This is a great post, I've never understood the idea that VPN's make people have better connections.
I always assumed most used them to get around any restrictions their country or provider might have in online gaming.
I feel the need to create this as people have a common misconception about what a VPN actually does. People will download Free VPNs to use and connect to so they "Speed" up there connection. Well a VPN does not do that and Im going to explain why.
So contrary to popular belief a VPN will NOT SPEED UP A CONNECTION. Your PING or the amount of time a packet takes to get to the destination and come back in milliseconds. So lets break down what a VPN does.
Heres what happens without a VPN :
"Home Network" -> (Sends a Packet out) -> "Packet arrives at destination" | -Lets say it took 100ms to complete this action-
Now with a VPN heres what it will look like :
"Home Network" -> (Sends a Packet out) -> "Stops at VPN server for encryption" -> (Packet sent out again this time encrypted) -> "Arrives at destination encrypted" | -This action took 120ms to complete as it had to make a extra stop at the VPN server for encryption BEFORE heading to its final destination-
A VPN is meant to connect you to a server and encrypt all data coming from your computer and even at the destination, the type of encryption and or way the vpn is handled will make it take sometimes longer. Its like heading over to a friends house some day it takes you lets say 5 minutes to get there. Now you go again the next day but stop by a store to pick something up, by making a extra stop you will not get there faster in fact the opposite will happen it will take you probably 10 minutes. its the same with a VPN, your packet will make a EXTRA stop so it will take longer in milliseconds to get to the final destination and not faster.
Encryption can come from SHA-128 Bit to SHA-256 bit, it can use different handshake methods and all this adds up and even takes longer to reach its destination. beyond just there some VPNs offer even more protection in the form of
Double VPN - This will go through one server somewhere encrypt your data THEN go to a second VPN server encrypt the encryption and then go to the final destination. This will most likely double your ping.
Dedicated IPs - These are servers with the same IP address, it will always use the same IP address as the server and is useful for hosting game server from your computer because a traditional VPN will change IPs and screw with connecting players. This type fixes that, might be a little less safe though if you are looking for maximum protection.
Onion OVER VPN - This method is very complex and uses TOR network or (The Onion Router) This network named TOR was built for being anonymous online COMPLETELY. So it pass through your VPN server at the start, bounce between dozens of TOR servers and then arrive at its destination. The destination will have no idea where the connection originated from as it bounced so many times. It will travel the world and increase PING 10 fold likely, this is for being COMPLETELY anonymous.
I see people download free VPNs and there data is being stolen and stored on logged server which is then sold to the highest bidder. "Free VPNs" are not free you pay with your data. Ask yourself this, if its a free VPN how do they keep their servers open? Where do they get the money if its free and clients dont pay? They sell your data to keep it open. They are also incredible slow servers with a very basic encryption type, its like using a broken condom without knowing its broken. Do yourself a favor and DO NOT USE FREE VPNS IF YOU VALUE ONLINE PRIVACY! My VPN is $12 a month to connect to a military grade encryption service that keeps no logs and has those specialty servers, and my ping goes up in games once I start using it but i do so to remain anonymous online so its worth a little slower ping rate.
At the end VPNs say they are for faster connection because they advertise your packets being sent through there servers faster then other services, but ALL VPNs increase your ping but by how much and at what security cost... well thats what you pay for. Hopefully people will stop using VPNs to make a connection faster, they are for security and privacy online at the cost of overall internet speed and money. Also whatever you do, DO NOT CONNECT TO ANY FREE VPN YOU ARE BEING SPIED ON! If you want some security you will have to pay for it with speed and money.
also worth noting that all ISP's certainly in the UK/EU are now required by law (since 2016) to keep logs which can be used for anti-terrorism/crime etc. these just extend to the endpoint connections rarther than content, but if required, im sure it could be obtained.
I think I get you, so changing the routed path of the data? Skipping some centres in favour of others. Networking and connections are not my strong point.This is a great post, I've never understood the idea that VPN's make people have better connections.
I always assumed most used them to get around any restrictions their country or provider might have in online gaming.
i think the point is that vpns can re-route traffic, which may have the effect of speeding things up in some circumstances, but given that we're talking about milliseconds, then theres the overhead of encryption/decryption that the OP talks about above - then the benefit is outweighed.
its a great OP by the way
Direct control, no, but in the case of ESO, the server owners choose to utilise the globally distributed protection, which by proxy is causing bad routing for some countries. From this viewpoint, the server owners have made a choice which resulted in the bad routes.The reality is how your connection is routed is far more important, and that really belongs fault wise to the various intermediaries which neither your ISP, nor the VPN's, nor the Game server owners have any control over.
Yes. The Akamai protection means majority of Australia travels up to an Asian Akamai node (ie, the nearest), before heading to the USA. With the gaming VPNs, traffic heads direct to the USA, leaves the VPN, then finds the nearest Akamai node (also in the USA). That detour up to Asia is horrible for latency.I think I get you, so changing the routed path of the data? Skipping some centres in favour of others. Networking and connections are not my strong point.This is a great post, I've never understood the idea that VPN's make people have better connections.
I always assumed most used them to get around any restrictions their country or provider might have in online gaming.
i think the point is that vpns can re-route traffic, which may have the effect of speeding things up in some circumstances, but given that we're talking about milliseconds, then theres the overhead of encryption/decryption that the OP talks about above - then the benefit is outweighed.
its a great OP by the way
I think I get you, so changing the routed path of the data? Skipping some centres in favour of others. Networking and connections are not my strong point.This is a great post, I've never understood the idea that VPN's make people have better connections.
I always assumed most used them to get around any restrictions their country or provider might have in online gaming.
i think the point is that vpns can re-route traffic, which may have the effect of speeding things up in some circumstances, but given that we're talking about milliseconds, then theres the overhead of encryption/decryption that the OP talks about above - then the benefit is outweighed.
its a great OP by the way
also worth noting that all ISP's certainly in the UK/EU are now required by law (since 2016) to keep logs which can be used for anti-terrorism/crime etc. these just extend to the endpoint connections rarther than content, but if required, im sure it could be obtained.
also worth noting that all ISP's certainly in the UK/EU are now required by law (since 2016) to keep logs which can be used for anti-terrorism/crime etc. these just extend to the endpoint connections rarther than content, but if required, im sure it could be obtained.
In this case it really depends on who you want your data protected from, and why.
You're right that ISPs have to keep a log and have to turn it over to a European government if they ask for it as part of an investigation into a terrorist threat (I believe there's a similar situation in the USA too). But that's not the same as it being unprotected because they will only hand it over to a government and only as part of an unofficial investigation.
This is a great post, I've never understood the idea that VPN's make people have better connections.
I always assumed most used them to get around any restrictions their country or provider might have in online gaming.
FlyingSwan wrote: »also worth noting that all ISP's certainly in the UK/EU are now required by law (since 2016) to keep logs which can be used for anti-terrorism/crime etc. these just extend to the endpoint connections rarther than content, but if required, im sure it could be obtained.
In this case it really depends on who you want your data protected from, and why.
You're right that ISPs have to keep a log and have to turn it over to a European government if they ask for it as part of an investigation into a terrorist threat (I believe there's a similar situation in the USA too). But that's not the same as it being unprotected because they will only hand it over to a government and only as part of an unofficial investigation.
That's not how that law (DRIPA) works at all. The UK Gov can, and do, share that information with other UK Government bodies, and this includes law enforcement, for what we might see as legitimate reasons (terrorist threat, paedophile investigations etc), but also for less savoury reasons. It can, for example, be shared with local councils, HMRC, all sorts of connected Gov bodies. There is no such thing as 'the EU government', there is the European Parliament and the Council of Europe and various courts that are the enforcement arm of the 'EU'. Notionally a body in an EU member state might ask for that data but we do not have to give it to them and the EU Parliament/CoE do not investigate terrorist threats; terrorist threats are investigated by state law enforcement with collaboration with other law enforcement orgs in various countries around the world, but the EUP and CoE are policy setters not investigatory bodies.
The concerns about this legislation (DRIPA) arose because of a lack of normal security controls upon the sharing of the collected information, and in fact the law itself has now been ruled illegal for a variety of reasons and must be remediated.
Examples of state power creep in the UK exist in abundance. Local councils setup surveillance under anti-terror legislation to spy on people not recycling, the police ask people to stop filming in public under anti-terror laws which do not technically exist in such a form, stop and search is illegally carried out by police under 'anti-terror laws', but what you are saying in your post is simply not correct mainly because there is no 'European Government', the closest thing would be the EU itself, which is actually a federation of like-minded state governments and because, contrary to popular belief, information cannot be legally forced to cross state boundaries in the EU, without a court ruling, but orgs may well use Safe Harbour principles to ensure compliance across jurisdictions etc.
FlyingSwan wrote: »also worth noting that all ISP's certainly in the UK/EU are now required by law (since 2016) to keep logs which can be used for anti-terrorism/crime etc. these just extend to the endpoint connections rarther than content, but if required, im sure it could be obtained.
In this case it really depends on who you want your data protected from, and why.
You're right that ISPs have to keep a log and have to turn it over to a European government if they ask for it as part of an investigation into a terrorist threat (I believe there's a similar situation in the USA too). But that's not the same as it being unprotected because they will only hand it over to a government and only as part of an unofficial investigation.
That's not how that law (DRIPA) works at all. The UK Gov can, and do, share that information with other UK Government bodies, and this includes law enforcement, for what we might see as legitimate reasons (terrorist threat, paedophile investigations etc), but also for less savoury reasons. It can, for example, be shared with local councils, HMRC, all sorts of connected Gov bodies. There is no such thing as 'the EU government', there is the European Parliament and the Council of Europe and various courts that are the enforcement arm of the 'EU'. Notionally a body in an EU member state might ask for that data but we do not have to give it to them and the EU Parliament/CoE do not investigate terrorist threats; terrorist threats are investigated by state law enforcement with collaboration with other law enforcement orgs in various countries around the world, but the EUP and CoE are policy setters not investigatory bodies.
The concerns about this legislation (DRIPA) arose because of a lack of normal security controls upon the sharing of the collected information, and in fact the law itself has now been ruled illegal for a variety of reasons and must be remediated.
Examples of state power creep in the UK exist in abundance. Local councils setup surveillance under anti-terror legislation to spy on people not recycling, the police ask people to stop filming in public under anti-terror laws which do not technically exist in such a form, stop and search is illegally carried out by police under 'anti-terror laws', but what you are saying in your post is simply not correct mainly because there is no 'European Government', the closest thing would be the EU itself, which is actually a federation of like-minded state governments and because, contrary to popular belief, information cannot be legally forced to cross state boundaries in the EU, without a court ruling, but orgs may well use Safe Harbour principles to ensure compliance across jurisdictions etc.
I didn't say there was an EU government. I said "ISPs have to keep a log and turn it over to a European government" - meaning the government of one (or more) of the 28 member states. It's like if I said "a game studio" or "a coffee shop" - that doesn't mean I think there's one studio which makes all video games and one company running all coffee shops, it means I'm talking about one of them in a general sense without specifying which one.
And my point still stands - the law requires ISPs to share information with governments, but it does not mean the same information is available for anyone who wants it. So if you're using a VPN to hide your location or identity from a government it won't work, but if you're using it to hide from a private company it might work because they do not have the same level of access.
Maybe not but it really cuts out the meta data crap website seem to spam on customers these days.. and it all depends on how bad the original connection is..