Categories
VPNs

Should I use VPN?

I will argue that you should use a VPN because it is necessary to keep your data secure.
The internet is an amazing tool, and has enabled so much progress for our species. It gives people in developing countries unprecedented access to the world’s knowledge, and allows us to communicate with each other like never before.
Unfortunately, it is also a very dangerous place. Hackers can easily steal your identity or access sensitive files by exploiting unprotected connections. Companies monitor and record your behavior online in order to sell you products that they think you want.
They can do this through the use of encryption algorithms, because it is impossible to convert plain text to ciphertext without knowing the decryption key. This means that even if your data is intercepted by a third party, they will only see scrambled and unreadable messages.
There is one problem with encryption algorithms, though. They are often slow and resource intensive. This means that they can be difficult to use for many applications.
Another issue is that encryption algorithms are usually secret, or proprietary. This means that users have no way to know whether they could be using a weaker form of the algorithm.

Categories
VPN reviews

Does Mullvad VPN Keep Logs?

Does Mullvad Keep Logs?

The question is whether Mullvad keeps logs or not. The answer isn’t just yes or no, as it depends on what we mean by “logs”.

There are many possible definitions of the term “logs”, and I will list them in a logical manner:

First, there is an informal definition of logs that does not match any precise scientific definition but rather matches everyday usage. This definition would include all information about your internet activity that is recorded anywhere in any form whatsoever. Example: If you visit example-dot-com then some records might be created which contain data indicating this fact (along with other facts such as IP address). These records could either be deleted at some later point (perhaps 30 days from now) if they are deemed unnecessary for whatever reason, or perhaps kept indefinitely for statistical purposes (to analyze traffic patterns over time). A host company may also sell access to their storage space to 3rd parties – who can do anything they want with the data stored there. Thus these so called logs contain all information about a person’s internet activity except his/her actual location/identity – unless he reveals this info somewhere else online.
The next definition of logs is the most precise scientific one – it matches what a computer scientist or engineer would understand as “logs”: A certain type of data structure that contains records about events in chronological order, usually time-stamped. There are many different types of such things, but for our purposes we can ignore the differences between them and focus on a more philosophical question: What does it mean to keep something like this? Keeping logs requires creating them in the first place. Someone must enter information into these logs (for example using some sort of interface) which creates a record there. Even if they never look at these logs again after entering this information, someone still had to do all the work involved with creating them initially.
So, in this sense of the word “logs”, Mullvad probably does not keep logs (unless you count configuration files as well). If they do then it is only because someone else created them.

The next definition of logs is very closely related to the first one – it again refers to any information about your activity that is stored anywhere: This time however we are not considering traffic patterns over long periods of time but rather short-term behavior involving specific web sites or services. Example: You access a certain site and log into an account using your email address and password (without 2FA activated). Now when you visit another site which has a malicious script on it which sends data back to this second site, there will be a record indicating that you accessed both sites.
Mullvad probably does not keep such logs (even though it depends on how you interpret the word “keep”). If they do then again, this is only because someone else created them.

Categories
VPNs

Do VPN providers keeps logs?

So, what VPN providers keep logs and why? The answer is that it depends on the VPN provider. Many people do not know that internet service providers (ISPs) aggressively market themselves as ‘VPN’ services to mask their logging policies.
But the fact is, ISPs are not good at providing VPN services. In as much as they claim to be ‘No Logs!’, they all have different policies that go against this claim.
Why do they go against their claims? It is simple. They are businesses, and as such, they will try to make money from you at every step.
The VPN market is very lucrative. Do you know how much a corporate account can cost? $1,000 per month and up! And they are the ones who provide all of the content that people use!
But while ISPs try to make money from you at every step, they also want to be able to monitor your internet activity for profit. Very few VPN providers are completely honest with their users about how much data is being logged by the provider.
The good news is that there are some VPN providers that do not log your data. They will claim to be no logs, while in reality they have a small amount of logging for a very specific reason.

Categories
VPNs

What is VPN and why it matter?

A VPN is a virtual private network. It connects you to a remote server and encrypts your traffic so that nobody can see what you are doing on the internet.

You might use it to access content which you wouldn’t otherwise be able to view from your location, for example due to censorship or geographical restrictions. You could also use it if there was some kind of leak on your computer or other device, such as email messages or passwords being transmitted in plain text (clear text), where these should be encrypted with secure protocols like TLS/SSL.
The most popular VPN protocol is OpenVPN, which uses a combination of symmetric-key encryption (meaning that the same key is used to encrypt and decrypt) with Rivest–Shamir–Adleman (RSA) public-key cryptography.

In this case your web traffic would be encrypted by using RSA, then decrypted at the other end.
A proxy server is a computer which allows you to get around restrictions and censorship. It does this by either masking your IP address (the unique number assigned to every device on the internet) or replacing it with that of another computer.
Usually, proxies are used to get around regional restrictions on content. For example, if you were in a country where certain websites or services were blocked by the government or otherwise censored due to their unacceptability under local laws.

You could use a proxy server with encrypted connections for those websites and any others which might be blocked.
Proxies are also used to hide your identity or location if you want to do things like avoid being tracked by advertisers.

They are used for a wide variety of purposes, including circumventing censorship, anonymity (where you don’t want people to know who you really are), and even hiding your IP address from the websites that you visit.
In a traditional proxy setup, the first computer (known as the client) connects to an intermediate server by passing along its IP address. The proxy server then fetches any content that is requested from elsewhere on the internet and sends it back to the client.

This means that if you are using a VPN or Proxy, your web traffic will be encrypted before it leaves your computer; anyone monitoring your traffic cannot see what websites you visit or anything else about what you’re doing online. This makes them very useful for people in countries with severe restrictions on freedom of speech.