Save 58% on two years of PIA VPN
Save 58% and pay just $69.95 for a full two years of PIA's super secure VPN when you pay upfront.
A virtual private network (VPN) allows computers or networks to connect to each other securely over the Internet. Traditionally, businesses and universities used VPNs to create secure, remote connections to an existing network, but many everyday consumers now utilise this same technology to shield their personal data while browsing the Internet. Despite the best efforts of some media companies to discredit VPNs as an illicit tool for circumventing geoblocks, there are plenty of sensible reasons why someone would want to use a VPN.
Here we discuss the various uses of VPNs and some companies that provide VPN services to Australians.
When you use a VPN, the data you transmit and receive goes through an encrypted "tunnel". This data cannot be read by anybody outside the VPN due to several security features, such as a firewall between the client and the host server. The data is also specifically encrypted so that only the computer receiving it can recognise it.
This set-up means that all your Internet traffic passes between the VPN server you're connected to and your computer (or whichever device you're using) without interference from prying eyes, which is especially handy when using public Wi-Fi hotspots at restaurants, cafes and libraries as they do not provide a secure and private connection to the Internet.
VPNs encrypt your Internet connection by sending it through private servers. After you download a VPN client to your computer or other device, you select a server that is owned by the VPN to connect to. When you hit "connect", your computer is connected to the server selected, and your IP address is changed to reflect the physical location of that server.
Even your own Internet provider can only see that you’re connected to a VPN, not what your IP address is or what data you are accessing. Your VPN provider can though. By using a VPN, you're passing on a considerable degree of trust to your chosen provider, so ensure ahead of time that the VPN you are using is a reputable one.
VPN use is first and foremost about security. What this actually means for you can differ dramatically depending on your needs.
VPNs are not without limits. They have their own set of constraints, some of which are glazed over by the advertising copy written on their websites. These limitations include:
There’s not much evidence to suggest that using a VPN to access geoblocked content is illegal, but it’s important to check with your VPN provider, as this may be breaching the terms and conditions you agreed to when signing up. Getting caught out could lead to your VPN service being cancelled, and you could lose credits and access to your downloads.
Using a VPN to stream paid services not available in Australia, such as Hulu Plus or the American Netflix, could also land you in hot water, including potential legal action from the copyright owner. Just because you’re paying a membership fee doesn’t mean that the service has the right to sell this content to you, since it wouldn’t be licensed in your region. It could also be considered fraudulent if you have provided a fake postcode or address when signing up.
Similarly, your rights when using overseas-based companies to purchase goods may not be protected by Australian law. Some companies refuse to recognise products and warranties purchased internationally under domestic consumer law.
So, what’s the verdict? Paying to stream TV services not available in your country through a VPN is not recommended, as neither your VPN nor the service provider is obliged to support you if your activity is discovered. But, then again, services like Netflix are now available in Australia, so there’s no longer as much of a need for Australians to look for alternative viewing options.
In April 2017, the government’s mandatory data retention scheme came into effect. Telcos and Internet service providers are now required to store your non-content data for a two-year period to help law enforcement agencies in criminal investigations. Many consider the bill a huge threat to privacy.
The metadata that is retained includes your billing information, traffic data (numbers called and texted etc), location of communications and quantity of uploads and downloads. So, if you’re a stickler for privacy and security, these laws should definitely concern you. It should be noted that many services provide offshore VPNs that allow you to browse the Internet anonymously by circumventing your ISPs in order to gain access to the Internet.
Using a VPN is standard practice for many Internet users and a great way to mask your online presence. Due to these new laws, however, it’s worth considering VPN providers located outside of Australia and other countries with similar laws.
Going the cheap or free route when searching for a VPN can have dangerous consequences. Because of the inherent costs of running a VPN, companies that offer these services at a discounted rate or for free are often getting their profits from a third party. This can involve generating adware that will track the sites you visit or by selling your personal data online.Which devices work with a VPN?
Generally speaking, VPNs can be used on any device that can browse the Internet. These include:
Yes, but not all VPNs allow traffic from peer-to-peer (P2P) file sharing from services like BitTorrent. These VPNs will likely throttle your download speeds if you're found to be torrenting. The rules aren't always black and white and some VPN providers will only block file-sharing services from particular regions. Below are three different VPN providers with three very different views of torrenting through their services:
Though most P2P file-sharing services have been painted with the same brush thanks to illegal copyright infringement, there are still legitimate uses for torrenting and file sharing. So if you're concerned about a VPN blocking your BitTorrent or Vuze service, it’s definitely worth checking with the provider before signing up.
One of the most important things to know about VPNs is that they cannot guarantee complete anonymity – your VPN provider, for one, has easy access to who you are and what you’re doing online. There are, however, a number of VPN features to look out for to up the ante on your security.
Many VPN providers claim they do not keep logs, although reading the fine print will often reveal that logs are kept for things such as the time and date the VPN connection was made, the duration of the connection and the bandwidth used. The more secure VPNs will guarantee that they do not keep log files on items such as web traffic data, files downloaded, videos watched or websites visited.
If you're using a VPN to mask your identity, you need to be sure that all traffic from your computer is being re-routed through the VPN network. Occasionally your computer's operating system will default back to the DNS designated by your ISP, rather than the DNS provided by your VPN service, essentially leaking your IP address. If there is a leak and your computer's IP address is exposed, then your usage data will be left vulnerable to eavesdroppers.
Essentially, a kill switch is a form of DNS leak protection – a safeguard should your VPN disconnect and your IP address becomes exposed. A VPN kill switch is a particularly valuable tool for regular torrent downloaders. It works by severing your computer's connection to the Internet if your VPN connection fails. Without it, your computer automatically defaults to your ISP-designated DNS and your identity and location become vulnerable.
finder.com.au is one of Australia's leading comparison websites. We compare from a wide set of major banks, insurers and product issuers.
finder.com.au has access to track details from the product issuers listed on our sites. Although we provide information on the products offered by a wide range of issuers, we don't cover every available product. You should consider whether the products featured on our site are appropriate for your needs and seek independent advice if you have any questions.
Products marked as 'Promoted' or "Advertisement" are prominently displayed either as a result of a commercial advertising arrangement or to highlight a particular product, provider or feature. Finder may receive remuneration from the Provider if you click on the related link, purchase or enquire about the product. Finder's decision to show a 'promoted' product is neither a recommendation that the product is appropriate for you nor an indication that the product is the best in its category. We encourage you to use the tools and information we provide to compare your options and find the best option for you.
The identification of a group of products, as 'Top' or 'Best' is a reflection of user preferences based on current website data. On a regular basis, analytics drive the creation of a list of popular products. Where these products are grouped, they appear in no particular order.
Where our site links to particular products or displays 'Go to site' buttons, we may receive a commission, referral fee or payment.
We try to take an open and transparent approach and provide a broad based comparison service. However, you should be aware that while we are an independently owned service, our comparison service does not include all providers or all products available in the market.
Some product issuers may provide products or offer services through multiple brands, associated companies or different labelling arrangements. This can make it difficult for consumers to compare alternatives or identify the companies behind the products. However, we aim to provide information to enable consumers to understand these issues.
Providing or obtaining an estimated insurance quote through us does not guarantee you can get the insurance. Acceptance by insurance companies is based on things like occupation, health and lifestyle. By providing you with the ability to apply for a credit card or loan we are not guaranteeing that your application will be approved. Your application for credit products is subject to the Provider's terms and conditions as well as their application and lending criteria.