• Get Surfshark
Wavy-haired smiling woman with glasses in a red sweater with a VPN shield swooshing past.

What is a VPN?

A VPN, or Virtual Private Network, is a technology that routes your internet traffic through a remote server. It encrypts your internet traffic and masks your IP (Internet Protocol) address. This process secures your connection to the internet and protects your privacy while browsing online. It also hides your online activities from third parties trying to collect your data or intercept your connection.

Using a VPN provides multiple benefits: it keeps your online activities private, secures your connections to home and public Wi-Fi networks, and improves your overall browsing experience.

Get Surfshark
30-day money-back guarantee

How does a VPN work?

A VPN establishes a secure, encrypted tunnel between your device and a VPN server and sends your device traffic through that server. This masks your IP address and encrypts your data before it reaches its destination on the internet. 

The encrypted connection increases your privacy and security online — it hides your online activities from your ISP (Internet Service Provider) and intrusive third parties, while the new IP address masks your location, making it seem like your traffic is coming from the VPN server location rather than your actual whereabouts.

Here’s how a reputable VPN works in practice:

  1. You activate your VPN. You’re at the airport about to connect to the public Wi-Fi. However, knowing the risks of open networks, you turn on your VPN to secure your internet connection.
  2. Encryption begins. As the VPN connects, it encrypts your outgoing internet traffic, turning it into a secret code that only your VPN server can unlock. It’s like putting all your online activity, messages, passwords, etc., into a hi-tech suitcase that can only be unlocked by a special decryption key.
  3. Data travels through a secure tunnel. A VPN creates a secure tunnel between your device and the VPN server. It sends your encrypted data through this tunnel where only authorized luggage — data packets authenticated by your VPN — can go. This prevents third parties (hackers, internet providers, etc.) from snooping on your activities.
  4. Your data is decrypted at the VPN server. When your encrypted data reaches the VPN server, it is unlocked using the special decryption key. All the scrambled data in your hi-tech suitcase is now readable again and ready for the next leg of the journey.
  5. Your IP address gets masked. At the same time, your real IP (Internet Protocol) address is hidden, and you get a new one from the server’s location. It’s like you’re taking a connecting flight where your original departure location remains hidden, and at your final destination, it looks like you — and your data — came from the connecting stop instead.
  6. You access the internet safely. Next, the VPN server forwards your request to its destination online (a website or online service), carrying the VPN server’s identity rather than your own. And then, the response goes through the same process in reverse.

This allows you to browse, check your email, or watch your favorite shows while you wait for your flight securely and privately.

How does a VPN work?

Understanding the basics of a VPN

What is a VPN tunnel?

A VPN tunnel is a secure, encrypted connection between your device and a VPN server. Tunneling uses encapsulation — a method of wrapping your data packets inside additional encrypted packets to conceal their contents. This process hides your online activities from outsiders — even if someone were to check your internet connection, they’d only see that you are using a VPN but not what you’re actually doing online.

Want to hide the fact that you’re using a VPN on top of protecting your activity? You can use our obfuscated servers for that extra bit of privacy.

What is a VPN tunnel?

What is a VPN server?

A VPN server is a regular server that’s been configured with VPN software. When you use a VPN, your internet traffic goes through this server before it reaches its destination — the websites or services you want to access. During this process, your real IP address is replaced with the server’s IP, boosting your online privacy and security.

What is a VPN server?

What is an IP address?

An IP address is a unique number assigned to each device connected to a network. It’s an identifier that allows communication with other devices over the internet and helps locate you within the network. A VPN hides your IP address, effectively masking your geographical location and making it harder for websites to gather information about you and your browsing habits.

What is an IP address?

What is encryption?

Encryption is a method of turning information into a secret code that can only be read using a special decryption key. VPNs use encryption to secure your data while it travels over the internet. 

When you connect to a VPN, your device and the VPN server generate a secret key. This key is used to encode and decode your data every time it travels through the VPN tunnel. Since no third parties have this key, your encrypted data appears as unreadable gibberish if anyone tries to intercept it.

The encryption strength depends on the cipher being used. Two of the most secure, industry-leading encryption algorithms are AES-256, recognized for its strong security, and ChaCha20, offering effective and high-speed encryption. Most reliable VPN service providers, including Surfshark, have one or both of these options to choose from to ensure top-notch security and privacy online.

What is encryption?

Why do you need a VPN?

Enhance your security

By encrypting your traffic, a VPN protects your data from interception and a range of cyberattacks. It’s especially useful if you use public Wi-Fi, which poses more threats than your home network.

Overcome oppressive censorship

Some oppressive governments heavily censor internet use. A VPN can help you overcome these restrictions and enjoy the best that the World Wide Web has to offer.

Protect your privacy

Secure encryption prevents advertisers, ISPs (Internet Service Providers), and other third parties from tracking and collecting your data. Surfshark pairs this with a strict no-activity-logs policy to maximize your privacy. 

Improve online gaming

Online games can expose just as much of your sensitive data as surfing the web. A VPN shields your data, protects against DDoS attacks, and reduces activity-based ISP bandwidth throttling when gaming.

Reduce price discrimination

Some websites use your location and cookies to tailor prices for their goods or services. With a VPN, you can avoid these marketing practices and find better deals when shopping online.

Stream content safely

A VPN not only allows you to watch your favorite shows online privately, but it can also help prevent buffering caused by ISP throttling your bandwidth based on your activity, ensuring a smooth viewing experience.

Interested in more details? Read our article on VPN benefits!

 

Disclaimer: Please note that using Surfshark services for any illegal activities is strictly forbidden and violates our Terms of Service. Make sure that any use of Surfshark services for your particular activities conforms to all relevant laws and regulations, including those of any service providers and websites you access using Surfshark.


Choose a VPN you can trust

Enjoy privacy and security online

Get Surfshark
30-day money-back guarantee
Choose a VPN you can trust

What does a VPN hide?

A VPN hides and encrypts all your internet traffic including your IP address, location, the websites you visit, and what you do on those websites. That said, a VPN cannot hide any information you choose to show, such as social media posts or the information you voluntarily provide to register on websites.

Can you hide this?With a VPNWithout a VPN
IP address✅ Hidden❌ Exposed
Location✅ Hidden❌ Exposed
Browsing habits✅ Hidden❌ Exposed
Internet traffic✅ Encrypted❌ Exposed
Email you use to register❌ Exposed❌ Exposed
Credit card information used for purchases❌ Exposed❌ Exposed
Googling when signed in to your Google account❌ Exposed❌ Exposed
Information you put on social media❌ Exposed❌ Exposed
Targeted ads✅ Minimal❌ Very frequent

If you’d like to know more, read our article on what a VPN hides.

Does a VPN make you fully anonymous?

No, a VPN does not make you totally anonymous. In fact, complete anonymity online is impossible. However, you can significantly enhance your online privacy by using a VPN — while it can’t hide all traces of your internet activity, it encrypts your data, hides your IP address, and makes it much harder for websites, advertisers, and other third parties to track you.

Does a VPN make you fully anonymous?

How secure is a VPN?

A VPN is very secure if it uses strong encryption and reliable connection protocols.

Most VPN security measures are made virtually impossible to crack.

Even if someone managed to crack the encryption, many VPN providers, including Surfshark, have implemented a feature called Perfect Forward Secrecy (PFS) — the VPN client generates a new encryption key every few minutes.

Get Surfshark
How secure is a VPN?

Safety online & offline

Take care of your online activities, device security, and digital identity

Get Surfshark
30-day money-back guarantee
Safety online & offline

What are the types of VPNs?

While there is no official, universally accepted classification of VPN types, these are the commonly recognized definitions:

Remote access VPN

A remote access VPN allows users to securely connect to a private network from remote locations. Since work-from-home has become more common, this VPN type has also gained big popularity as it allows employees to establish a secure connection to their work networks from home or another remote site.

Site-to-site VPN

Site-to-site VPNs connect intranets to networks. This is useful for large organizations with offices in different locations. By linking these spread-out office intranets into a single, seamless network, the site-to-site VPN allows employees to access company resources without having to configure and connect to different networks.

Personal VPN

Personal VPNs are designed for individual users. Instead of connecting you to a different network, they connect you to a VPN server. When you access websites or services with a personal VPN, websites see the VPN server’s location instead of your actual one. Surfshark and most other popular VPNs fall into this category.

VPN protocols

VPN protocols determine how your VPN connections work from start to finish. They can also impact the speed, security, and performance of your VPN connection. While there are quite a few VPN protocols, here are some of the most popular ones:

OpenVPN

OpenVPN is an open-source VPN protocol known for its speed, security, and compatibility with a wide selection of routers. Because it is open-sourced, its code has been thoroughly tested by cybersecurity experts worldwide. It’s a trustworthy choice but tends to perform worse than IKEV2 and WireGuard.

Available on: Windows, macOS, Android, iOS, Linux, and BSD.

Supported by Surfshark: Yes

WireGuard®

WireGuard® is a relatively new protocol that has been built to outperform OpenVPN and IPSec in terms of power usage and performance, with only 4,000 lines of code. Currently, WireGuard is the fastest VPN protocol available.

Available on: Windows, macOS, Android, iOS, FreeBSD, NetBSD, OpenBSD, and others.

Supported by Surfshark: Yes

IKEv2/IPSec

IKEv2 (Internet Key Exchange version 2) is on par with WireGuard’s quality. It excels at speed, particularly when switching networks and at shorter distance connections, making it popular among mobile users.

Available on: macOS, Android, iOS, Linux, Blackberry, Unix, and others.

Supported by Surfshark: Yes

PPTP and LT2P/IPSec

Both PPTP and LT2P/IPSec are considered outdated tunneling protocols, and it’s better to avoid them. While they can provide decent speeds, they can’t offer the security or reliability of more modern protocols like OpenVPN, IKEv2, or WireGuard.

Available on: Windows, macOS, Android, and iOS.

Supported by Surfshark: No

SSTP

SSTP is a tunneling protocol rather than a VPN protocol. This means it lacks the functionality of OpenVPN, IKEv2, and WireGuard. While considered relatively safe and easy to use, its code was never audited, and it has compatibility issues with certain operating systems like macOS.

Available on: Windows, Linux, and BSD.

Supported by Surfshark: No

Shadowsocks

Shadowsocks is not a VPN protocol but a tunneling proxy. However, it can function as a protocol for VPN clients. It was specifically created to bypass the Great Firewall of China. It is fast, hard to detect, and can be used to get around government-imposed censorship.

Available on: Windows, macOS, Android, iOS, and Linux.

Supported by Surfshark: No

How to pick a VPN service

Here are some of the essential things to consider when choosing a VPN provider:

Server coverage

A reliable VPN provider should have an extensive VPN server network worldwide. This provides you with more locations to choose from, which can help reduce server load and improve connection speeds.

VPN encryption

A secure VPN encryption algorithm is essential. Look for a VPN service that employs AES-256 or ChaCha20 ciphers, the current industry standard.

Speed

For the best connection speeds, choose a provider that utilizes servers with 10Gbps ports and offers unlimited bandwidth. These features will contribute to a smoother streaming, gaming, and browsing experience.

VPN protocols

Protocols play a key role in VPN’s security. Look for services that offer protocols like OpenVPN, IKEv2, or WireGuard, as they’re some of the best options available on the VPN market today.

Double VPN

Double VPN, or Surfshark’s Dynamic MultiHop, is a VPN feature that routes your traffic through two servers simultaneously, providing an extra layer of protection. While it can boost your online security, it may slow down your connection.

Obfuscated VPN servers

Connecting to an obfuscated VPN server hides the fact that you’re using a VPN. This feature helps bypass VPN blockers and protects you from censorship, particularly in oppressive regions.

Device support

Before purchasing a VPN, make sure it supports the devices you want to secure. For example, Surfshark supports all major platforms, such as iOS, macOS, Android, Windows, Linux, and more.

RAM-only servers

RAM-only servers are becoming a staple for reputable VPN services. When running on RAM, servers automatically wipe all the data when powered off, enhancing user privacy and security.

Privacy policy

A strong privacy policy is essential for any VPN service. Consider it a major red flag if your VPN provider doesn’t have a clear privacy policy or logs sensitive information without justification.

How to set up a VPN in three easy steps

1. Create an account

Choose a subscription plan that suits your needs and create an account.

2. Download the VPN app

Install the VPN app on all your devices.

3. Connect to a VPN server

Connect to a server on the app or do so manually.

If you need help with the setup process, check out our guide on getting started with Surfshark. It includes detailed setup guides for all platforms and other useful information.

Or set the VPN up on your router!

Want to protect your entire home network? Set up a VPN on a router! Just one router connection allows you to secure your entire household, safeguarding all devices, even those that don’t support a VPN app.

Or set the VPN up on your router!

Expand your knowledge about virtual private networks

Start your VPN journey today

Get the best protection at an affordable price

Get Surfshark
30-day money-back guarantee
Start your VPN journey today

Frequently asked questions

The easiest way to check whether your VPN works is by performing an IP and DNS leak check. First, disconnect your VPN, perform the test, and check your IP. Then, connect to your VPN and do the same test again. If your VPN is working, your IP address should be different and no DNS leaks should be found.

If you want a more detailed description, check out this blog post for more ways to see if your VPN is working.

Device compatibility always depends on the VPN provider. Surfshark supports apps and plug-ins on most computers, mobile devices, smart TVs, and consoles.

No logging means handling user data without keeping any logs or records of their online activity. In short, a no-logs VPN will not collect the following information about your internet activity:

  • Your network traffic;
  • Your browsing history;
  • Your bandwidth information;
  • Session information.

The short answer is yes — VPNs are legal in most countries. However, using a VPN for illegal activities is still against the law.

A VPN browser has a built-in VPN protocol that protects the user’s browser resources. Not everything that is advertised as a VPN browser is one; some are just privacy browsers.

In some cases, yes. If your ISP is bandwidth-throttling certain activities, like streaming or downloading, it may slow down your internet connection. They do this to regulate bandwidth usage and reduce congestion. A VPN hides your traffic so your ISP won’t know when to throttle you.

However, in most other cases, a VPN will not make your connection faster because it adds extra steps to your connection. By default, VPN protection may slow your connection, but it will hardly be noticeable.

The price of a VPN depends on the provider and the subscription period. Shorter subscriptions tend to be more expensive and are usually in the $12-15/month range. Longer subscriptions are much cheaper, so if you decide to go for a 2-year plan, you can get a top-tier VPN for as little as $2-4/month.

You can use a free VPN, but you shouldn’t. VPN services are expensive to maintain, so they all have to make money in one way or another. There are three ways to do this:

  1. Setting up a subscription.
  2. Bombarding the user with ads.
  3. Collecting and selling the user’s information.

A “free” VPN often does numbers two and three simultaneously. So, be careful when choosing a VPN service provider!

Yes, a VPN is safe as long as the VPN provider is reputable and has its services verified by independent audits. Reliable VPNs tend to use industry-leading encryption algorithms and modern VPN protocols without known vulnerabilities to ensure a secure connection.

When not using a VPN, you are easier to track, the ISP can see your internet browsing history, and your data is easier to intercept.

If you want in-depth information, check out our article on why you should use a VPN.

ISPs and websites can monitor, log, and later sell the information connected to your browsing, e-shopping, and other habits. This data is valuable to advertisers and service providers because it reveals patterns in your actions, such as preferences, hobbies, and interests. They can later use this information to target you with personalized offers.

VPN stands for Virtual Private Network. It refers to a secure, encrypted connection established between your device and a server or network. It encrypts your internet traffic and safeguards your identity online, allowing you to access the internet more safely.

VPN deal that Rocks

Get % off + mo. EXTRA
Get VPN Deal