• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
Restore Privacy Logo

Restore Privacy

Resources to stay safe and secure online

  • Privacy Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search
    • Password Manager
    • Tor
    • Identity Theft Protection
    • Privacy Tools
  • Reviews
    • Email Reviews
      • ProtonMail
      • Tutanota
      • Mailfence
      • CTemplar
      • Mailbox.org
      • Posteo
      • Fastmail
      • Hushmail
    • VPN Reviews
      • ExpressVPN
      • NordVPN
      • Surfshark
      • Perfect Privacy
      • CyberGhost
      • IPVanish
      • Private Internet Access
      • Netflix VPN
      • Best VPN for Torrenting
      • NordVPN vs ExpressVPN
    • Cloud Storage Reviews
      • pCloud
      • Nextcloud
      • IDrive
      • SpiderOak
      • Sync.com
      • MEGA Cloud Storage
      • Tresorit
    • Secure Messenger Reviews
      • Telegram
      • Signal
      • Wire
    • Password Manager Reviews
      • KeePass
      • NordPass
      • 1Password
      • Dashlane
      • LastPass
      • Bitwarden
  • VPN
    • What is VPN
    • VPN Coupons
      • ExpressVPN Coupon
      • NordVPN Coupon
      • NordVPN Cyber Monday
      • Cyber Monday VPN Deals
      • ExpressVPN Cyber Monday
      • Surfshark Cyber Monday
    • Best VPN Services
    • VPN Router
    • Free VPN
    • Free Trial VPN
    • Cheap VPNs
    • VPN for Firestick
  • Reports
  • Mission
  • Privacy Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search
    • Password Manager
    • Tor
    • Identity Theft Protection
    • Privacy Tools
  • Reviews
    • Email Reviews
      • ProtonMail
      • Tutanota
      • Mailfence
      • CTemplar
      • Mailbox.org
      • Posteo
      • Fastmail
      • Hushmail
    • VPN Reviews
      • ExpressVPN
      • NordVPN
      • Surfshark
      • Perfect Privacy
      • CyberGhost
      • IPVanish
      • Private Internet Access
      • Netflix VPN
      • Best VPN for Torrenting
      • NordVPN vs ExpressVPN
    • Cloud Storage Reviews
      • pCloud
      • Nextcloud
      • IDrive
      • SpiderOak
      • Sync.com
      • MEGA Cloud Storage
      • Tresorit
    • Secure Messenger Reviews
      • Telegram
      • Signal
      • Wire
    • Password Manager Reviews
      • KeePass
      • NordPass
      • 1Password
      • Dashlane
      • LastPass
      • Bitwarden
  • VPN
    • What is VPN
    • VPN Coupons
      • ExpressVPN Coupon
      • NordVPN Coupon
      • NordVPN Cyber Monday
      • Cyber Monday VPN Deals
      • ExpressVPN Cyber Monday
      • Surfshark Cyber Monday
    • Best VPN Services
    • VPN Router
    • Free VPN
    • Free Trial VPN
    • Cheap VPNs
    • VPN for Firestick
  • Reports
  • Mission

VPN: Everything You Need to Know

March 15, 2021 By Sven Taylor — 77 Comments
VPN

This 20-part (5,500 word) guide gives you everything you need to know about Virtual Private Networks (VPNs) and is regularly updated with new information.

VPN usage continues to surge around the world — and there are many factors that explain this trend:

  1. Privacy – More people are concerned about digital privacy than ever before. Whether it is corporate data collection or government surveillance efforts, the internet is becoming more invasive by the day. VPNs offer privacy by encrypting your traffic while also hiding your IP address and location.
  2. Security – Public WiFi is a dangerous place where hackers can target users, intercept traffic, and collect data from users who are not encrypting traffic through a good VPN.
  3. Unrestricted Access – Websites and streaming services the world over are implementing geo-restrictions and other methods to block/restrict content. Whether a country is carrying out censorship or a certain website is using geo-blocks, a VPN is your ticket for full access, allowing you to appear anywhere in the world.

These are the top three reasons people are using VPNs, but there are others as well. We’ll examine each of these topics in more detail below.

Table of contents – Here are the topics we’ll cover in this 20-part VPN guide.

  1. What is a VPN
  2. How a VPN works
  3. Why use a VPN
  4. What are the best VPNs?
  5. Are VPNs safe?
  6. Are VPNs legal?
  7. How do I set up a VPN?
  8. Why a VPN is necessary for online privacy
  9. Will a VPN make me 100% anonymous?
  10. VPN protocols and encryption
  11. VPN logs – different types
  12. VPN performance and speed
  13. Using VPN for streaming
  14. Using a VPN for torrenting
  15. VPNs on Android and iOS devices
  16. Using a VPN on a router
  17. VPNs and Tor
  18. VPN leaks and kill switches
  19. How to defeat VPN blocks
  20. The future of VPNs

1. What is a VPN?

A VPN is a Virtual Private Network. It allows you to access the internet with more security and privacy, while also giving you the ability to get around censorship or content restrictions. In this guide we will discuss the following VPN terms:

  • VPN client – Software that connects your computer/device to a VPN service. The terms ‘VPN client’ and ‘VPN app’ are used interchangeably.
  • VPN protocol – A VPN protocol is basically a method by which a device creates a secured connection to a VPN server.
  • VPN server – A single endpoint in a VPN network to which you can connect and encrypt your internet traffic.
  • VPN service – For our purposes here, a VPN service is an entity that provides you with the ability to use their VPN network. Usually, a VPN service provides custom VPN apps (clients) for different devices and operating systems, but not always. Access is usually sold via a subscription. The terms ‘VPN service’ and ‘VPN provider’ are used interchangeably.

Now we will get into the basics of how a VPN actually works.

2. How a VPN works

A VPN works by creating an encrypted connection between your computer/device and a VPN server. Think of this encrypted connection as a protected “tunnel” through which you can access everything online, while appearing to be in the location of the VPN server you are connected to. This gives you a high level online anonymity, provides you with added security, and allows you to access the entire internet without restrictions.

how vpn works
A VPN will encrypt, secure, and anonymize your internet traffic, while also unblocking content from anywhere in the world.

Without a VPN, everything you do online is traceable to your physical location and the device you are using via the device’s IP address. Every device that connects to the internet has a unique IP address – from your computer to your phone and tablet. By using a VPN, you will hide your true location and IP address, which will be replaced by the VPN server you are using.

Most VPN providers maintain servers all around the world. This gives you lots of connection possibilities and access to worldwide content. Two VPNs that both have a large server network around the world are ExpressVPN and NordVPN.

After purchasing a VPN subscription and downloading the software for your device, you can instantly connect to any of these worldwide servers.

Now that you know how a VPN works, let’s cover the reasons for using one.

3. Why use a VPN?

Why are so many people around the world using VPN services?

It really depends on your situation, but there are ten different reasons to use a VPN:

  1. Surf the internet without revealing your real IP address and geo-location (online anonymity).
  2. Add an extra level of security by encrypting your internet connection.
  3. Prevent your Internet Service Provider (ISP), third parties, network admins, and governments from spying on your online activities (encrypting your traffic).
  4. Unblock websites and access content that is restricted to certain geographic locations.
  5. Torrent, P2P download, and stream media safely and with more privacy.
  6. Bypass censorship and gain access to geo-restricted content.
  7. Save money on flights and other online purchases by changing your IP address (your virtual geographic location).
  8. Protect yourself from hackers and security risks on public WiFi networks, such as in cafés, hotels, and airports.
  9. Protect your private data, such as bank passwords, credit cards, photos, and other personal information when online.
  10. Surf the internet with peace of mind.

Now that we’ve covered why a VPN is used, we’ll move on to another question that many people have about VPNs.

4. What are the best VPNs?

We have an entire guide dedicated to the best VPN services.

To save you time, however, the table below lists our picks for the top three VPNs that will work well for all types of use cases. As noted in our report, these VPNs all:

  • User-friendly apps for all major devices and operating systems
  • Very secure with built-in leak protection settings and strong encryption
  • Excellent performance (fast speeds that we regularly test)
  • Great for streaming and torrenting
  • 24/7 live chat customer support
  • A full 30 day money-back guarantee on all subscription plans

Here are the top VPNs we’ve tested:

nordvpn cheap

NordVPN Review

$3.71/month
68% Off Coupon >>


cheap surfshark vpn

Surfshark VPN Review

$2.49/month
81% Off Coupon >>


ExpressVPN

ExpressVPN Review

$6.67/month
3 Months FREE Coupon >>


Finding the best VPN all boils down to matching up your unique needs with the VPN that meets your requirements. There is no one-size-fits-all “best VPN” for every user. Nonetheless, there are a handful that do well in nearly all categories and come out on top in our rankings and guides.

5. Are VPNs safe?

As a general rule of thumb, VPNs are safe to use – as long as you are using a high-quality VPN service. But therein lies the catch.

There are currently over 200 VPNs on the market – even more when you consider all the random free VPN apps in the Apple and Google Play stores. Unfortunately, most VPN services – particularly the free VPNs – have flaws, bugs, and problems that pose a threat to your security and privacy.

In other words, there are very few high-quality VPNs that will keep you safe and protect you against data leaks on all your devices.

For example, one alarming study found that 84% of free Android VPN apps leak user data. While most people know that free VPNs should be avoided, there are still millions of people using these dangerous apps.

As I explained in my overview of free VPN services, there are many reasons to avoid free VPNs altogether:

  1. embedded malware (quite common with free VPN apps)
  2. hidden tracking (many popular VPN providers hide tracking in the apps to collect your data)
  3. third party access to your data
  4. stolen bandwidth
  5. browser hijacking
  6. traffic leaks (IP address leaks, DNS leaks)
  7. fraud (identity theft and financial fraud)

There are also a number of different VPN scams to avoid – from dubious “lifetime” VPN subscriptions to bogus features and fake reviews. As a general rule of thumb, you typically get what you pay for when it comes to VPN services.

6. Are VPNs legal?

Throughout the Western world the answer is generally yes, VPNs are perfectly legal to use for the purposes of online privacy and security. In fact, businesses every day use VPNs – and that will not change any time soon.

However, there are a few exceptions in places like the United Arab Emirates, where VPN use is currently restricted. Some Middle Eastern countries, such as Saudi Arabia and Iran, frown on the use of VPNs because they allow people to get around internet censorship efforts.

VPN service
VPNs allow people to easily get around online restrictions and censorship.

But even still, the laws in these countries generally do not outlaw the VPN itself, but rather the use of a VPN to bypass the state censorship efforts.

This is also the case in China, where the government has been fortifying its “Great Firewall” to block VPNs and websites. Nonetheless, you can still use the best VPN for China to get around these issues. Russia has also attempted to “ban” some VPNs – but these measures often fail, simply because VPN traffic can be hidden to look like regular HTTPS traffic. There are a few VPN providers that do quite well with obfuscating VPN traffic in their apps.

Note: VPNs are routinely used by businesses around the world for network security. Therefore you will likely never see an outright “ban” on all VPNs because they are a necessary tool for both businesses and individual security.

But can’t people use VPNs to do bad things?

Of course, but you should think of VPNs like steel. Steel can be used for good purposes, such as bridges, buildings, and transportation. But it can also be used to build bombs, guns, and tanks, which harm people. Completely banning steel because it is sometimes used for bad purposes would be insane and stupid.

The same is true for encryption and VPNs. Banks, businesses, and any website that deals with sensitive data must use encryption technology to keep people (and their data) safe. VPNs and encryption are necessary tools that we all need to be using, even if a few people misuse this technology for their own reasons.

Disclaimer: I’m not a lawyer and none of this is legal advice. Consult the laws of your country to verify what is and is not legal!

7. How do I set up a VPN?

The exact instructions for setting up a VPN depends on the device you are using and the VPN service you will be connecting to. Most VPN providers – especially the ones recommended on this site – offer simple installation guides for all major operating systems and devices.

Here’s a general outline for how to set up a VPN:

  1. Choose a good, trustworthy VPN service (see my discussion of the best VPN services for the latest test results)
  2. After purchasing a VPN subscription, download the VPN software for the device / operating system you will be using.
  3. Once the VPN client is installed on your device, log in to the VPN service using your credentials (through the VPN app).
  4. Connect to a VPN server and enjoy using the internet with privacy and freedom.

Windows, Mac OS, Android, and iOS users also have the option of using the built-in VPN capability on their operating systems. This uses the IPSec/IKEv2 or IPSec/L2TP protocols, rather than OpenVPN, which requires the use of apps. You will need to import the VPN configuration files from your VPN provider if you want to go this route.

The most common way to use a VPN is through a VPN client (VPN app) offered by your VPN provider. This also gives you all of the features and full leak protection settings (recommended).

8. Why a VPN is necessary for online privacy

A good VPN can provide you with both online privacy and security.

Without a VPN, your internet service provider (ISP) can easily monitor and record your online activities: sites you visit, comments you make, social media interactions, preferences etc.

Many countries now require internet providers to log user data and browsing activities. A VPN is the best solution to protect yourself against these privacy violations.

VPN online privacy

When using a VPN, your internet provider can only see that you’re online and connected to a VPN server. That’s it. With a VPN, your data is encrypted and secured, which makes it unreadable to third parties.

With a VPN, public WiFi hotspots are once again safe to use, thanks to secure encryption that protects your data. Using public WiFi without a VPN is risky because hackers can exploit public wireless to steal your identity, credit cards, bank accounts, passwords, etc. A VPN will encrypt and protect this data from third parties and hackers.

9. Will a VPN make me 100% anonymous?

The short answer is no.

Given all the different ways someone can be de-anonymized online (particularly through browser fingerprinting), a VPN alone will not give you 100% anonymity. In fact, with the vast resources of surveillance agencies, such as the NSA, it is probably very difficult to ever achieve 100% online anonymity.

On a positive note, however, there are simple steps you can take to further increase your online anonymity:

  1. Use a secure browser that protects against browser fingerprinting (your browser can reveal lots of information to third parties).
  2. Use a good ad blocker. Advertisements are basically tracking in disguise, collecting your activities online, profiling you, and then using that data to target you with better ads. There are also some VPNs with ad blocking.
  3. Use a VPN to hide your IP address and location, while also encrypting your traffic.

These are the three basics that everyone should be doing. However, we list more tools and solutions on our privacy tools page.

10. VPN protocols and encryption

Most commercial VPN services offer a variety of different VPN protocols you can use with the VPN app.

What exactly is a VPN protocol?

A VPN protocol is a set of instructions to establish a secure and encrypted connection between your device and a VPN server for the transmission of data.

VPN Protocol

Here are the most popular VPN protocols in use today:

  • OpenVPN – OpenVPN remains the most popular and most secure VPN protocol that is used on all types of different devices. OpenVPN is an open-source project developed for multiple types of authentication methods. It is a very versatile protocol that can be used on many different devices, with a variety of features, and over any port with UDP or TCP. OpenVPN offers excellent performance and strong encryption using the OpenSSL library and TLS protocols.
  • WireGuard – WireGuard is a newer VPN protocol that aims to offer improved security and better performance in comparison to existing VPN protocols. By default, WireGuard has some issues with privacy, although most VPNs supporting WireGuard have overcome these issues (see for example with NordVPN and Surfshark). Now a word on speeds. In our WireGuard vs OpenVPN speed tests, WireGuard was about 58% faster than OpenVPN on average.
  • IKEv2/IPSec – Internet Protocol Security with Internet Key Exchange version 2 (IPSec/IKEv2) is a fast and secure VPN protocol. It is automatically pre-configured in many operating systems, such as Windows, Mac OS, and iOS. It works well for re-establishing a connection, especially with mobile devices. One downside with IKEv2 is that it was developed by Cisco and Microsoft and is not an open-source project, like OpenVPN. IKEv2/IPSec is a great choice for mobile users who want a fast, light-weight VPN that is secure and can quickly reconnect if the connection is temporarily lost.
  • L2TP/IPSec – Layer 2 Tunneling Protocol with Internet Protocol Security is also a decent choice. This protocol is more secure than PPTP, but it does not always have the best speeds because data packets are double-encapsulated. It is commonly used with mobile devices and comes built-in on many operating systems.
  • PPTP – Point-to-Point Tunneling Protocol is a basic, older VPN protocol that is built-in on many operating systems. Unfortunately, PPTP has known security vulnerabilities and is no longer considered a safe protocol for privacy and security reasons.

Each VPN protocol has its own pros and cons. OpenVPN is the most popular and widely-recommended, because it is secure, open-source, and also offers good performance. But it also requires the use of third-party apps. L2TP/IKEv2 is also a secure protocol with excellent performance and it can be used natively on most operating systems (no apps required) – but it’s not open source.

If you are looking for speed and updated security, WireGuard remains an excellent choice. The best VPN for WireGuard is currently NordVPN, which supports WireGuard directly in all of the VPN apps.

VPN Encryption

AES (Advanced Encryption Standard) is one of the most common cryptographic ciphers in use today. Most VPNs utilize AES encryption with either a 128-bit or 256-bit key length. AES-128 is considered secure, even with the advances in quantum computing.

Here is an interesting quote from VPN.ac on AES and encryption and vulnerabilities:

OpenVPN 256-bit AES is kind of overkill, rather use AES 128-bit. We don’t expect anyone to go for AES cracking while there are weaker links in the chain, such as the RSA keys: how are they generated (good or poor entropy, online/offline generation, key storing on servers etc.). Therefore, AES-128 is a very good choice over AES-256 which is mostly used for marketing claims (“bigger is better”).

Aside from AES, there are other VPN ciphers, such as Blowfish and Camellia, although they are rarely offered by VPN services.

WireGuard uses an interesting assortment of encryption algorithms, as we explained in the main WireGuard VPN guide:

  • ChaCha20 for symmetric encryption, authenticated with Poly1305, using RFC7539’s AEAD construction
  • Curve25519 for ECDH
  • BLAKE2s for hashing and keyed hashing, described in RFC7693
  • SipHash24 for hashtable keys
  • HKDF for key derivation, as described in RFC5869

Moving beyond security, let’s now examine VPN logs and privacy.

11. VPN logs – different types

When it comes to privacy, it’s good to pay attention to logs and logging policies.

VPN Logs

Here are the different types of VPN logs:

  • Usage (browsing) logs – These logs basically include your online activities: browsing history, times, IP addresses, metadata, etc. Reputable VPN services do not collect any usage logs. With shady free VPN apps, however, you will often find they are collecting usage logs (and selling the data).
  • Connection logs – Connection logs typically include dates, times, connection data, and sometimes IP addresses. Usually this data is used for optimizing the VPN network and potentially dealing with user problems or ‘terms of use’ issues. The key here is reading the fine print to see how the data is secured and how regularly it is deleted.
  • No logs – While there are many VPNs that claim to be ‘no logs’, there are only a few that have been verified to be truly no logs VPN services in real-world tests and/or through third-party audits.

Minimal connection logs that are secured and regularly deleted are not very concerning – but it all depends on the user and threat level.

Also, keep in mind that there are some VPN services that will falsely claim to be “no logs” on their homepage, but then carefully disclose the data that is collected in their privacy policy. There have been cases where authorities obtained user data from “no logs” VPN providers. Two examples of this are with PureVPN (logging case) and IPVanish (logging case).

12. VPN performance and speed

When you’re using a VPN, a lot is going on behind the scenes. Your computer is encrypting and decrypting packets of data, which is being routed through a remote VPN server. All of this takes more time and processing power, which will ultimately affect your internet speed.

To ensure the fastest speed while using a VPN, it’s best to connect to the closest VPN server that fits your needs. For example, if you’re in the UK and want to watch blocked videos that are available to people in the United States, choosing a VPN server in New York is better than a Los Angeles server.

VPN speeds are a factor we always test for in our VPN reviews. Top-quality VPNs will offer consistently fast speeds throughout their server network. You should not be able to notice any performance tradeoff with regular browsing or streaming videos. That being said, due to encryption and increase latency, you will still take a drop in speed.

On a positive note, many VPNs are rolling out solutions to give you the fastest VPN speeds possible. For example, NordVPN’s implementation of the WireGuard VPN protocol with NordLynx recently broke our speed test record. This was the fastest VPN speed we recorded, which we got with a NordVPN server in Seattle using WireGuard:

VPN speeds
Some VPNs offer very fast speeds, such as this example from NordVPN with the WireGuard protocol.

Here are a few tips for maximizing your VPN speed:

  1. Get a premium VPN service with good performance, such as NordVPN.
  2. Connect to a nearby server that is not congested with other users (lots of available bandwidth).
  3. Try changing VPN protocols if the first two options do not work. In our tests, we’ve found the WireGuard protocol to be significantly faster than all other VPN protocols.

VPN speeds may also be limited by the device you are using, your network, or your internet provider throttling VPN connections. Therefore you may want to tinker with variables to find the best solution for speeds with your VPN.

13. Using a VPN for streaming

Aside from online privacy and security, VPNs are also used by thousands of people around the world for streaming. There are many reasons to use a VPN for streaming.

A VPN will allow you to access content that is censored, geo-blocked, or otherwise restricted. Because a VPN gives you the ability to “tunnel” into any VPN server location around the world, it remains the ultimate tool for online streaming.

Below I’m using NordVPN to stream US Netflix:

VPN for streaming

Here are a few popular streaming uses for VPNs:

  • Streaming Netflix – Using a good Netflix VPN is a great idea no matter where you live. This allows people living anywhere in the world access to American Netflix, or any other major Netflix library that’s supported by your VPN.
  • Streaming sports – Some sporting events/games are restricted to certain geographic regions, with access blocked for anyone outside those regions. A VPN lets you appear to be “virtually” located in the designated area for streaming.
  • Streaming Kodi – Using a VPN with Kodi is a popular way to unlock any add-ons and utilize Kodi to its full potential.
  • Evading censorship – Censorship continues to ramp up throughout the world and there are numerous media websites that are blocked in different regions. A VPN allows you to easily break through these censorship efforts to access the content you want.

VPNs are also popular for other streaming services, such as Hulu, Amazon Prime, and BBC iPlayer. Many expats living outside their home country use VPN services to unblock websites, streaming add-ons, and media channels in various locations.

14. Using a VPN for torrenting

Another very popular use for VPNs is with torrenting and P2P downloads. When you use a VPN for torrenting, your true identity and IP address will be concealed from third parties. Additionally, your ISP will not even be able to see your activities — whether you are torrenting or streaming, your ISP will be in the dark.

Torrenting and P2P filesharing is somewhat of a grey area and may be classified as copyright infringement, depending on the content you are sharing/downloading and where you live. Right now, countries throughout the world are cracking down on torrenting, from Europe to the United States and Australia. Here is one such example illustrating the risks of torrenting without a VPN:

VPN for torrenting
Always use a good VPN for torrenting.

While we do not support any illegal activity or copyright infringement here at Restore Privacy, it should be obvious that torrenting without a VPN can be risky.

Media companies often run networks of monitoring nodes, which will join torrenting swarms and collect connection data of all infringing parties. Then, the media companies can go to the internet service providers that own the IP addresses they collected, and link these up to users along with connection times. The user will then be fined or sued for copyright infringement on behalf of the copyright holder.

The best solution here is to always torrent with privacy by using a good VPN.

15. VPNs on Android and iOS devices

People spend a lot of time on mobile devices, and mobile internet traffic continues to rise. As such, VPNs are also becoming more popular on mobile devices.

There are three different ways to use a VPN on Android and iOS devices:

  1. With custom VPN apps. Most providers offer custom VPN apps for both Android and iOS devices, which are usually fast, stable, and offer different features. For example, both Surfshark and ExpressVPN, as well as NordVPN, offer secure and user-friendly clients for Android. Here is NordVPN Android client:
    VPN for Android
  2. With third-party VPN apps. There are also popular, third-party VPN apps that you can use with your VPN service, such as OpenVPN for Android, which is free and open source.
  3. With built-in VPN functionality. With Android, you can use the built-in IPSec/L2TP functionality. With iOS, you can use the built-in IPSec/IKEv2 functionality. Both operating systems have VPN preferences in the settings area. You will need to import the configuration files from your VPN provider into your phone/tablet to go this route.

While VPNs have improved significantly on iOS and Android, they still don’t work quite as well as they would on a computer. The main reason for this is that using a VPN is a bit more complicated than typical applications, requiring connection to external servers, encryption, and decryption. Naturally, this is a bit challenging on a phone which may go in and out of connectivity. However, this is improving as cell service and bandwidth continue to improve.

WARNING: Be very careful with mobile VPN apps from third parties. There are many shady VPN apps that are dangerous and should be avoided. Do your research before installing the VPN app and remember that highly-rated (free) apps in the Apple and Google Play stores can still be full of malware – as explained in this study. Your best bet is to only use the VPN mobile apps offered by a reputable (paid) VPN service, not a shady free VPN app that is probably collecting your data for profit.

We have reviewed some of the best VPNs for Android.

16. Using a VPN on a router

It is possible to use a VPN on a router, although it may require a bit of work.

A good VPN router offers the following benefits:

  • Extends the benefits of a VPN to all your devices without installing software
  • Easily protects you against surveillance and internet service provider (ISP) spying
  • Secures your home network against attacks, hacking, and spying
VPN router

The trick to getting this setup correctly is first choosing a good VPN service and then selecting the right router – the rest is easy.

Important note: The main factor when choosing a VPN router is the router’s CPU (processing power). Unfortunately, most consumer-grade routers are underpowered and do not do well with VPN encryption.

Right now, the best VPN router we have tested is the Vilfo router, from the creators of OVPN in Sweden.

17. VPNs and Tor

VPNs and Tor are both privacy tools that offer online anonymity, but they are very different from each other.

Tor stands for The Onion Router and is both a browser and a network that utilizes multiple “hops” to protect user privacy. Tor was created by the US government in 2002 and is still largely dependent on US government agencies for funding. Aside from this troubling fact, there are a few other concerns with Tor:

  • Some believe that the Tor network has been compromised
  • Microsoft’s DRM can easily expose Windows-on-Tor users
  • Viewing PDF documents while using Tor can also leak your identity
  • Tor users are vulnerable to end-to-end timing attacks
  • Tor is too slow for everyday use, especially with anything that requires some bandwidth, such as watching videos

There have also been numerous issues with malicious Tor nodes. Many also suspect that government agencies are operating Tor nodes for surveillance purposes.

We discuss these issues and more in our VPN vs Tor comparison.

One way to mitigate risk is to distribute trust. You can do this by using a VPN and Tor together, here’s how:

  • Connect to a VPN > Launch Tor browser: This method is pretty basic and self-explanatory. Simply use your desktop VPN client and connect to a VPN server, then open the Tor browser and use Tor as normal. This won’t give you great speeds, but it’s a simple way to use “Tor-over-VPN”. This method hides your real IP address from the Tor network.
  • Use a VPN service with servers that exit onto the Tor network. In this case, you can simply connect to a designated “Tor-over-VPN” server, and your traffic will automatically leave the VPN server, exit onto the Tor network, and then go through to the regular internet. I have tested out two different VPNs that offer this feature: NordVPN and ZorroVPN.

It should also be pointed out that you can get many advantages of Tor, such as multi-hop configurations, with VPNs. There are a few VPN providers that offer multi-hop VPN servers and cascading support – see the multi-hop VPN guide for an in-depth discussion of this topic.

18. VPN leaks and kill switches

One serious issue that plagues many VPN services is when data leaks out of the VPN. Here are a few different types of leaks that will undermine your privacy and security when using the VPN:

  • DNS leaks – This occurs when your DNS requests leak out of the VPN tunnel and are processed by your internet provider. This can reveal your browsing history (DNS requests) to third parties, the IP address of your internet provider, and your general location.
  • IP address leaks – An IP address leak is when your IP address leaks out of the VPN tunnel. This can be a short, temporary leak, or a continuous leak. This is often the case with IPv6 addresses with VPNs that do not support or properly block IPv6.
  • WebRTC leaks – This is mainly an issue with Firefox, Chrome, Brave, and any other Chromium-based browsers that utilize WebRTC APIs. A WebRTC leak exposes your IP address through your browser, even if you are using a good VPN. See the WebRTC leak guide for how to fix this problem in your browser.

Here is an example of DNS leaks we found in the PureVPN review:

VPN that leaks
Some VPNs will leak your data.

This is one reason I recommend regularly testing your VPN to check for any problems, leaks, or vulnerabilities.

19. How to defeat VPN blocks

One problem that some people face is that their VPN is getting blocked. There are a few different circumstances in which VPNs are blocked:

  • Restrictive countries – China, UAE, and Iran all implement some form of VPN blocking, because they do not want people using VPNs to get around censorship efforts.
  • School networks – School networks sometimes block VPNs for two reasons. First, they want to be able to monitor everything you do online (and on their network), which is easy to do if you aren’t using a VPN. Second, they may want to block torrenting, streaming, and other high-bandwidth activities. A VPN allows you to easily get around these restrictions and access any blocked websites.
  • Work networks – Work networks often block VPNs for the same reasons mentioned above: they want to control and monitor workers’ online activities.

The best way to get around VPN blocks is with obfuscation. VPN obfuscation basically hides VPN traffic behind standard HTTPS (Hypertext Transfer Protocol Secure) encryption, such as when you connect to a banking website over port 443.

Many VPNs offer obfuscation features for this situation. Some offer obfuscated servers, while others offer a self-developed protocol that will automatically obfuscate traffic with any server, as we observed in the VyprVPN review. Below is an example with VyprVPN, which uses the Chameleon protocol (based on OpenVPN) to get around VPN blocks when other protocols fail:

VPN blocks

Unless you are in a restricted network situation where VPNs are getting actively blocked, you should not need to use obfuscation, since it may affect performance.

20. The future of VPNs

The future of VPNs is looking bright – but not for the right reasons.

Mass surveillance, corporate tracking, and online censorship are three drivers that will continue to push VPN usage higher. Internet providers are increasingly blocking various websites – from adult content to torrenting sites. Concerns over surveillance and privacy are also rising:

  • United States: Since March 2017, US internet providers are able to legally record your browsing history and sell this information to advertisers – or hand it over to surveillance agencies.
  • United Kingdom: The UK is one of the worst countries in the world for privacy. Internet providers and telephone companies are required to record all browsing history, text messages, and location data of their customers. This data is provided to UK government agencies and is available without any warrant. The UK is also testing experimental new tools to track the browsing history of everyone.
  • Australia: Similar to the UK, Australia implemented a mandatory data retention scheme requiring telecoms to collect text messages, calls, and internet connection data.

Going online without a VPN really leaves you exposed.

As people wake up to the risks of surveillance, data collection, and security threats, VPN usage will continue to grow. The growing trend of people streaming media and wanting to access various content from around the world also increases the demand for VPNs.

Whichever VPN you decide to use, be sure to do your research and select the best fit for your own needs and uses. We have many different VPN guides you can see on the Restore Privacy homepage.

Sven Taylor

About Sven Taylor

Sven Taylor is the founder of Restore Privacy. With a passion for digital privacy and online freedom, he created this website to provide you with honest, useful, and up-to-date information about online privacy, security, and related topics. His focus is on privacy research, writing guides, testing privacy tools, and website admin.

Reader Interactions

Comments

  1. AvatarJ.M.

    December 17, 2020

    While I disagree with Google on all fronts, if you do have an Android TV, this may be of interest to you.

    https://protonvpn.com/blog/android-tv-app/

    Reply
  2. AvatarDwight

    December 2, 2020

    Hi Sven,
    I use NordVPN on Windows.
    Do I need to configure the following settings to prevent DNS leaks?
    By default, Ethernet is connected.

    ControlPanel > Network and Internet > Network Connections >
    TAP-NordVPN Windows Adapter V9 > Internet Protocol Version4
    (TCP/IPv4)The choice

    Reply
    • Sven TaylorSven Taylor

      December 2, 2020

      Hi Dwight, you should just enable the Kill Switch under NordVPN settings and that should protect all traffic against DNS and IP leaks.

      Reply
  3. AvatarTrisha

    November 29, 2020

    What is your opinion regarding Kaspersky VPN and Security protection software?

    Reply
  4. AvatarOskar

    November 4, 2020

    Hi there,

    I have a general question regarding VPN use. Does it make sense to use the same VPN server all the time (because I get good speeds etc..) or is it better to use a different VPN server / VPN IP every day?
    Reason is, there a providers like NordVPN which have a big amount of servers (which are less crowded) or VPN´s like OVPN (with less servers, so many users share the same ip). Is it better in terms of privacy/tracking to use the same server all the time (but always with the same Ip adress), so my traffic is mixed with many other users; (OVPN) or use a different server every day (NordVPN) where each server is used by less users but I get another IP more often?

    Best regards and thanks in advance

    Reply
    • Sven TaylorSven Taylor

      November 4, 2020

      Hi Oskar, I don’t think it’s a bad idea to mix things up a bit. This is just the idea of distributing trust between different providers and different VPN servers.

      Reply
  5. AvatarArnon

    October 25, 2020

    Hello Sven,

    You assume there is more privatization in a country as Panama, than in a Sweden? the last one has high private rights, but member is a member in the ’14 eyes’.

    Regards,

    Arnon

    Reply
  6. AvatarArnon

    October 25, 2020

    Hello,

    Mozilla has started offering VPN , joint venture with Mullvad.

    Reply
  7. AvatarJezz

    October 15, 2020

    Hi Sven,
    I have read a lot of Restore Privacy’s articles and research. It’s my favorite site for internet safety.
    I just came across something that surprised me though. I started to read NORD Acount/VPN/Pass
    Privacy Policy and under Cookies, I found that they indeed use cookies. They were very open about it even to the point of identifying the cookies and what they do. As an example the cookie +_4etsid is used for targeted advertising. This seems to fly in the face of the whole purpose of using a VPN!
    If NORD is tracking us, what’s the use of even bothering with all of this? Maybe you can tell me how I am so wrong about this. That would make me feel a lot better.
    Jezz

    Reply
    • Sven TaylorSven Taylor

      October 15, 2020

      These are website cookies, which is separate from the VPN itself. Without cookies, you can’t really run a website, especially where people log in to their accounts. And yes, every competitive VPN runs advertising campaigns, with related cookies, to stay competitive and attract customers. But cookies are easy to block, and you will find nearly every VPN website has some kind of cookies and analytics.

      Reply
    • AvatarJezz

      October 19, 2020

      Thank you so much.

      Reply
  8. AvatarBrandon P

    October 7, 2020

    This was very helpful article. Thanks so much. I’ve had Nord for about a year and a half and have been happy with it’s effectiveness, but there’s one issue I have that I cannot figure out. (I even chatted with support and they couldn’t help me.)

    Whenever I connect using Nord on one wifi network and then try to change to another (from work to home, for example), I can’t connect at all until I restart my computer. This happens even if I disconnect first. No matter what I do, I can’t connect to a new wifi network until I restart my computer. And this isn’t unique: it happens on both of my Macbooks. Do you have any idea what I might be missing?

    Reply
    • Sven TaylorSven Taylor

      October 7, 2020

      Hi Brandon, I’m not sure on this one, but I’d guess it’s connected to the leak protection settings.

      Reply
  9. AvatarMr. Orange

    September 30, 2020

    Hi Sven

    A newbie question. If I’m using an app (let’s say spotify) in my cellphone while having my VPN turned on, would my ISP or phone service provider know I’m connecting to Spotify?

    Reply
    • Sven TaylorSven Taylor

      September 30, 2020

      If your ISP is only examining internet traffic, through which the app connects, then no, they should not be able to see that you are using a Spotify app.

      Reply
      • AvatarMr. Orange

        October 2, 2020

        Thanks for the quick reply. Would you recommend to always keep the VPN turned on? Because I’ve kept ExpressVPN connected the last couple of days and have noticed a slight increase in battery usage.

        Reply
        • Sven TaylorSven Taylor

          October 2, 2020

          Well, it all depends on your threat model and who your adversary is. I’m not on mobile much, but with my computers, I always use a VPN. I guess keep it on whenever you don’t want your ISP snooping everything you do online.

  10. AvatarA LAN Lad

    August 16, 2020

    Came here earlier via a link in The Register’s forums. Using an Android phone, my computer being currently elsewhere (extensive work on the property beginning tomorrow. Not seized by the authorities!)
    I began degoogling long ago, using Ixquick, and Startpage, when they were good. When they were no longer good I switched to DuckDuckGo, and only today replaced it as my default Search Engine on this device with MetaGer. It’s good, at long last, to have one the results of which I can open in a proxy again!
    So, checking out your VPN recommendations, tapping the links to their home pages… here, in the UK, on O2, straightforward links from anywhere, to VyprVPN and Perfect-Privacy, I get about:blank or Connection Failed. But they load if opened via the MetaGer proxy. NordVPN and ExpressVPN load fine. So it’s not O2 treating VPNs like Torrent indexers? I’ve decided against Vypr now anyway, but Perfect-Privacy still looks promising.
    I’m using Firefox, but also have the DDG browser and Tor, and they don’t open in those, either. I vaguely remember sites being cached versions, though not that that was specifically when opening in a proxy, and even if it was, why no 404 or O2 block warning page if the current ones are unavailable? Turned off uBlock Origin, Decentraleyes, Privacy Badger and AdNauseum, but no difference.
    Any idea what’s going on here? Just curious. When the place is sold I’ll expect to be on the desktop, using an Asus router and maybe two VPNs – so thanks for that idea! It’s been very helpful.
    Btw I mostly use Pale Moon (on the desktop), have since – what was it, Firefox 27? I do not understand those commenting with such a low opinion of it (and you can take this whichever way you like: I’ve still got one or two add-ons running in it – or capable of it – I was running in FF3.x, if not earlier). The Pale Moon profile used to get corrupted about as regularly as the Firefox profile did, but that’s getting to be a distant memory almost as old as Windows crashing (disclaimer: I don’t run 10 !).
    I seem to have strayed from the point.

    Reply
  11. AvatarAlex

    July 11, 2020

    really great article. have you any comment about lime vpn? it is very cheap . that is mean:D

    Reply
    • Sven TaylorSven Taylor

      July 11, 2020

      I have not tested it, so no comment..

      Reply
  12. Avatarshopper

    June 19, 2020

    Silly question. I work for a online retail store. They use ip address’ to protect from fraud orders. From my limited understanding, they make sure the location of the person is the same as the billing address. Would using a VPN flag the fraud protection service when trying to buy online?

    Reply
    • Sven TaylorSven Taylor

      June 19, 2020

      Yes, it could get an order flagged, but I always have a VPN on and have never had an issue with multiple orders from various sources over the years.

      Reply
  13. AvatarJ.M.

    June 16, 2020

    I just saw this advertisement. I know it may be a proxy but it could be something else. Any thoughts?

    https://swisscows.ch/en/vpn

    Thanks.

    Reply
    • Sven TaylorSven Taylor

      June 16, 2020

      Interesting, thanks for sharing. Well, it’s just part of the trend we’ve noticed over the past few years as various companies enter the growing VPN market.

      Reply
      • AvatarJ.M.

        June 16, 2020

        You’re welcome.

        I haven’t looked into it much more than a precursor look but thought I would put it on your radar.

        Reply
  14. AvatarPeter

    May 15, 2020

    Any comments on Proton VPN, thanks.

    Reply
    • Sven TaylorSven Taylor

      May 15, 2020

      ProtonVPN review

      Reply
  15. AvatarNiels

    May 4, 2020

    Do you have any thoughts on the stance that VPNs shouldn’t be used in an attempt to increase privacy? Wolfgang’s Channel has made an interesting video called ‘Stop using VPNs for privacy.’ on the subject referencing joepie91 on github:

    [https://www.youtube.com/watch?v=FMScV1Mkaok]
    [https://gist.github.com/joepie91/5a9909939e6ce7d09e29]

    I must admit I am fairly novice in regards to privacy enhancement and thus I primarily seek guidance from more well versed people in as broad a scope as possible wherefore I seek your opinion on this issue as I’ve come to respect yours quite a lot. I hope I’m not merely asking a previously answered question.

    Best regards!

    Reply
    • AvatarJoe

      February 25, 2021

      I second that question!
      Even if it’s still good that we can hide our IP from anyone but the VPN..

      Reply
  16. AvatarKirstin

    March 12, 2020

    Thanks so much Sven, such a helpful website! One thing I don’t see is this – you had recommended Chameleon extension for the FF browser, and so I wonder – once you’ve installed a recommended VPN, is it still useful to use? Or does it somehow conflict?

    Reply
    • Sven TaylorSven Taylor

      March 13, 2020

      The Chameleon extension is useful for changing your browser fingerprint, whereas a VPN hides your IP address and location. So both do different things.

      Reply
  17. AvatarVicki

    February 21, 2020

    newbie question that I did not see specifically spelled out: suppose I get one of the recommended VPN apps for a mobile device/phone. Does the VPN’s protection apply only to connection via WiFi, or does it also protect connection via phone service provider? I would hope that at least the “data” portion of a phone plan would be protected… Anyone know? Thanks!

    Reply
    • Sven TaylorSven Taylor

      February 21, 2020

      Yes, the VPN will work with any internet connection the phone makes, whether it is with cellular data, WiFi, or anything else. So yes, you’ll be protected.

      Reply
      • AvatarVicki

        February 21, 2020

        Thank you very much!

        Reply
  18. AvatarHardSell

    December 13, 2019

    Sven,

    You know when you install a 3rd party Windows VPN client, you also get a Tap-Adapter (driver) that’s used and I’m guessing for the (OpenVPN protocol).
    I’ve seen OpenVPN Daemon making network contacts – which I take is the client to the network handshake or the tunnel established / something likewise.

    What does a Router use in place of the Tap-adapter, when your using it’s VPN client ?
    Would something that functions like the Tap driver be pre-installed to a Routers firmware especially in one that offers a VPN client ?

    Reply
  19. Avatarrobin

    July 24, 2019

    Hi Sven,

    Many thanks for this Website! It was a great help to inform myself about how to gain more online privacy.

    I implemented several of your suggestions:
    – switched from chrome to firefox with you privacy guide
    – switched from gmail to posteo
    – got an account with ExpressVpn
    – trying startpage.com

    It is because of the VPN that i write you. Is it best to just use it for my browser or for all connections leaving my pc? Because when my macOs (or any other application) is looking for an update, they will now who I am. So would it be better to use my normal IP? Or are they just knowing that i use a VPN but still can not track me?

    The same question i would have for google as a search engine. If I am not logged in with a google account and using the vpn. Could they still map my searches to me? Or are they just knowing that I use a vpn? I am a Developer and need google for my work. I still think it delivers the best results. I know that startpage.com is showing me google answers but i miss search suggestions and auto completion in the address bar of my firefox when using startpage.

    My Threat level is not that high. I am not a valuable target for governments. I just dont want private companies to spy on me and reading my mails etc.

    Many thanks for your work!
    Lg
    Robin

    Reply
    • Sven TaylorSven Taylor

      July 25, 2019

      “Is it best to just use it for my browser or for all connections leaving my pc?”
      Yes, I would say so. Many apps on Mac OS “phone home” in the background. You can see this with programs like Little Snitch, for example, which also allows you to block these connections. A VPN will conceal your IP address and location, and given the performance of ExpressVPN, you shouldn’t even notice it’s on.
      “If I am not logged in with a google account and using the vpn. Could they still map my searches to me? “
      I don’t have a definitive answer here since there are many advanced methods Google can use to track people. The VPN will hide your IP and location, but it doesn’t solve the issue of browser fingerprinting. So if you want more privacy, you might want to also use a secure and hardened browser.

      Reply
  20. AvatarPeter

    June 2, 2019

    Hi, Sven.
    Just wanted to say that I’ve been advocating the use of VPNs to friends and family for years. This primer is probably the best I’ve seen on the topic. Great work!

    Reply
    • Sven TaylorSven Taylor

      June 2, 2019

      Hey Peter, thanks for the feedback!

      Reply
  21. Avatarjdg

    May 20, 2019

    I’m not an expert – I have a couple questions about virus protection and internet security. I have Apple products (iMac, MacBook Pro, iPhone, iPad, and the family uses WinTel computers and android products. I currently use Bitdefender (country of origin is Romania) is that a good solution overall for virus protection and such? They offer a VPN as well- do you have an opinion on their VPN? I have seen where experts claim that apple products don’t need virus protection if you use their OSX built in protections and common sense when on the internet- I wasn’t aware of Bitdefenders country of origin until after I purchased the subscription – should I be concerned with their country of origin for virus protections? Recently I started researching about privacy and decided I need to beef up my internet protections – your site is a trove of useful information by the way – thank you! Any help and understanding you can provide is greatly appreciated.

    Reply
    • Sven TaylorSven Taylor

      May 20, 2019

      Hi JDG, yes, I’d agree the Mac OS and iOS offer advantages in terms of security over Windows, but Linux would be best. I don’t spend too much time on antivirus software, but I did write an article about antivirus privacy issues. Yeah, I’ve seen lots of antivirus companies rolling out various VPNs, and frankly, I would stick with a VPN from a company that specializes in VPNs, but that’s just me. See the best VPN guide for the latest updates.

      Reply
  22. AvatarMullvadComingSoon?

    March 29, 2019

    Hey Sven, I know youre probably really busy right now, I was just wondering if you plan on doing a Mullvad review anytime soon? They look like a very promising choice for those looking to protect their anonymity.
    Hope to hear from you soon, thanks.

    Reply
  23. AvatarChris Martin

    February 27, 2019

    I am a disabled adult living on a government pension, there is no extra money for anything as you may well imagine. I am looking for a completely free vpn or open source vpn to protect my internet usage. Can you recommend one that is completely free and easy to use for the less tech user.

    Reply
    • Sven TaylorSven Taylor

      February 27, 2019

      Hi Chris, I can’t say I’d recommend any free VPN or Tor. That being said, you can harden your browser (see the secure browser guide) for maximum privacy, install HTTPS Everywhere which will encrypt traffic between your browser and the HTTPS sites you are visiting and also install an ad blocker (check out uBlock Origin). Note that HTTPS Everywhere does not conceal your browsing history from your internet provider or other third parties and only encrypts traffic for HTTPS websites, but it’s better than nothing, and this is all free.

      Reply
    • AvatarHard Sell

      March 2, 2019

      ditto @ Chris Martin
      Me it’s not a pension and only hundreds not thousands monthly.
      So it’s imperative that if money has to be forked up, it’s spent well and understood why it’s important as being spent on something.
      – If you meet it’s eligibility requirements – ‘PCs for People’ – a potential recipient must be below the 200% poverty level or be currently enrolled in an income-based government assistance program. https://www.pcsforpeople.org/
      –
      Your most likely having the time to research into all of this. Take small steps – keep organized notes – draft a plan with an outline to the overall direction of your goal/your privacy.
      See – “Simple Online Privacy Guide – 18 Steps to Protect Yourself”
      https://restoreprivacy.com/simple-privacy-guide/
      I’d advise never going with a free VPN, just like anything associated with the web as free – it’s not completely free as your surrendering your most important self data.
      Seek a paid trustworthy VPN, trying out at first or understand it’s refund policy – then going with multiple years brings a monthly cost basis down.
      https://restoreprivacy.com/vpn/coupons-discounts-deals/
      https://restoreprivacy.com/vpn/reviews/
      https://restoreprivacy.com/vpn/best/
      –
      See the Internet as the interstate roadways, where your with many other commuters. Factory tinted windows – tinted tag plates.
      Blend in as just one of the many brown fords in the traffic flow.
      Point being common as and concealed is harder to stand out – as opposed to commuting of a top down flashy red convertible with personal tags – that would be as online with your ISP IP address shown in the open.
      – Cops are on the beat and spy’s in the sky on roadways, the internet also shares in your IP address liability of the digital traces you’ll spread and then has it’s own cops and spy’s.
      –
      As in using a VPN, your moving your trust, speed, viewable web data from an ISP you’ve paid for over to a VPN service. The ISP no longer can easily intercept, snoop and view your data.
      – You’ll still use the ISP to connect to the internet. A VPN is not a replacement for it. But, instead of the ISP communicating directly with a web page, the ISP now talks to the VPN server that talks to the web page encrypted.
      *It’s the VPN server that connects to the website you wish to reach. The key point now is the connection between your device and the VPN server is encrypted in what’s called a VPN Tunnel.
      –
      The ISP can still intercept the data, but that data is no longer viewable to it. In other words, the ISP is aware you’re sending and receiving things but has absolutely no way of knowing what those things are.
      That is till a dropout occurs in the VPN service at anytime.
      The moment a VPN connection drops, the encrypted VPN Tunnel is lost, and the ISP can once again view and analyze anything of your transmitted data. Good paid for VPN’s have a KILL SWITCH for this purpose and then likely will handle all you DNS requests on their ens as well.
      –
      Pay for a VPN please to get-
      1. More privacy.
      Your connections cannot be linked to your computer…and you. You can visit any website and your ISP doesn’t know where you’ve been.
      2. More security.
      VPN connections are super encryption secure. The network is hack proof and all of your Internet activity is encrypted (coded) and unreadable in transit.
      3. More website access.
      No more blocks or censorship. Whoever can’t now prevent you from getting to websites based an your IP address location.
      4.More anonymity.
      Your true IP address is hidden! You’re unidentifiable online because you can constantly be using a different IP address, never your ISP own. In fact, it typically looks as if you’re in a different part of the world from wherever you really are if you choose too.
      Hope this is informative help : )

      Reply
    • Avatarxeonfreeman

      January 9, 2020

      Chris, protonvpn is what I use

      Reply
  24. AvatarVoltir

    January 16, 2019

    Hi Sven.
    I have a question: should VPN be used for online gaming? Logically it could increase ping and lower fps a bit, but what is the trade-off? It kinda puzzles me, because if we want to play a game it also means we have to accept EULA and install game on our computer which then has access to almost any file. If so then shouldn’t it be more important to read eula/research what information game collects than encrypting connection to game server?
    And second question: what about services (ie. banks) that require geo-location? Connecting to vpn server in same country should be sufficient?

    Reply
    • Sven TaylorSven Taylor

      January 17, 2019

      Hi Voltir, yes, there are many advantages to use a VPN for gaming, but you will need to go with a high-performance VPN that offers good ping and speeds throughout the network – I’d recommend ExpressVPN (see also the ExpressVPN review). Regarding exactly how much info/data games collect from your system, I can’t answer that. Some advantages of using a VPN for gaming:
      Play games, download DLC content, and access Xbox Live and PSN exclusives from every country.
      Be the first to play certain games by downloading from countries with earlier launch dates.
      Shorter connection routes between you and gaming servers can reduce ping times and overall lag (much better performance).
      Keep your data and files safe behind an encrypted gaming private network.
      Protect yourself from DDoS attacks, which are quickly becoming the scourge of e-sport tournaments.
      Use gaming servers from anywhere in the world when traveling to cut out terrible ping times.
      Play multiplayer games in every region.
      Connect to servers around the world to play your friends, even if a title requires an IP address from a specific country to play.

      Reply
  25. AvatarHard Sell

    November 1, 2018

    Hi Sven,
    As your reply to Jack NOVEMBER 10, 2017, https://restoreprivacy.com/vpn-logs-lies/
    ‘you are correct in suggesting that VPNs are playing “word games” when it comes to logs. As I said in this article, there is no definition of “logs” or “no logs” – so anything goes.
    Even “trusted” VPNs that are put up on a pedestal by the tech industry are playing “word games” when it comes to logs.’
    @ So there is no understood and an applied standard to Logs methodology in the VPN industry and it’s a shame.

    And your reply to Dan NOVEMBER 5, 2017, https://restoreprivacy.com/vpn-logs-lies/
    ‘A VPN service must cooperate with the laws under which they operate (jurisdiction). For example, a Romanian VPN service does not have to “cooperate” with an American DMCA complaint – different countries, different laws. Jurisdiction is key here – it may be good to avoid Five Eyes and 14 Eyes.’
    @ So if their servers are located in different countries than where the VPN headquarters is, how is jurisdiction of a VPN playing a key role here ?
    If servers can be seized in countries other than the VPN headquarters location what jurisdiction laws take a president to the located servers being seized?

    And your reply to Jack OCTOBER 14, 2017, https://restoreprivacy.com/vpn-logs-lies/
    In one the suggestion – ‘Adjust use of two VPNs together to keep things more anonymous.’ I know you go into to this elsewhere on your site.

    Would the paid Connectify Hotspot Max program offer anything else to the equation of a VPN’s usage ?
    Connectify Hotspot PRO and MAX let you easily share the Internet connection from your 3G or 4G LTE mobile broadband device.
    In Wired Mode, Connectify Hotspot PRO and MAX let you share your computer’s Wi-Fi connection via Ethernet so that older gaming consoles, computers, and any other Ethernet-only device can get online.
    All premium versions of Connectify Hotspot let you broadcast a totally custom name (SSID) for your Hotspot.

    -With Bridging Mode enabled, your Connectify Hotspot MAX connects devices on your Hotspot directly back to the network you’re broadcasting.
    -By default Connectify Hotspot Max automatically chooses an available IP so you don’t have to worry about configuration. For power users that want more control over their hotspot, Custom IP and DHCP controls ensure that particular devices connect on a user-specified IP range.

    I get a little lost up in it all every time I’m thinking of going to another VPN service provider.
    I know already, and needless to say, do your homework on a reliable and trusted VPN to use.
    Things like – IP recording at purchase and requiring your real users info., the payment methods, what is logged – site and clients, etc…
    All can point back to you at some point in the end.

    But isn’t a good understanding also understood in, if their servers are encrypted, the kind used (baremetal, ram disk, virtual, etc.). Are they physically located in the countries where they are claimed in. If the VPN company has physical access to them and by their own personnel.

    As well, has complete control over its network and servers, that does includes their own DNS servers as well.

    Thanks for your reply Sir.

    Reply
    • Sven TaylorSven Taylor

      November 1, 2018

      So for example, a server in a New York data center would be operated and leased by a VPN in Switzerland, with the VPN remaining under Swiss jurisdiction. While a server could potentially be monitored for traffic, the offshore VPN is still not subject to New York jurisdiction. See the multi-hop VPN guide.

      Reply
      • AvatarHard Sell

        November 2, 2018

        Yes Sir, you do your research for your site topics and articles information, I’ll have to visit that multi-hop VPN page again.

        Let’s explore of your answer and my question further:
        New York (USA) data center leased a Server in their complex to a VPN headquartered in Switzerland for one of their Servers located in their Server service configuration (locations) provided to it’s clientele.
        I fully understand your answer of ‘VPN remaining under Swiss jurisdiction’.

        That’s not where my question was headed had I asked only it – sorry I ran to many together.
        Trying to help myself and others understand if the Headquartered Switzerland VPN leased Server in the New York (USA) data center location fell to what governing jurisdiction then – by what principal ? Location or origin of leaser.

        Does the leased Switzerland VPN Server in the New York’s data center location have any legal privileges and immunities from that New York state but, most importantly the United States Government?

        Barring the known – servers will be fully encrypted, secured, and under control of the VPN provider, thereby preventing third-party access to sensitive user data and traffic.

        Not worried about third-party access but, State and Federal government authorities and in this case the 3-letter agencies… I guess some stored information is there if the Server was an exit point of any user – though shared IP’s.

        Just for the sake of knowledge wondered who had legal jurisdiction rights for said Server or any like leased Servers anywhere in the USA. The VPN host country or the Servers host country?

        Reply
        • Sven TaylorSven Taylor

          November 2, 2018

          OK, so a server physically located in New York at a data center would be under NY jurisdiction (even though it’s operated by a foreign VPN). A VPN service operating in Switzerland would be under Swiss jurisdiction (even though they are operating foreign servers).
          Here’s a real example of how jurisdictions and servers work in practice:
          1. Somebody uses an ExpressVPN server connection to delete social media posts relating to a crime.
          2. Turkish authorities trace this activity back to an IP address at a data center in Turkey, with a server that is operated by ExpressVPN.
          3. Turkey contacts ExpressVPN and demands that they hand over the name of the user and all logs/information they have about the user.
          4. ExpressVPN declines the data request because: 1) they are not subject to Turkey jurisdiction because they are based in the British Virgin Islands; and 2) they do not maintain any logs, and therefore cannot identify the user or provide any information.
          5. Turkish authorities get upset and then go to the data center and physically seize ExpressVPN’s server to try to extract data.
          6. The Turkish authorities are unable to obtain any information because there are no logs or personally identifiable information available on the server.
          This is a true story illustrating jurisdiction and servers – also explained in the no logs VPN guide.

  26. AvatarJack

    October 3, 2018

    Hi Sven,
    I don’t know which vpn to buy… I got a new router Netgear XR500 and want to used it for gaming and online, No streaming got Netflix on comcast apps. Can I used vpn on my router to protect myself and family’s.

    Reply
    • Sven TaylorSven Taylor

      October 9, 2018

      Hi Jack, yes, see the VPN router guide.

      Reply
  27. Avatarbill2

    September 24, 2018

    Hello Sven,

    Thanks for you excellent website.

    I am looking for a decent comprehensive book(s) , video(s) , or curated list(s) for understanding VPN and VPN alternatives for privacy & anonymity & plausible deniability?

    Please check out this thread for my question and some people’s answers.
    [https://arstechnica.com/civis/viewtopic.php?f=10&t=1438481]

    The conclusion is there is no such comprehensive resource for newbies like me to learn about VPN and VPN alternatives.

    Your thoughts?

    Please advise.

    Thanks a million.

    Reply
    • Sven TaylorSven Taylor

      September 24, 2018

      Hi Bill, well, that’s what I’m trying to do with this site – i.e. provide lots of information and resources without getting overly complex. I’m not aware of any books, but ExpressVPN has a huge video library on YouTube explaining different uses for a VPN and how to set everything up on different operating systems and devices.

      Reply
  28. AvatarSylvan

    January 29, 2018

    Have you reviewed unBlockr. They claim to not have the DNS service but there own VPN service. Was looking to see if you have reviewed there VPN service. Thank you for this site and your work.

    Reply
    • Sven TaylorSven Taylor

      January 29, 2018

      Hi Sylvan, no, I’ve never heard of it before. Looks like a pretty small operation, but I may check it out in the future.

      Reply
  29. AvatarBela Zsir

    May 19, 2017

    Hi Sven,
    Somehow I have second thoughts about installing the client software of these VPN providers (considering these ‘VPN clients’ have total control of my computer and inherently I am giving them the best secret way of communication to anywhere), could you please reassure me the client software of these VPN providers are safe to use. Or are my worries reasonable ?

    Alternatively is there a way to use these services without the client software, ie. configuring Windows built-in VPN access to the server just with the addresss of the VPN server and my login credentials not using any installed software. I suppose I would lose the extra configuration (like setting up the multihop, etc.) so, but does it work at all without the client?

    Reply
    • AvatarSven Taylor

      May 19, 2017

      Hi Bela, I share your general distrust of many VPN providers, especially if they are new to the scene. I generally would be much less worried when using software from a reputable VPN with a good track record, but it’s still wise to be cautious.

      Yes, there are many third party alternatives. One third party VPN client that works very well for both Windows and Mac is Viscosity, which is an OpenVPN client by Sparklabs – see here. It has been around a while and has many fans. Of course, you probably won’t get all the features that your VPN client offers, but it’s a great alternative. (Cost is $9 for a lifetime license.)

      For free open source software, see OpenVPN GUI for Windows, or Tunnelblick for Mac OS.

      Reply
  30. AvatarJudy fowler

    November 28, 2016

    I live in Texas,
    Can you recommend some great
    Companies that are safe.

    Reply
    • AvatarSven

      November 28, 2016

      Hi Judy,
      See here: Best VPNs list

      Reply
Newer Comments »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Essential Privacy Guides:
Secure Browsers
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

VPN Reviews and Guides:
What is a VPN
ExpressVPN Review
NordVPN Review
Surfshark Review
Perfect Privacy Review
ProtonVPN Review
IPVanish Review
Avast VPN Review
VyprVPN Review
Private Internet Access Review
PureVPN Review
CyberGhost Review
VPN Routers
Best VPN for Netflix
Best VPN for Torrenting
Best VPN for Firestick
No Logs VPN Services
Cheap VPNs
ExpressVPN vs NordVPN
NordVPN vs Surfshark

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

Recommended Privacy Setup

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: Mailfence or ProtonMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Swisscows
  7. Password manager: NordPass or Bitwarden

Support this Project

Restore Privacy was created to provide you with honest, useful, and up-to-date information about online privacy and security topics. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others.

You can read our mission here.

Restore Privacy is also on Twitter

COPYRIGHT © 2021 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP