In this article:
In this article:
A VPN alone can't protect you from phishing or malware; still, for the average user they can be useful. With other security tools, they’re more effective.
A VPN alone can't protect you from phishing or malware; still, for the average user they can be useful. With other security tools, they’re more effective.
In this article:
In this article:
A virtual private network (VPN) creates a conduit for your online traffic and information to travel safety between devices and networks.
Instead of moving through your internet service provider's (ISP) server, your data and activity route through the VPN's remote server. In the process, the VPN effectively hides your IP address by replacing it with the remote server's IP.
To protect your data, VPNs send it through an encrypted tunnel — making it undecipherable — except to your device and the VPN server. A VPN’s security and performance depend on several factors, including the encryption algorithm and protocols used. The encryption type and key length decide how your data is scrambled. A VPN protocol sets the rules for data encryption, decryption, and authentication.
For example, Aura uses Advanced Encryption Standard (AES) 128-bit encryption — a National Institute of Standards and Technology (NIST)-recommended algorithm for use on unclassified federal systems [*]. As for protocols, VPNs may choose from several options, including OpenVPN, IKEv2/IPSec, or WireGuard®.
{{show-toc}}
It was in the 2010s that commercial VPNs took off — spurred by browsing history leaks, ISP throttling, and a boom in streaming services like Netflix.
Average internet users who didn’t trust their ISP cloistered to VPNs for online privacy [*]. While VPN usage continues to grow [*], Americans are more discerning about VPN services.
VPNs are not complete cybersecurity tools and must be used with antivirus software, password managers, and multi-factor authentication (MFA). Here's a brief summary of what VPNs can and cannot hide.
What a VPN hides:
What a VPN doesn’t hide:
{{show-cta}}
In general, VPNs cost between $3 and $13 per month. The true cost depends on other available features, functionality, and subscription length. Here are the prices for some of the top VPNs in the market*:
While free VPN services are available, they lack the privacy and security that premium VPNs offer. In fact, they may be more dangerous than using no VPN at all.
SuperVPN, for example, compromised over 360 million user records after a data breach last year [*]. Its free VPN app for Android and iOS was listed as being developed by two different entities.
*Prices are as of March 2024.
Nearly half of all internet users turn to VPNs for general online safety — for reasons such as preventing identity theft [*]. So, yes, VPNs are safe to use as long as you choose the right provider.
Websites can track you in other ways
How a VPN is set up matters, too
HTTPS makes most website secure already
When ISPs and data brokers amass your personal information without your consent, VPNs can be helpful. The problem is that less-than-reliable VPN providers collect that same information themselves [*].
You’re then left to choose between whom you trust more — your ISP or VPN provider.
It should be noted, however, that not all VPNs record browsing activity or store device identifiers. Aura does not record your VPN browsing activities in any way that can be traced back to you.
Even the best VPNs can't stop viruses and malware on their own. While they can help defend your information from man-in-the-middle (MITM) attacks on public Wi-Fi networks and fake hotspots, VPNs do not block, quarantine, or remove malicious files or software from your device.
If you click on a malicious link or download a corrupted file from a phishing email, your VPN alone won't protect you.
In reality, there's no one way to completely stop viruses and malware. You can, however, decrease the likelihood of them affecting you by using a well-rounded approach to digital security. For best results, pair a good VPN with the following:
For most users, the Tor browser shouldn't be considered as an alternative to a VPN.
When you use the Tor browser, your encrypted traffic ricochets to randomly selected servers (or nodes) before landing at its destination.
While this gives you anonymity, the multiple layers of encryption and relays can result in slower search speeds. The Tor browser may also give you access to the Dark Web. This part of the internet is blocked by search engines and can be a lurking ground for cybercriminals [*].
Some people use the Tor browser in addition to a VPN to increase their privacy, but this isn't recommended either. Using both will block your ISP from knowing you used Tor and block Tor from seeing your IP address. This will result in much slower speeds; and your privacy still hinges on your VPN's logging policies.
By taking on the IP address of a remote server, VPN users can trick their networks and online services into thinking they're visiting from a different country.
This is especially useful in heavily surveilled environments, like Russia and China, or to unblock geo-restricted streaming content.
Not all VPNs can get around these geo-blocks. China, Russia, and Netflix have all cracked down on the technology by blocking IP addresses known to be associated with VPNs. Despite these efforts, many VPN providers have kept up by introducing new and unblocked IP addresses.
In most cases, VPNs slow down your internet connection speed because of the data encryption process, the protocols used, your distance from the VPN server, and the number of users on the server.
Security.org speed-tested VPNs 120 times and found that internet speeds decreased every time [*].
The only exception to this rule is if your ISP throttles your bandwidth, say, when you stream. With a VPN on your home network, you can hide what you're doing and sidestep the throttling.
CAPTCHAs trigger when a website or search engine detects bot-like behavior. Since VPNs use the same IP address for many users, their collective activity appears to come from one location.
As a result, VPNs may trigger "unusual traffic" alerts and CAPTCHAs from Google [*]. Google even blocks all activity from some VPNs.
While it’s frustrating for VPN users, there are some workarounds:
VPNs scramble your data and hide your IP address, but they can't protect you against phishing attacks, malware, fraud, or Dark Web leaks.
Individuals and organizations that require more control, security, and/or anonymity might use a VPN alternative. Zero-trust network access (ZTNA) is an example.
For the average user, however, VPNs can be quite effective, especially in consort with other digital security tools:
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.