interrupted. Windows, MacOS, iOS, and Android all support IKEv2. Some open-source implementations are also available.

Version 1 of the protocol was introduced in 1998 and version 2 in 2005. IKEv2 is not one of the newest protocols, but it is very well-maintained.

2. SSTP (Secure Socket Tunneling Protocol)

SSTP (Secure Socket Tunneling Protocol) is a product of Microsoft, primarily supported on Windows. When used with AES and SSL encryption, SSTP provides good security in theory. No vulnerabilities have been found in SSTP so far, but a potential weakness might still exist.

A practical issue with SSTP is the limited support on non-Windows systems.

3. OpenVPN

OpenVPN is an open protocol offering strong security and has become very popular. OpenVPN was first released in 2001 under the GPL license. OpenVPN is open-source, so vulnerability checks are assured. OpenVPN's encryption functionality often uses the OpenSSL library. OpenSSL supports many encryption algorithms, including AES.

There is no native support for OpenVPN at the operating system level, but many packages include their own OpenVPN clients.

To achieve the highest security with a protocol, administrators must handle it correctly. The OpenVPN community provides recommendations to enhance OpenVPN security.

4. SoftEther (Software Ethernet)

SoftEther (Software Ethernet) is a new name, first introduced in 2014. Like OpenVPN, SoftEther is also open-source. SoftEther supports the strongest encryption protocols, including AES-256 and RSA 4096-bit. SoftEther provides greater communication speeds than most protocols, including OpenVPN, at a certain data rate. It does not support its own operating system but can be installed on many operating systems, including Windows, Mac, Android, iOS, Linux, and Unix.

As a new protocol, SoftEther is not as widely supported as some other protocols. SoftEther has not been around as long as OpenVPN, so users have not had much time to test for potential weaknesses. However, SoftEther is a strong candidate for anyone needing top-tier security.

5. Which Protocol to Choose?

The question "Which protocol is the safest?" is difficult to answer definitively. IKEv2, OpenVPN, and SoftEther are all strong candidates. OpenVPN and SoftEther have the advantage of being open-source. IKEv2 has open-source implementations but also proprietary ones. The main security advantage of IKEv2 is its ease of installation, reducing the risk of configuration errors. SoftEther provides very good security, but users have not had as much time to experience SoftEther as the other two protocols, so there may be issues yet to be discovered.

OpenVPN's code has been around for years for security experts to examine. OpenVPN is widely used and supports the strongest encryption protocols. Making a final decision also requires considering other factors, such as convenience and speed, or whether security is the top concern.

Advantages and Disadvantages of VPN

Theoretically, VPNs sound great, but what are the practical advantages and disadvantages? Let's continue the discussion with Network Administration.

To build a private network or a virtual private network, using a VPN is a cost-effective solution. We can imagine it like this: the Internet acts as the main bridge and communication medium for data transmission. In terms of cost, it is completely reasonable compared to paying for a high-priced dedicated connection. Additionally, the expense of using software and hardware systems to support the authentication process is not cheap. When comparing the convenience VPN brings with the cost of setting up a custom system, VPN clearly has a significant advantage.

However, there are some noticeable disadvantages:

  • VPN cannot manage Quality of Service (QoS) over the Internet, so data packets still risk being lost or facing other risks. The management capabilities of VPN providers are limited, and no one can predict what might happen to their customers, or in short, there is a risk of being hacked.

Why Do You Need a VPN Service?

Browsing the web or conducting transactions on an unsecured WiFi network means you might expose your personal information and browsing habits. This is why VPNs are essential for anyone concerned about online privacy and security.

Have you ever logged into your online bank account in your hotel lobby? Or maybe you've paid your credit card bill online while sipping a mocha at your favorite coffee shop. If you've done this without first logging into a VPN, you might have exposed your personal information and browsing habits to hackers and cybercriminals.

Unless you log into a private WiFi network that requires a password, all data transmitted during your online sessions can be intercepted by strangers using the same network.

This is where VPNs come in: they encrypt your data online, scrambling it so that strangers cannot read it. The encryption provided by VPNs keeps your online activities private, including everything from sending emails and shopping online to paying bills or chatting with your doctor.

VPNs can also hide your IP address so snoopers don’t know that you’re browsing, downloading files, and commenting on Reddit threads. VPNs encrypt the data you send and receive on any device you’re using, including your phone, laptop, or tablet. It sends your data through a secure tunnel to the VPN service provider’s servers. Your data is encrypted and routed to any website you are trying to access.

What to Expect from VPN Services

The VPN market has a lot of options, so it’s important to consider your needs when shopping for a VPN.

Think about what is important to you. Do you want to browse the web anonymously by hiding your IP address? Are you worried that your information might be stolen on public WiFi? Are you a frequent traveler who wants to be able to watch your favorite shows on the go?

A good VPN can help you meet all those needs, but there are other points to consider.

How to Choose a VPN

A smart way to stay safe while using public WiFi is to use a VPN solution. But what’s the best way to choose a virtual private network? Here are some questions to ask when selecting a VPN provider.

Do they respect your privacy? The purpose of using a VPN is to protect your privacy, so it’s important that the VPN provider respects your privacy too. They should have a no-log policy, meaning they never track or log your online activities.

Do they run the latest protocol? OpenVPN provides stronger security than other protocols like PPTP. OpenVPN is open-source software that supports all major operating systems.

Do they place data limits? Depending on your Internet usage, bandwidth could be a big determinant for you. Make sure their services fit your needs by checking if you get full bandwidth, unlimited data.

Where are the servers located? Deciding which server locations are important to you. If you want to appear to be accessing the web from a certain locality, make sure there’s a server in that country.

Can you set up VPN access on multiple devices? If you’re like the average consumer, you use 3 to 5 devices. Ideally, you should be able to use VPN on all of them at once.

How much does the VPN cost? If price matters to you, you might think free VPNs are the best option. However, remember that some VPN services might not cost you money but could cost you in other ways, like frequent ads or your personal information being collected and sold to third parties. Comparing paid and free options, you might find that free VPNs:

  • Don’t offer the latest or most secure protocols.
  • Don’t provide the highest bandwidth and connection speed for free users.
  • Have higher disconnection rates.
  • Have fewer servers in fewer countries globally.
  • Don’t offer support.

There are many points to consider when choosing a VPN, so try it out at home to ensure you get a VPN that fits your needs. Regardless of which provider you choose, rest assured that a good VPN will provide higher security, privacy, and anonymity online than public WiFi access points.

VPN Pricing

It’s wise to choose your VPN provider based on price. After all, we all want to spend as little as possible each month, right?

But focusing solely on price can be a mistake. You want your VPN provider to protect your online privacy and encrypt the data you send and receive. You want it to be reliable and connect quickly. All these factors are important—if not more so—than price.

This means most VPN providers charge similar rates, usually ranging from $9.99 to $12.99 per month, with some exceptions. However, when considering price, make sure you understand what you’re getting.

For example, a provider might charge as low as $4.99 per month to provide VPN protection on one device. However, the provider might charge $9.99 per month to provide the same service for 10 devices. You can also reduce your monthly cost by signing up for a longer-term plan. Usually, you’ll spend less per month if you sign up for a one-year VPN plan than if you choose to pay monthly.

Is there a free version of VPN?

Many top providers offer free versions of their VPNs. However, the free versions might have some limitations, such as the amount of data you can use.

Some VPN providers offer a free trial for their paid versions. The trial period usually lasts about a month. Some allow access to most of the features of the paid service, although there may be data restrictions.

When signing up for a free trial, you will need to provide personal and payment information, just as you would if signing up for a paid service. You can cancel your account before the trial period ends. If you do not cancel, the provider will start charging you to continue using the service.

Please note that some free VPNs may collect and share or sell your data to third parties for marketing purposes, while others may not block ads.

More important than price is the number of servers your VPN provider offers. Generally, the more servers, the better.

Why? VPNs that do not offer many servers often struggle with slow online speeds. This can be an issue if you first connect to the VPN and then download a file or stream a video.

If too many users are on the same server, that server can become overloaded. When that happens, you will notice your browsing speed slow down.

When considering a VPN provider, ensure you sign up with one that has a high number of servers. How many servers are enough? There is no single answer to that. However, VPN services with 1,000 servers or more are less likely to be overloaded.

How does a VPN protect your IP address and privacy?

Essentially, a VPN creates a data tunnel between your local network and an exit node in another location, which could be thousands of miles away, making it seem as if you are in another place. This benefit allows for online freedom or the ability to access your favorite apps and websites while on the go.

Here’s a closer look at how a virtual private network operates. VPNs use encryption to scramble data when it’s sent over a WiFi network. Encryption makes the data unreadable. Data security is especially important when using public WiFi because it prevents anyone else on the network from eavesdropping on your internet activity.

There is another aspect to privacy. Without a VPN, your internet service provider can know your entire browsing history. With a VPN, your search history is hidden. That’s because your web activity will be associated with the VPN server’s IP address, not yours.

A VPN provider may have servers all over the world. This means your search activity could originate from any one of them. Note that search engines also track your search history, but they will associate that information with an IP address that’s not yours. Again, a VPN keeps your online activity private.

What does a VPN hide?

A VPN can hide a lot of information that could put your privacy at risk, including:

1. Your browsing history

There is no secret about what you do on the internet. Your internet service provider and web browser can track everything you do on the internet. Many websites you visit can also keep a history. Web browsers can track your search history and tie that information to your IP address.

Here are two examples of why you might want to keep your browsing history private. Maybe you have a medical condition and are researching treatment options on the web. Without a VPN, you’ve automatically shared that information and could start receiving targeted ads that draw even more attention to your condition.

Or perhaps you want to check out airfare for a flight next month. The travel sites you visit know you’re looking for tickets and might show you prices that aren’t the lowest available.

These are just a few specific examples. Remember, your internet service provider may sell your browsing history. Even so-called private browsers may not be as private as you think.

2. Your IP address and location

Whenever you connect to the internet, your IP address is visible to everyone online. This makes it easy for hackers, ISPs, and others to track your online activities. IP addresses can be used by ISPs to collect data about your browsing activities, restrict access to certain sites, and even throttle your internet speeds. Cybercriminals can use it for malicious purposes. Even if you browse anonymously and don’t use your real name, your IP address can still be used to identify you.

Anyone who gets hold of your IP address can access what you’re searching on the internet and where you were located when you searched. Think of your IP address as the return address you’d put on a letter. It can lead back to your device.

Luckily, VPNs can hide your IP address by rerouting your traffic through one of their servers. This ensures that anyone monitoring the web won’t be able to trace your online activities or location back to you.

Since VPNs use IP addresses that aren’t yours, they allow you to maintain your online privacy and search the web anonymously. You’re also protected from having your search history collected, viewed, or sold. Note that your search history might still be visible if you’re using a public computer or a computer provided by your employer, school, or other organization.

3. Your streaming location

You might pay for streaming services that allow you to watch things like professional sports events. When you travel abroad, this streaming service might not be available. There are legitimate reasons for this, including contractual terms and regulations in other countries. Still, a VPN would allow you to select an IP address in your home country. That could give you access to any event shown on your streaming service. You might also avoid data throttling or speed throttling.

4. Your devices

A VPN can help protect your devices, including desktops, laptops, tablets, and smartphones, from prying eyes. Your devices can be prime targets for cybercriminals when you go online, especially if you’re using public WiFi. In short, VPNs help protect the data you send and receive on your devices so that hackers won’t be able to track your every move.

5. Web activity to maintain internet freedom

Hopefully, you’re not the subject of government surveillance, but anything is possible. Remember that a VPN protects against your ISP seeing your browsing history. Therefore, you’ll be protected if a government agency asks your ISP for records of your internet activity. Assuming the VPN provider doesn’t log your browsing history, that VPN service can help protect your internet freedom.

What does a VPN not hide?

VPNs offer many advantages when it comes to online privacy and security, but they do not provide full privacy protection as there are still some things a VPN cannot hide.

1. Account activity

A VPN can encrypt your web traffic, hide your IP address, and spoof your location, but it cannot protect you from being tracked by online services. When you sign up for a website or an online service, the company can still track your activities within their own platform. Therefore, if you use Gmail, Facebook, or Twitter while the VPN is on, your account activities will not be truly hidden.

2. Payment information

A VPN can help protect you from hackers and snoopers, but it cannot protect you from financial fraud. When you make online purchases using a credit card or PayPal, the company can still access your payment information. Even when using a VPN, it is important to take extra precautions when shopping online and always use secure payment methods.

3. Malware and viruses

A VPN can do many things to protect your system from intruders, but can a VPN protect you from malware? Unfortunately, using a VPN while browsing the Internet cannot prevent malware or viruses from infecting your device. It can actually make the situation worse because a VPN can route you through untrusted networks that might contain malware.

Even when using a VPN, it is important to install a good antivirus program on your device if you want to stay safe from malicious attacks.

4. Device MAC address

Your VPN can hide your IP address but it cannot hide the MAC (Media Access Control) address of your device. This is a unique identifier assigned to every device on a network and can be used to track your activities.

5. Data usage

Your ISP will still be able to see how much data you are using even if you are using a VPN. Additionally, some ISPs have data caps that limit the amount of data you can use each month and these limitations will still apply even if you are using a VPN.

Can VPN access be set up on multiple devices?

If you are a regular consumer, you typically use between 3 to 5 devices. Ideally, you should be able to use a VPN on all of them at the same time.

How much does this option cost? If cost is a key factor for you, you might think that a free VPN is the best option. However, remember that some VPN services may not charge you nominally, but you have to trade off in other ways, such as seeing frequent ads or having your personal information collected and sold to third parties. When comparing paid and free options, you might find that free VPNs:

  • Do not offer the latest or most secure protocols
  • Do not provide the highest bandwidth and connection speeds for free users
  • Have a higher disconnection rate
  • Do not have many servers in multiple countries around the globe
  • Do not offer support

There are many factors to consider when choosing a VPN, so think carefully to ensure you are getting a VPN that suits your needs. Regardless of which provider you choose, rest assured that a good VPN will provide much more security, privacy, and online anonymity than a public WiFi hotspot can.

Do you need a VPN at home?

What if you are logging into the Internet from home? Do you need a VPN?

Probably not. When setting up your home WiFi network, you likely secured your network with a password. Therefore, you may not need the added security of a VPN to protect your online activities.

Investing in a VPN for home use could be a waste of money unless you want to keep your browsing private from your Internet Service Provider (ISP) or if you choose to access streaming content or sports news that you cannot access from your location.

You can invest in a VPN service provider to access the Internet at home, but it is not a wise financial move. It is worth noting that you might consider a free VPN, but those services may cover their costs in other ways, such as selling your data to third parties for marketing purposes.

There are exceptions where you might consider using a VPN at home. You might want to use a VPN if you are concerned about your ISP tracking your online activities. If you connect to the internet through a VPN, your ISP will not be able to see what you are doing online. However, your VPN service provider can. If you trust that company more than your ISP, then using a VPN at home might make sense.

Another reason to use a VPN is to help you stream content or watch sporting events that are not available in your location. Keep in mind that you should understand any contract agreements you have accepted with your streaming service provider. Moreover, government regulations in different regions or countries might make this a bad idea.

VPN Terminology

Learning about VPNs can seem like it requires a specialized vocabulary. Here is a glossary with definitions of some of the most common terms you will encounter.

1. AES encryption

Encryption is essential to keep your data unreadable by hackers, private companies, and possibly government agencies. Encryption scrambles your data so that others cannot understand it without a specific decryption key. AES, short for Advanced Encryption Standard, is an encryption method developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. In 2002, AES became the U.S. federal standard for encryption. Since then, it has also become the standard form of encryption for the rest of the world.

2. Browser history

A record of all your internet activity using a specific web browser, including the keywords you searched for and the websites you visited.

3. Geographic restrictions

One of the main reasons users rely on VPNs is to bypass geographic restrictions. These restrictions are often put in place by entertainment companies that only want to distribute content to certain regions.

For example, Netflix may offer content in the U.S. but not in the UK. It may offer a show in the UK that Netflix users in the U.S. cannot access. By using a VPN with an IP address based in the UK, a viewer in the U.S. can try to access a Netflix show not available in their country.

VPN services – and VPN connections – hide the location from which the internet connection is made. Check your streaming service’s agreement for terms of service and also note that some countries may impose penalties for using a VPN to bypass its rules.

4. Google search history

A record of all your internet searches using the Google search engine.

5. IP address

IP stands for Internet Protocol, and an IP address is a string of numbers and dots that identifies a computer using the Internet Protocol to send and receive data over a network.

6. IPsec

IPsec is a series of protocols or rules that virtual private networks use to secure a private connection between two points, usually devices such as laptops or smartphones and the internet. Without these protocols, VPNs would not be able to encrypt data and ensure user data privacy. IPsec stands for Internet Protocol Security.

7. ISP

Short for Internet Service Provider, this is the service you pay to connect to the internet. ISPs can record your browsing history and sell it to third parties for marketing or other purposes.

8. Kill switch

Users sign up with a VPN provider for data security and online privacy. But what happens if the VPN provider’s network connection fails? Your computer or mobile device will default back to the public IP address provided by your ISP. This means your online activities can now be tracked. However, a kill switch will prevent this from happening. If your VPN provider’s connection fails, the kill switch will cut your connection to the internet entirely. This way, your online activities will not be tracked by others. Not all VPN providers offer this feature, so look for it when shopping around.

9. L2TP

The acronym L2TP stands for Layer 2 Tunneling Protocol and is a series of rules that allow ISPs to enable VPNs. However, L2TP does not encrypt data itself, so it does not provide full privacy for users. This is why L2TP is often used with IPsec to help protect users’ online privacy.

10. Public WiFi

A wireless network in a public place that allows you to connect your computer or other device to the internet. Public WiFi is often unsecured and vulnerable to hackers.

11. Search engine

A service that allows you to search for information using keywords on the internet. Many popular search engines record your search history and may monetize that information.

12. Service provider

A company that provides a virtual private network – essentially routing your connection through a remote server and encrypting your data.

14. Simultaneous connections

You may have many devices connected to the internet at once, everything from smartphones and laptops to desktops in your home office. Many VPN providers now offer protection for all your simultaneous internet connections with one account. This is important: You may think to log in to a VPN before searching the internet on your laptop. But if your smartphone is not protected with a secure VPN, your browsing activities on that device will not be protected.

15. Virtual private network

A VPN provides you with online privacy and anonymity by creating a private network from a public internet connection. It hides your Internet Protocol address to keep your online actions private. It offers secure and encrypted connections to provide greater privacy and security for the data you send and receive.

16. VPN connection

A virtual private network connection allows you to access the internet through a remote server, hiding your actual location and browsing history, and encrypting your data.

17. VPN privacy

This refers to the privacy provided by using a VPN. For example, a VPN encrypts your data, disguises your location, and hides your browsing history and the data you transmit over the internet.

18. VPN client

A VPN client helps users connect to a virtual private network more easily. This is because it is the actual software installed on your computer, phone, or tablet. The most common operating systems, such as Android, Windows, and iOS, come with pre-installed VPN client software. However, many users choose to work with third-party VPN clients that offer different features