Sun. Jan 22nd, 2023


A virtual private network creates just that: a virtual (i.e. logical rather than physical) network which is private, meaning only you and the end-point can view the data you are transmitting and receiving.

They are typically used to hide activity, to spoof your location or to provide additional security (for example to access confidential information from outside of a work network).

The typical steps involved in the use of a VPN are:

  • When the connection has been established, the following will happen to your data:
    • The VPN software on your computer encrypts your data traffic and sends it (via your Internet Service Provider) to the VPN server through a secure connection.
    • The encrypted data from your computer is decrypted by the VPN server.
    • The VPN server will send your data on to the internet and receive a reply, which is meant for you, the user.