• 0 Posts
  • 16 Comments
Joined 6 months ago
cake
Cake day: June 29th, 2025

help-circle




  • the way vpns are used now is not what they were designed for, and they are sold to layman users with promises they can’t fullfil.

    vpn is virtual private network, and what is does is establishing encrypted connection between two vpn points.

    (home network) --- (vpn server) ----- (unsecure internet) ----- (you)
         (A) -------------- (B) ------------ (x) ----- (x) --------- (C)
    

    you can now connect to your home network (which may be your company when you are on home office, or it may be your department of foreign affairs if you are your country’s embassy halfway around the world) using the vpn server, who authenticates you as a user and establishes encrypted connection to traverse the unsecure network.

    it increases security in two main ways: the admin of the networks does not have to accept incoming connections from the whole internet, which reduces number of ways to attack the network.

    the traffic going over the public internet and servers you have no control over is now encrypted and can`t be hijacked in the middle.

    and it hides the route and traffic between (B) and (C). for everyone in (A), your traffic seems to look coming from (B), they don`t know what is behind it.

    now using some public vpn service may help you pretend you are in another country (because the provider will provide you with server in that country, and no one sees the route between you and the server.

    so you can now convince twitter you are black soccer mom in texas supporting trump, when you are actually gru officer in moscow.

    but it is oversold to people as some super secure solution and people think it is more secure than it is. your traffic can no longer be intercepted between you and the vpn server, but can be intercepted anywhere behind it.

    if you think you are some enemy of the state, it is actually much less secure. “the enemy” now have limited number of chokepoints where they can try to intercept the traffic, and doesn’t have to intercept all its little enemies independently. it is like if people voluntarily joined the line for some police checkpoint.

    there are even conspiracy theories that some vpn providers and tor nodes may be directly operated by “the enemy” instead and if your data are really valuable (you are not a teenager trying to get to netflix, but you are say disident or journalist in some dictatorship country) then using tor, or vpn generally, may put target on your back - hey, these are data that are more likely to contain something interesting and may be worth monitoring.

    long story short, vpn is designed to traverse unsecure public internet and connect you to some trusted network. the connection is allowed only to identified users and is encrypted and secure.

    using it to connect to unsecure internet helps you

    • get access to netflix show that may not be accesible in your location
    • may help hide your identity (if the vpn server is in different jurisdiction, it can be complicated for law enforcement to get information)
    • may be useful if you think your own internet provider is after you and you trust the vpn provider more (which is definitely not the case for me in europe, i trust my own isp more than some random vpn provider, someone in iran may be in different situation)
    • anyone intercepting the traffic in your home provider’s network can see there is a connection between you and the vpn server, but can’t see the content, and can’t easily establish connection between you and outgoing data from the vpn server you are connected to.

    and to asnwer your original question, if you operate your own vpn server at the remote location, no one will know. but if you use some public service for 5$/month, these and their servers are of course known.