VPNs or Virtual Private Networks as Fast As Possible

Techquickie ·Techquickie ·2015-05-07 · 876 words · ~4 min read
Floatplane YouTube

Transcript

JSON SRT VTT 67
0:00 virtual private networks or vpns for short are used today for many reasons
0:05 but all of them fall under the same general umbrella securely connecting an
0:10 individual client off in a PC to a larger server or provider now in the
0:15 past these types of connections were mostly used in business settings when a
0:19 large employer wishes to allow employees access to a secured internal network
0:23 over the Internet while working from home or in the field but it's becoming
0:28 more and more common now to see them used by even small businesses or even
0:32 individuals who for a range of reasons wish to keep their activities online
0:37 secure and private reasons that range from the completely understandable to
0:41 the legally Andor morally gray to the downright paranoid and delusional now
0:46 the first step of the security process for a VPN involves creating a tunnel
0:51 protocol which acts as well a tunnel or
0:54 conduit for the information packets being transferred to pass through it
0:58 creates a security layer which instantly terminates the connection whenever it
1:02 detects an intrusion and then reconnects the client back to the server using a
1:07 different route avoiding the compromised Point points or the entire previous
1:11 route alt together the next time around some Services even utilize highly
1:16 specified Roots which they consider to be lower risk than other ones usually
1:21 based on some sort of internally established metrics or a working
1:24 partnership with the operator now inside this protective hard chocolate tunnel is
1:30 where the gooey caramel and nougat Center or data can be found this data is
1:35 also encrypted as one might expect but on top of this further efforts are made
1:39 to ensure that the contents of one's email don't become public Sony anyone
1:45 Beyond standard encryption nonlinear transfer methods such as utilizing
1:49 multiple routes for the traffic or the introduction of dummy code into the
1:53 information packet prevents prying eyes from seeing anything but a small garbled
1:59 slice of the overall Pi so to summarize
2:02 the way a VPN security works I'll turn this into a classic analogy it's like a
2:06 taco inside a taco within a Taco Bell that's inside a KFC within a mall that's
2:10 inside your brain Okay then lonus if
2:13 data transfers happen in basically the same way that all other internet traffic
2:17 does while offering a tremendously higher level of personal protection and
2:21 the ability to access secure networks from abroad then there's no downside
2:25 right let's just use them all the time well actually basically yeah VP are
2:30 super cool but come on man these videos are pretty much a formula at this point
2:34 you know the other shoe was going to drop although some VPN companies have
2:38 made utilizing their service as easy as double clicking the correct icon and
2:42 beginning to Surf and they're getting more affordable than ever some pages and
2:46 services might not work correctly over a VPN and content loading performance can
2:51 be affected as well since encryption efforts coupled with what can be
2:54 considered less direct routes can lead to a slower overall experience in many
2:59 cases though this can be solved quite easily by keeping another stock web
3:03 browser installed on your computer for non-mission critical use and it's also
3:07 worth noting that many VPN users actually report faster speeds on certain
3:12 popular sites such as YouTube at peak times presumably because their traffic
3:16 is avoiding some of the congestion seen along the other traditional routes there
3:20 are some other less easily addressed problems too though in buildings with
3:23 shoddy wiring packet loss can look like the network is compromised causing the
3:28 connection to be continually dropped and reestablished and another is the widely
3:33 reported one where the NSA in the United States has actually been known to flag
3:37 accounts for using keywords related to accessing these Services meaning that
3:42 seeking out extra security could potentially open one up to intrusion
3:47 speaking of intrusion Dollar Shave Club you know the guys that walk past you
3:51 while you poop kick the door open to your stall while you poop and bother you
3:55 while you're nugget mining in poop well
3:58 there today's episode sponsor they offer affordable and highquality bathroom
4:02 supplies razor handles razor blades butt wipes for men shaving butter aftershave
4:07 you name it as long as what you name is one of the things I just mentioned and
4:10 they'll ship that stuff to your door once a month so you don't have to leave
4:14 your house to be as well groomed as your friends who do save time and save money
4:18 today by joining up at dollarshaveclub.com Linus thanks to
4:23 Dollar Shave Club for sponsoring this episode thanks to you guys for watching
4:26 like this video if you liked it dislike it if you thought it sucked leave a comment if you have suggestions for
4:29 future fast as possible episodes just like this one and a shout out to another
4:34 new writer who wrote today's episode I did make some tweaks but uh yeah let us
4:38 know what you think of new writer number two oh and don't forget to subscribe if
4:43 you haven't already