What Is A VPN?


VPN means Virtual Private Network, which is basically a secure connection between two or more devices. It doesn’t physically exist, it is just a temporary encrypted connection between your computer and our servers and as only we have the encryption keys, it is private to us.

How Does A VPN Work?


When you connect to our service, your computer makes an encrypted connection to one of our secure servers and then sends all of your Internet traffic across that connection. So suppose you are in Egypt (for example) and you connect to our server in the United States, the connection between you and our server in the United States will be fully encrypted, and anyone in between cannot see or tell what you are doing on the Internet. This means all hackers, snoopers, ISPs, and third parties can see is an encrypted connection between you and us.

Why Does A VPN Matter?


Well suppose the government of Egypt decided that they did not want their people to access Facebook, they can simply firewall all access to facebook.com on the country’s telecommunications equipment and straight away you would not be able to access Facebook.

 

However, by connecting to our service first, your network traffic would go directly from your computer to one of our secure servers and only then out on the Internet to Facebook. The Egyptian telecoms people can only see a secure connection to us, they are not able to trace or block your connection to Facebook. Conversely, suppose the board at Twitter (or more likely one of the media companies such as Hulu, ABC, NBC and etc.) decided that their service was only going to be available to U.S based customers, they could simply block access from any location outside of the U.S on their servers.

 

Again, by using our service and connecting to one of our secure U.S based servers, Twitter would think you are in the U.S and therefore grant you full access. These are fairly generic examples but the principle is simple in which by connecting to our servers, you get to choose which country your computer appears to be in and therefore which rules govern your Internet connection.

What Are VPN Protocols?


A VPN connection utilises different protocol technologies such as PPTP, L2TP, SSL, or IKEv2 to establish a secure connection. Some have been developed since the birth of the Internet, and some are freshly of this decade, but not all are created equally. We support all the main VPN protocols and your account provides you access to use any of them. Here’s a quick breakdown on these protocols below:

PPTP L2TP-IPSec SSL IKEv2
Details Point-to-Point Tunneling
Protocol was developed by
Microsoft for creating VPN over
dial-up networks. It has long
been the standard protocol for
internal business VPN. PPTP is
a VPN protocol only and has a
quick implementation due to low
computational overhead
requirements.
Layer 2 Tunnel Protocol is a
VPN protocol that provides
encryption and confidentiality
for traffic that passes through it
when implemented with the
IPsec encryption suite. L2TP
over IPsec is as easy and quick
to set up as PPTP and is built-in
most modern operating
systems.
OpenVPN is an open source
VPN solution that uses various
technologies, including the
OpenSSL library and SSLv3/
TLSv1 encryption protocols. It is
highly configurable and can be
set to run on any port, although
it runs best on a UDP port. It is
considered difficult to block as it
makes traffic on it impossible to
differentiate from traffic using
standard HTTPS over SSL.
Internet Key Exchange version
2 is the newest VPN protocol
and based on IPSec tunneling
protocol. Jointly developed by
Microsoft and Cisco, it is baked
into Windows 7+.
 Security MPPE – 128bit AES – 128bit AES – 256bit AES – 256bit
 Speed Highest speed due to basic
encryption, but can result in
unstable connections.
L2TP/IPsec has tunneling
overhead but still fast due to
encryption/decryption efficiency.
Even on connections with high
latency and across great
distances it still has great
speed, making this the best
performing protocol.
Faster than most VPN
protocols.
Supported
Devices
All Platforms: Windows, Mac,
Linux, iOS, Android, and more
Most Platforms: Windows, Mac,
Linux, iOS, Android, and more
Most Platforms: Windows, Mac,
Linux, iOS, Android, DD-WRT,
and more
Newer Platforms: Windows,
Mac, iOS, and Android
 Pros • Fast
• Very easy setup
• Support for all platforms
• Easy setup
• Support on most platforms
• Very fast
• Very secure
• Can bypass firewalls
• Highly customisable
• Very fast
• Very secure
• Very stable
• Easy setup
 Cons • Stability varies depending on
network
• Low security level
• May have slightly slower
speeds
• Can be problematic on
restrictive firewalls
• Setup may be trickier than
other protocols
• Not supported on some
mobile devices
• Requires third party software
• Not supported on most older
platforms
 Conclusion A good basic VPN connection,
widely supported without any
additional software
An improvement over PPTP and
widely supported
In our humble opinion, the best
VPN solution. Although you
need to download a bit of
software and it is not usually
supported on mobile devices.
(RECOMMENDED)
An excellent standard VPN
solution, second only to SSL.
(RECOMMENDED)