This article contains dynamic lists that may never be able to satisfy particular standards for completeness. You can help by editing the page to add missing items, with references to reliable sources.
A wide variety of entities provide VPN services for several purposes. Depending on the provider and the application, they do not always create a true private network. Instead, many providers simply provide an Internet proxy that uses VPN technologies such as OpenVPN or WireGuard. Commercial VPN services are often used by those wishing to disguise or obfuscate their physical location or IP address, typically as a means to evade Internet censorship or geo-blocking.
Providers often market VPN services as privacy-enhancing, citing security features, such as encryption, from the underlying VPN technology. However, when the transmitted content is not encrypted before entering the proxy, that content is visible at the receiving endpoint regardless of whether the VPN tunnel itself is encrypted for the inter-node transport. On the client side, configurations intended to use VPN services as proxies are not conventional VPN configurations. However, they do typically utilize the operating system's VPN interfaces to capture the user's data to send to the proxy. This includes virtual network adapters on computer OSes and specialized "VPN" interfaces on mobile operating systems. A less common alternative is to provide a SOCKS proxy interface.
In 2025, 1.75 billion people used VPNs. By 2027, this market has been projected to grow to $76 billion.[1] As of 2022, recommendation websites for VPNs tended to be affiliated with or even owned by VPN service providers, and VPN service providers often make misleading claims on their products.[2]
Reasons for use
While research on user behavior and motivations for using VPNs is relatively limited compared to technical literature,[3][4] studies generally find that users are motivated by concerns over security and privacy,[5][4] particularly protection against hackers.[6][7] In contrast, a study of 349 college students found that students were more likely to use VPNs to access entertainment content than for privacy-related reasons.[5] Another study of 90 technically savvy users reported that those motivated by privacy concerns, rather than by practical needs such as accessing geo-blocked content, were more likely to continue using VPNs over time.[4] Surveys have also found that users tend to distrust free VPN services and express concern about providers collecting or selling their data.[6][5]
VPN usage has also been observed to increase in response to content restrictions,[8][9] social media taxes,[10][11] and the implementation of age verification laws.[12]
Accessing geo-restricted content
VPNs allow users to bypass regional restrictions by hiding their IP address from the destination server and simulating a connection from another country.[citation needed]
Improving privacy on public Wi-Fi
Where public Wi-Fi networks do not provide isolated encryption for each connected device, VPN services can provide a certain level of protection. When in use, potential eavesdroppers on the network can only observe that a connection to the VPN server is made by a user's device.[13] As of June 2025, however, approximately 98% of human-generated internet traffic was encrypted using TLS through the HTTPS protocol;[14] when TLS is used, network eavesdropping can only point out the IP addresses or hostnames a user is connecting to. Interception of network requests by a bad actor in the form of a Man-in-the-middle attack will most likely result in a certificate warning in being displayed in the user's browser.[15]
SSL stripping, the practice of downgrading a connection to unencrypted HTTP,[16][17] doesn't always result in a browser warning,[citation needed] although this has been partly mitigated by the implementation of HTTP Strict Transport Security.[18][19]
Improving privacy
Activists and journalists working in restrictive or authoritarian regions can use VPNs to help maintain anonymity and protect sensitive communications.[20][21]
By geographical region
As of 2025, four of the top six countries of VPN adoption rates from 2020 through the first half of 2025 were in the Middle East: UAE #1, Quatar #2, Oman #5 and Saudi Arabia #6 [22] Aside from bypassing a block of content it is thought that bypassing of restriction of voice over internet protocol (VoIP) services,like WhatsApp, Skype, and FaceTime are motivating factors.[22]
Criticism and limitations
Research has generally found that non-specialist users often have flawed mental models of VPNs and misunderstand the extent of the protection they provide.[6][5][7] Such misconceptions may persist even among active VPN users.[7]
Most users discover VPN services through review websites,[6][4] which can be influenced by commercial incentives, with some relying on paid reviews and auctioning off the top review spot.[6]
Users are commonly exposed to misinformation on the VPN services market, which makes it difficult for them to discern fact from false claims in advertisements.[23] According to research by Consumer Reports, 12 out of 16 surveyed service providers had poor privacy and security practices and also made hyperbolic claims.[24]The New York Times has advised users to reconsider whether a VPN service is worth their money.[25] VPN services are not sufficient for protection against browser fingerprinting.[26] The provider may log the user's traffic, although this depends on the individual company.{{cn]}} Users can still be tracked through tracking cookies even if the user's IP address is hidden.[citation needed]
A VPN service is not in itself a means for good Internet privacy. The burden of trust is simply transferred from the Internet service provider to the VPN service provider.[27][28]
In China, unlawful use of VPNs may result in criminal prosecution under the relatively obscure Supreme People’s Court guidelines: the Criminal Information Technology System Security Offense Adjudicative Guidelines [29] and the Damage to Telecommunications Market Integrity Adjudicative Guidelines.[30]
According to the guidelines, however, the simple use of typical VPN tunnels is not inherently unlawful because it does not achieve the elements of a computer crime, i.e. intrusion or unlawful control of a computer.[29] VPN providers themselves can be prosecuted because providing a type of VPN in a way that severely disrupts the telecommunications market constitutes the offense of unlawful business operations.[30] Additionally, if a VPN is used to commit illegal activities, then its provision could fall under aiding and abetting a crime. This was the logic applied by Chinese police in the widely publicized case involving a Chinese programmer who was penalized on grounds he used an unapproved international connection to provide internet consulting services to a Company for 1,058,000 CNY in unlawful income.[31]
Russia
Russia banned various VPN service providers in 2021.[32] Law No. 276-FZ (2017) requires VPN/anonymizer services to prevent access to sites on the government blacklist; it prohibits owners of virtual private network (VPN) services and internet anonymizers from providing access to websites banned in Russia. The obligation is codified via amendments adding Article 15.8 to the Information Law and enforced by Roskomnadzor.[33]
North Korea
VPN use is subject to a blanket criminal ban protecting the North Korean internet firewall; communication through other countries’ communication networks without approval within the territory of the Republic is not allowed. The 2023 revision of the Radio Wave Control Law also provides penalties including fines and “up to three months of unpaid labor or punishment by labor education.[34]
Iran
VPNs are subject to general criminalization, but with discretion by the government to allow certain permissible uses. Use of filtering-circumvention tools (e.g., VPN services) is prohibited unless legally authorized by permit under the Supreme Council of Cyberspace’s 2024 resolution (cl. 6).[35]
Comparison of commercial virtual private network services
Privacy
In 2018 PC Magazine recommended that users consider choosing a provider based in a country with no data retention laws because that makes it easier for the service to keep a promise of no logging.[36]PC Magazine and TechRadar also suggested that users read the provider's logging policy before signing up for the service,[37] because some providers collect information about their customers' VPN usage.[38][39]
Whether the users' bandwidth is logged while using the service, according to the service's privacy policy.
Diskless
Whether the service's server hardware is connected to hard drives, according to the service provider. If the servers are diskless, the service provider should be unable to log any usage data.
Whether the service has the ability to immediately sever your connection to the Internet in the event that the VPN connection fails. This prevents a user IP address leak.[118]
Logging
Whether the service stores information about their users' connection or activity on the network, according to the service's privacy policy or terms of service. If logging isn't mentioned in those sections but denied somewhere else on the website, the particular table cell will be marked as "No" in yellow and include an explanatory note.
Privacy Impact Score
An indicator of a website's usage of potentially privacy intrusive technologies such as third-party or permanent cookies, canvas trackers etc.[119] The score can be in the range from 0 to 100, where 0 is minimal privacy impact (best) and 100 is the biggest privacy impact (worst) relative to other web sites.[119] The score also has a simplified letter and colour presentation from A to F where A is "No cookies" and F is "Score above three standard deviations from the average".[119] The metric is developed by WebCookies.org.[119]
Obfuscation
Whether the service provides a method of obfuscating the VPN traffic so that it's not as easily detected and blocked by national governments or corporations.[120][121]
↑ Karaymeh, Ashraf; Ababneh, Mohammad; Qasaimeh, Malik; Al-Fayoumi, Mustafa (October 2019). "Enhancing Data Protection Provided by VPN Connections over Open WiFi Networks". 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS). pp.1–6. doi:10.1109/ICTCS.2019.8923104. ISBN978-1-7281-2882-5.
↑ Shahid, Muhammad Azhar; Akram, Urooj; Shahid, Muhammad Mazhar Ali; Samad, Ali; Mushtaq, Muhammad Faheem; Majeed, Rizwan (November 2020). "A Systematic Approach Towards Compromising Remote Site HTTPS Traffic Using Open Source Tools". 2020 IEEE 23rd International Multitopic Conference (INMIC). pp.1–6. doi:10.1109/INMIC50486.2020.9318180. ISBN978-1-7281-9893-4.
↑ Bramwell, Phil (2018). Hands-on penetration testing on Windows: unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis: Packt Publishing. ISBN978-1-78829-509-3.
↑ Athow, Desire (13 January 2018). "The best VPN services for 2018". TechRadar. How to test a VPN. Archived from the original on 17 January 2018. We were looking for features, value, and clear and honest pricing. Free ways to learn more about a service - free plans, trial periods, refund periods - were important, and we also looked for companies which maintained your privacy when you signed up (no email address required, trials available without credit cards, Bitcoin available as a payment option).
↑ NordVPN. "Frequently Asked Questions (FAQ)". Do you offer socks5 proxies?. Archived from the original on 13 January 2017. Yes, we do support Socks5 proxies as well as HTTP proxies (1 HTTP and Socks5 proxy at each of our VPN server destinations).
↑ "Why can't I send email when on the VPN? / Private Internet Access". 31 October 2017. Archived from the original on 27 December 2017. Retrieved 27 December 2017. Any VPN provider that does not retain logs must block outgoing SMTP traffic due to rampant spam associated with usage of VPN services. With that said, we can whitelist (allow) any outgoing email server that a) require authentication, and b) is correctly setup so as not to be an open relay.
↑ "PureVPN P2P File Sharing - Break P2P barriers anonymously!". 8 July 2014. Archived from the original on 3 January 2018. Furthermore, we have blocked P2P on some of our servers as per changing Global Web Policy. We don't allow p2p/filesharing where it's illegal by law named United Kingdom (UK), United States (US), Canada, Australia etc.
↑ "PureVPN Servers". Virtual Servers and When you Should Use them?. 11 November 2017. Archived from the original on 4 January 2018. PureVPN has never denied using virtual servers. To make matters simpler, an update on our Server Location page will state which servers are virtual and which are physical.
↑ "TunnelBear DNS: Protecting Your Privacy and Mauling DNS Leaks". 22 June 2017. Archived from the original on 28 December 2017. Every time you connect to TunnelBear, your DNS requests are directed to TunnelBear DNS servers, so your ISP can no longer see what websites you're visiting. And because we don't keep any records of your DNS, you're the only one that knows your browsing history.
↑ "GhostBear: How to Hide Your VPN From DPI". 18 July 2017. Archived from the original on 28 December 2017. When you turn GhostBear on, it changes your VPN traffic signature to look like a different kind of traffic. To do this, GhostBear uses a technology called Obfsproxy.
1 2 "Hotspot Shield Privacy Frequently Asked Questions / Hotspot Shield". How does Hotspot Shield secure my Internet connection?. Archived from the original on 28 December 2017. Retrieved 28 December 2017. Turning Hotspot Shield on encrypts all of the traffic between your device and our servers using TLS 1.2 with perfect forward secrecy (ECDHE), 128-bit AES data encryption.
↑ "AnchorFree Hotspot Shield Privacy Policy". Security. 29 November 2017. Archived from the original on 28 December 2017. We encrypt all of the traffic between your device and our servers using TLS 1.2 with perfect forward secrecy (ECDHE), 128-bit AES data encryption, and HMAC message authentication.
This page is based on this Wikipedia article Text is available under the CC BY-SA 4.0 license; additional terms may apply. Images, videos and audio are available under their respective licenses.