Top Qs
Timeline
Chat
Perspective
VPN service
Commercial service for proxied Internet access From Wikipedia, the free encyclopedia
Remove ads
A virtual private network (VPN) service is a proxy server marketed to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against user profiling or MitM attacks on hostile networks.
A wide variety of entities provide VPN services for several purposes. Depending on the provider and the application, they do not always create a true private network. Instead, many providers simply provide an Internet proxy that uses VPN technologies such as OpenVPN or WireGuard. Commercial VPN services are often used by those wishing to disguise or obfuscate their physical location or IP address, typically as a means to evade Internet censorship or geo-blocking.
Providers often market VPN services as privacy-enhancing, citing security features, such as encryption, from the underlying VPN technology. However, when the transmitted content is not encrypted before entering the proxy, that content is visible at the receiving endpoint regardless of whether the VPN tunnel itself is encrypted for the inter-node transport. On the client side, configurations intended to use VPN services as proxies are not conventional VPN configurations. However, they do typically utilize the operating system's VPN interfaces to capture the user's data to send to the proxy. This includes virtual network adapters on computer OSes and specialized "VPN" interfaces on mobile operating systems. A less common alternative is to provide a SOCKS proxy interface.
In 2025, 1.75 billion people use VPNs. By 2027, this market is projected to grow to $76 billion.[1] Recommendation websites for VPNs tend to be affiliated with or even owned by VPN service providers, and VPN service providers often make misleading claims on their products.[2]
Remove ads
VPN use cases
Summarize
Perspective
Accessing geo-restricted content
VPNs allow users to bypass regional restrictions by hiding their IP address from the destination server and simulating a connection from another country.
Improving privacy on public Wi-Fi
Where public Wi-Fi networks do not provide isolated encryption for each connected device, VPN services can provide a certain level of protection. When in use, potential eavesdroppers on the network can only observe that a connection to the VPN server is made by a user's device.[3] As of June 2025, however, approximately 98% of human-generated internet traffic was encrypted using TLS through the HTTPS protocol;[4] when TLS is used, network eavesdropping can only point out the IP addresses or hostnames a user is connecting to. Interception of network requests by a bad actor in the form of a Man-in-the-middle attack will most likely result in a certificate warning in being displayed in the user's browser.[5]
SSL stripping, the practice of downgrading a connection to unencrypted HTTP,[6][7] doesn't always result in a browser warning,[citation needed] although this has been partly mitigated by the implementation of HTTP Strict Transport Security.[8][9]
Improving privacy for activists and journalists
Activists and journalists working in restrictive or authoritarian regions often use VPNs to maintain anonymity and protect sensitive communications. VPNs mask IP addresses and encrypt data, ensuring safe access to information and secure communication channels.
Remove ads
Criticism and limitations
Users are commonly exposed to misinformation on the VPN services market, which makes it difficult for them to discern fact from false claims in advertisements.[10] According to Consumer Reports, VPN service providers have poor privacy and security practices and also make hyperbolic claims.[11] The New York Times has advised users to reconsider whether a VPN service is worth their money.[12] VPN services are not sufficient for protection against browser fingerprinting.[13]
Security
A VPN service is not in itself a means for good Internet privacy. The burden of trust is simply transferred from the ISP to the VPN service provider.[14][15] The provider may log the user's traffic, although this depends on the individual company. Users can still be tracked through tracking cookies and device fingerprinting, even if the user's IP address is hidden.
Remove ads
Legality
In March 2018, the use of unapproved VPN services was banned in China, as they can be used to circumvent the Great Firewall.[16] Operators received prison sentences and were penalized with fines.[17][18][19][20] Russia banned various VPN service providers in 2021.[21]
Comparison of commercial virtual private network services
Summarize
Perspective
Privacy
PC Magazine recommends that users consider choosing a provider based in a country with no data retention laws because that makes it easier for the service to keep a promise of no logging.[22] PC Magazine and TechRadar also suggest that users read the provider's logging policy before signing up for the service,[23] because some providers collect information about their customers' VPN usage.[24][25]
Technical features
Notes
Encryption
Notes
- Only on iOS 8 and earlier. All other supported devices and operating systems use AES-256 (CBC).[87]
- iOS 9 and later use 2048 bit. iOS 8 and earlier use 1548 bit. All other supported devices and operating systems use 4096 bit.[87]
- iOS 8 and earlier use SHA-1. All other supported devices and operating systems use SHA-256.[87]
Definitions
The following definitions clarify the meaning of some of the column headers in the comparison tables above.
- Anonymous payment method
- Whether the service offers at least one payment method that does not require personal information. Even if a service accepts a cryptocurrency like bitcoin, it might still require that the customer hands over personally identifiable information (PII) like their full name and address.
- Bandwidth
- Whether the users' bandwidth is logged while using the service, according to the service's privacy policy.
- Diskless
- Whether the service's server hardware is connected to hard drives, according to the service provider. If the servers are diskless, the service provider should be unable to log any usage data.
- First-party DNS servers
- Whether the service provides its own domain name system (DNS) servers.
- Kill switch
- Whether the service has the ability to immediately sever your connection to the Internet in the event that the VPN connection fails. This prevents a user IP address leak.[105]
- Logging
- Whether the service stores information about their users' connection or activity on the network, according to the service's privacy policy or terms of service. If logging isn't mentioned in those sections but denied somewhere else on the website, the particular table cell will be marked as "No" in yellow and include an explanatory note.
- Privacy Impact Score
- An indicator of a website's usage of potentially privacy intrusive technologies such as third-party or permanent cookies, canvas trackers etc.[106] The score can be in the range from 0 to 100, where 0 is minimal privacy impact (best) and 100 is the biggest privacy impact (worst) relative to other web sites.[106] The score also has a simplified letter and colour presentation from A to F where A is "No cookies" and F is "Score above three standard deviations from the average".[106] The metric is developed by WebCookies.org.[106]
- Obfuscation
- Whether the service provides a method of obfuscating the VPN traffic so that it's not as easily detected and blocked by national governments or corporations.[107][108]
- Offers WireGuard
- Whether the service provider offers the WireGuard tunneling protocol.
- SSL rating
- The service's website's overall SSL server rating according to Qualys SSL Labs' SSL Server Test tool.
- Supports Obfsproxy
- Whether the service has an implementation of the Tor subproject Obfsproxy.[107][108]
Remove ads
References
Wikiwand - on
Seamless Wikipedia browsing. On steroids.
Remove ads