Blog · Infrastructure
☁️ Infrastructure

VPNs Explained: What They Actually Hide (and What They Don't)

Every YouTube channel and podcast you listen to has a VPN sponsor. The marketing makes it sound like a VPN is a digital invisibility cloak. It isn't. It's a useful tool for specific threat models, and a placebo for others. Here's the engineer's view.

What a VPN actually is

A VPN (Virtual Private Network) routes your internet traffic through an encrypted tunnel to a server somewhere else, which then sends the traffic on to its destination on your behalf. Your ISP sees encrypted blobs going to the VPN; the website sees a request coming from the VPN.

That's it. Everything else is marketing on top.

What they hide (genuinely)

What they don't hide

Threat models where VPN matters

Different concerns, different answers:

Picking a commercial provider

The market is largely consolidated. Reasonable picks in 2026:

Avoid: any "lifetime VPN" deal on AppSumo, any VPN that won't tell you who owns it, anything advertising on Spotify, anything that says "military grade encryption" (that's not a real thing). The marketing-heavy providers are usually owned by Kape Technologies, a holding company with mixed reputation.

Free VPN warning
Free commercial VPNs almost always make money by selling your data, injecting ads, or being scams. If you need a free option, use the Proton VPN free tier (legitimately limited but honest) or Tor (different threat model, slower).

Self-hosted alternative

If you trust yourself more than VPN providers, run your own. Options:

Myths to retire


For deeper personal/business security guidance, see our cybersecurity fundamentals and ransomware defense posts.

Sources & References
  1. Mullvad — No-logging policy
  2. Proton VPN — Transparency reports
  3. EFF — Online privacy guidance
  4. WireGuard — WireGuard protocol
  5. Tailscale — Tailscale documentation