Everything has its own story. So does Virtual Privat Network (VPN). This story became a logical continuation of the history of the Internet that should be space without borders, censorship and any other restrictions.
The threats to the existence of the safety Internet appeared shortly after the mass started to use it. The majority threats were related to computer viruses. Later freedom, personal data, and censorship have become the object of attacks. Intelligence agencies, cybercriminals and just computer bullies become a real problem for many users. It was important to find an effective decision.
There is some controversy over creation of the first VPN on the Internet. Officially, the first talks about using of the VPN started in 1996, when engineers from the companies 3Com and Microsoft developed PPTP (pear-to-pear tunneling protocol). PPTP allows establishing the direct encrypted connection of mutually remote computers through the virtual tunnel. PPTP protocol solved the needs of large companies and corporations regarding the transfer of data over a secure communication channel between the branches, placed in different parts of the world. Lately it turned out that the resistance of the encryption keys was low (40, 56 and 128-bit) and the protection of authentication MS-CHAP was insufficient.
The next step in the history of the VPN was implementation of IPSec (Internet Protocol Security), SSTP and L2TP (Layer 2 Transport Protocol). Although the level of protection increased, even in this case VPN did not spread among ordinary Internet users. It had two reasons: access to special telecommunications equipment and good knowledge in administration of computer networks.
The demand for the VPN connection began to increase for about 10 to 15 years ago. This was facilitated by several factors:
1. The use of regional restrictions on access to web resources;
2. The establishment of Internet censorship;
3. Strengthening of a control of the Internet traffic;
4. Increasing of the number of financial services launched online;
5. The development of new, more efficient cryptographic protocols;
6. Simplifying and extension of the ways of using the VPN protocols.
In 2002 a new VPN Protocol OpenVPN was developed. It has allowed creating a secure connection “computer-computer” or “server-client” even between computers that were behind NAT or firewall (firewall), without changing their settings. In addition OpenVPN got strengthen-grade encryption with 256-bit key and multiple authentication methods. In the same time, developers of the popular web browsers started to use SSL and TLS protocols to create secure HTTPS connections with the websites. The OpenVPN Protocol also works through the TLS (SSL) protocols.
All these technical solutions were used to create the companies providers of VPN services that guarantee the safety of customers and anonymity on the Internet, regardless of the type of activities and the connection.
Today there is no need to acquire sophisticated equipment or hire specialists to feel protected on the Internet. Just select a VPN provider from the available ones, pay for their services, download and run the application. Ready! Your personal information is protected if you have chosen a really reliable VPN-provider. In that case you may use home or public Wi-Fi access, write messages, surf the Internet, download the torrent file or watch videos from popular video-stream without any threat.