A VPN, or Virtual Private Network, is a cybersecurity tool that reroutes your internet traffic through an encrypted tunnel, allowing you to:
- Protect your privacy – traffic rerouting through an encrypted tunnel hides your source IP and obscures your browsing history from your ISP and admins
- Secure your data – encrypted tunnels ensure your data is unreadable and untraceable.
- Bypass network blocks – some content is restricted using geo-ip blocking and access to this content can be at times bypassed. The reason i say sometimes is that services are getting better at detecting VPN applications or IP nodes.

ImgSrc: privateinternetaccess.com
Virtual Private Networks (VPNs) have long been used to hide the origin IP address for privacy reasons, or to access geo-restricted services, or to surf the internet securely on public wifi networks. Most VPN providers collect and store session metadata and logs though, and it is not uncommon for them to share your web browsing history upon request from law enforcement (for legitimate reasons) or other third parties often without consent. Some of the privacy-focused VPN services out there include:
- ProtonVPN
- Private Internet Access
- Mullvad
I have personally used PIA for a while and I find the service good and responsive. There are issues with customer support that one must contend with. Even though they are hosted in the US, they do not store any logs making them secure from a privacy standpoint.
In a nutshell i would recommend using a VPN to secure your internet activity. Some points of consideration are
- Usage logs anonymity or storage
- App transparency and audits
- Reputation and logevity – its takes years to build a global infrastructure
- Speed and data restrictions if any
- Number of devices covered
- Cost
- Number of countries with servers – I frequently VPN via only a few countries and they are offered by almost all service providers.
- A more technical user should look at – algorithm support, encryption standards, App support on devices and browsers, Technical support access, history of working with law enforcement if any, known breaches of the service if ever

Leave a comment