|Author||Topic: VPN protocols in China.|
|posted: 3/20/2020 at 9:22:48 AM ET|
The family of network protocols for implementing VPN is quite extensive, but only three of them are widely used. These are IPSec, PPTP, and L2TP.
IPSec-Internet Protocol Security-has already been discussed in detail on this site in an article by Stanislav Korotygin.
PPTP-Point-to-Point Tunneling Protocol-created by Microsoft, US Robotics and a number of other developers. The Protocol is described by the creators in this and this works.
L2TP-Layer 2 Tunneling Protocol-the pride of the" network monster " — Cisco. More information about it can be found here and here.
The features, disadvantages and advantages of each of the protocols are a separate and very broad topic that is beyond the scope of this article. It should be noted that for a number of reasons, the most common VPN Protocol is currently IPSec. More than 65 percent of private virtual networks are based on it. Therefore, this time we will only talk about hardware and software solutions in which IPSec is the main one.
|posted: 3/21/2020 at 8:31:36 AM ET|
Using a VPN without understanding the reason why such a service can offer a service without payment, you risk losing more than you gain. Instead of protecting your connections and personal data, the VPN provider can collect information about you for the purpose of selling it to interested parties, the most harmless of which are advertisers.
|posted: 3/22/2020 at 12:44:25 PM ET|
Currently, the most common VPN protocol is
Point-to-Point Tunneling Protocol - PPTP. Designed by him
3Com and Microsoft to provide secure remote access to
corporate networks over the Internet.
PPTP leverages existing open TCP / IP standards
and relies heavily on the legacy PPP point-to-point protocol.
|posted: 3/22/2020 at 1:16:34 PM ET|
The catch is that every time you visit a site, even from your phone, you leave your IP address on it. Now this site knows that you were on it, and can, for example, sell this information to an advertiser. This type of information is also called logs.
Here, a VPN provider can help you out, allowing you to hide your IP address and block the recording of any logs about your behavior on websites and on the Internet in General. As a result, no site will be able to determine that you were on it. Moreover, the provider will encrypt all your traffic, so that no one can intercept it. Whoer VPN provides just such a service – VPN - security of the highest level.
|posted: 3/23/2020 at 5:23:32 PM ET|
Secrecy is very good because governments can not put pressure on VPN administrators and require them to give out user data if they do not know who they are and where they are. And many users in the US really prefer foreign VPN providers over American.
|posted: 3/23/2020 at 9:52:17 PM ET|
The following VPNs can definitely be recommended for China:
ExpressVPN - the leader in China, the fastest, easiest and most reliable service;
NordVPN - VPN with the most powerful anonymity and encryption algorithms;
Ivacy VPN is a rapidly growing inexpensive service. Sometimes there are problems in China.