VPN Services
Virtual Private Networks (VPNs) encrypt your internet traffic and route it through a remote server, hiding your IP address from the websites you visit and shielding your activity from anyone on your local network. But a VPN is not a magic shield — it solves specific problems, and understanding those problems is essential before choosing to use one.
This section covers the key aspects of VPN usage, from understanding why HTTPS alone is not enough, to evaluating providers and configuring tools that match your threat model.
Subtopics
-
HTTPS vs VPN — Why HTTPS does not make VPNs unnecessary. How metadata leaks even with encrypted connections, and what a VPN actually hides.
-
Attack Surfaces on Public Networks — Specific risks on open Wi-Fi networks: rogue hotspots, captive portals, DNS spoofing, and insecure mini-browsers.
-
When to Use a VPN — A threat-model-based decision framework. Includes how to choose a VPN service that fits your needs.
-
VPN Limitations — What a VPN cannot protect you from: provider trust, DNS leaks, TunnelVision, browser fingerprinting, and endpoint compromise.
-
VPN Providers and Tools — Recommended no-logs providers, plus tools organized by network, DNS, device, and browser level.