menu_book Knowledge Base

VPN & Security
Glossary

Clear, practical explanations of VPN, networking, and cybersecurity terms. Understand the technology that protects your privacy online.

search

24 terms

lock

AES-256 Encryption

AES-256 is the Advanced Encryption Standard with a 256-bit key, widely considered the gold standard of symmetric encryption, used by governments and military organizations worldwide.

Read more arrow_forward
lock_clock

ChaCha20-Poly1305

ChaCha20-Poly1305 is a modern authenticated encryption algorithm designed by Daniel Bernstein, providing 256-bit security with excellent software performance and immunity to timing attacks.

Read more arrow_forward
dns

DNS (Domain Name System)

The Domain Name System translates human-readable domain names like vpnwg.com into IP addresses that computers use to communicate, and is a critical but often overlooked privacy vulnerability.

Read more arrow_forward
water_drop

DNS Leak

A DNS leak occurs when your DNS queries bypass the VPN tunnel and are sent to your ISP's servers in plain text, exposing the websites you visit despite being connected to a VPN.

Read more arrow_forward
policy

DPI (Deep Packet Inspection)

Deep Packet Inspection is a network surveillance technology used by ISPs and governments to analyze, filter, and block internet traffic based on its content and protocol signatures.

Read more arrow_forward
enhanced_encryption

Encryption

Encryption is the process of converting readable data into an unreadable format using mathematical algorithms, ensuring only authorized parties with the correct key can access the original information.

Read more arrow_forward
local_fire_department

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on security rules, acting as a barrier between trusted and untrusted networks.

Read more arrow_forward
swap_vert

IKEv2/IPSec Protocol

IKEv2/IPSec is a VPN protocol known for excellent mobile performance and fast reconnection when switching networks, built into most operating systems natively.

Read more arrow_forward
language

IP Address

An IP address is a unique numerical identifier assigned to every device connected to the internet, which can reveal your physical location and be used to track your online activity.

Read more arrow_forward
tag

IPv4 (Internet Protocol version 4)

IPv4 is the fourth version of the Internet Protocol, using 32-bit addresses that provide approximately 4.3 billion unique addresses, a pool now almost completely exhausted.

Read more arrow_forward
hub

IPv6 (Internet Protocol version 6)

IPv6 is the successor to IPv4, using 128-bit addresses to provide a virtually unlimited address space, but it introduces unique privacy risks for VPN users if not properly handled.

Read more arrow_forward
power_settings_new

Kill Switch

A VPN kill switch instantly blocks all internet traffic if the VPN connection drops unexpectedly, preventing your real IP address and unencrypted data from being exposed.

Read more arrow_forward
router

NAT (Network Address Translation)

NAT translates private IP addresses to a public IP address and back, allowing multiple devices to share one public IP for internet access.

Read more arrow_forward
visibility_off

No-Log Policy

A no-log policy means the VPN provider does not record, store, or monitor any information about users' online activities, connection timestamps, IP addresses, or browsing history.

Read more arrow_forward
security

OpenVPN Protocol

OpenVPN is an established open-source VPN protocol that uses TLS for key exchange and supports a wide range of ciphers, though it is slower and more complex than modern alternatives like WireGuard.

Read more arrow_forward
swap_horiz

Proxy Server

A proxy server acts as an intermediary between your device and the internet, forwarding requests through a different IP address but without the encryption that a VPN provides.

Read more arrow_forward
settings_ethernet

SOCKS5 Proxy

SOCKS5 is a versatile proxy protocol that can handle any type of network traffic including TCP and UDP, supporting authentication but lacking built-in encryption unlike a VPN.

Read more arrow_forward
https

SSL/TLS (Secure Sockets Layer / Transport Layer Security)

SSL/TLS are cryptographic protocols that encrypt communications between web browsers and servers, forming the foundation of HTTPS and securing the majority of internet traffic today.

Read more arrow_forward
call_split

Split Tunneling

Split tunneling allows you to choose which applications or traffic routes through the VPN tunnel and which connects directly to the internet without encryption.

Read more arrow_forward
security

Tor Network

Tor (The Onion Router) is a free anonymity network that routes traffic through multiple encrypted layers across volunteer-operated servers worldwide, providing strong anonymity at the cost of speed.

Read more arrow_forward
vpn_lock

VPN (Virtual Private Network)

A VPN encrypts your internet traffic and routes it through a secure server, hiding your real IP address and protecting your data from surveillance, hackers, and ISP tracking.

Read more arrow_forward
visibility_off

VPN Obfuscation

VPN obfuscation disguises VPN traffic to look like regular internet traffic, making it undetectable by Deep Packet Inspection systems used in censored countries like China, Russia, and Iran.

Read more arrow_forward
videocam

WebRTC (Web Real-Time Communication)

WebRTC is a browser technology enabling peer-to-peer audio, video, and data sharing without plugins, but it can leak your real IP address even when connected to a VPN.

Read more arrow_forward
shield

WireGuard Protocol

WireGuard is a modern, lightweight VPN protocol that delivers faster speeds, stronger security, and a smaller attack surface than legacy protocols like OpenVPN and IPSec.

Read more arrow_forward

Ready to Protect Your Privacy?

Now that you understand the technology, experience it yourself. VPNWG uses WireGuard with Amnezia obfuscation for unmatched speed and security.