Virtual Private Network (VPN) software makes it harder for your crypto activities to be observed
VPNs increase your online privacy (although they can not offer complete privacy).
VPNs hide your location from websites you visit, and hide websites that you visit from your ISP.
When using a VPN, you still need to protect yourself against malware and other online threats.
It is not recommended to use free VPNs from commercial companies.
VPNs introduce speed and convenience tradeoffs.
Some governments take steps to block the use of VPNs.
VPN providers could possibly be hacked and/or subpoenaed.
What is a VPN?
A Virtual Private Network (VPN) is software that encrypts your online data and sends it through a different computer, making it more difficult for anyone to see what you are doing online. This increases both your security and privacy.
A VPN's layer of encryption offers added security. For example, if you connect to an unencrypted service (like a web site that uses http instead of https), or a weakly-encrypted service (even an https web site may have weaknesses in its configuration), the VPN's encryption will help to prevent eavesdroppers on the network from being able to see your traffic.
Because the VPN connection wraps and sends your data through a different computer (the VPN server) you also gain privacy: sending your data through this "secret tunnel" limits how much of your online activity your internet service provider can observe. And the destination internet service that you are connecting to is also prevented from seeing your home IP address or physical location - instead, your internet traffic looks like it is coming from the VPN server that you are tunneled through.
VPNs hide users' location and enhance privacy
Who uses VPNs?
People use VPNs for many reasons. They might want to:
- add a layer of encryption as protection against eavesdroppers while they use an untrusted wireless network.
- connect securely to their employer's network in order to gain access to a service or machine on an internal work network.
- pretend that they are in a different location in order to get around rules (for example, some online services limit the countries that they serve).
- hide their activities from their internet service provider.
- hide their activities from governments or the police.
Ultimately, VPNs are a tool that add data protection and privacy, for legitimate or illegitimate reasons.
When should crypto consumers use VPN software?
Since its inception, cryptocurrency has prioritized the importance of user privacy. The Bitcoin White Paper dedicated its Section 10 to "Privacy," clearly separating the concept of a crypto user's identity from their publicly-visible transactions.
If others find out that you own cryptocurrency or other digital assets, or that you use a particular software or hardware wallet, it may be more likely that you would be targeted for theft or hacking. You may not even want your ISP to know that you connect to crypto exchanges, or even that you have a habit of checking crypto prices. You may not want a crypto exchange to know what country you are in, or to know any information about your IP address or location.
Moving into the future, the unpredictability of laws and restrictions that may be placed on cryptocurrency by different jurisdictions makes some crypto owners understandably hesitant to share any more information about their transactions than they have to.
It is recommended that privacy-conscious crypto users use a VPN when they connect to any crypto-related web site or service.
How much privacy do VPNs offer?
Although VPNs offer more privacy from the ISP and from the service that is consumed, the VPN service provider will still have logs that can identify where the user connected from. (If the user pays for service from the VPN provider, that provider likely also has additional personal information about the user as well.) There may also be some logging on the VPN provider's machines that captures destination addresses (for example, unencrypted web site URLs could be logged by the VPN provider). So VPNs do not offer perfect privacy - but they do reduce the audience of people who could analyze your internet traffic.
Increased privacy does not suggest complete anonymity: if you use a VPN to log into a web site with an account that is associated with your contact details, of course, the site still knows that it is you, even though they would not know what your location is.
How to Choose VPN software
Here are some of the things that you should consider when deciding which VPN service to use:
- Generally, avoid free services that are provided by commercial businesses. They are making money somehow. (Open source software can be excellent and free, since it avoids this conflict of interest of needing to make money.)
- Look for a VPN provider that states their respect for your privacy. They should be transparent about what logging they do, and they should state that they do not resell their customers' personal information.
- Look for a VPN provider that is based in a country with strong privacy laws, for example, Switzerland (with ProtonVPN), Panama (with NordVPN), and the British Virgin Islands (with ExpressVPN and SurfShark).
- Don't rule out VPN providers from countries with "stronger-than-average" privacy laws, and with a strong stated commitment to user privacy (like MullvadVPN).
- Your VPN provider should offer VPN connection servers that are hosted in the locations where you would like to appear to be from.
- Ensure that your VPN provider supports the device platforms that you need.
- VPN providers should be able to state that they have received an independent security and privacy audit by an industry-respected security organization.
- It is a nice feature if they accept payment in cryptocurrency. (If you can pay in crypto, you do not have to share as much information about your identity.)
Limitations of using a VPN
There are a few downsides.
Using a VPN will probably slow down your connection speed.
Some online services may block your access if they detect that your IP address is associated with a VPN. You might be able to evade the block by connecting to a different server from your VPN provider's fleet, and you may not ... "VPN blocking" will be an occasional inconvenience.
Some governments take measures to block the use of VPNs entirely, in an attempt to limit communication and privacy. Because of this, it is much more difficult to use VPNs in a few countries in the world. The legality of VPN use in countries that ban or otherwise prevent the use of VPNs is something that you should research and consider carefully if you will find yourself in that situation.
VPNs will not protect your machine from malware - that is not its purpose. You still have a responsibility to follow all guidelines for sensible internet security.
Web sites can still leave cookies and other privacy-related breadcrumbs on your local computer. You should clear your browsing history after online activity if you would like to increase your privacy more.
Even if a VPN provider claims to limit their logging of your traffic, they can potentially be compelled to provide traffic logs if given a court order.
Like every other company, VPN providers can be hacked or have data breaches. If a VPN provider's access logs are unintentionally published, any information that they do have about you may be leaked. This has happened to several VPN providers, including LimeVPN and UFOVPN.
Other forms of VPN
Instead of running conventional VPN provider software on your laptop and mobile devices, you could install a VPN client in a different form, like on a wireless internet router, although that setup can be tricky and inconvenient.
There are also browser extension VPNs that only protect data that is transmitted through a specific browser, although many people find the scope of such a partial VPN tool to be too limited.
There is also a new breed of decentralized, open-source VPNs that are entering the market, like mysterium. Although these VPNs offer intriguing technology, they do not yet have a large user base or a long a track record like conventional VPNs, and are not yet as user-friendly.
Apple announced with iOS 15 that it is offering a new privacy tool for iCloud users in the form of a Safari browser feature called Private Relay. While not a VPN, it does add a layer of encryption, and it does mask the user's IP address (although it does not evade geoblocking controls, so you can not pretend to be in a different location).
Cloudflare offers a VPN alternative called "22.214.171.124 Warp." This service acts as a DNS resolver that can cloak what internet-based services you are connecting to from your Internet Service Provider. The service that you are connecting to, however, will still see your actual IP address.
Alternatively, you could also choose to use an open source peer-to-peer browser like Tor. Tor is not a VPN, but the Tor network breaks data up into smaller pieces and individually routes them through nodes that can be run by anyone, making it nearly impossible to reassemble who did what. Tor traffic can be quite slow, and may be blocked by service providers more than standard VPNs.
When to enable your VPN
Although nearly all crypto-related web sites and internet services already provide a high level of security by protecting "in-flight" data with HTTPS/TLS encryption, you might not want the web site that you are connecting to to know your location or IP address, and you may not want your ISP to have visibility into your online habits. If you want to add another layer of security and privacy to your crypto activity, using a VPN can help.
Some people leave a VPN tunnel enabled all of the time, and only disable it temporarily if they find that they are blocked from using a particular service. Others only enable their VPN before connecting to a cryptocurrency exchange where they want to transact cryptocurrency. As with so much in cryptocurrency, the choices are up to you - but it is highly recommended that you have a VPN and that you know how to use it, so that you can make informed and appropriate decisions. Empower yourself with some experience using a VPN so that you can enable it when you feel it's prudent.
Next Up From Vault 12
Inheritance and long term storage for CryptocurrencyVault12 Explainer
Vault12 Product Demo
Vault12 Digital Inheritance is the first solution to offer a simple, direct, and secure way to ensure cryptocurrency, NFTs and other Web3 digital assets can be inherited by future generations.
Digital Inheritance enables investors to designate an individual or a mobile device as a guardian that will inherit their entire portfolio of digital assets stored in a secure digital Vault once the time comes, eliminating undue risk and the need to continually update an inventory or issue updated instructions which result in privacy leakage.
Designed to be used alongside traditional hardware, software, and online wallets, Vault12 helps cryptocurrency owners, professional crypto traders, and high net worth investors safeguard their digital assets without storing anything in the cloud or in fact any one single location. This increases the protection and decreases the risks of loss.
The Vault12 app helps you self-custody, back up, and provide legacy inheritance for all your digital assets, including Bitcoin, Ethereum, NFTs, other cryptocurrencies, secrets like keys, seed phrases, PIN codes, DAO project keys, digital art, and of course, your crypto wallets.
Whether your digital art is suitable for a phone, or represents much higher resolution multimedia, make sure that you have backed up a copy in case the resource link is disrupted in the future. Digital art can easily be added to the Vault either via the mobile app or via the desktop utility. Once you have stored your artwork in your Vault, it will also benefit from inheritance once you activate that in your app.
As a creator you can use Vault12 to safeguard not just your NFT and crypto wallets, but also original digital artwork. Project creators will always have to deal with multiple wallets - inventory, treasury as well as future royalty wallets.
Vault12 safeguards your project assets, increasing protection and decreasing the risks of loss, whilst ensuring that everything is ready to go to be passed onto future generations, when the need arises.