Clear, practical explanations of VPN, networking, and cybersecurity terms. Understand the technology that protects your privacy online.
24 terms
AES-256 is the Advanced Encryption Standard with a 256-bit key, widely considered the gold standard of symmetric encryption, used by governments and military organizations worldwide.
ChaCha20-Poly1305 is a modern authenticated encryption algorithm designed by Daniel Bernstein, providing 256-bit security with excellent software performance and immunity to timing attacks.
The Domain Name System translates human-readable domain names like vpnwg.com into IP addresses that computers use to communicate, and is a critical but often overlooked privacy vulnerability.
A DNS leak occurs when your DNS queries bypass the VPN tunnel and are sent to your ISP's servers in plain text, exposing the websites you visit despite being connected to a VPN.
Deep Packet Inspection is a network surveillance technology used by ISPs and governments to analyze, filter, and block internet traffic based on its content and protocol signatures.
Encryption is the process of converting readable data into an unreadable format using mathematical algorithms, ensuring only authorized parties with the correct key can access the original information.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on security rules, acting as a barrier between trusted and untrusted networks.
IKEv2/IPSec is a VPN protocol known for excellent mobile performance and fast reconnection when switching networks, built into most operating systems natively.
An IP address is a unique numerical identifier assigned to every device connected to the internet, which can reveal your physical location and be used to track your online activity.
IPv4 is the fourth version of the Internet Protocol, using 32-bit addresses that provide approximately 4.3 billion unique addresses, a pool now almost completely exhausted.
IPv6 is the successor to IPv4, using 128-bit addresses to provide a virtually unlimited address space, but it introduces unique privacy risks for VPN users if not properly handled.
A VPN kill switch instantly blocks all internet traffic if the VPN connection drops unexpectedly, preventing your real IP address and unencrypted data from being exposed.
NAT translates private IP addresses to a public IP address and back, allowing multiple devices to share one public IP for internet access.
A no-log policy means the VPN provider does not record, store, or monitor any information about users' online activities, connection timestamps, IP addresses, or browsing history.
OpenVPN is an established open-source VPN protocol that uses TLS for key exchange and supports a wide range of ciphers, though it is slower and more complex than modern alternatives like WireGuard.
A proxy server acts as an intermediary between your device and the internet, forwarding requests through a different IP address but without the encryption that a VPN provides.
SOCKS5 is a versatile proxy protocol that can handle any type of network traffic including TCP and UDP, supporting authentication but lacking built-in encryption unlike a VPN.
SSL/TLS are cryptographic protocols that encrypt communications between web browsers and servers, forming the foundation of HTTPS and securing the majority of internet traffic today.
Split tunneling allows you to choose which applications or traffic routes through the VPN tunnel and which connects directly to the internet without encryption.
Tor (The Onion Router) is a free anonymity network that routes traffic through multiple encrypted layers across volunteer-operated servers worldwide, providing strong anonymity at the cost of speed.
A VPN encrypts your internet traffic and routes it through a secure server, hiding your real IP address and protecting your data from surveillance, hackers, and ISP tracking.
VPN obfuscation disguises VPN traffic to look like regular internet traffic, making it undetectable by Deep Packet Inspection systems used in censored countries like China, Russia, and Iran.
WebRTC is a browser technology enabling peer-to-peer audio, video, and data sharing without plugins, but it can leak your real IP address even when connected to a VPN.
WireGuard is a modern, lightweight VPN protocol that delivers faster speeds, stronger security, and a smaller attack surface than legacy protocols like OpenVPN and IPSec.
No terms found
Try a different search term
Now that you understand the technology, experience it yourself. VPNWG uses WireGuard with Amnezia obfuscation for unmatched speed and security.