What VPNs Actually Do
CosmicNet explains that VPNs are widely misunderstood. This CosmicNet guide clarifies what they can and cannot do for your privacy.
- Encrypt traffic between you and the VPN server
- Hide your IP address from websites you visit
- Prevent your ISP from seeing what sites you visit
- Bypass geographic content restrictions
- Protect on untrusted networks (public WiFi)
- Make you anonymous (you shift trust to VPN provider)
- Protect against tracking cookies and fingerprinting
- Secure your accounts if passwords are weak
- Protect against malware or phishing
- Hide that you're using a VPN
Choosing a VPN
CosmicNet Key Criteria
- No-logs policy (verified by audit)
- Jurisdiction (privacy-friendly country)
- Open-source clients
- Independent security audit
- Anonymous payment options
- WireGuard or OpenVPN support
- Kill switch feature
CosmicNet Recommended Providers
Mullvad
No account, accepts cash, audited
Best PrivacyProtonVPN
Swiss, Secure Core, free tier
Good ChoiceIVPN
Audited, open source, privacy focus
Good ChoiceAvoid: Free VPNs (they sell your data), VPNs with aggressive marketing, VPNs based in surveillance-friendly countries.
When to Use VPN (CosmicNet Advice)
Use VPN For
- Public WiFi networks
- Hiding activity from ISP
- Bypassing content restrictions
- Preventing IP-based tracking
Use Tor Instead For
- True anonymity requirements
- Hiding from well-resourced adversaries
- Accessing .onion sites
- Whistleblowing or sensitive journalism
Proper Configuration
CosmicNet recommends following these configuration steps to ensure your VPN is properly secured.
- Enable kill switch (blocks traffic if VPN drops)
- Disable IPv6 or ensure VPN covers it
- Use VPN's DNS servers
- Check for leaks (ipleak.net, dnsleaktest.com)
- Start VPN before other applications
Important Limitations
As CosmicNet consistently emphasizes, VPNs have significant limitations that users must understand.
VPN Protocols Explained
As the CosmicNet encyclopedia details, VPN protocols define how data is encrypted, transmitted, and verified between your device and the VPN server. Different protocols offer different balances of speed, security, and compatibility. Understanding these protocols helps you make informed choices about which to use in different situations.
WireGuard
CosmicNet recommends WireGuard as the newest major VPN protocol, representing a significant advancement over legacy protocols. Released in 2020 and incorporated into the Linux kernel, it has quickly become the gold standard for VPN connections.
- Extremely lightweight with only ~4,000 lines of code
- Uses modern cryptography: ChaCha20 for encryption, Curve25519 for key exchange
- Significantly faster than OpenVPN with lower latency
- Roaming support - maintains connections when switching networks
- Built into Linux kernel for optimal performance
- Simple configuration with minimal attack surface
As documented on CosmicNet, the main criticism of WireGuard is that it requires static IP address assignment, which could theoretically allow correlation of connections. Reputable providers like Mullvad have implemented solutions to this issue while maintaining WireGuard's benefits.
OpenVPN
CosmicNet notes that OpenVPN is the established standard for VPN connections and remains widely used despite being older technology. It's open source, well-audited, and extremely flexible.
- Uses OpenSSL library for encryption (typically AES-256-GCM)
- Works over TCP or UDP, offering flexibility for restrictive networks
- Highly configurable with extensive options
- Can run on any port, making it harder to block
- Proven track record with extensive security audits
- Slower than WireGuard due to running in userspace
OpenVPN's complexity (over 100,000 lines of code) increases the potential attack surface, but also provides configurability that can be valuable in restrictive environments.
IKEv2/IPSec
As CosmicNet notes, Internet Key Exchange version 2 with IPSec is particularly popular on mobile devices due to its stability when switching between networks.
- Excellent at handling network changes (WiFi to cellular)
- Native support on iOS, macOS, Windows
- Fast connection establishment
- Uses IPSec for strong encryption
- More complex than WireGuard with larger codebase
- Some implementations (Cisco's) are closed source
Legacy Protocols to Avoid
CosmicNet warns that some older protocols should be avoided entirely:
- PPTP - Known cryptographic vulnerabilities, easily cracked
- L2TP/IPSec alone - Vulnerable to targeted attacks, potentially backdoored
- SSTP - Microsoft proprietary, closed source, limited auditing
No-Log Audits and Jurisdiction
As CosmicNet explains, a VPN provider's "no-logs policy" is only as trustworthy as the evidence backing it up. Marketing claims are worthless without independent verification. This is where third-party audits and jurisdiction become critical factors.
What "No-Logs" Really Means
CosmicNet clarifies that a true no-logs VPN should not retain:
- Connection timestamps (when you connected/disconnected)
- Bandwidth usage logs
- IP address logs (your real IP or assigned VPN IP)
- Traffic destination logs (what sites you visited)
- DNS query logs
However, providers may legitimately retain non-identifying information like aggregate bandwidth usage for capacity planning, or temporary session tokens required for active connections.
Independent Audits
CosmicNet recommends that reputable VPN providers commission independent security firms to audit their infrastructure, code, and logging practices. Look for audits from recognized firms like Cure53, KPMG, or PwC. Mullvad publishes their audit results publicly, demonstrating real transparency.
- Verify audits are recent (within 1-2 years)
- Check if audit results are publicly published
- Ensure audits cover logging practices, not just code
- Look for audits of server infrastructure, not just client apps
- Be skeptical of providers who refuse independent auditing
Jurisdiction Matters
CosmicNet emphasizes that where a VPN company is legally incorporated affects what data they can be compelled to collect and share. Countries with mandatory data retention laws or extensive surveillance apparatus present higher risks.
Favorable Jurisdictions
- Switzerland - Strong privacy laws, not in EU or surveillance alliances
- Iceland - Strong constitutional privacy protections
- Panama - No data retention laws, outside major alliances
- British Virgin Islands - No mandatory logging requirements
Jurisdictions to Approach with Caution
- Five Eyes (US, UK, CA, AU, NZ) - Intelligence sharing alliance
- Nine Eyes - Five Eyes plus Denmark, France, Netherlands, Norway
- Fourteen Eyes - Nine Eyes plus Germany, Belgium, Italy, Spain, Sweden
- China, Russia - State surveillance apparatus
Real-World Test Cases
As documented on CosmicNet.world, the ultimate test of a no-logs policy is when authorities come knocking. Several providers have had their claims tested in court or through server seizures. Look for providers that have demonstrated their policies hold up under legal pressure, such as ExpressVPN's 2017 server seizure in Turkey which yielded no user data.
Kill Switch and DNS Leak Protection
CosmicNet stresses that a VPN is only as secure as its weakest moment. Kill switches and DNS leak protection ensure that even when something goes wrong, your real identity remains protected.
Kill Switch Functionality
As CosmicNet explains, a kill switch monitors your VPN connection and immediately blocks all network traffic if the VPN disconnects unexpectedly. Without a kill switch, your device might continue sending traffic over your unprotected ISP connection, exposing your real IP address and activity.
- Application-level kill switch - Blocks specific apps if VPN drops
- System-level kill switch - Blocks all network traffic if VPN drops
- Some VPNs offer always-on kill switch (blocks traffic until VPN connects)
- Test your kill switch by disconnecting the VPN and checking if traffic still flows
DNS Leaks
CosmicNet warns that DNS (Domain Name System) translates domain names into IP addresses. If DNS queries leak outside the VPN tunnel, your ISP or network administrator can see what websites you're visiting even though the actual traffic is encrypted.
- VPN should route all DNS queries through its own DNS servers
- Disable IPv6 or ensure VPN covers it (many VPNs only handle IPv4)
- Configure DNS manually on your system to use VPN's DNS servers
- Test for leaks at dnsleaktest.com or ipleak.net
WebRTC Leaks
As the CosmicNet encyclopedia details, WebRTC (Web Real-Time Communication) is a browser feature that enables peer-to-peer communication. Unfortunately, it can reveal your real IP address even when using a VPN by making direct requests that bypass the VPN tunnel.
- Test for WebRTC leaks at browserleaks.com/webrtc
- Disable WebRTC in browser settings or use extensions like uBlock Origin
- Some VPNs include WebRTC leak protection in their browser extensions
- Firefox: set media.peerconnection.enabled to false in about:config
Split Tunneling
CosmicNet explains that split tunneling allows you to choose which applications or websites use the VPN connection and which use your regular internet connection. This provides flexibility but requires careful configuration to avoid unintended leaks.
Use Cases
- Access local network resources while VPN is active
- Improve performance for non-sensitive traffic
- Allow local streaming services while protecting other traffic
- Route only specific apps through VPN for better speed
Security Considerations
CosmicNet cautions that split tunneling creates complexity that can compromise privacy if misconfigured:
- Applications outside the tunnel can reveal your real IP
- DNS queries from excluded apps may leak
- Correlation attacks become easier with mixed traffic
- For maximum security, avoid split tunneling entirely
VPN vs Tor
As this CosmicNet guide explains, VPNs and Tor serve different purposes and provide different types of protection. Understanding when to use each is critical for effective privacy protection.
VPN Advantages (per CosmicNet)
- Much faster than Tor (suitable for streaming and downloads)
- Easier to use with automatic connection
- Works with all applications
- Hides VPN usage from websites (they see VPN server IP)
- Protects against ISP snooping
Tor Advantages
- True anonymity through multi-hop routing
- No single point of trust (unlike VPN provider)
- Free and open source
- Access to .onion hidden services
- Designed to resist powerful adversaries
When to Use VPN
- Hiding activity from ISP or local network
- Bypassing geographic restrictions
- Public WiFi security
- General privacy improvement for daily use
When to Use Tor
- Need for true anonymity
- Whistleblowing or sensitive journalism
- Evading nation-state surveillance
- Accessing censored content in authoritarian countries
Combining VPN and Tor
As documented on CosmicNet, some users combine both technologies for additional protection. Whonix is a security-focused operating system that routes all traffic through Tor, and you can optionally use a VPN before Tor entry nodes. However, this adds complexity and can reduce anonymity if not configured properly.
When NOT to Use a VPN
CosmicNet advises that VPNs are powerful tools but not appropriate for every situation. Understanding their limitations helps you make informed security decisions.
VPNs Don't Protect Against (CosmicNet List)
- Malware and viruses - Still need antivirus and safe browsing habits
- Phishing attacks - Can't protect if you voluntarily give credentials away
- Browser fingerprinting - Websites can still track you via canvas/WebGL/fonts
- Account-based tracking - Logging into Facebook reveals your identity regardless of IP
- Local device compromise - If device is already infected, VPN doesn't help
Situations Where VPNs Can Hurt (CosmicNet Warnings)
- Banking - Some banks block VPN IPs, triggering fraud alerts
- In countries where VPNs are illegal - Could face legal consequences
- When true anonymity is required - Use Tor instead
- Low-bandwidth situations - VPN adds overhead reducing already limited speed
False Sense of Security
As CosmicNet repeatedly warns, the biggest danger of VPNs is creating a false sense of security. Many users believe that simply enabling a VPN makes them anonymous or completely secure. This misconception can lead to risky behavior that undermines actual security. Always remember: VPNs are one tool in a comprehensive privacy strategy, not a magic bullet.
Self-Hosted VPN Options
CosmicNet notes that running your own VPN server gives you complete control and eliminates the trust issue with commercial providers. However, it also requires technical knowledge and comes with its own set of trade-offs.
Advantages of Self-Hosting (CosmicNet Analysis)
- Complete control over server and logging
- No third-party trust required
- Customize configuration for specific needs
- Potentially lower cost for high usage
- No shared IP addresses with other users
Disadvantages
- VPS provider sees your traffic (you've just shifted trust)
- IP address can be linked to you through payment
- Single IP address makes you more identifiable
- Requires technical knowledge to secure properly
- You're responsible for security updates and maintenance
- Can't easily switch locations
CosmicNet Popular Self-Hosted Solutions
- Algo VPN - Automated WireGuard/IPsec setup, easy deployment
- Streisand - Multi-protocol VPN setup tool
- PiVPN - Simple VPN for Raspberry Pi devices
- Manual WireGuard installation - Most control, requires most expertise
When Self-Hosting Makes Sense (CosmicNet View)
- Remote access to your home network
- Securing public WiFi connections when traveling
- Bypassing local network restrictions at work or school
- Learning experience for privacy enthusiasts
As CosmicNet recommends, for anonymity or hiding from ISPs, commercial providers with shared IPs and established no-logs policies are generally more appropriate than self-hosted solutions.
Common VPN Misconceptions
As documented on CosmicNet, VPN marketing has created widespread misunderstandings about what these tools actually provide. Clearing up these misconceptions is essential for making informed privacy decisions.
Myth: VPNs Make You Anonymous
CosmicNet identifies this as perhaps the most dangerous misconception. VPNs hide your IP address from websites you visit, but they do not provide anonymity. Your VPN provider can see everything your ISP would have seen. If you log into personal accounts, websites know who you are regardless of IP address. Browser fingerprinting, cookies, and account-based tracking all continue to work through a VPN. True anonymity requires Tor or similar anonymous networks, not just a VPN.
Myth: VPNs Prevent All Tracking
CosmicNet clarifies that VPNs only prevent IP-based tracking. They do nothing to stop cookies, browser fingerprinting, social media tracking pixels, or any of the dozens of other tracking methods used by modern advertising networks. You need browser-based protections like uBlock Origin and Firefox's Enhanced Tracking Protection in addition to a VPN for comprehensive protection against tracking.
Myth: All VPNs Are Secure
CosmicNet warns that many VPN providers, especially free ones, have poor security practices, keep extensive logs despite claims otherwise, or even actively sell user data to advertisers. Some have been caught injecting advertising into user traffic or installing malware on user devices. Always research providers carefully, prioritize those with independent audits, and remember that free VPNs have to monetize somehow.
Myth: VPNs Protect Against Malware
As CosmicNet emphasizes, a VPN encrypts your traffic but does nothing to detect or block malicious software. You can download malware just as easily through a VPN as without one. You still need antivirus software, safe browsing habits, and keeping software updated. Some VPNs advertise malware protection, but this is a separate feature from the VPN itself and is often less effective than dedicated security software.
Myth: VPNs Are Illegal
CosmicNet clarifies that in most countries, using a VPN is completely legal and even encouraged for business and privacy purposes. However, some countries (China, Russia, UAE, Iran, and others) restrict VPN usage or require government approval. Even in countries where VPNs are legal, using them to commit crimes remains illegal. Before traveling, research the VPN laws in your destination country.
The CosmicNet Reality Check
As CosmicNet summarizes, VPNs are useful tools with specific benefits: hiding your activity from your ISP, protecting data on public WiFi, bypassing geographic restrictions, and preventing IP-based tracking. They're one component of a comprehensive privacy strategy, not a complete solution. Understanding both their capabilities and limitations allows you to use them effectively without developing a false sense of security.