VPN for Security

VPN ConnectionVPN use has increased dramatically in the last year because of news that the NSA, GCHQ, and other government snoops have been attempting to sniff through your personal electronic documents and/or block or ban websites.
Some web sites are not available in the country in which you reside to allow you to purchase online items such as the Google Play Store or the Google Nexus site. Other sites have political or other information on them which some governments do not wish their citizens to see. Some, such as Pirate Bay, or KickAss Torrents are repositories of free film, music, and ebook downloads, acts which the entertainment and publishing industries find objectionable.

Why should I use a VPN?

A VPN stops such snooping or makes it very difficult to intercept and also allows you to visit blocked web sites. A VPN also masks your Internet activity so that Internet Service Providers (ISP) will find it nearly impossible to intercept your data. These ISP’s may be required by government agencies to report the activities of Internet users and hand over the data moving between user computers and others. They cannot hand over what they do not know. Hackers often use “sniffer” software to obtain logins and passwords of wireless computer and tablet users, again, a VPN can mask this information from these snoops.

What is a VPN?

VPN-How It WorksVPN stands for Virtual Private Network. It allows you to browse web sites and send and receive email anonymously and secure because it uses something called encryption.

Why should I bother using a VPN for Security?

Browsing web sites and sending and receiving private email are actions which are supposed to be secure from snoops. No one has the right to peek at your private email accounts, including the government of the country where you reside, whether you are a citizen or not.

How does a VPN and Packet Encapsulation work?

Packet EncapsulationSuppose that you write a long, 10 page physical letter but you tore off each paragraph and put it in a separate, numbered envelope and mailed it from different parts of the city. When it arrived at the address of your recipient, the envelopes could then be read in numbered order.

Data is not sent over the Internet one message at a time. Each message knows where to go and to return to using a set of addresses called Internet Protocol or IP addresses. Every computer on the Internet has a unique IP address. When you send an email message or a request for website information, the data is broken up into small pieces called packets. These packets can be “intercepted” as they leave your computer and are easily ready by anyone with the proper equipment. It is as if you sent an letter in a transparent envelope.

VPN tunnelA VPN looks at the IP addresses of the sender and recipient and creates an opaque software “tunnel” directly between them. This tunnel is accomplished by putting a “regular” packet within another packet before it’s transported over the Internet. The outer packet is this tunnel which protects the inner packets from public view and ensures that the packets move securely to their destination. This is called packet encapsulation.

These tunnels act as if the two computers are connected, point-to-point, with a direct black, opaque cable. It is as if there were no wireless, no Internet, nor anything else which connects the two machines. You might compare VPN software to a child’s tin can telephone, connected by a thin wire or a physical dedicated “tunnel.”

VPN software can be installed on a home computer, a laptop, a mobile phone or a tablet such as Nexus or iPad.


Public key encryptionImagine that before you sent the 10 page physical letter mentioned above, you sent the recipient a code or “key” to unlock the letters of the message that you write. A simple example might be where the letter “a” actually means the number “25” or “10” equals “x.” Without the key to unlock the code, the recipient would see only nonsensical and unreadable strings of numbers and letters. This is called encryption, this scientific discipline called cryptography has been around for two or three thousand years. Google has taken measures to encrypt messages for Gmail to Gmail users. Read the article carefully, there are warnings.

A VPN, in a similar but much more sophisticated manner, encrypts or scrambles the data being sent through a tunnel so that it looks like gibberish to someone who does not have the key to unlock it. The VPN software does the packet encapsulation and the encryption once it is set up properly, the software user need not do anything else.

Location Anonymity

Location anonymiserThe location of the servers of your VPN provider may be important to you. If you live in a country where websites are blocked by government of that country, you may want to have a VPN server located in another country where those sites are not blocked. At one time, YouTube was blocked to anyone using an IP address which originated in Turkey. By using a VPN located in the UK, the EU or the US, people located in Turkey would then have been able to see YouTube. If you’re concerned about privacy or state-sponsored snooping, you may want to pick a service operated outside of your home country.

If you live in Turkey for example, you cannot shop at Google or Apple USA online or watch certain BBC programs in the UK. If you have a VPN provider located in the US or UK, it is as if you are physically located in those countries. However, if the service is based in the US, they’re subject to US laws, and may be forced to turn over usage data to the authorities upon request.

Warning about VPN Log Files

Usually a file server administrator keeps a log of every transaction which happens on that server. A VPN server administrator is in a different category and if they keep log files, they cannot guarantee the privacy nor the anonymity of their clients under the threat of the laws of the country in which the server is located.

It is important that if you decide to use a VPN on a regular basis, you find one which does not keep log files; most of them do not. If a VPN provider is then faced with an order from the authorities, they cannot give up data they do not have. The torrentfreak web site has a series of posts highlighting VPN services that take privacy and anonymity seriously. Their latest, dated February 20, 2016, is called “Which Vpn Services Take Your Anonymity Seriously? 2016 Edition” By Ernesto

A security specialist recently wrote, “If you don’t trust your VPN provider 100%, use two VPNs. This way you are tunneling your already encrypted connection through another tunnel.” First, connect to your primary VPN, and when the connection is complete, connect to another without disconnecting the first. Like magic, a tunnel is created through a tunnel.


Proxy Server changes IPA Proxy is sometimes confused with a VPN. They are very different. A proxy server is a means of connecting to the Internet in order to mask your Internet identity, it “serves” you the IP address of the country in which their server resides. A proxy server is used if you want to see certain web sites or do Internet shopping from a country in which that information is not allowed or available. Netflix, the Google Store, and certain BBC sites are examples of this. Proxy servers may or may not be much help in in browsing or seeing blocked websites, especially if you are in a heavily censored country and they are easier to block by the ISP.

If you use a proxy, your computer is not secure and can be more easily tracked because the data between the the user and the proxy server is not encrypted; thereby allowing your Internet Service Provider (ISP), the government, or a hacker with snooping software, to potentially see and access your data. You then run the risk of having your messages and data compromised.

Free VPN Service

VPNBook.comVPNBook.com is a free VPN service that is relatively easy to setup and use. A Free VPN is NOT intended to be used as a primary VPN service! Only use it occasionally for website shopping in foreign countries or occasional browsing of blocked web sites. There are links below to other VPN services.

What do I need to install this Free VPN Service?

You will need to get the software bundles to use with Free OpenVPN. If you click on one of the country “bundles” it should ask you to download some software.

You will also need to download OpenVPN software from the OpenVPN software site.

After you download the software then read carefully for How to Setup OpenVPN and VPNBook.

An example of a paid VPN Service is Private Internet Access.

  • They do not keep logs of their users.
  • They go through third-party payment systems to keep your subscription information secure.
  • They are extremely reliable and have many servers based in many countries enabling you to “spoof” your real location for both security and access to web sites not available outside of your home country.
  • They have great tech support and a live chat system on their web site.
  • They are inexpensive, a one-year subscription costs $39.95 USD.
  • They allow you connect up to five devices at the same time; for example a laptop, a tablet, a phone, a router, and a desktop PC.

Links and References:

“Which Vpn Services Take Your Anonymity Seriously? 2016 Edition”

The website VPN and Usenet Reviews.com seems to have honest editor reviews and keeps a good comparison table.

The Wikipedia page explaining what is a VPN.

Why You Need a VPN, or How You Can Benefit from Using One

“Six Strikes” Boosts Demand For BitTorrent VPNs and Proxies
The launch of the six strikes anti-piracy scheme in the United States has boosted demand for VPN services and BitTorrent proxies. Data from Google reveals a big surge in searches for terms such as “BitTorrent VPN” and “BitTorrent proxy” over the past two weeks. Some VPN providers see the scheme as a clear invasion of privacy and are encouraging people to protect themselves.

How to Make A VPN Even More Secure

The Wikipedia page explaining a Proxy Server.

What’s The Best VPN / Proxy for BitTorrent?
StrongVPN, HideMyAss, VyprVPN, and Astrill are typically at the top of the charts on most review sites.

This entry was posted in Linux, Open Source, Technology and tagged , , . Bookmark the permalink.