The Internet is an invaluable resource, but browsing the web can also leave you vulnerable to hackers, identity thieves, unscrupulous advertisers, and even government surveillance. If you’re interested in having an extra layer of privacy when you’re online, using a VPN
, or virtual private network, may be a good option for you. VPNs work by routing your incoming and outgoing data through their own servers so that it’s not visible to anyone else who might be watching. Before you sign up for a VPN, though, it’s important to investigate your options and make sure you’re choosing one that’s safe, secure, and has all the features you need. [1]
X
Expert Source
Luigi Oppido
Computer & Tech Specialist
Expert Interview. 31 July 2019.
Steps
-
Look up reviews and third-party reports on VPNs to make sure they’re safe. [2] X Expert Source Luigi Oppido
Computer & Tech Specialist Expert Interview. 31 July 2019. Since the whole point of using a VPN is to protect your privacy and keep your personal information secure, it’s important to choose a service you can trust. Before you use a VPN, read reviews from as many sources as possible and check out how it’s rated on transparency and trustworthiness. [3] X Trustworthy Source Consumer Reports Nonprofit organization dedicated to consumer advocacy and product testing Go to source- The Wirecutter, a product review website owned by the New York Times, maintains a list of highly-rated VPNs: https://thewirecutter.com/reviews/best-vpn-service/ .
- The Center for Democracy & Technology has a list of questions and answers from VPN providers that are meant to demonstrate their accountability and trustworthiness: https://cdt.org/insights/unedited-answers-signals-of-trustworthy-vpns/ .
- Some VPN providers enlist independent third-party testing firms to audit their services. However, these reports can sometimes be biased. Check multiple reviews before deciding that a VPN is trustworthy based on a single audit. [4] X Research source
-
Choose VPNs that can back up promises not to use or sell your data. When you use a VPN, your data is routed through the provider’s servers. This means that an unscrupulous VPN provider would be in a prime position to collect and exploit your data. [5] X Expert Source Luigi Oppido
Computer & Tech Specialist Expert Interview. 31 July 2019. If a VPN promises not to log and sell your data, check that they are able to support these claims with independently published, fully accessible third-party security audits. [6] X Research source- Don’t take promises that a VPN won’t sell your data at face value. Many scam VPNs make false claims about how they use their customers’ data. Always look for third-party verification of these claims.
- VPN providers that have been caught sharing customer data or violating their own privacy policies include EarthVPN, Onavo (a VPN offered by Facebook that has since been discontinued), and HideMyAss.
- VPNs that have proven their claims not to log customer data include ExpressVPN, PIA, and Perfect Privacy.
Warning: A major red flag that a VPN may be untrustworthy is if the provider isn’t willing to disclose who owns the company or where it is based. [7] X Research source TunnelBear and Mullvad have high ratings for ownership transparency, while ExpressVPN has raised concerns with some reviewers because they aren’t willing to reveal these details. [8] X Research source
Advertisement -
Check for transparency about which data the VPN keeps. Most VPNs collect and keep at least a small amount of data from their users. A trustworthy VPN should be open and honest about which data they keep and what they do with it. Be cautious of VPN providers that claim that they don’t keep any of your data. [9] X Research source
- For example, most VPN providers keep information such as the personal data you provided when you originally signed up for the service, your true internet address or IP address (a number that helps identify your computer and your location within the network you’re using), and the timestamps for when you connect or disconnect from the VPN.
- Look for VPN providers that offer regular transparency reports, such as TunnelBear, IVPN, and CyberGhost. [10] X Research source
-
Read the fine print in the privacy policy to check for hidden security concerns. Some unscrupulous VPN providers make promises that turn out to be false or misleading. If a VPN provider makes claims upfront about their privacy and security, read over the fine print to make sure it matches.
- The privacy policy should be clear and easy to understand. Watch out for vague or confusing language.
- TunnelBear, Mullvad, and IVPN are all examples of VPN providers with fairly clear and readable privacy policies and terms of service. [11] X Research source
- Hotspot Shield is an example of a VPN with marketing claims that contradict the fine print in its privacy policies, an issue highlighted in a complaint brought by the Center for Democracy & Technology before the Federal Trade Commission. [12] X Research source
-
Select a VPN that offers OpenVPN and L2TP/IPsec protocols. VPN security protocols translate your data into a format that can’t easily be read while it’s passing between your device and other locations online. A good VPN should have strong security protocols that ensure your information won’t be leaked in transit. [13] X Expert Source Luigi Oppido
Computer & Tech Specialist Expert Interview. 31 July 2019. OpenVPN is a highly secure communication protocol that’s great to have if you’re using a PC or Mac computer, but not all smartphones support it. L2TP/IPsec is a good alternative protocol for mobile devices that don’t support OpenVPN. For the most flexibility, look for a VPN that has both. [14] X Research source- L2TP/IPsec is more vulnerable to security issues than OpenVPN, so it’s best to use OpenVPN if your device supports it. [15] X Research source
- Stay away from VPNs like VyprVPN that use PPTP, an older protocol that is no longer secure.
-
Steer clear of free VPN services. Reputable VPN providers tend to charge at least a small monthly fee for their services. Be wary of any VPN that’s completely free of charge, since this is often a sign that the provider is either making money off of your data or running an ad-based business. [16] X Research source
- For example, one popular free VPN app, VPN Patron, is owned by a Hong Kong-based advertisement company that is known for monetizing its users’ data. [17] X Research source
- Some trustworthy VPN providers, such as TunnelBear, offer a free trial period or provide a free version of the VPN that covers only a very limited amount of data per month (e.g., 500 MB). These can be useful for testing out the service before you commit.
- Some IT security experts claim that not all free VPNs are untrustworthy, but you should always proceed with caution and do extensive research before trying one. [18] X Trustworthy Source Consumer Reports Nonprofit organization dedicated to consumer advocacy and product testing Go to source
-
Select a VPN that’s based in a country without aggressive surveillance policies. Before using a VPN service, look for transparency about where the service is based. The governments of some countries have a history of exploiting VPN services or forcing VPN providers to hand over their customers’ data. [19] X Research source
- Russia, China, and Turkey all have a history of attempting to interfere with, seize, or exploit data from VPN providers. [20] X Research source
-
Compare pricing options to find an affordable VPN. While it’s a good idea to steer clear of free VPNs, you don’t have to spring for the most expensive service on the market. [21] X Trustworthy Source Consumer Reports Nonprofit organization dedicated to consumer advocacy and product testing Go to source Once you find a few trustworthy potential VPN providers, compare their prices to see which option seems like the best deal.
- Most VPNs cost around $4-$6 per month. They may charge more if you pay by the month instead of signing up for a full year.
- Some providers allow you to sign up for a free trial or offer a free version with limited data. In some cases, you might also be able to get a refund if you aren’t satisfied with the service.
-
Look for a VPN that’s easy to use. A good VPN should be user-friendly, easy to set up, and simple to use. Try to find a VPN that stays on all the time once you set it up, or that you can easily turn on without having to log in every time. [22] X Trustworthy Source Consumer Reports Nonprofit organization dedicated to consumer advocacy and product testing Go to source
- The disadvantage of more complicated VPNs, or those that require you to log in every time you want to use them, is that it’s easy to forget to activate them or to become frustrated and not bother. Choose a VPN that will give you security without the hassle.
- TunnelBear is one of the easiest VPNs to set up and use. IVPN and Mullvad are also solid, user-friendly options. [23] X Research source
- NordVPN also has strong ratings on ease of use, but has had some negative publicity due to a major security breach. [24] X Research source
-
Get a VPN that has lots of servers. VPNs work by routing your data through their own servers. This means that the more servers the VPN has access to, the more quickly your data can move. VPNs with lots of servers are also less likely to throttle your bandwidth (the practice of intentionally slowing down connection speeds to reduce pressure on the network). [25] X Research source To avoid slow connection speeds, look for a VPN that has at least 75 server locations in at least 20 countries. [26] X Research source
- Ideally, a VPN should have at least 1000 servers.
- A higher number of servers doesn’t always guarantee the highest speeds. For example, TunnelBear has 4,000 servers, but it does not perform quite as well in speed tests as Mullvad, which has only 553 servers.
-
Opt for a VPN with a kill switch in case your encrypted connection fails. Many VPNs feature a kill switch option, which allows you to shut off network traffic in and out of your device in case your connection is disrupted. This feature can help prevent you from becoming vulnerable to hackers in moments when your VPN stops securing your connection. Check that any VPN you choose has a kill switch that’s easy to access and activate. [27] X Research source
- Additionally, your VPN software should alert you whenever there’s a problem or interruption in your secure connection.
- The kill switch is a feature of most modern VPNs, including TunnelBear, Mullvad, and IVPN.
-
Choose a VPN with apps for multiple devices. At the very least, a VPN should protect your computer. However, it’s also a good idea to have VPN protection on your smart phone, tablet, and other devices that you use to browse the Internet. Look for a VPN that has apps or software that will cover all the devices you’d like to protect. [28] X Research source
- Ideally, a VPN should work on multiple operating systems (such as Android, iOS, and less common operating systems).
- Some VPNs, such as NordVPN and ExpressVPN, even have native apps for smart TVs!
-
Check for strong customer support service. You’ll get the most protection out of your VPN if you’re able to easily reach out for help when you need it. Make sure your VPN provider offers email support with 24-hour turnaround at minimum, as well as a strong help section on their website or app. [29] X Research source
- Ideally, your VPN provider should offer support chat or a toll-free customer service phone line.
-
Find out if they offer useful extra features. Some VPNs come with a variety of bonus features that you might find helpful. If you’re struggling to choose between 2 strong VPNs, check their list of extra features to help you decide which one would be more helpful to you. Bonus features may include: [30] X Research source
- A variety of payment options, such as cash, PayPal, Amazon Pay, or cryptocurrency (such as bitcoin).
- Stealth modes, which can help you get around networks that block VPNs.
- Custom ad blockers.
- Multihop connections, which can pass your data through multiple servers instead of just one for extra security. Keep in mind that using these connections will likely result in slower speeds.
Expert Q&A
-
QuestionIs using a VPN safe?Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over two years.VPNs are fantastic if you trust the company that you're using. A VPN basically shifts your internet browsing from being secure with a little lock at the top of the browser or being secure within Google to being secure within another company that you are deciding to trust.
-
QuestionHow do you know if a VPN is good?Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over two years.Check that your VPN uses good security protocols. A great VPN will offer OpenVPN and L2TP/IPsec protocols. Additionally, the VPN you choose should promise not to back up or sell your data. Read reviews to make sure other people like your VPN.
-
QuestionWhat is VPN? What's its use?Community AnswerVPN stands for Virtual Private Network. It is used to create a secure connection between two or more devices over the internet.
Tips
- While VPNs can give you an extra layer of privacy and security, they don’t guarantee anonymity online. If you’re interested in a service that can allow you to remain truly anonymous on the Internet, try Tor, a volunteer-run network that does not save any browsing or search history. [31] X Research source You can access Tor at https://www.torproject.org/ . However, keep in mind that Tor is not completely foolproof and has been targeted by hackers. [32] X Research source Many IT security experts recommend using it in combination with a VPN.Thanks
- VPNs do not make already secure (HTTPS) connections to websites any more secure; rather they stop ISPs from seeing which websites you visit.Thanks
References
- ↑ Luigi Oppido. Computer & Tech Specialist. Expert Interview. 31 July 2019.
- ↑ Luigi Oppido. Computer & Tech Specialist. Expert Interview. 31 July 2019.
- ↑ https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
- ↑ https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html
- ↑ Luigi Oppido. Computer & Tech Specialist. Expert Interview. 31 July 2019.
- ↑ https://www.pcmag.com/news/what-does-a-vpn-security-audit-really-prove
- ↑ https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html
- ↑ https://thewirecutter.com/reviews/best-vpn-service/
- ↑ https://krebsonsecurity.com/2017/03/post-fcc-privacy-rules-should-you-vpn/#more-38802
- ↑ https://thewirecutter.com/reviews/best-vpn-service/
- ↑ https://thewirecutter.com/reviews/best-vpn-service/#trusting-a-vpn
- ↑ https://cdt.org/wp-content/uploads/2017/08/FTC-CDT-VPN-complaint-8-7-17.pdf
- ↑ Luigi Oppido. Computer & Tech Specialist. Expert Interview. 31 July 2019.
- ↑ https://www.cnet.com/how-to/understanding-vpns-and-how-to-choose-one/
- ↑ https://thewirecutter.com/reviews/best-vpn-service/
- ↑ https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html
- ↑ https://hackernoon.com/whos-really-behind-the-world-s-most-popular-free-vpns-d74bafc82178
- ↑ https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
- ↑ https://www.wyden.senate.gov/imo/media/doc/052819%20DHS%20Response%20to%20Wyden%20Letter%20RE%20Chinese%20Russian%20VPN.pdf
- ↑ https://slate.com/technology/2019/02/best-vpn-companies-trust-privacy.html
- ↑ https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
- ↑ https://www.consumerreports.org/privacy/how-to-choose-a-vpn-for-digital-privacy-and-security/
- ↑ https://thewirecutter.com/reviews/best-vpn-service/
- ↑ https://www.pcmag.com/picks/the-best-vpn-services
- ↑ https://www.cnet.com/how-to/understanding-vpns-and-how-to-choose-one/
- ↑ https://thewirecutter.com/reviews/best-vpn-service/
- ↑ https://www.pcmag.com/picks/the-best-vpn-services
- ↑ https://www.vpnmentor.com/blog/the-best-vpns-for-multiple-devices-and-connections/
- ↑ https://www.pcmag.com/picks/the-best-vpn-services
- ↑ https://www.pcmag.com/picks/the-best-vpn-services
- ↑ https://thewirecutter.com/reviews/best-vpn-service/
- ↑ https://www.washingtonpost.com/news/the-switch/wp/2014/12/26/the-hackers-who-say-they-took-down-gaming-networks-are-now-going-after-tor/?arc404=true