Today’s article will cover the basics of VPN (Virtual Private Network).
First of all, let’s break down networks (a group of computers) into two simple parts, Public networks, and Private networks.
Public networks are those networks whose devices are visible to the public. Anyone can interact with a computer which is in a federal system.
On the other hands, Private networks are private. No outsider can connect to the computers present in an exclusive arrangement. But why? Because private networks can’t connect to the internet.
Take an example, let’s say you work for a video game developer company. You work in a team of 150 people, some create music for the game, some draw characters, some write a story, and some adds bugs. What makes these people a team? Teamwork. They share their creations using documents, pictures, videos, etc. But how do they share it? Are they using pen drives? Internet? No, that’s not safe as hackers can attack. Are they connecting those computers? Yes. They can connect their computers, forming a LAN. But what if some hackers break into one of the networks and steal data? The hacker will attack from outside, which means the internet, but what if we don’t connect our computers to the internet? then, we are safe, and this is what we call a Private Network.
So basically, you can say a LAN which can’t connect to the internet is called a private network.
Note: You can call your network a private network if it is behind a N.A.T., which makes it connect to the internet indirectly. Private networks are hence an integral part of such an organisation’s security.
But there’s still a problem, what if some employee is at his home, but the team needs him to sketch them? Well, he will not be able to send his design to the office because he is not a part of the private network of the office.
To solve such problems, we have a technology named VPN (Virtual Private Network). It lets a computer outside of the private network to connect to the private network. VPN seems to destroy the concept of an individual system because anyone can use a sniffer to intercept the connection between the computer and the private network.
Well VPN has a surprise, it uses encryption which makes the connection invulnerable from sniffing and MITM (Man In The Middle attack).
Evolution Of VPN:
Years back, VPN technology was only limited to offices and other such places, but then VPN got evolved. It became something more than a technique used to connect to private networks. Now you can install a VPN client on your device to encrypt all the data going in and out of your device.
For example, if you are visiting a website with standard connection settings, your connection can be represented. Usually, when you visit a site, you forward your request to your I.S.P. (Internet Service Provider) then your I.S.P. forwards your request to the website. Website hence receives your application and transmits the answer to your request to your I.S.P. then I.S.P. delivers the response to you. But if you are in a public network, you are an easy target to sniffing and MITM attacks.
Now let’s install a VPN Client (a program that allows us to use VPN services) in our computer and try to revisit the website:
Step 1. VPN Client installed in our device encrypts the request.
Step 2. I.S.P. receives the encrypted request and forwards it to the VPN server.
Step 3. VPN decrypts the request and sends it to the website.
Step 4. The site gets the request and sends the answer to the VPN server.
Step 5. VPN server encrypts the response and forwards it to the I.S.P.
Step 6. I.S.P. receives the encrypted answer and sends it to our device.
Step 7. VPN Client installed in our device decrypts the response.
Now there is something else that that’s good about VPN, and it also works as a proxy which gives us another layer of security in this big wild world of internet pirates.
[F.A.Q.] Am I Completely Invisible Behind A VPN?
If we ignore factors like DNS leaks then yes, your target will not be able to trace you. But if you do something illegal using a VPN and the victim contacts police, you will get caught because the VPN Server has users information stored and they will give it police right away.
Many paid VPN providers claim that they don’t store logs. Don’t fall into such traps because they keep records! Every VPN provider keeps logs!
And never trust a VPN client which is not famous or is cracked version or something because it can lead to privacy risks as your data goes through their servers. I hope that was useful if you do have any questions just put them below and I’ll get back to you.
My Recommendation: There are some VPN is really helpful such as
- Nord Vpn (Paid)
- Ip Vanish (Paid)
- Cyber Ghost(Paid)
- Tunnelbear (Paid) > Not Unlimited
- Avira (Free & Paid)