How a VPN Works
Information like your e-mail, passwords and instant messages can be intercepted!
Internet service providers (ISPs) and governments can still obtain a lot of personal information about you in this era of mass surveillance where governments and companies collect, log and store all your online activities resulting in a serious privacy risk even if you’re doing nothing wrong.
What Can BolehVPN Do?
- Establishing an encrypted tunnel between your device and our servers.
- Hiding your true location and IP address.
When you use the internet, a lot of things are transmitted in the clear. What this means is that as they flow through the internet, information like your e-mail, passwords and instant messages can be intercepted if not properly secured!
Even if they are secured so that its contents cannot be viewed, internet service providers (ISPs) and governments can still obtain a lot of personal information about you such as the sites you visit, who you’re communicating with and where it was sent from which is often referred to as ‘metadata‘. In the era of mass surveillance where governments and companies collect, log and store all your online activities, this results in a serious privacy risk even if you’re doing nothing wrong.
Using a VPN such as BolehVPN can reclaim your internet privacy by establishing an encrypted tunnel between your device and our servers. All your internet traffic is not only encrypted, but all your ISP can see is an encrypted connection to our server which means they can no longer gather metadata about you or glean information on your online activities.
Our VPN servers then establish the final end connections to your destination on your behalf so your destination doesn’t see you, only our VPN servers. This means that VPNs also provides a good degree of identity protection from the websites you visit and the people you communicate with by hiding your true location and IP address from them.
As Privacy International put it:
Mass surveillance programmes are premised on one fundamental objective – collect everything. Mine it, exploit it, extrapolate from it; look for correlations and patterns, suspicious thoughts or words, tenuous relationships or connections.
By starting from a position where everyone is a suspect, mass surveillance encourages the establishment of erroneous correlations and unfair suppositions. It enables individuals to be linked together on the basis of information that may be no more than a coincidence – a tube ride shared together, a website visited at the same time, a phone connecting to the same cell tower – and conclusions to be drawn about the nature of those links.
Various Configuration Options
Just select and connect to your desired server!
Unlike other VPN providers that provide only one type of configuration, BolehVPN is unique in that we offer many different configuration options from the super privacy conscious that require military grade encryption to those that want to P2P securely or even speed optimized servers for streaming video from geo-specific websites.
Supported operating systems that can use BolehVPN includes Windows, Linux, Mac, iOS, Android and even routers or Internet of Things (IOT) devices that support VPNs (DD-WRT, Tomato, Asus, Merlin, etc).