When using a VPN or a VPN service, you might encounter some technical terms and wonder how they are related to your privacy and security. Well, in this article, we are going to explain some few very basic technical terms that encompass a VPN and its services.
虚拟专用网
A VPN encrypts your internet traffic and passes it through a secure tunnel to the VPN servers. This is how a VPN achieves security. With the encryptions, you keep prying eyes (ISP, government, cybercriminals, etc.,) at bay since they won’t be able to see your internet traffic.
Also, a VPN provides you with privacy. When connecting to the VPN service, you must first select a server. This is the server where your internet traffic will be tunneled through. This server assigns you a virtual IP address that replaces your actual IP address on the internet. This means your actual IP address won’t be visible to prying eyes. Also, your geolocation will be hidden too.
加密
Using various encryption standards such as the AES 256 bit, a VPN distorts and scrambles your data in a gibberish form that can’t be understood by prying eyes. Encryption uses keys and a cipher to turn your data into the unreadable chunk. Decryption is turning the data back into a readable form using a decryption key. VPNs usually implement end-to-end encryptions, that’s, a VPN service encrypts your entire communication to and fro.
AES
AES or Advanced Encryption Standard is one of the best specifications that VPNs use to encrypt your internet traffic. The most preferred one is the AES 256 bit. This specification has a longer key length that even supercomputers might take years to crack it. The longer the key, the stronger the encryption.
密码
A cipher is an algorithm that facilitates the encryption and decryption of VPN data. A cipher can be likened to a set of keys used to lock and unlock the secure VPN tunnel. There are various ciphers, but most secure VPNs use the AES 256-bit cipher. This cipher is found in the Advanced Encryption Standard (AES) which is regarded as one of the strongest encryption techniques.
隧道工程
Tunneling involves establishing a secure encrypted channel between your device (VPN client) and the VPN server. Several VPN protocols govern tunneling. The most common ones include; OpenVPN, L2TP/IPSec, and IKEv2.
VPN 协议
Protocols are standards that govern and tell a VPN how to perform encryptions and communications over the network. Additionally, they are also responsible for how fast a VPN can be.
关闭开关
This is a security feature that’s is essential when the VPN connection drops. When enabled, the kill switch will stop your device from sending or receiving data from the internet. This ensures that your internet traffic doesn’t get to the internet via your ISP and hence cause an IP leak which will sabotage your privacy and security.
IP 泄露/DNS 泄露
这是指在连接 VPN 后,您的 IP 地址在开放互联网上仍然可见。大多数情况下,当你的 VPN 连接断开,杀毒开关被禁用,或者由于 WebRTC 泄露,就会出现这种情况。
Dedicated IP vs. Shared IP
大多数 VPN 都向客户提供这种类型的 IP 地址。专用 IP 只分配给一个人,而共享 IP 地址包含一个 IP 地址池,由用户共享。共享 IP 地址注重隐私,而专用 IP 地址注重任务。
VPN 日志
这是您连接到 VPN 服务后在互联网上所做任何活动的记录。最好的 VPN 服务不会保留或收集这些日志。它们可以用来破坏个人隐私和匿名性。政府也会利用这些日志来了解某个人使用 VPN 所做的事情。
隐私政策
这是注册任何 VPN 服务时都应关注的基本政策。该政策规定了他们收集或不收集何种日志,以及他们如何处理与你的隐私和安全有关的各种数据。有些还说明了他们所处的位置对他们的影响,以及许多隐私方面的内容。
IPBurger VPN
Our VPN service provides an excellent service of keeping you secure and private while surfing the internet. IPBurger VPN uses strong encryption standards, AES 256-bit, has various protocols to choose from and there’s also a kill switch. Additionally, IPBurger VPN protects you against DNS leaks, doesn’t log your connections and has various subscriptions for dedicated and shared IP addresses. You also get access to unlimited bandwidth, lightning speeds, and worldwide servers.