I am done with paying for a virtual private network, a service that claims to protect your privacy when you are connected to a public Wi-Fi network at the local coffee shop, the airport or a hotel.
For more than a decade, security experts have recommended using a VPN to shield your internet traffic from bad actors who are trying to snoop on you. But just as tech gadgets become outdated over time, so does some tech advice.
The reality is that web security has improved so much in the past few years that VPN services, which charge monthly subscription fees that cost as much as Netflix, offer superfluous protection for most people concerned about privacy, some security researchers said.
Many of the most popular VPN services are now also less trustworthy than in the past because they have been bought by larger companies with shady track records. That is a deal-breaker when it comes to using a VPN service, which intercepts our internet traffic. If you cannot trust a product that claims to protect your privacy, what good is it?
“Trusting these people is really critical,” Matthew Green, a computer scientist who studies encryption, said about VPN providers. “There’s no good way to know what they’re doing with your data, which they have huge amounts of control over.”
I learned this the hard way. For several years, I subscribed to a popular VPN service called Private Internet Access. In 2019, I saw the news that the service had been acquired by Kape Technologies, a security firm in London. Kape was previously named Crossrider, a company that had been called out by researchers at Google and the University of California for developing malware. I immediately canceled my subscription.
In the past five years, Kape has also bought several other popular VPN services, including CyberGhost VPN, ZenMate and, just last month, ExpressVPN in a $936 million deal. This year, Kape additionally bought a group of VPN review sites that give top ratings to the VPN services it owns.
A Kape spokeswoman said that Crossrider, which has long been shut down, was a development platform that was misused by those who distributed malware. She said Kape’s VPN review sites maintained their independent editorial standards.
“It kind of sets a concerning precedent from the consumer standpoint,” said Sven Taylor, founder of the tech blog Restore Privacy. “As the average user goes online to look for information about the product, do they know that what they’re reading might have been written by the company that owns the end product?”
Here is what you need to know.
What has changed about VPNs
Not long ago, many websites lacked security mechanisms to prevent bad actors from eavesdropping on what people were doing when browsing their sites, which opened doors to their data being hijacked. This helped VPN services become a must-have security product. VPN providers offered to help cloak people’s browsing information by creating an encrypted tunnel on their servers through which all your web traffic passes.
But in the past five years, the internet has undergone immense change. Many privacy advocates and tech companies pushed for website creators to rewrite their sites to support HTTPS, a security protocol that encrypts traffic and solves most of the aforementioned problems.
You have probably noticed the padlock symbol on your web browser. A locked padlock indicates a site is using HTTPS; an unlocked one means it is not and is therefore more susceptible to attack. These days, it is rare to stumble upon a site with an unlocked padlock; 95% of the top 1,000 websites are now encrypted with HTTPS, according to W3Techs, a site that compiles data on web technologies.
This means that VPNs are no longer an essential tool when most people browse the web on a public Wi-Fi network, said Dan Guido, CEO of Trail of Bits, a cybersecurity firm.
“It’s very difficult to find cases where people were harmed by signing on to the airport, coffee shop or hotel Wi-Fi,” he said. These days, he added, the people who benefit from a VPN are those working in high-risk fields and who might be targets, like journalists who correspond with sensitive sources and business executives carrying trade secrets while traveling abroad.
So what to do? Fortunately, most of us can secure ourselves online with basic protections that, unlike VPN services, are free, Guido said.
Importantly, people should keep the software on their devices and web browsers up to date because new software updates include security protections against the latest vulnerabilities, he said.
Another crucial step is setting up online accounts with two-step verification, which requires two forms of verification of your identity before letting you log in. That safeguard can help prevent attackers from gaining access to your data if they obtain your passwords.
For those who would still prefer not to browse the web on a public Wi-Fi network, there is an easy solution included on most smartphones. The personal hot spot, a feature for wirelessly sharing a smartphone’s cellular data connection with other devices, like your computer, can be activated in the phone’s settings. Many phone plans do not charge extra to use this feature, although hotspotting does count against the monthly data allotment in your cellular plan.
How to create your own VPN
I turned to Algo VPN, a free tool developed by Guido that automatically builds a VPN service in the cloud, which shields my browsing activity by allowing me to create a virtual tunnel on an outside server for my internet traffic to pass through.
Following the instructions listed on the Algo VPN project website, I set up a cloud service where my VPN service would be located on Amazon’s web services, a reputable and widely trusted cloud provider. The rest of the steps involved installing some scripts on my computer and typing in commands to generate my VPN.
After about an hour, I set up a VPN that worked flawlessly. The best part? Not only is it free to use, but I no longer have to worry about trust because the operator of the technology is me.