HOW DOES VPN WORK?
A VPN (virtual private network) is a self-contained sub-network within a larger IP network in which the participants are spatially separated (sometimes thousands of kilometers). The participants connect to a login server via a VPN protocol (login servers are available worldwide) and receive their own new (internal) IP after setting up the encrypted tunnel. Since the entire connection to the Internet is now encrypted, computers outside this network can no longer read or change the communication. This ensures that the client computer can communicate with selected other computers in a tap-proof manner. This is accomplished via a virtual network card in the customer's computer. This network card appears in the operating system as a normal Ethernet adapter and is used by the system as well as the programs, only the difference that the data that is transferred via this network card is automatically encrypted to a high degree. In addition, settings of the VPN LoginServer prevent customers from influencing each other, each customer receives their own tunnel and their own encryption. All data sent or received is then sent from the server to the Internet via a single IP (the IP of the respective VPN login server) - this server IP applies to all customers and ensures anonymity again. If the computer is not connected to a VPN or to a VPN provider that distributes fixed IPs, everyone can be identified based on their currently unique IP.
Encryption via the internal, virtual VPN network card ensures that the Internet connection is non-transparent for providers, data collectors and other computers in the local network and cannot be assigned to the Internet user.
Surf with VPN encryption
A “normal” internet connection such as UMTS / GPRS / ISDN / DSL etc. does not include encryption by default: all data you generate (e-mail, surfing, chatting etc.) are broken down into small packets and unencrypted by TCP / IP protocol sent to the recipient. Participants in local networks, e.g. public hotspots, this data can be easily intercepted and recorded. However, it is also possible to simply park near your apartment and tap your WiFi using a laptop.
Below is an example to illustrate this: You are at home and surfing via your (only) WEP-encrypted WiFi. Your neighbor ran “Wireshark”, a free program for analyzing network communication connections, and records everything. Since WEP and WPA are no longer secure, it is easy for your neighbor to generate your WiFi password from the data obtained. In a next step, he surfs via your line and monitors your laptop in real time and receives so much of your private data - your bank / account details, your email access data, what you shop for when and where, with whom you chat and so on. In many countries, the Internet is censored by the respective government, so that many offers (e.g. Facebook, YouTube, Wikipedia) are not available. In these cases, the Internet cannot be used fully without a VPN connection. Only when the VPN is activated will you have access to all content worldwide.
Reasons for encryption
It was not only since Edward Snowden's revelations about the worldwide and suspicious interception practice of American and English secret services (NSA, GCHQ and others) that securing digital communication has become a basic need of society. Digital communication has become an integral part of today's world and now encompasses all areas of daily life. Sensitive, private information does not belong on a postcard, comparable to the letter that protects the message, protects strong encryption from curious data collectors all over the world. Another reason for the widespread use of VPNs is the increasing level of censorship - not only in autocratic countries. Blocked websites, information that cannot be accessed for political or religious reasons, the VPN (Virtual Private Network) also helps here - because no one can monitor which websites are accessed, no blockages take effect. One reason why Websecuritas.com VPNs are so popular in MiddleEast and China. But there are also some basic rules to consider when choosing a VPN - such as choosing the right provider. There are many VPN providers, everything is advertised. Inexpensive, fast and secure - however few people can stand an objective assessment.
Location of the VPN provider
How much sense does it make to book with an American, English or Eastern European provider? The prices may be tempting, but your data is not secure with such providers. All companies located in the USA must hand over customer data and SSL keys to each user at the request of the authorities - even if the data is stored in Europe. The first providers have therefore already stopped their service in the USA. Serious protection of communication cannot be guaranteed. (see Lavabit and Cryptoseal) Nowhere is data protection more conscious and anchored in law than in Germany - providers who advertise in Romania are not there for security and the rule of law, but solely for tax reasons. In Germany it is not allowed to log and there is no data retention. At the beginning of 2014 the ECJ in Luxembourg classified and stopped all ambitions of premature "security" politicians as incompatible with European law.
Protocols and IPs
Almost all major providers advertise with PPTP VPN - set up quickly and easily - and decrypt just as quickly. Even Microsoft, the inventor, has classified this protocol as potentially dangerous and unsafe for years. Another sore point are static IP’s - providers use it to offer customers their own, fixed IP’s. Why? This makes the customer easily identifiable, it is clear who has used which IP, when, for what and for how long. From an anonymity point of view, it makes more sense to hide hundreds of VPN tunnels behind a server IP - the tunnels protect the user connections and the server IP reliably obscures the traffic of everyone.
Logging / data retention
We do not log any data regarding what is being surfed. We do not save any data about what was done when. We only know when someone was online - and just to keep our billing system up and running. Websecuritas.com stands for maximum data protection and anonymity in a time characterized by increasing surveillance.