Technology has revolutionized our lives. Anything we want is just a few clicks away, but this has concurrently exposed us to Wi-Fi spoofing, Firesheep, Honeypot and ransomware attacks. The technologies which were once limited to corporate sectors (i.e. VPNs) are now available for average consumers. In this article, we will discuss the VPN (Virtual Private Network) and will tell you everything you need to know about it.
What is a VPN? How Does It Work?
A VPN protects data transmitted between two devices that are connected to the internet. It is done by routing your connection through a VPN’s servers where different security protocols are applied to your information to make it secure.
Now take the example of sending money. You just don’t give the money to a person without an envelope and you oftentimes seal the envelope to curb a bystander’s casual curiosity. The function of a VPN is similar. It encrypts the data in an envelope so that no one could know what’s inside and it protects your data from tampering.
Similarly, VPNs can be used for other purposes. You can use a VPN to access restricted sites. For example, many schools restrict websites like YouTube and Facebook on their networks so that students can focus on their studies. However, VPNs can be used as a circumvention tool to access blocked sites. One of the most common uses is to get past a school’s firewall or a network filter that uses a proxy VPN connection. With a VPN, the school’s network doesn’t see the domain name or IP of the site you are connecting to.
So now that you know how a VPN works, let me explain it in geek language. VPNs use the tunneled connection to ensure the datas’ integrity and privacy. Our computers send the data in the form of small pieces known as “packets.” Each packet carries a chunk of information including information of the sender and receiver. So when we use the Tunneled connection, every packet is placed inside another packet. This process is known as encapsulation. Next in securing your information is encrypting the data. Our VPN uses a number of security protocols to encrypt the data — including PPTP, SSTP — but the most secure ones are IPsec (Internet Protocol Security).
So these security protocols use two methods to ensure your online security.
- The first method is encryption in which all information in the packet is encrypted and the key to encryption is shared between the VPN’s server and clients.
- The second method is an encapsulation header where the VPN hides the information like sender’s identity in the packet before it is sent over the internet.
How BOLDFISH Uses VPN Technology
The BOLDFISH app protects our users’ privacy and bolsters mental wellbeing when using our app. BOLDFISH uses one of the most secure VPN protocols, IPsec, to keep you protected and to BLOCK the top social platforms on your phone. On our VPN servers, we set up special configurable network rules that only block connections to the big social media players. If you purchase tokens you can choose which apps and sites to block. We want our users to feel safe about their data when using BOLDFISH. While the VPN/BLOCK is on, your data is secure. Another benefit of the BOLDFISH app is you are saving on data usage since the apps and sites you have you block will not have any incoming phone data while the BOLDFISH block is on. So when downloading our app for the first time, remember to allow the VPN configuration so we can filter/block the connections for the apps that distract you.
Example on iOS:
Example on Android: