VPN Services
   HOME

TheInfoList



OR:

A virtual private network (VPN) service provides a
proxy server In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a reques ...
to help users bypass Internet censorship such as
geoblocking Geo-blocking or geoblocking is technology that restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, such as checking t ...
and users who want to protect their communications against
data profiling Data profiling is the process of examining the data available from an existing information source (e.g. a database or a file) and collecting statistics or informative summaries about that data. The purpose of these statistics may be to: # Find ou ...
or
MitM attacks In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
on hostile networks. A wide variety of entities provide "VPNs" for several purposes. But depending on the provider and the application, they do not always create a true private network. Instead, many providers simply provide an
Internet proxy In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. Instead of connecting directly to a server that can fulfill a request ...
that uses VPN technologies such as
OpenVPN OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server app ...
or WireGuard. Commercial VPN services are often used by those wishing to disguise or obfuscate their physical location or IP address, typically as a means to evade
Internet censorship Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org) but exceptionally may extend to all Int ...
or
geo-blocking Geo-blocking or geoblocking is technology that restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, such as checking t ...
. Providers often market VPN services as privacy-enhancing, citing security features, such as encryption, from the underlying VPN technology. However, users must consider that when the transmitted content is not encrypted ''before'' entering the proxy, that content is visible at the receiving endpoint (usually the VPN service provider's site) regardless of whether the VPN tunnel itself is encrypted for the inter-node transport. The ''only'' secure VPN is where the participants have oversight at ''both'' ends of the entire data path or when the content is encrypted before it enters the tunnel. On the client side, configurations intended to use VPN services as proxies are not conventional VPN configurations. However, they do typically utilize the operating system's VPN interfaces to capture the user's data to send to the proxy. This includes virtual network adapters on computer OSes and specialized "VPN" interfaces on mobile operating systems. A less common alternative is to provide a
SOCKS A sock is a piece of clothing worn on the feet and often covering the ankle or some part of the calf. Some types of shoes or boots are typically worn over socks. In ancient times, socks were made from leather or matted animal hair. In the late ...
proxy interface. In
computer magazine Computer magazines are about computers and related subjects, such as networking and the Internet. Most computer magazines offer (or offered) advice, some offer programming tutorials, reviews of the latest technologies, and advertisements. His ...
s, VPN services are typically judged on connection speeds; privacy protection, including privacy at signup and grade of encryption; server count and locations; interface usability; and cost. In order to determine the degree of privacy and anonymity, various computer magazines, such as ''
PC World ''PC World'' (stylized as PCWorld) is a global computer magazine published monthly by IDG. Since 2013, it has been an online only publication. It offers advice on various aspects of PCs and related items, the Internet, and other personal tech ...
'' and '' PC Magazine'', also take the provider's own guarantees and its reputation among news items into consideration.


Criticism and limitations

Users are commonly exposed to
misinformation Misinformation is incorrect or misleading information. It differs from disinformation, which is ''deliberately'' deceptive. Rumors are information not attributed to any particular source, and so are unreliable and often unverified, but can turn ...
on the VPN services market, which makes it difficult for them to tell apart vague and bold claims and facts in advertisements. In 2019, VPN services were criticized on various grounds by British
YouTuber A YouTuber is an online personality and/or influencer who produces videos on the video-sharing platform YouTube, typically posting to their personal YouTube channel. The term was first used in the English language in 2006. Influence Influe ...
and web developer Tom Scott. In 2022, he revised his position, stating that VPNs do have valid use cases, such as unlocking geoblocked websites, bypassing mobile throttling, and accessing blocked websites in restricted countries. ''
The New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid d ...
'' has noted that users should reconsider whether a VPN service is worth their money. VPN services are not sufficient for protection against
browser fingerprinting A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinti ...
. ''
Techradar ''TechRadar'' is an online publication owned by Future and focused on technology. It has editorial teams in the US, UK and Australia and provides news and reviews of tech products and gadgets. It was launched in 2007 and expanded to the US in ...
'' noted that, for privacy reasons, an independent VPN provider is recommended.


Legality

In March 2018, the use of unapproved VPN services was banned in China, as they can be used to circumvent the
Great Firewall The Great Firewall (''GFW''; ) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected for ...
. Operators received prison sentences and were penalized with fines. Russia has banned various VPN service providers in 2021. Russia Forcing Google To Delist VPN Websites, But 400,000+ Russians Are Downloading VPNs Daily.


Comparison of commercial virtual private network services


Definitions

The following definitions clarify the meaning of the column headers in the comparison tables below.


Privacy

''PC Magazine'' recommends that users consider choosing a provider based in a country with no
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
laws, since that makes it easier for the service to keep a promise of no logging. ''PC Magazine'' and ''
TechRadar ''TechRadar'' is an online publication owned by Future and focused on technology. It has editorial teams in the US, UK and Australia and provides news and reviews of tech products and gadgets. It was launched in 2007 and expanded to the US in ...
'' also suggest that users read the provider's logging policy before signing up for the service, since some providers collect information about their customers' VPN usage. ''PC World'' recommends that users avoid free services as a rule of thumb, and asserts that free services either sell their users' browsing data in aggregated form to researchers and marketers, or only offer a minimal amount of data transfer per month. ''Logitheque'' explains why there are so many VPN comparison websites on the web. Notes


Technical features

Notes


Availability


Encryption


Notes


References

{{DEFAULTSORT:VPN services Virtual private network services Internet privacy