Can I Use a VPN Connection to Avoid Traffic Shaping?

posted on May 5, 2021

tags:

VPN can help you avoid traffic shaping. And may I add, not only your IP, but now a days, the government is also spying on you. And the best solution possible is a VPN.

What's a VPN and how does it work?
A VPN encrypts traffic between two end points on the Internet creating a secure tunnel that does not let any external entity to intervene; note that it has nothing to do with providing access to internet. The regular Internet traffic goes directly from you to the websites (and other resources) you connect to, and back. Your ISP transmits all your Internet packets for you.

What is your ISP capable of?
Everything you do is visible to the ISP. The ISP knows where you are connecting to and can read all your unencrypted traffic. The ISP charges you for the access to internet, which is a must-have if you need to browse online and therefore carries a high price. An ISP can even hack into your computer if he wants to and there's nothing you can do about it.

How would a VPN save you?
A VPN can be referred to as an extension that provides secure browsing over the internet. As described earlier, a secure tunnel won't let your ISP or even the government spy on you or your activities. And if the ISP grows suspicious, then there's feature call Split tunneling available in limited VPNs such as Ivacy VPN. This feature lets you decide what you want to show to your ISP, and what you don't. The activities that you don't want to share with your ISP will stay hidden.

How Can I Make My Network to Be Secure?

posted on May 2, 2021

tags:

If you’re looking for anonimity of data, think of implementing an IpSec VPN.

If you’re looking for network availability, think of redundant links, link controllers, Service Providers redundancy etc

If you’re looking for authentication into the network, think of NAC, or some kind of IAM

If you’re looking for data leak prevention, start implementing some technologies that analyze SMTP and WEB trafic to detect data exfiltration and user behaviour analytics.

Also, it’s good to think of network segmentation using DMZs and VLANs in order to separate network flows that doesn’t need to interact

So it really depends on your needs and your budget.