Your IP: 107.22.102.16
Your Location: United States, Ashburn
Your Status: Unprotected
Protect Me

VPN protocols

Ready to use a VPN service? Then you need to learn some info about VPN protocols to make sure your VPN provider gives you the top online protection and security.

Let’s start with the definition. A VPN protocol refers to a set of processes that VPN providers use to ensure you get a secure and fast connection to VPN servers and back. Simply stated, it is a method by which your device connects to a VPN server.

VPN Unlimited offers a variety of protocols, each with unique capabilities and strengths. Consider what protocols your device supports, and whether any of them are blocked by your network. Then, choose the one with a balance between security, online freedom, and speed that is best suited to your needs.

By default, VPN Unlimited uses the optimal protocol for your network, but you can also configure your app to use other protocols. Just choose the one you would like to try in your VPN settings. Here is a chart with all possible options that are currently available:

Platform Protocol by default Options
Windows, Android OpenVPN KeepSolid Wise via TCP
iPhone, iPad IKEv1 KeepSolid Wise via TCP
macOS IKEv1 Profile installation mode
Windows Phone L2TP/IPsec PPTP
Linux OpenVPN KeepSolid Wise via TCP
Google Chrome, Mozilla Firefox TLS encryption ----

You don’t need to settle for just using a single VPN protocol. For instance, if you are only using a VPN to watch geo-blocked videos or access websites from another country, in this case PPTP can be really useful. And if your target is to keep yourself secure, go for OpenVPN.

Encryption

According to Edward Snowden, “properly implemented strong crypto systems are one of the few things that you can rely on.” This means that the encryption does work.

The encryption itself is a process of encoding messages or information that makes sense in such a way that only authorized parties can read it. For interceptors, the encoded message looks like gibberish. The commonly used encryption methods are 128-bit and 256-bit (in a key length). They are considered to be of military level, and are widely used by the US government to protect their “sensitive” data.

Note: Generally, 128-bit encryption is uncrackable through brute force, and it is believed to be so for another hundred years or so. However, taking into account the scale of resources that the NSA seems to have thrown at cracking encryption, it is a good practice to upgrade cipher key lengths to 256-bit. This key would require twice as much computational power to break it as a 128-bit one.

VPN Unlimited uses both methods, depending on the protocol and operating system, to ensure the best security and performance.

If you are interested in learning more about encryption methods, here are our blog posts that will help you to dig deeper into this topic:

Ciphers

A cipher is a mechanical operation, known as an algorithm, and used for performing the encryption or decryption of a certain information, such as video files, images, or simple messages. The encrypting/decrypting procedure depends on the key, a piece of auxiliary information which changes the detailed operation of the algorithm.

VPN Unlimited uses AES cipher that, today, is generally considered to be the most secure cipher for the VPN use, as well as for all other applications that now exist. It is highly efficient on a wide variety of hardware, from smartphones and tablets, to high-performance computers.

With the AES cipher together with the 128-bit or 256-bit key, VPN Unlimited makes our users strongly protected and secured while they are surfing the web.