We live in uncertain times. Take Control. Set up Inheritance and Self-Custody Backup. Download the Vault12 Guard app today.

Encrypted network cables
Basics of Crypto Security

How VPNs increase your crypto security

Virtual Private Network (VPN) software makes it harder for your crypto activities to be observed


TL;DR

VPNs increase your online privacy (although they can not offer complete privacy).

VPNs hide your location from websites you visit, and hide websites that you visit from your ISP.

When using a VPN, you still need to protect yourself against malware and other online threats.

It is not recommended to use free VPNs from commercial companies.

VPNs introduce speed and convenience tradeoffs.

Some governments take steps to block the use of VPNs.

VPN providers could possibly be hacked and/or subpoenaed.

What is a VPN?

A Virtual Private Network (VPN) is software that encrypts your online data and sends it through a different computer, making it more difficult for anyone to see what you are doing online. This increases both your security and privacy.

A VPN's layer of encryption offers added security. For example, if you connect to an unencrypted service (like a web site that uses http instead of https), or a weakly-encrypted service (even an https web site may have weaknesses in its configuration), the VPN's encryption will help to prevent eavesdroppers on the network from being able to see your traffic.

Because the VPN connection wraps and sends your data through a different computer (the VPN server) you also gain privacy: sending your data through this "secret tunnel" limits how much of your online activity your internet service provider can observe. And the destination internet service that you are connecting to is also prevented from seeing your home IP address or physical location - instead, your internet traffic looks like it is coming from the VPN server that you are tunneled through.

Illustration showing the benefits of VPNs

VPNs hide users' location and enhance privacy

Who uses VPNs?

People use VPNs for many reasons. They might want to:

  • add a layer of encryption as protection against eavesdroppers while they use an untrusted wireless network.
  • connect securely to their employer's network in order to gain access to a service or machine on an internal work network.
  • pretend that they are in a different location in order to get around rules (for example, some online services limit the countries that they serve).
  • hide their activities from their internet service provider.
  • hide their activities from governments or the police.

Ultimately, VPNs are a tool that add data protection and privacy, for legitimate or illegitimate reasons.

When should crypto consumers use VPN software? 

Since its inception, cryptocurrency has prioritized the importance of user privacy. The Bitcoin White Paper dedicated its Section 10 to "Privacy," clearly separating the concept of a crypto user's identity from their publicly-visible transactions.

If others find out that you own cryptocurrency or other digital assets, or that you use a particular software or hardware wallet, it may be more likely that you would be targeted for theft or hacking. You may not even want your ISP to know that you connect to crypto exchanges, or even that you have a habit of checking crypto prices. You may not want a crypto exchange to know what country you are in, or to know any information about your IP address or location.

Moving into the future, the unpredictability of laws and restrictions that may be placed on cryptocurrency by different jurisdictions makes some crypto owners understandably hesitant to share any more information about their transactions than they have to.

It is recommended that privacy-conscious crypto users use a VPN when they connect to any crypto-related web site or service.

How much privacy do VPNs offer?

Although VPNs offer more privacy from the ISP and from the service that is consumed, the VPN service provider will still have logs that can identify where the user connected from. (If the user pays for service from the VPN provider, that provider likely also has additional personal information about the user as well.) There may also be some logging on the VPN provider's machines that captures destination addresses (for example, unencrypted web site URLs could be logged by the VPN provider). So VPNs do not offer perfect privacy - but they do reduce the audience of people who could analyze your internet traffic.

Increased privacy does not suggest complete anonymity: if you use a VPN to log into a web site with an account that is associated with your contact details, of course, the site still knows that it is you, even though they would not know what your location is.

How to Choose VPN software

Here are some of the things that you should consider when deciding which VPN service to use:

  • Generally, avoid free services that are provided by commercial businesses. They are making money somehow. (Open source software can be excellent and free, since it avoids this conflict of interest of needing to make money.)
  • Look for a VPN provider that states their respect for your privacy. They should be transparent about what logging they do, and they should state that they do not resell their customers' personal information.
  • Look for a VPN provider that is based in a country with strong privacy laws, for example, Switzerland (with ProtonVPN), Panama (with NordVPN), and the British Virgin Islands (with ExpressVPN and SurfShark).
  • Don't rule out VPN providers from countries with "stronger-than-average" privacy laws, and with a strong stated commitment to user privacy (like MullvadVPN).
  • Your VPN provider should offer VPN connection servers that are hosted in the locations where you would like to appear to be from.
  • Ensure that your VPN provider supports the device platforms that you need.
  • VPN providers should be able to state that they have received an independent security and privacy audit by an industry-respected security organization.
  • It is a nice feature if they accept payment in cryptocurrency. (If you can pay in crypto, you do not have to share as much information about your identity.)
Some prominent VPN providers are ProtonVPN, NordVPN, and ExpressVPN.

Two professional sites that offer independent reviews of VPN software are:
And one popular user forum that may also offer sound advice is:

Limitations of using a VPN

There are a few downsides.

Using a VPN will probably slow down your connection speed.

Some online services may block your access if they detect that your IP address is associated with a VPN. You might be able to evade the block by connecting to a different server from your VPN provider's fleet, and you may not ... "VPN blocking" will be an occasional inconvenience.

Some governments take measures to block the use of VPNs entirely, in an attempt to limit communication and privacy. Because of this, it is much more difficult to use VPNs in a few countries in the world. The legality of VPN use in countries that ban or otherwise prevent the use of VPNs is something that you should research and consider carefully if you will find yourself in that situation.

VPNs will not protect your machine from malware - that is not its purpose. You still have a responsibility to follow all guidelines for sensible internet security.

Web sites can still leave cookies and other privacy-related breadcrumbs on your local computer. You should clear your browsing history after online activity if you would like to increase your privacy more.

Even if a VPN provider claims to limit their logging of your traffic, they can potentially be compelled to provide traffic logs if given a court order.

Like every other company, VPN providers can be hacked or have data breaches. If a VPN provider's access logs are unintentionally published, any information that they do have about you may be leaked. This has happened to several VPN providers, including LimeVPN and UFOVPN.

Other forms of VPN 

Instead of running conventional VPN provider software on your laptop and mobile devices, you could install a VPN client in a different form, like on a wireless internet router, although that setup can be tricky and inconvenient.

There are also browser extension VPNs that only protect data that is transmitted through a specific browser, although many people find the scope of such a partial VPN tool to be too limited.

There is also a new breed of decentralized, open-source VPNs that are entering the market, like mysterium. Although these VPNs offer intriguing technology, they do not yet have a large user base or a long a track record like conventional VPNs, and are not yet as user-friendly.

VPN Alternatives

Apple announced with iOS 15 that it is offering a new privacy tool for iCloud users in the form of a Safari browser feature called Private Relay. While not a VPN, it does add a layer of encryption, and it does mask the user's IP address (although it does not evade geoblocking controls, so you can not pretend to be in a different location).

Cloudflare offers a VPN alternative called "1.1.1.1 Warp." This service acts as a DNS resolver that can cloak what internet-based services you are connecting to from your Internet Service Provider. The service that you are connecting to, however, will still see your actual IP address.

Alternatively, you could also choose to use an open source peer-to-peer browser like Tor. Tor is not a VPN, but the Tor network breaks data up into smaller pieces and individually routes them through nodes that can be run by anyone, making it nearly impossible to reassemble who did what. Tor traffic can be quite slow, and may be blocked by service providers more than standard VPNs.

When to enable your VPN

Although nearly all crypto-related web sites and internet services already provide a high level of security by protecting "in-flight" data with HTTPS/TLS encryption, you might not want the web site that you are connecting to to know your location or IP address, and you may not want your ISP to have visibility into your online habits. If you want to add another layer of security and privacy to your crypto activity, using a VPN can help.

Some people leave a VPN tunnel enabled all of the time, and only disable it temporarily if they find that they are blocked from using a particular service. Others only enable their VPN before connecting to a cryptocurrency exchange where they want to transact cryptocurrency. As with so much in cryptocurrency, the choices are up to you - but it is highly recommended that you have a VPN and that you know how to use it, so that you can make informed and appropriate decisions. Empower yourself with some experience using a VPN so that you can enable it when you feel it's prudent.

Basics of Crypto Security

How VPNs increase your crypto security

Virtual Private Network (VPN) software makes it harder for your crypto activities to be observed

Discover More

Featured Articles

Inheritance and self-custody for Cryptocurrency

Vault12 Guard Explainer
Get the Vault12 Guard app onto your phone
QR code Vault12 Crypto/NFT InheritanceDownload Vault12 on App StoreDownload Vault12 on Google Play
Vault12 app mockup
Scroll down
Close

Vault12 Product Demo

Get The Vault12 App Onto Your Phone

Download Vault12 on App StoreDownload Vault12 on Google Play
Inheritance: Get ready today.

Inheritance: Get ready today.

Vault12 Digital Inheritance is the first solution to offer a simple, direct, and secure way to ensure cryptocurrency, NFTs, and other Web3 digital assets can be inherited by future generations.

Digital Inheritance enables investors to designate an individual or a mobile device as a guardian that will inherit their entire portfolio of digital assets (seed phrases,private keys, digital art and other secrets) inside a secure digital Vault once the time comes, eliminating undue risk and the need to continually update an inventory or issue updated instructions which result in privacy leakage.

Decentralized Self-Custody Backup.

Decentralized Self-Custody Backup.

Designed to be used alongside traditional hardware, software, and online wallets, Vault12 Guard helps cryptocurrency owners, professional crypto traders, and high-net-worth investors safeguard their digital assets without storing anything in the cloud or in fact, any one single location. This increases protection and decreases the risks of loss.

(Note: The Vault12 app is not a crypto wallet and does not hold cryptocurrency. It is a Vault that safeguards your wallet seed phrase and private keys, associated files for NFTs, and digital art).

The Vault12 Guard app enables decentralized self-custody back up, and provide legacy inheritance for all your web3 digital assets, including NFTs, wallet seed phrases, secrets like keys, PIN codes, DAO project keys, and digital art.

Collectors, ensure your Art is protected for the future.

Collectors, ensure your Art is protected for the future.

Whether your digital art is suitable for a phone, or represents much higher resolution multimedia, make sure that you have backed up a copy in case the resource link is disrupted in the future. Digital art can easily be added to the Vault either via the mobile app or via the desktop utility. Once you have stored your artwork in your Vault, it will also benefit from inheritance once you activate that in your app.

Creators, do you have creative security?

Creators, do you have creative security?

As a creator, you can use Vault12 Guard to safeguard not just your NFT and crypto wallets but also your original digital artwork. Project creators will always have to deal with multiple wallets - inventory, treasury, as well as future royalty wallets.

Vault12 Guard safeguards your project assets, increasing protection and decreasing the risks of loss whilst ensuring that everything is ready to be passed onto future generations when the need arises. This is creative security.

Learn

Step-by-step guides for setting up your digital Vault and adding assets, inheriting and restoring Vaults. Vault12 Guard helps you inherit and back up all assets stored in your Vault, including Bitcoin, Ethereum, crypto, private keys, seed phrases, wallets, NFTs, and digital art.

Teacher explaining how to to use Vault12 Guard
Two people opening a large Vault with digital assets

How to get the Vault12 app, create your own Digital Vault, and assign trusted Guardians to guard your Vault.

Decorative Background

Get started now.

Vault12 Guard is now available from the iOS and Android App Stores.
Download Vault12 on App StoreDownload Vault12 on Google Play
Close
Start protecting your digital assets: Free 30-day trial available today.