
VPN from only US$1.11 per month
Buy a safe and secure VPN with up to 10 Multi Logins
Last verified
Finder is committed to editorial independence. While we receive compensation when you click links to partners, they do not influence our content.
A virtual private network (VPN) allows computers or networks to connect to each other securely over the Internet. Traditionally, businesses and universities used VPNs to create secure, remote connections to an existing network, but many everyday consumers now utilise this same technology to shield their personal data while browsing the Internet. Despite the best efforts of some media companies to discredit VPNs as an illicit tool for circumventing geoblocks, there are plenty of sensible reasons why someone would want to use a VPN.
When you use a VPN, the data you transmit and receive goes through an encrypted “tunnel”. This data cannot be read by anybody outside the VPN due to several security features, such as a firewall between the client and the host server. The data is also specifically encrypted so that only the computer receiving it can recognise it.
This set-up means that all your Internet traffic passes between the VPN server you’re connected to and your computer (or whichever device you’re using) without interference from prying eyes, which is especially handy when using public Wi-Fi hotspots at restaurants, cafes and libraries as they do not provide a secure and private connection to the Internet.
VPNs encrypt your Internet connection by sending it through private servers. After you download a VPN client to your computer or other device, you select a server that is owned by the VPN to connect to. When you hit “connect”, your computer is connected to the server selected, and your IP address is changed to reflect the physical location of that server.
Even your own Internet provider can only see that you’re connected to a VPN, not what your IP address is or what data you are accessing. Your VPN provider can though. By using a VPN, you’re passing on a considerable degree of trust to your chosen provider, so ensure ahead of time that the VPN you are using is a reputable one.
VPN use is first and foremost about security. What this actually means for you can differ dramatically depending on your needs.
VPNs are not without limits. They have their own set of constraints, some of which are glazed over by the advertising copy written on their websites. These limitations include:
There’s not much evidence to suggest that using a VPN to access geoblocked content is illegal, but it’s important to check with your VPN provider, as this may be breaching the terms and conditions you agreed to when signing up. Getting caught out could lead to your VPN service being cancelled, and you could lose credits and access to your downloads.
Using a VPN to stream paid services not available in your country could also land you in hot water, including potential legal action from the copyright owner. Just because you’re paying a membership fee doesn’t mean that the service has the right to sell this content to you, since it wouldn’t be licensed in your region. It could also be considered fraudulent if you have provided a fake postcode or address when signing up.
Similarly, your rights when using overseas-based companies to purchase goods may not be protected by law in your country. Some companies refuse to recognise products and warranties purchased internationally under domestic consumer law.
So, what’s the verdict? Paying to stream TV services not available in your country through a VPN is not recommended, as neither your VPN nor the service provider is obliged to support you if your activity is discovered. But, then again, services like Netflix are now available in most countries, so there’s no longer as much of a need for you to look for alternative viewing options.
Going the cheap or free route when searching for a VPN can have dangerous consequences. Because of the inherent costs of running a VPN, companies that offer these services at a discounted rate or for free are often getting their profits from a third party. This can involve generating adware that will track the sites you visit or by selling your personal data online.Which devices work with a VPN?
Generally speaking, VPNs can be used on any device that can browse the Internet. These include:
Yes, but not all VPNs allow traffic from peer-to-peer (P2P) file sharing from services like BitTorrent. These VPNs will likely throttle your download speeds if you’re found to be torrenting. The rules aren’t always black and white and some VPN providers will only block file-sharing services from particular regions. Below are three different VPN providers with three very different views of torrenting through their services:
Though most P2P file-sharing services have been painted with the same brush thanks to illegal copyright infringement, there are still legitimate uses for torrenting and file sharing. So if you’re concerned about a VPN blocking your BitTorrent or Vuze service, it’s definitely worth checking with the provider before signing up.
One of the most important things to know about VPNs is that they cannot guarantee complete anonymity – your VPN provider, for one, has easy access to who you are and what you’re doing online. There are, however, a number of VPN features to look out for to up the ante on your security.
Many VPN providers claim they do not keep logs, although reading the fine print will often reveal that logs are kept for things such as the time and date the VPN connection was made, the duration of the connection and the bandwidth used. The more secure VPNs will guarantee that they do not keep log files on items such as web traffic data, files downloaded, videos watched or websites visited.
If you’re using a VPN to mask your identity, you need to be sure that all traffic from your computer is being re-routed through the VPN network. Occasionally your computer’s operating system will default back to the DNS designated by your ISP, rather than the DNS provided by your VPN service, essentially leaking your IP address. If there is a leak and your computer’s IP address is exposed, then your usage data will be left vulnerable to eavesdroppers.
Essentially, a kill switch is a form of DNS leak protection – a safeguard should your VPN disconnect and your IP address becomes exposed. A VPN kill switch is a particularly valuable tool for regular torrent downloaders. It works by severing your computer’s connection to the Internet if your VPN connection fails. Without it, your computer automatically defaults to your ISP-designated DNS and your identity and location become vulnerable.
Back to topProviding safety and privacy for all, protect your computer and keep your information private when your purchase from Avast Software.
Learn how to find the right security camera to protect your loved ones and belongings.
How to choose a TV that best suits your needs.
If you want to buy a cordless phone but don’t know where to start, this guide will help you compare the features, specs and prices of top cordless phones.
Check out our comprehensive Trust Wallet mobile cryptocurrency wallet review if you’re looking for a popular wallet that lets you hold your own private keys.
Where should you store your OmiseGO (OMG) tokens? Find out in this guide to the best OMG wallets.
Your guide to six of the best desktop, mobile, hardware and web wallets for securely storing NEO.
Your guide to the best wallets for safely and securely storing Cardano Ada tokens (ADA), including tips on how to choose the right wallet for your needs.
Your guide to the best Ethereum wallets, how they work and how to find the right ETH wallet for your needs.
A comprehensive guide to what you need to know to detect and avoid some of the most common cryptocurrency scams.