A Virtual Private Network (VPN) is a service that creates a secure, encrypted connection between your device and the internet. It masks your IP address and encrypts your internet traffic, making it difficult for third parties to intercept your data.
We’ve compiled a handy VPN glossary to explain commonly used acronyms and other VPN-related jargon. Check it out below.
Key Terms and Definitions for VPN
Below, you’ll find explanations of commonly used acronyms and jargon related to VPNs. This glossary will help you understand essential terms and concepts to enhance your knowledge of VPNs.
Ad-blocker
An ad-blocker is a piece of software designed to stop them. Some VPNs include ad-blockers as an additional feature to enhance user experience by eliminating unwanted ads. This can lead to faster browsing speeds and improved privacy.
AES (Advanced Encryption Standard)
AES is a symmetric encryption algorithm widely used across the globe to secure data. It is known for its efficiency in both hardware and software and is a crucial component of modern encryption protocols used in VPNs.
Algorithm
An algorithm is a finite sequence of well-defined instructions typically used to solve a problem or perform a computation. In VPNs, algorithms encrypt and decrypt data, ensuring secure communication.
Anonymity
Anonymity refers to the state where an individual’s identity is unknown. Using a VPN means browsing the internet without revealing personal information, often achieved by masking the IP address.
Asymmetric encryption
A method of encryption that uses two keys to lock and unlock messages: public and private. It’s secure but slower than symmetric encryption, which uses a single key.
Asymmetric encryption is essential for secure communications over the internet, providing robust protection for data exchanges.
Bandwidth
Bandwidth is the maximum rate at which data can be transferred over a network. It is a critical factor in determining the speed and efficiency of a VPN connection.
BitTorrent
BitTorrent is a peer-to-peer file-sharing protocol that allows users to distribute data and electronic files over the internet. BitTorrent often uses VPNs to enhance privacy and security during file transfers.
Client
A client is a software or hardware that requests and uses server services. In VPN terms, the client is the end-user’s application to connect to the VPN server.
Cookies
Cookies are small data stored on a user’s device by web browsers while browsing websites. They are used to remember information about the user, such as login credentials or preferences.
Dark web
The dark web is a segment of the deep web that can only be accessed using specialized software, such as the Tor browser. Websites on the dark web often use .onion URLs, allowing for anonymous browsing.
It is frequently associated with privacy-focused activities and sometimes illicit operations due to its untraceable nature.
Deep packet inspection
An analysis of the full contents of data packets being sent across a network. Deep packet inspection (DPI) is often used in firewalls to detect and block VPN connections. DPI enables network administrators to enforce security policies and manage traffic more effectively.
DNS (Domain Name System)
DNS is the system that translates human-friendly domain names into IP addresses that computers use to identify each other on the network. VPNs often use their own DNS servers to prevent DNS leaks.
DNS leak
A security flaw where DNS traffic leaves the device outside of the VPN tunnel, or leaves via the tunnel but goes to a DNS server not run by the VPN provider. DNS leaks can expose your browsing activity to your ISP.
Tools to check for DNS leaks help users ensure their privacy remains intact.
Encryption
Encryption is converting plain text into coded text to prevent unauthorized access. VPNs use encryption to secure data transmitted over the internet, ensuring privacy and security.
Geo-blocking
Geo-blocking restricts access to internet content based on the user’s geographical location. VPNs can bypass geo-blocking by making it appear that the user is accessing the internet from a different location.
Hash
A hash function converts an input (or ‘message’) into a fixed-length string of characters, which typically appears random. VPNs use hashes for various security functions, including verifying data integrity.
Host
A device on a network that communicates with other hosts on the network. Network hosts require an IP address and can include both clients and servers. Hosts are fundamental to network functionality, enabling resource sharing and device communication.
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a secure version of HTTP – the protocol to send hypermedia (web-based) resources between a web server and a web browser.
HTTPS uses the TLS encryption protocol to secure communications, ensuring data integrity and privacy for online transactions.
IP Address
An IP address is a unique identifier assigned to each device connected to a network. VPNs mask the user’s IP address to protect their privacy and location information.
IP leak
Occurs when a user’s real IP address is exposed despite being connected to a VPN server. IP leaks can be avoided by using a good quality VPN service. Preventing IP leaks is crucial for maintaining online anonymity and protecting personal information from exposure.
IPSec
Internet Protocol Security (IPsec) is a framework of techniques used to secure the connection between two points. It has a tunnel mode that is frequently used in VPN software.
IPSec is versatile and can be used for securing internet traffic and establishing VPN connections.
IPv4
The fourth version of the Internet Protocol (IP), and still the most commonly used. An IPv4 address contains 32 bits and consists of four numbers, each between 0 and 254.
Despite the development of IPv6, IPv4 remains prevalent due to its widespread adoption and compatibility.
IPv6
The sixth (and latest) version of the Internet Protocol. IPv6 addresses contain 128 bits each and use hexadecimal digits. IPv6 will eventually become the dominant protocol, offering a vastly larger address space to accommodate the growing number of internet-connected devices.
ISP (Internet Service Provider)
An ISP provides internet access to individuals and organizations. VPNs can help protect users from ISPs monitoring their online activities by encrypting their internet traffic.
Kill Switch
A kill switch is a safety feature in VPNs that disconnects a device from the internet if the VPN connection drops, preventing unprotected data from being transmitted.
Latency
Latency is the delay before a data transfer begins following instructions for its transfer. VPNs can sometimes increase latency due to the additional encryption and routing processes.
Logs
Records relating to user activity. Logs can include connection times, users’ IP addresses, bandwidth usage, and even websites visited. The better VPNs keep no logs that could be used to identify individual users, adopting a “no-logs” or “zero-logs” policy to protect user privacy.
L2TP/IPsec
L2TP/IPsec combines Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPsec) to create secure VPN connections. It provides strong encryption and data integrity.
Money-back guarantee
Reassurance that a vendor will refund a customer’s payment if the product or service does not meet their requirements. Good quality VPNs typically provide a money-back guarantee lasting around 30 days.
This policy gives users peace of mind and confidence in trying out the service.
MultiHop
A typical VPN tunnel involves connecting to a single VPN server. In a MultiHop connection, user data passes through two servers, providing an additional layer of encryption. This extra security measure makes it even harder for adversaries to trace your online activities.
NAT (Network Address Translation)
NAT is a method of remapping one IP address space into another by modifying network address information. VPNs often use NAT to enhance security and manage multiple connections efficiently.
Obfuscation
A technique used to circumvent VPN blocks by masking VPN traffic so that it isn’t identified as VPN traffic. Obfuscation can be performed using tools like Obfsproxy, Stunnel, Shadowsocks, or OpenVPN XOR scramble.
This helps users bypass censorship and access restricted content in restrictive environments.
Open-source
Refers to freely distributed software along with the source code used to create it. This enables anyone to use, modify, and distribute the source code as they see fit. Open-source software promotes transparency and security, allowing community contributions and scrutiny.
OpenVPN
OpenVPN is an open-source VPN protocol known for its strong security and reliability. It uses SSL/TLS for key exchange and can traverse firewalls and network address translators (NATs).
Packet
A network packet is a more minor part of a larger message. Data is split into packets sent over computer networks and recombined by the receiving device.
Each packet consists of a header – containing information about the packet’s contents, origin, and destination – and the payload – which is the actual data being sent.
Ping
A measurement of the total time it takes to send an Internet Control Message Protocol (ICMP) echo request packet to a host and to receive an ICMP echo reply packet from that host.
Ping is primarily a network diagnostic tool built into most operating systems to test for device connectivity and latency. It helps determine the responsiveness of a network connection.
Plug-in
Software that provides additional features to an existing program without altering the program itself. May also be referred to as an “add-on” or “extension”.
Plug-ins enhance the functionality of applications, allowing users to customize their software experience according to their needs.
PPTP
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete VPN protocol that uses easily compromised encryption. PPTP should be avoided in favor of alternatives such as WireGuard and OpenVPN.
Despite its historical significance, PPTP is no longer considered secure for modern VPN use.
Proxy server
An intermediary server is between a user and the resource they’re attempting to reach online. This hides the user’s IP address as, to the broader internet, requests appear to originate from the proxy server.
Unlike VPNs, proxy servers do not encrypt internet traffic. Proxy servers can be helpful to for bypassing geo-restrictions and accessing blocked content.
P2P (Peer-to-Peer)
P2P is a decentralized communications model where each party has the same capabilities and either party can initiate a communication session. VPNs are often used to enhance privacy and security in P2P file sharing.
Server
A server is a computer program or device that provides a service to another computer program and its user. VPN servers provide secure connections and IP masking for VPN clients.
SHA (Secure Hash Algorithm)
SHA is a family of cryptographic hash functions designed to keep data secure. They are used in VPNs to ensure data integrity and authenticity.
Simultaneous connections
Refers to the number of VPN connections you can make simultaneously from different devices. Most providers impose a limit of between five and 10. Multiple simultaneous connections allow users to secure all their devices with a single VPN subscription.
SmartDNS
Technology that routes DNS queries through a proxy server to bypass geo-restrictions. Some VPN subscriptions include SmartDNS for use with VPN-incompatible devices.
SmartDNS offers a way to access region-locked content without full VPN encryption, which can be useful for streaming.
SSL
Secure Sockets Layer (SSL) is an outdated encryption protocol designed to provide privacy, authentication, and data integrity for internet communications.
SSL has been replaced by Transport Layer Security (TLS), which offers enhanced security features. Despite its replacement, SSL is still commonly referenced in discussions about web security.
Static IP
A static IP address remains constant even when you disconnect and reconnect to the internet. Some VPNs offer static IP addresses as part of their subscription packages. Static IPs are useful for tasks requiring a consistent address, such as hosting servers or accessing remote devices securely.
Throttling
Bandwidth throttling is the intentional slowing of internet speed by an Internet Service Provider (ISP) or mobile carrier. Throttling is often used to manage network congestion, enforce data caps, or limit access to certain services.
Users can experience slower download speeds, buffering, and reduced online performance due to throttling.
TLS (Transport Layer Security)
Transport Layer Security (TLS) is a cryptographic protocol used to secure data transmitted between a web browser and a website via HTTPS. TLS also secures email and other protocols by authenticating the connection, checking data integrity, and ensuring confidentiality.
It is the successor to SSL, providing stronger security measures.
TLS/SSL certificates
TLS/SSL certificates are digital certificates that authenticate a website’s identity and enable TLS/SSL encryption. These certificates establish a secure connection between a web server and a browser, ensuring data transmitted remains private.
They protect sensitive information, such as login credentials and financial transactions.
URL (Uniform Resource Locator)
A URL is the address of a web page on the internet. VPNs can hide the user’s original URL requests by encrypting them and routing them through the VPN server.
Virtual server
A virtual server is a server that has an IP address different from the country in which it is physically located. Some VPNs use virtual servers to access regions where physical servers are challenging to maintain. They offer flexibility and can improve the availability of VPN services.
VPN (Virtual Private Network)
A VPN is a service that allows users to connect to the internet via a server run by a VPN provider. It encrypts the user’s internet traffic and masks their IP address, enhancing privacy and security.
VPN tunnel
A VPN tunnel is an encrypted connection between the user’s device and a VPN server. It ensures that all data passing through the tunnel is secure and private. VPN tunnels protect against eavesdropping and allow users to browse the internet anonymously.
Warrant Canary
A warrant canary is a statement that indicates that the service provider has not received secret government subpoenas. VPN providers use warrant canaries to inform users indirectly about government requests for data.
WebRTC
Web Real-Time Communication (WebRTC) is an open-source project allowing real-time communication between web apps and browsers.
Used for voice and video chat, WebRTC poses a security risk as it can transmit data outside the encrypted VPN tunnel. Disabling WebRTC can prevent potential IP leaks.
WireGuard
WireGuard is a modern protocol used by many VPNs to create encrypted tunnels. It is faster and more lightweight than traditional protocols like OpenVPN.
WireGuard is open-source, uses ChaCha20 authenticated encryption, and is known for its simplicity and high performance.