Encrypted network cables
Basics of Crypto Security

How VPNs increase your crypto security

Virtual Private Network (VPN) software makes it harder for your crypto activities to be observed


TL;DR (concentrated takeaways)

VPNs increase your online privacy (although they can not offer complete privacy).

VPNs introduce speed and convenience tradeoffs.

VPNs hide your location from websites you visit, and hide websites that you visit from your ISP.

Some governments take steps to block the use of VPNs.

VPN providers could possibly be hacked and/or subpoenaed.

When using a VPN, you still need to protect yourself against malware and other online threats.

It is not recommended to use free VPNs from commercial companies.

What is a VPN?

A Virtual Private Network (VPN) is software that encrypts your online data and sends it through a different computer, making it more difficult for anyone to see what you are doing online. This increases both your security and privacy.

A VPN's layer of encryption offers added security. For example, if you connect to an unencrypted service (like a web site that uses http instead of https), or a weakly-encrypted service (even an https web site may have weaknesses in its configuration), the VPN's encryption will help to prevent eavesdroppers on the network from being able to see your traffic.

Because the VPN connection wraps and sends your data through a different computer (the VPN server) you also gain privacy: sending your data through this "secret tunnel" limits how much of your online activity your internet service provider can observe. And the destination internet service that you are connecting to is also prevented from seeing your home IP address or physical location - instead, your internet traffic looks like it is coming from the VPN server that you are tunneled through.

Illustration showing the benefits of VPNs

Using a VPN protects against some prying eyes

Who uses VPNs?

People use VPNs for many reasons. They might want to:

  • add a layer of encryption as protection against eavesdroppers while they use an untrusted wireless network.
  • connect securely to their employer's network in order to gain access to a service or machine on an internal work network.
  • pretend that they are in a different location in order to get around rules (for example, some online services limit the countries that they serve).
  • hide their activities from their internet service provider.
  • hide their activities from governments or the police.

Ultimately, VPNs are a tool that add data protection and privacy, for legitimate or illegitimate reasons.

When should crypto consumers use VPN software? 

Since its inception, cryptocurrency has prioritized the importance of user privacy. The Bitcoin White Paper dedicated its Section 10 to "Privacy," clearly separating the concept of a crypto user's identity from their publicly-visible transactions.

If others find out that you own cryptocurrency or other digital assets, or that you use a particular software or hardware wallet, it may be more likely that you would be targeted for theft or hacking. You may not even want your ISP to know that you connect to crypto exchanges, or even that you have a habit of checking crypto prices. You may not want a crypto exchange to know what country you are in, or to know any information about your IP address or location.

Moving into the future, the unpredictability of laws and restrictions that may be placed on cryptocurrency by different jurisdictions makes some crypto owners understandably hesitant to share any more information about their transactions than they have to.

It is recommended that privacy-conscious crypto users use a VPN when they connect to any crypto-related web site or service.

How much privacy do VPNs offer?

Although VPNs offer more privacy from the ISP and from the service that is consumed, the VPN service provider will still have logs that can identify where the user connected from. (If the user pays for service from the VPN provider, that provider likely also has additional personal information about the user as well.) There may also be some logging on the VPN provider's machines that captures destination addresses (for example, unencrypted web site URLs could be logged by the VPN provider). So VPNs do not offer perfect privacy - but they do reduce the audience of people who could analyze your internet traffic.

Increased privacy does not suggest complete anonymity: if you use a VPN to log into a web site with an account that is associated with your contact details, of course, the site still knows that it is you, even though they would not know what your location is.

How to Choose VPN software

Here are some of the things that you should consider when deciding which VPN service to use:

  • Generally, avoid free services that are provided by commercial businesses. They are making money somehow. (Open source software can be excellent and free, since it avoids this conflict of interest of needing to make money.)
  • Look for a VPN provider that states their respect for your privacy. They should be transparent about what logging they do, and they should state that they do not resell their customers' personal information.
  • Look for a VPN provider that is based in a country with strong privacy laws, for example, Switzerland (with ProtonVPN), Panama (with NordVPN), and the British Virgin Islands (with ExpressVPN and SurfShark).
  • Don't rule out VPN providers from countries with "stronger-than-average" privacy laws, and with a strong stated commitment to user privacy (like MullvadVPN).
  • Your VPN provider should offer VPN connection servers that are hosted in the locations where you would like to appear to be from.
  • Ensure that your VPN provider supports the device platforms that you need.
  • VPN providers should be able to state that they have received an independent security and privacy audit by an industry-respected security organization.
  • It is a nice feature if they accept payment in cryptocurrency. (If you can pay in crypto, you do not have to share as much information about your identity.)
Some prominent VPN providers are ProtonVPN, NordVPN, and ExpressVPN.

Two professional sites that offer independent reviews of VPN software are:
And one popular user forum that may also offer sound advice is:

Limitations of using a VPN

There are a few downsides.

Using a VPN will probably slow down your connection speed.

Some online services may block your access if they detect that your IP address is associated with a VPN. You might be able to evade the block by connecting to a different server from your VPN provider's fleet, and you may not ... "VPN blocking" will be an occasional inconvenience.

Some governments take measures to block the use of VPNs entirely, in an attempt to limit communication and privacy. Because of this, it is much more difficult to use VPNs in a few countries in the world. The legality of VPN use in countries that ban or otherwise prevent the use of VPNs is something that you should research and consider carefully if you will find yourself in that situation.

VPNs will not protect your machine from malware - that is not its purpose. You still have a responsibility to follow all guidelines for sensible internet security.

Web sites can still leave cookies and other privacy-related breadcrumbs on your local computer. You should clear your browsing history after online activity if you would like to increase your privacy more.

Even if a VPN provider claims to limit their logging of your traffic, they can potentially be compelled to provide traffic logs if given a court order.

Like every other company, VPN providers can be hacked or have data breaches. If a VPN provider's access logs are unintentionally published, any information that they do have about you may be leaked. This has happened to several VPN providers, including LimeVPN and UFOVPN.

Other forms of VPN 

Instead of running conventional VPN provider software on your laptop and mobile devices, you could install a VPN client in a different form, like on a wireless internet router, although that setup can be tricky and inconvenient.

There are also browser extension VPNs that only protect data that is transmitted through a specific browser, although many people find the scope of such a partial VPN tool to be too limited.

There is also a new breed of decentralized, open-source VPNs that are entering the market, like mysterium. Although these VPNs offer intriguing technology, they do not yet have a large user base or a long a track record like conventional VPNs, and are not yet as user-friendly.

VPN Alternatives

Apple announced with iOS 15 that it is offering a new privacy tool for iCloud users in the form of a Safari browser feature called Private Relay. While not a VPN, it does add a layer of encryption, and it does mask the user's IP address (although it does not evade geoblocking controls, so you can not pretend to be in a different location).

Cloudflare offers a VPN alternative called "1.1.1.1 Warp." This service acts as a DNS resolver that can cloak what internet-based services you are connecting to from your Internet Service Provider. The service that you are connecting to, however, will still see your actual IP address.

Alternatively, you could also choose to use an open source peer-to-peer browser like Tor. Tor is not a VPN, but the Tor network breaks data up into smaller pieces and individually routes them through nodes that can be run by anyone, making it nearly impossible to reassemble who did what. Tor traffic can be quite slow, and may be blocked by service providers more than standard VPNs.

When to enable your VPN

Although nearly all crypto-related web sites and internet services already provide a high level of security by protecting "in-flight" data with HTTPS/TLS encryption, you might not want the web site that you are connecting to to know your location or IP address, and you may not want your ISP to have visibility into your online habits. If you want to add another layer of security and privacy to your crypto activity, using a VPN can help.

Some people leave a VPN tunnel enabled all of the time, and only disable it temporarily if they find that they are blocked from using a particular service. Others only enable their VPN before connecting to a cryptocurrency exchange where they want to transact cryptocurrency. As with so much in cryptocurrency, the choices are up to you - but it is highly recommended that you have a VPN and that you know how to use it, so that you can make informed and appropriate decisions. Empower yourself with some experience using a VPN so that you can enable it when you feel it's prudent.

https://www.linkedin.com/company/vault12
https://twitter.com/_vault12_

Featured Articles

avatar-icon

Vault12 Crypto Security

Social Recovery Vault for Digital Asset Security + Digital Inheritance for protecting the future of money.

avatar-icon

Art Krotou

Art is a crypto-security expert and researcher with serial entrepreneurship background. Having a degree in physics and experiences in multiple cutting-edge industries like fintech, secure hardware and semiconductors, and identity gave him a unique multi-faceted perspective on the problem of key management for individuals in the crypto networks and the evolution of the internet in general.

In his current work, he is specifically researching how cryptographic keys can be inherited without posing a threat to 3rd parties in edge cases. In addition, he advocates for "fault-tolerance via secrets automation". He discusses the quantitative impact of user experience factors on the uptake of non-custodial solutions.

As one of his most notable accomplishments, he co-founded and led through the early years of the company that contributed to the complex technology behind Apple's recent M-series CPUs. He is also the creator of the most friendly and aesthetically pleasing, but nonetheless super secure and fault-tolerant hardware wallet - U•HODL.


Check out his curated series of "Vault12 Learn" contributions below, and follow him on Twitter and LinkedIn for more sharp insights.

star-background

Backup and Inheritance for Bitcoin

vault12-guard
Vault12 Guard Explainer
Get the Vault12 Guard app onto your phone
QR code Vault12 Crypto/NFT InheritanceDownload Vault12 on App StoreDownload Vault12 on Google Play
Vault12 app mockup
Scroll down
Close

Vault12 Product Demo

Get The Vault12 App Onto Your Phone

Download Vault12 on App StoreDownload Vault12 on Google Play
Close
Start protecting your digital assets: Free 30-day trial available today.