What is a VPN, why use it?

A VPN ( Virtual Private Network ) allows you to create a secure connection ( VPN tunnel ) between two or more devices, encrypting data traffic and guaranteeing anonymity and privacy.

To prevent traffic on the connection between two networks (or between two computers) from being intercepted, the VPN tunnel is encrypted. Thus, no one, even following an interception activity, can steal, monitor, or alter the information that passes through the tunnel.

In the digital information age, privacy and anonymity on the internet are very important. This complete guide will answer all your curiosities and doubts. We will also help you choose the best VPN currently available.

To understand all the mechanisms behind a VPN, we must be clear about the following key points:

  • Tunnel: as mentioned above, it is the connection, from the English link , with which the client and the server communicate. All data passes through the VPN tunnel which is encrypted (using a type of encryption called “asymmetric public key”).
  • Encryption: simplifying as much as possible, encrypting a connection between two endpoints (client or server) means making the information illegible by mixing it up so that only and exclusively the two legitimate interlocutors can understand it.
  • Client: one of the two entities that come into play. The client is us (or our program that connects to a VPN), from which the “packets” depart towards the server and only then towards the internet. It can be our computer or a single application configured to use a VPN (for example, the web browser or torrent downloader).
  • Server: In general, it is the service provider, and in this specific case, it is the provider of the VPN tunnel. In the case of a VPN, the client information only reaches the server responsible for routing it to the Internet.
  • Endpoint: The starting or ending point of an information channel. The VPN client and server represent the endpoints. Two networks can be located and separated geographically.

Why use a VPN?

  1. To pass all internet traffic through a secure channel and prevent third parties from “spying” on the data in transit (including our providers: Fastweb, Tim, Wind, Tiscali, etc).
  2. Connect to a computer or server using the virtual tunnel as if on a local network. Encryption mechanisms allow us to communicate over a secure channel.
  3. To overcome some regional restrictions, by using the VPN, we can make our connection appear as coming from a different country and bypass this type of censorship set up on the internet and based on the IP address of origin.

Scenarios for using a VPN

For clarity, we report some possible scenarios for using VPN networks.

  • “Privacy” example: we typically rely on a VPN service provider if we want to download films, TV series, music or games from the torrent network and want to mask this type of activity; it also works if we stream movies using the browser and don’t want traces of our IP address to remain.
  • “Censorship” example: a site like YouTube blocks the viewing of some videos in Italy; we can use our third-party tunnel to open the pages as if we were in any other country where viewing the video is allowed. Or we can watch Italian TV channels streaming from abroad using RaiPlay or Mediaset Play.
  • “Security” example: we are out and about with our iPhone or Android smartphone and we connect to a completely open wireless network; this is one of those cases where we want all traffic to be encrypted because we can’t know who is “listening” on the open wireless network.

Example “Local network”: we can access our office from home or vice versa (obviously reversing the endpoints) as if we were on the same private network.

In the case of the “Privacy” and “Censorship” example we can use a paid private VPN made available by third parties because it was created precisely for this purpose. For the “Security” example, we can use either a paid private network or configure a VPN server at home: in this example, the important thing is to have a secure tunnel to transit information. With the “Local network” example we have to configure the VPN server ourselves at home or in the office and connect without using third-party services.

How can I use a VPN?

For anonymity on the internet, we pay for one of the best VPNs that guarantees us privacy on the internet and security of the data in transit. VPN providers provide us with easy-to-use computer and smartphone programs to set up the VPN connection in just a few clicks. Configuring the ADSL or fiber router/modem to use a VPN is also possible. In the latter case, all the devices connecting to the router will use the tunnel, not just a computer or mobile phone. It is also useful for bypassing censorship, bans, and any restriction based on IP address.

To connect to one of our servers: If we are geeks, we can configure a VPN server anywhere in the world and create a tunnel to connect with a client. The advantage will be that all the devices (NAS, desktop computers, tablets) will belong to the same local private network.

Does a VPN slow down my connection?

VPNs, especially paid ones, have large bandwidth; generally, they do not represent a bottleneck and do not slow down the connection. The geographical location of the VPN servers to which we create the tunnel can be decisive. For this reason, it is important to choose a provider that has many servers and is also geographically close to us and that perhaps also allows us to choose the fastest. We can always use the fiber and ADSL test to test the speed of a VPN.

How effective is it to use a VPN?

Third-party VPNs are not all the same; some guarantee a high level of encryption, which is essential for greater anonymity guarantees, and others a lower level of protection. It is important to know whether or not they keep the logs (registers) of the connections we make; it is not excluded that the VPNs themselves are the ones that control our internet traffic. For these reasons, you must inform yourself before signing up for a subscription and avoid using a new VPN network without knowing if it has already been tested. Always check the latest updates on the list of the best VPNs available.

Can I use a public VPN or free VPN?

There are many free and publicly available VPNs. We can use them in the same way. Still, some of the fundamental requirements are missing: they do not cover our tracks, they can resell our personal information and traffic usage data and often P2P activities (torrent, emule) are limited. Not to mention that they don’t give bandwidth guarantees and in the vast majority of cases we will have a slow connection because the VPN will be the bottleneck to the internet. To use a VPN for free, we recommend the trial period made available by the top VPN services or consulting the list of free VPNs.

How much security does a private VPN give me?

There is no such thing as total and complete security. You can still be a victim of malware and viruses, so installing a good free or paid antivirus is always recommended.

Furthermore, authorities can exploit other methods to track illegal activities, for which anonymity and a different IP address are not sufficient. Therefore, as in everything, it is necessary to use a good dose of common sense.

On which devices can I use a VPN?

On virtually all devices. The major VPNs provide software for macOS, Windows, Linux, iOS, and Android. The procedures for installing a VPN on a modem or router are more complex but detailed in the guides. It is possible to use them on Android Smartbox, NAS, Amazon FireStick, Playstation 4, Xbox One, Nintendo Switch, and Smart TV. Every device accessing the internet can use a secure connection channel such as a VPN tunnel.

How do I know if the VPN is working?

By using a VPN, our IP address will not be shown publicly, and we will have the VPN’s IP address for all websites and online services.

Before activating a VPN tunnel, we can check our real address, and after activating the tunnel, we can check that they do not match. The IP address at this point may be geographically located on the other side of the world.

Rate this post
Updated: May 16th, 2024