← Home  |  ← Protection Tools

VPN (Virtual Private Network)

Hide your IP address and encrypt your internet connection

How It Works

A VPN creates an encrypted tunnel between your device and a remote server. All your internet traffic is routed through this server, so websites see the VPN server's IP address instead of yours. This effectively hides your IP address, location, ISP, and hostname.

What It Protects

What It Does NOT Protect

A VPN does not change your browser fingerprint — your screen resolution, fonts, GPU, user agent, and other technical details remain the same. Websites can still track you using these parameters even if your IP changes.

Limitations

Best combined with: A privacy browser or browser extensions for fingerprint protection. A VPN hides your network identity, but you need additional tools to mask your browser fingerprint.

How a VPN Works in Detail

Without a VPN

When you connect to a website without a VPN, your device communicates directly with the website's server. The website can see your real IP address, your ISP, and your approximate physical location.

Your Device 2601:4c:xx::8a3 New York, US Unencrypted — visible to ISP, hackers 👁 ISP sees all Website 2601:4c:xx::8a3 Sees: New York, US

With a VPN

When you use a VPN, your traffic is first encrypted on your device, then sent through a secure tunnel to a VPN server. The VPN server decrypts your traffic and forwards it to the website. The website only sees the VPN server's IP address and location — not yours.

Your Device 2601:4c:xx::8a3 New York, US Encrypted tunnel ISP sees only encrypted data VPN Server 2a0e:1c80:xx::f1 Zurich, CH Decrypts & forwards Website 2a0e:1c80:xx::f1 Sees: Zurich, CH

The Encryption Process

VPN encryption works in layers. When your device sends data, the VPN client wraps it in an encrypted envelope before it leaves your machine. This process is called encapsulation.

1. Original data GET https://example.com/page 2. VPN client encrypts the data VPN Encryption Layer (AES-256) a7f2b9...encrypted payload...3e8d1c 3. Wrapped in a new IP packet New IP Header (destination: VPN server) Encrypted VPN payload (original data hidden inside) Anyone can read this Only VPN server can decrypt ISP sees only this

VPN Protocols

The VPN protocol determines how the encrypted tunnel is established and maintained. Different protocols offer different trade-offs between speed, security, and compatibility.

What Happens to Your Data at Each Step

1 Your Device VPN client encrypts all outgoing traffic. Your real IP is attached as the source. 2 Your ISP Sees encrypted data going to a VPN server IP. Cannot read the content or see which websites you visit. 3 VPN Server Decrypts your traffic. Replaces your IP with its own. Forwards the request to the destination website. 4 Destination Website Receives the request from the VPN server's IP. Has no knowledge of your real IP, location, or ISP. The response travels back through the same encrypted tunnel in reverse.

Common VPN Leak Scenarios

Even with a VPN active, certain misconfigurations can reveal your real identity:

Tip: You can use our homepage tool to test for DNS, IPv6, and WebRTC leaks while connected to your VPN. If any of these show your real IP or ISP, your VPN configuration needs attention.

On This Page