Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

You Need a VPN, or You're Screwed

The Virtual Private Network is about to go mainstream. Just be sure you get one that's legit.

March 23, 2016
The Best VPN Services for 2015

PCMag recently looked at the world of the Virtual Private Network (VPN) and produced an outstanding report on The Best VPN Services for 2016. I urge everyone to read it.

Opinions I've been using various VPNs for at least 15 years, maybe longer. Everyone should be on a VPN. Especially now that they have been perfected and commoditized.

In a nutshell, a VPN allows you to use an IP address other than your own and appear to be somewhere other than where you are. The idea was originally dreamed up so work-from-home users could tunnel in to the workplace network as if they were in the office.

It turned out that this idea was a good one for other reasons. The most important is that it is difficult, if not impossible, for advanced worm-style malware that can self-install via open ports to ever target your computer. Your machine will appear to be another system someplace else; that other machine is usually a highly protected server and, more importantly, it is not your computer.

I began using a VPN on my laptop because I was using public Wi-Fi. VPNs provide some protection in public, although using Wi-Fi presents other problems. Nowadays I use my mobile phone's Wi-Fi hotspot, which I leave unencrypted with the SSID name of VIRUS. I have yet to find any log evidence that anyone has bothered me. Even if they did, I keep nothing important on the laptop.

The one thing I've noticed changing over the years is the performance of VPNs. The PCMag reports does discuss a hit on performance, but with most it is negligible. There is encryption every which way with these systems (although you can usually disable it altogether) and that might slow things a bit, but not so much with a modern desktop.

Not fully discussed in the article is illegal file sharing, which appears to be a worldwide nuisance. Torrent hubs—where people illegally download music, movies, and software—all promote VPNs because when you use one, it should not be possible to track you down.

That is, unless the VPN itself is a honeypot, which is always something to consider. I would personally assume a lot of these VPN operations are indeed fronts for agencies and law enforcement to track and follow terrorist organizations and individuals. It's possible that the RIAA and MPAA are doing something similar.

There are more than a few folks developing and maintaining a list of known IP addresses associated with a VPN. If you are using a VPN to circumvent geography restrictions (like watching the BBC online from the USA) you will commonly find yourself blocked anyway. Sometimes you will also see an IP address that some spammer or DNS attacker used to flood the market with spam or pings. It will end up on various blacklists and now you cannot visit a lot of sites without a site-wide CAPTCHA, usually initialized by CloudFlare. This is a pain in the butt and requires a new connection with a different IP. Thankfully, most of the legit VPN companies have thousands of addresses.

I usually keep track of the troublesome IP addresses myself and do not use them. I would not say that more is always better unless you are getting blocked too much.

As more and more people use mobile phones for Internet access they will find that malware will be targeting them and there is an actual need for a mobile phone VPN on the data side. This has not been fully explored but if you want to get a hint as to Amazon's App Store and see the VPNs available for the Android OS.

As people chat up privacy in the mainstream media you will begin to hear about the VPN and its importance. It's time to begin to take it seriously.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About John C. Dvorak

Columnist, PCMag.com

John C. Dvorak is a columnist for PCMag.com and the co-host of the twice weekly podcast, the No Agenda Show. His work is licensed around the world. Previously a columnist for Forbes, PC/Computing, Computer Shopper, MacUser, Barrons, the DEC Professional as well as other newspapers and magazines. Former editor and consulting editor for InfoWorld, he also appeared in the New York Times, LA Times, Philadelphia Enquirer, SF Examiner, and the Vancouver Sun. He was on the start-up team for C/Net as well as ZDTV. At ZDTV (and TechTV) he hosted Silicon Spin for four years doing 1000 live and live-to-tape TV shows. His Internet show Cranky Geeks was considered a classic. John was on public radio for 8 years and has written over 5000 articles and columns as well as authoring or co-authoring 14 books. He's the 2004 Award winner of the American Business Editors Association's national gold award for best online column of 2003. That was followed up by an unprecedented second national gold award from the ABEA in 2005, again for the best online column (for 2004). He also won the Silver National Award for best magazine column in 2006 as well as other awards. Follow him on Twitter @therealdvorak.

Read John C.'s full bio

Read the latest from John C. Dvorak