With growing censorship and regulations threatening global internet freedom and security, in turn, weve seen an increasing number of services become available to protect your online web browsing.
Virtual Private Networks (or VPN) have become increasingly popular in recent years for their ability to bypass government censorship and geo-blocked websites and services, and do so without giving away who is doing the bypassing.
For a VPN to do this, it creates what is known as a tunnel between you and the internet, encrypting your internet connection and stopping ISPs, hackers, and even the government from nosing through your browsing activity.
When you connect to the internet with a VPN, it creates a connection between you and the internet that surrounds your internet data like a tunnel, encrypting the data packets your device sends.
While technically created by a VPN, the tunnel on its own cant be considered private unless its accompanied with encryption strong enough to prevent governments or ISPs from intercepting and reading your internet activity.
The level of encryption the tunnel has depends on the type of tunneling protocol used to encapsulate and encrypt the data going to and from your device and the internet.
There are many types of VPN protocols that offer varying levels of security and other features. The most commonly used tunneling protocols in the VPN industry are PPTP, L2TP/IPSec, SSTP, and OpenVPN - and the world's best VPN services should offer most or all of them. Lets take a closer look at them.
Point to Point Tunneling Protocol (PPTP) is one of the oldest protocols still being used by VPNs today. Developed by Microsoft and released with Windows 95, PPTP encrypts your data in packets and sends them through a tunnel it creates over your network connection.
PPTP is one of the easiest protocols to configure, requiring only a username, password, and server address to connect to the server. Its one of the fastest VPN protocols because of its low encryption level.
While it boasts fast connection speeds, the low level of encryption makes PPTP one of the least secure protocols you can use to protect your data. With known vulnerabilities dating as far back as 1998, and the absence of strong encryption, youll want to avoid using this protocol if you need solid online security and anonymity government agencies and authorities like the NSA have been able to compromise the protocols encryption.
Layer 2 Tunneling Protocol (L2TP) is used in conjunction with Internet Protocol Security (IPSec) to create a more secure tunneling protocol than PPTP. L2TP encapsulates the data, but isnt adequately encrypted until IPSec wraps the data again with its own encryption to create two layers of encryption, securing the confidentiality of the data packets going through the tunnel.
L2TP/IPSec provides AES-256 bit encryption, one of the most advanced encryption standards that can be implemented. This double encapsulation does, however, make it a little slower than PPTP. It can also struggle with bypassing restrictive firewalls because it uses fixed ports, making VPN connections with L2TP easier to block. L2TP/IPSec is nonetheless a very popular protocol given the high level of security it provides.
Secure Socket Tunneling Protocol, named for its ability to transport internet data through the Secure Sockets Layer or SSL, is supported natively on Windows, making it easy for Windows users to set up this particular protocol. SSL makes internet data going through SSTP very secure, and because the port it uses isnt fixed, it is less likely to struggle with firewalls than L2TP.
SSL is also used in conjunction with Transport Layer Security (TLS) on your web browsers to add a layer to the site youre visiting to create a secure connection with your device. You can see this implemented whenever the website you visit starts with https instead of http.
As a Windows-based tunneling protocol, SSTP is not available on any other operating system, and hasnt been independently audited for potential backdoors built into the protocol.
Saving the best for last, we have OpenVPN, a relatively recent open source tunneling protocol that uses AES 256-bit encryption to protect data packets. Because the protocol is open source, the code is vetted thoroughly and regularly by the security community, who are constantly looking for potential security flaws.
The protocol is configurable on Windows, Mac, Android, and iOS, although third-party software is required to set up the protocol, and the protocol can be hard to configure. After configuration, however, OpenVPN provides a strong and wide range of cryptographic algorithms that will allow users to keep their internet data secure and to even bypass firewalls at fast connection speeds.
Even though its the fastest, you should steer clear of PPTP if you want to keep your internet data secure. L2TP/IPSec provides 256-bit encryption but is slower and struggles with firewalls given its fixed ports. SSTP, while very secure, is only available on Windows, and closed off from security checks for built-in backdoors.
OpenVPN, with its open source code, strong encryption, and ability to bypass firewalls, is the best tunneling protocol to keep your internet data secure. While it requires third-party software that isnt available on all operating systems, for the most secure VPN connection to the internet, youll want to use the OpenVPN protocol.
A good VPN service should offer you the choice of at least these four types of tunneling protocols when going online. Weve compiled a list of the best VPNs in the industry for you to get started on protecting your internet data.
Balance of options and ease of use
- Regulated encryption isnt possible heres what is - POLITICO Europe - August 3rd, 2021
- Work from home and cloud are prompting hard looks at security - GCN.com - August 3rd, 2021
- Atakama and Spirion to announce their strategic partnership at Black Hat 2021 - PRNewswire - August 3rd, 2021
- Spirion and Atakama Join Forces at Black Hat 2021 Conference - MarTech Series - August 3rd, 2021
- Looking for ways to password protect a file or folder on Windows 11? Here's how you can do it - India Today - August 3rd, 2021
- XSOC CORP's SOCKET Receives UL- 2900 Certification for Securing Encrypted Workflows of Today's Enterprise and Industrial Connected Devices - Business... - August 3rd, 2021
- Apple @ Work: FileVault 2 is so good, theres no reason for IT departments not to use it - 9to5Mac - August 3rd, 2021
- The Future of Industrial Security - Security Today - August 3rd, 2021
- Global Encryption Software System Market Size And Forecast to 2021 2027 analysis with key players : IBM, Microsoft, Sophos ltd, Gemalto, Net App Inc,... - August 3rd, 2021
- Cloud Encryption Software Market Size 2021 Industry Demand, Share, Global Trend, Industry News, Business Growth, Top Key Players Update, Business... - August 3rd, 2021
- Global E-mail Encryption Market Dynamics Analysis, Production, Supply and Demand, Covered in the Latest Research 2021-2026 - Digital Journal - August 3rd, 2021
- Insights on the Optical Encryption Global Market to 2027 - Featuring Arista Networks, Broadcom and CenturyLink Among Others - ResearchAndMarkets.com -... - July 8th, 2021
- Jupiter Project Presents 'Metis Messenger', the Decentralized Chat Application That Syncs Across All Platforms - GlobeNewswire - July 8th, 2021
- If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels - The Daily Post - July 2nd, 2021
- Leveraging Encryption Keys to Better Secure the Federal Cloud - Nextgov - July 2nd, 2021
- Benefits of Adopting Data Encryption in Businesses - CIOReview - July 2nd, 2021
- Encryption can be lucrative, but with environmental costs - Floridanewstimes.com - July 2nd, 2021
- UK Government has suggested messaging apps to avoid using end-to-end encryption on the accounts of children because that can be harmful to them -... - July 2nd, 2021
- Diavol ransomware linked to Trickbot botnet - IT PRO - July 2nd, 2021
- Got data? The biggest-ever portable encrypted SSD just came out - Cult of Mac - July 2nd, 2021
- Application-Level Encryption Market is expected to expand at a CAGR of 25% from 2020 to 2030 KSU | The Sentinel Newspaper - KSU | The Sentinel... - July 2nd, 2021
- Encryption Key Management Market to Eyewitness Massive Growth by 2028: Ciphercloud, Gemalto, Google The Manomet Current - The Manomet Current - July 2nd, 2021
- Data storage: the importance of protecting the device and not just the network - IT-Online - July 2nd, 2021
- Global E-mail Encryption Market 2021 Demands To Sustain in Future Industry Size, Growth, Revenue, Global Statistics and Forecast to 2030 The Manomet... - July 2nd, 2021
- Hardware Encryption Market 2021 Industry Analysis by Manufacturers, End-User, Type, Application, Regions and Forecast to 2027 The Manomet Current -... - July 2nd, 2021
- Former Anonymous and Lulzsec hacker discusses his criminal past and gives his top tips for avoiding ransomware - Texasnewstoday.com - July 2nd, 2021
- Why Inspecting Encrypted Traffic Is A Must - Security Boulevard - June 25th, 2021
- Researchers: 2G Connection Encryption Deliberately Weakened To Comply With Cryptowar Export Restrictions - Techdirt - June 25th, 2021
- The Ultimate Guide to Key Management Systems - Hashed Out by The SSL Store - Hashed Out by The SSL Store - June 25th, 2021
- Will regulation adapt to encryption, or will encryption adapt to regulation?Expert answers - QNT - June 25th, 2021
- China 'all in' on its own encryption brand - BollyInside - June 25th, 2021
- How the FBI Is Trying to Break Encryption Without Actually Breaking Encryption - Gizmodo - June 19th, 2021
- Vergecast: Windows 11 leaks, RCS encryption, and this week in antitrust - The Verge - June 19th, 2021
- WhatsApp vs govt: Can traceability and encryption co-exist? - Business Today - June 19th, 2021
- Finding the balance in encryption and crime-fighting Monash Lens - Monash Lens - June 19th, 2021
- Drug bust was a huge coup - but the surveillance should trouble free citizens - Stuff.co.nz - June 19th, 2021
- Google open-sources tools to bring fully homomorphic encryption into the mainstream - The Daily Swig - June 16th, 2021
- Google enables end-to-end encryption for Androids default SMS/RCS app - Ars Technica - June 16th, 2021
- Bitcoin and Encryption: A Race Between Criminals and the F.B.I. - The New York Times - June 16th, 2021
- We've been shown time and again that strong encryption puts crims behind bars, so why do politicos hate it? - The Register - June 16th, 2021
- How To Enable End-To-End Encryption In Zoom On Windows 10 - Wccftech - June 16th, 2021
- WhatsApp to Enable Multi-Device Support With End-to-End Encryption: Report - Gadgets 360 - June 16th, 2021
- How to Encrypt Files, Folders and Drives on Windows 10 ... - June 12th, 2021
- Device encryption in Windows 10 - support.microsoft.com - June 12th, 2021
- Countering disinformation and protecting democratic communication on encrypted messaging applications - Brookings Institution - June 12th, 2021
- 2021 Hong Kong Encryption Trends: As cyber threats grow, Hong Kong outpaces the world in enterprise encrypt... - Security Boulevard - June 12th, 2021
- FBI, Australian Police Ran A Backdoored Encrypted Chat Service For Three Years - Techdirt - June 12th, 2021
- New beta reveals more info about upcoming end-to-end encrypted backups in WhatsApp - TechRadar - June 12th, 2021
- Hacking, encryption and threat of attack: What the dead Israeli intel officer did before he was drafted - Haaretz - June 12th, 2021
- Fitting Into IoT Security with a New Open-Source Encryption Standard - IoT For All - June 12th, 2021
- Raids worldwide as police reveal vast hack of criminal encryption platform - FRANCE 24 - June 12th, 2021
- Social applications are the next big trend in encryption - QNT - June 6th, 2021
- Microsoft Teams: Here's when your calls will get end-to-end encryption - TechRepublic - June 4th, 2021
- Survey reveals how businesses have gotten more serious towards encrypting their data - Digital Information World - June 4th, 2021
- Microsoft Teams calls are getting end-to-end encryption in July - BleepingComputer - June 4th, 2021
- Data encryption cyber security software company DAtAnchor, Inc. offers affordable CMMC v1.02 compliance for Office, CAD, video, and audio files. Ohio... - June 4th, 2021
- Only 17% of organizations encrypt at least half of their sensitive cloud data - SC Magazine - June 4th, 2021
- Database Encryption Market 2021 Present Scenario on Growth Analysis and High Demand to 2030 KSU | The Sentinel Newspaper - KSU | The Sentinel... - June 4th, 2021
- Cloud Encryption Gateways Market is Booming Worldwide | Global Analysis and Forecasts 2020-2026 | Key Players are Google, Ciphercloud, Perspecsys,... - June 4th, 2021
- End-to-End Encryption: Important Pros and Cons - CIO Insight - June 2nd, 2021
- 5 Trends Shaping the Future of Encryption - Cyber Security Hub - June 2nd, 2021
- Duality Technologies and Intel Collaborate to Deliver Optimized Homomorphic Encryption Applications - PRNewswire - June 2nd, 2021
- Top Benefits that Help in Boosting the Growth of the Email Encryption Market - TechBullion - June 2nd, 2021
- Baffle Brings the Holy Grail of Encryption to Amazon RDS - Yahoo Finance - June 2nd, 2021
- Why Indian Courts Should Reject Traceability Obligations - EFF - June 2nd, 2021
- Ending encryption: On enforcing traceability on popular messaging apps - The Hindu - June 2nd, 2021
- E-mail Encryption Market is Anticipated to Gain Moderate CAGR by 2027 The Manomet Current - The Manomet Current - June 2nd, 2021
- Expert Stakeholder Consultation Report on the Indian Encryption Debate - Business Wire India - June 2nd, 2021
- Homomorphic Encryption Market Proceeds To Witness Huge Upswing Over Assessment Period by 2030 | Microsoft (US), IBM Corporation (US), Galois Inc (US) ... - June 2nd, 2021
- Rings 1080p Video Doorbell Pro with end-to-end encryption requires no batteries at a low of $120 - 9to5Toys - June 2nd, 2021
- More Businesses Adopting Encryption in the Last Year - Softpedia News - June 2nd, 2021
- Quantum computers have the potential to crack todays encrypted messages.Its a problem - Illinoisnewstoday.com - May 30th, 2021
- Ravi Shankar Prasad: Govt not in favour of breaking WhatsApps encryption, users have full right to it - The Indian Express - May 30th, 2021
- Data Encryption, Zero Trust A Practical Review of Bidens Executive Order on Improving the Nations Cybersecurity - Security Boulevard - May 30th, 2021
- WhatsApp challenges govt: Breaking end-to-end encryption will lead to security issues but timing of petition circumspect - Free Press Journal - May 30th, 2021
- The Indian Government Wants to Break Messaging Encryption, WhatsApp's Suing - Gizmodo - May 30th, 2021
- Klever integrates Jumio on its encrypted exchange service for user authentication - QNT - May 30th, 2021
- IoT Security Solution for Encryption Market Size and Share 2021 | Global Industry Analysis By Trends, Future Demands, Growth Factors 2027 Brockville... - May 30th, 2021
- WhatsApp Sues The Indian Government Over New Laws That Would Force It To Break Encryption - Techdirt - May 28th, 2021
- More and more companies are encrypting their devices - ITProPortal - May 28th, 2021