What is VPN? A Virtual Private Network (VPN) is a type of network that imitates a private network over a public one.

What does it mean for you? Well, a VPN allows you to use the internet with enhanced security and privacy.

In a nutshell, a VPN: 

  • Helps you to stay secure when using public Wi-Fi hotspots.
  • Hides your IP (Internet Protocol) address.
  • Encrypts your internet traffic, making your browsing more secure and private.
  • Allows you to access more internet content and bypass restrictions such as government censorship.

It also ensures that your internet traffic isn’t tracked and recorded, later to be sold by your internet service provider (ISP), ad brokers, or snoops.

    How does a VPN work?

    How does a VPN work?

    A VPN protects you by encrypting and disguising your traffic. It also reroutes your data packets through one of its VPN servers.

    By doing so, a VPN changes your visible IP address. A VPN makes it appear as if you’re browsing from the VPN server’s location instead of your device.

    That’s why you can appear virtually anywhere in the world using a VPN! This feature greatly improves your privacy and is one of the two primary reasons that make a VPN so useful. The other one is security. Let’s talk about it.

    How a virtual private network secures your traffic

    The blind post office analogy:

    Imagine a post office that doesn’t know your first or last names or address. The post person inside this office receives and sends letters containing only one piece of information about you – your customer’s ID. The post office generated this ID especially for you and it keeps it confidential.

    When you receive a letter, the post person identifies you using this ID and forwards the mail directly to you. All this happens through a super-secret pipe that connects your house and the office.

    In the same way, you can ask this courier to send a letter to anyone in the world. The courier will take your letter, attach your customer ID to it, slap the post office’s address on it, and ship it. As far as the receiver is concerned – the letter came from the post office and not from you (unless you signed it).

    To protect the contents of the mail and your ID, these letters are translated into a language only you and the post person can understand. So even if anyone got hold of your mail – they couldn’t read it.

    The technical explanation:

    How a virtual private network secures your traffic - The technical explanation

    An internet connection secured by a VPN

    When you connect to the internet via a VPN, it establishes a secure virtual tunnel (i.e., a secure connection) between itself and one of its servers. This tunnel is then used to transfer all of your internet traffic originating from your apps and websites.

    But the VPN connection goes a step further. To ensure the tunneling process is secure, the VPN client and the VPN server encrypt your data (English: turn into scrambled, unreadable code) using a shared key (more about this below).

    The VPN client and the VPN server do this every time data travels through the encrypted tunnel. This way, no one can snoop on your traffic. When the data passes through – it’s rearranged again, i.e., decrypted into readable text.

    This way, a VPN ensures that your IP address, location, and online identity remain hidden from your internet service provider and third-party websites.

    What is a VPN server?

    So I’ve mentioned VPN servers several times now, but what are they? Are they any different than regular servers?

    Well, not really. A VPN server is just a standard server configured with VPN software. This ensures that only people with VPN client software can connect to it.

    If you try to connect to a VPN server it will ask for authentication (proof) that you have a VPN client. Once you’re in, all your traffic goes through this server. To anyone watching from outside, they can only see a mess of random internet data going in and out of the server. Hence, your whereabouts remain unknown.

    So, what can a VPN do for you?

    Still following? Great. We’ve covered the basics of how a VPN works. Now, let’s take a look at what all that technical mumbo jumbo means for you!

    1. A VPN protects you on public Wi-Fi

    Free public Wi-Fi may be handy if you’re on the go. Sadly, it is really unsafe and makes you vulnerable even to basic cyber attacks. A VPN encrypts your online data and helps secure your personal information when you use Wi-Fi in airports, coffee shops, or other public places. It’s useful for hiding your web activity when you want to access sensitive information in public like online banking, emails, or crypto assets.

    1. A VPN masks browsing and torrent history

    Masking your IP address is essential to secure online privacy. A Virtual Private Network ensures that your location, browsing habits, and torrenting history aren’t directly linked to your identity. This way, you can surf with peace of mind without any third parties trying to steer your choices.

    1. A VPN unlocks blocked and censored websites

    Access to various websites is restricted in many countries due to geo-blocking and censorship. You can unblock sites by connecting to a VPN server based in a different country. This allows you to bypass internet censorship and various geo-restrictions for content, social media, whistleblowing, or even research purposes.

    1. A VPN helps stream Netflix privately

    With a VPN, you can remain safe when streaming Netflix and using other streaming services like Hulu, Disney+, HBO Max. Our ultra-fast servers and unlimited bandwidth will ensure a throttle and buffer-free experience. This way, you can always stay private when streaming your favorite shows and movies! Learn more about VPN streaming here. 

    Disclaimer: Surfshark does not encourage using a VPN in any way that would potentially violate the Terms of Service of streaming service providers.

    1. A VPN helps you avoid price discrimination

    Websites and services use your location and cookies to tailor prices for their goods and services. With a Virtual Private Network, you can avoid such marketing practices and save a buck when shopping online or buying airplane tickets.

    Browsing without a VPN: what makes your data valuable?

    Browsing without a VPN: what makes your data valuable?

    When surfing the web, you constantly send and receive data packets. These packets contain your IP address because they need to know where to go and come back.

    Without a Virtual Private Network, your Internet Service Provider (ISP) and websites can see where these packets travel and what data comes with them. This allows them to monitor, log, and later sell this information. 

    Why do they care? Your data is valuable to ad brokers and other service providers because it reveals patterns in your actions, such as likes, hobbies, and interests. This can later be used to make product offers you’re more likely to buy. 

    The amount of information these companies collect and store has also become a privacy hazard. Data breaches happen all the time, affecting billions every year.

    All that information eventually ends up on the dark web. This can lead to mass phishing campaigns and even identity theft. So, it’s better to protect your privacy and data in the first place!

    What is an IP address, and why can others see it?

    What is an IP address and why can others see it?

    An Internet Protocol (IP) address is a digital label used to achieve communication between networks. It serves the purpose to identify:

    • The host (you);
    • Your location in the network so that it knows where to send you the information.

    This means that without a VPN, the data packets traveling over the internet display your IP address at all times. It is visible to most online services, allowing websites to gather information about you.

    A VPN hides your IP address and location in the process because you’re technically accessing the internet through a VPN server. And this server is where information goes before it gets encrypted and reaches you through a trusted tunnel.

    Does a VPN make you anonymous?

    Does that mean a VPN can make you anonymous?

    No, a VPN does not make you anonymous. And don’t believe anyone who’ll tell you otherwise.

    Let’s set one thing straight, no sugar coating – internet anonymity is a fantasy. Yes, you’ve read it right. There is no real way you can be anonymous on the web

    However, a VPN enhances your online privacy greatly. Here’s a table illustrating what a VPN does and doesn’t do:

    With a VPN
    Without a VPN
    IP address
    Hidden
    Exposed
    Location
    Hidden
    Exposed
    Browsing habits
    Hidden
    Exposed
    Internet traffic
    Encrypted
    Exposed
    E-mail you use to register
    Exposed
    Exposed
    Credit card information used for purchases
    Exposed
    Exposed
    Googling when signed in to your Google account
    Exposed
    Exposed
    Information you put on social media
    Exposed
    Exposed
    Targeted ads
    Minimal
    Very frequent

    What a VPN does and does not hide

    In other words – there’s no cure for being careless. A VPN can help you prevent being tracked, but it doesn’t help you if you display your information openly on the web. So, be mindful of what you reveal about yourself!

    What is encryption, and how does it work?

    What is encryption, and how does it work?

    An encryption process visualized.

    I’ve mentioned encryption several times already but let’s take a look at how it works.

    Encryption is what VPNs use to encode and secure your data. To anyone else, an encrypted message would look like complete gibberish unless they had a shared key to decipher it.

    The VPN client and server generate and exchange this key when you first connect to a VPN.

    Every time your data travels through the encrypted tunnel – it’s scrambled and later unscrambled using this key.

    So how powerful is encryption? Well, it depends on what encryption algorithm you use and the VPN protocol (discussed below) you pair it with.

    The AES 256-bit cipher is considered the best encryption algorithm used by the US government, the NSA, and the more reliable VPN service providers, including Surfshark.

    So, how secure does this make a VPN?

    Short answer – Very secure.

    Long answer – It gets more interesting.

    Most security measures bank on making themselves too tedious to crack. For example, an encrypted session could take up to trillions of years (depending on the computer used) to decrypt by trying to “brute force,” i.e., guess the right key. 

    And even if someone managed to crack it, many VPN providers like Surfshark have implemented something called Perfect Forward Secrecy (PFS). This means that a VPN client generates a new key every set amount of time (about 7 minutes).

    With PFS in place, cracking an encrypted session would only reveal what happened during those 7 minutes. After a new key is generated, you’d need to crack it again.

    In other words – scammers and hackers wouldn’t bother cracking an encrypted connection. They prey on people who don’t protect themselves online and on public Wi-Fi hotspots.

    VPN protocols

    VPN protocols

    An important part of VPN security is protocols. They make your connection to the VPN server possible. They are sets of rules that determine how your VPN connections work from start to finish. 

    Contrary to popular belief, a VPN protocol does not have a huge impact on the speed, stability, and security of your connection. However, protocols can prove useful in different situations and will perform differently for every device! Here are some that you may come across:

    1. OpenVPN 

    OpenVPN is an open-source VPN protocol. It’s fast, secure, and compatible with many routers. Because it is open-sourced, its code has been examined through and through by cybersecurity experts worldwide. Generally, it performs worse than IKEV2 and WireGuard.

    Available on: Windows, macOS, Android, iOS, Linux, and BSD.

    1. Wireguard®

    WireGuard® is a relatively new protocol built to surpass OpenVPN and IPSec in power use and performance with only 4,000 lines of code.

    Available on: Windows, macOS, Android, iOS, FreeBSD, NetBSD, OpenBSD, and others.

    1. IKEv2/IPSec

    Internet Key Exchange version 2 (IKEv2) is on par with WireGuard’s quality. It can outperform other protocols in terms of speed when switching networks and at shorter distance connections, making it popular among mobile users.

    Available on: Windows, macOS, Android, iOS, Linux, Blackberry, Unix, and others.

    1. PPTP and LT2P/IPSec

    Both are severely outdated tunneling protocols, and I highly recommend avoiding them. Albeit fast, they can offer neither the security nor reliability of OpenVPN, IKEv2, or WireGuard.

    Available on: Windows, macOS, Android, iOS.

    1. SSTP

    SSTP is a tunneling protocol rather than a VPN protocol, meaning that it lacks the functionality of OpenVPN, IKEv2, and WireGuard. While considered relatively safe and easy to use, its code was never audited, and it has issues working on other operating systems like Mac OS.

    Available on: Windows, Linux, BSD.

    1. Shadowsocks

    Shadowsocks is not a VPN protocol but a tunneling proxy. However, it can run as a protocol on VPN clients. It was created for the sole purpose of bypassing The Great Firewall of China. It is fast, hard to detect, and can be used to skirt government-imposed censorship.

    Available on: Windows, macOS, Android, iOS, Linux.

    How to pick a VPN service

    Let’s say, hypothetically, that I have touched your soul so far (a writer can dream), and you have decided that you need a VPN.

    Even then, before choosing a VPN service provider, there are important things to look out for: 

    • Server coverage. A strong VPN provider should have good worldwide VPN server coverage. This will give you more locations to choose from and will decrease server load.
    • VPN encryption. A secure VPN encryption algorithm is essential. Make sure to look for the AES-256 cipher – a current standard in the industry.
    • Server load. If there aren’t enough servers to balance the user load, connection speeds will suffer and become slow.
    • VPN protocols. Protocols are vital to a VPN’s security, and you can use different ones according to which one you prefer. I recommend you look for services that offer OpenVPN, IKEv2, or WireGuard.
    • Multi-hop is a VPN feature that directs your traffic through several servers at the same time. It is not essential but can give your online security an extra kick.
    • Obfuscated VPN servers. When obfuscated (a fancy term for making something obscure), a VPN server will make your traffic seem like regular internet traffic. This helps to bypass VPN blockers and win at hide-and-seek against your internet provider.
    • Device support. Before purchasing a VPN, make sure it supports the device that you wish to secure. It happens. We’ve all been there.
    • RAM-only servers are becoming a staple for any VPN service. When running on RAM, servers automatically wipe all the data whenever turned off.
    • The Privacy Policy is one of the most important parts of any VPN service. It’s an immediate red flag if your VPN provider does not have a Privacy Policy or if they’re logging sensitive information without any stated reason.

    How to set up a VPN

    Setting up a VPN couldn’t be easier. We recommend downloading native apps, but you can always opt for a manual setup if you’re more tech-savvy.

    For a more detailed guide, check out our article on How to set up a VPN on any device.

    What is a no-logging or a no-log VPN?

    What is a no-logging or a no-log VPN?

    No-logging means handling user’s personal data without keeping any logs or records of their online activity.

    In short, a no-log VPN will not collect the following information about your internet activity:

    • Your IP address
    • Your network traffic
    • Your browsing history
    • Your bandwidth information
    • Connection timestamps
    • Session information

    This way, it ensures that you can secure your online connection and surf the internet with peace of mind.

    And speaking of surfing with peace of mind, you are now armed with the knowledge to take your online privacy into your own hands.

    Surfshark is a VPN with all the features mentioned in this article and we constantly strive to deliver the best user experience. 

    And if you want to learn more about Virtual Private Networks, security, and privacy, check out our blog for more cybersecurity content.

    Stay safe surfing with Surfshark

    Bet you 30 days you’ll like it

    Get started

    What devices are VPNs compatible with?

    Device compatibility always depends on the VPN provider. Surfshark supports apps and plugins on most computer and mobile devices, smart TVs, and consoles:









    If a VPN hides your information, is it legal?

    The short answer is yes – VPNs are legal in most countries. However, it is still against the law to use a VPN for illegal activities.

    Some countries ban the use of VPNs for political and legislative purposes like internet access control and stunting freedom of speech. Yet, most countries do not forbid their use.

    Read more about VPN legality and a list of countries that ban or restrict VPN use.

    What is a VPN web browser? Can I use it?

    A VPN browser is a web browser with a built-in VPN protocol that protects a user’s browser resources. Not everything that is advertised as a VPN browser actually is one. Some are just privacy browsers. Here are the VPN browsers you’re most likely to have heard of:

    Opera

    One of the top-dog contenders in the browser market, Opera does indeed come with a VPN plugin. Of course, like every browser-based VPN out there, it only protects your browser traffic.

    Epic

    Epic is a privacy-focused browser that stores very little and deletes everything once you quit. It now comes with a VPN feature.

    Tor Browser

    Not a VPN browser but has somewhat similar privacy use cases. Tor is necessary to access the Tor Network. It doesn’t have a VPN feature – instead, it relies on the Tor Network for privacy.

    Brave

    Brave is a Chromium-based browser with a VPN that comes as a premium feature (and only for iOS users). So its appeal is hardly universal.

    UR Browser

    UR Browser is a Chromium-based privacy browser made by AdaptiveBee. It claims to offer VPN functionality, but some online security experts argue that UR Browser’s VPN was previously just an unencrypted proxy.

    Orfox

    Orfox was a Tor-based browser for Android. Was. As the Tor Project released Tor Browser for Android, the project was discontinued.

    Can a VPN make my internet connection faster?

    In some cases, if you’re streaming or downloading something, your ISP may throttle, i.e., slow down your internet connection. They do this to save on and distribute bandwidth across their internet users. But since a VPN hides your traffic, your internet service provider lacks the necessary information to throttle you.

    However, in most other cases, a VPN will not make your connection faster because it adds extra steps to accompany your connection. By default, the prolonged process may slow your connection down, but it would hardly be noticeable.

    How much does a VPN product cost?

    VPN prices vary across different VPN providers. To illustrate this, here is a table of price comparisons from some of the better-known VPNs:

    Time period Price per month (USD)
    Surfshark NordVPN ExpressVPN Private Internet Access
    3 years 2.19
    2 years 2.49 3.67
    1 year 4.92 8.32 3.33
    6 months 6.49 9.99
    1 month 12.95 11.95 12.95 9.95

    Can't I just use a free VPN?

    You can, but you shouldn’t. Here’s why.

    A VPN uses servers to reroute your information. Thousands of these servers are scattered across the world, and they cost money to set up and maintain. The same goes for developers and everyone else that works to keep the VPN functioning.

    In other words – free VPNs don’t exist because no VPN services are free to maintain. It’s all a question of where the VPN service is getting its funding from. Mainly, there are three ways to do this:

    1. Setting up a subscription
    2. Bombarding the user with ads
    3. Collecting and selling the user’s information

    Often, a “free” VPN will do numbers two and three simultaneously. So, be careful when choosing a VPN service provider!

    Should I leave my VPN on all the time?

    Yes. Ideally, you should always be using a VPN. Cybersecurity threats are much more common than people tend to think.

    If you use a VPN, your device, network traffic, and browsing activity remain protected at all times.