Protect your online privacy with a VPN tunnel
Instant, secure, anonymous VPN tunnels to the uncensored Internet you deserve.
Seven-day 100% money back guarantee.
Make the Internet Great Again with LiquidVPN
Ensure your online anonymity is protected with a VPN tunnel
The Internet has revolutionized the world. Information and commerce are sent across the globe at the speed of light. The open nature of the Internet has governments and corporations fearful that their time is coming to an end. To prolong the inevitable, they censor the Internet and build walls around data that should be free. VPN tunneling changes that by giving you the power to access the entire Internet without borders.
The basics of anonymous browsing
It is important to remember that being 100% anonymous on the web is impossible regardless of the steps you take. There are ways to protect your privacy and access the content you want on the Internet. Whenever you are online you should use a Virtual Private Network. A VPN changes your IP address and your perceived physical location opening up the rest of the web.
LiquidVPN’s privacy and security highlights
What is VPN tunneling?
- It is important to note that in this section we will describe what a VPN tunnel is within the context of a consumer based VPN service that focuses on privacy and security and is running OpenVPN.
A VPN tunnel in its simplest form is data encapsulation. However, there is more to it than that. Here is a simple analogy, imagine a mountain with a train tunnel running through it. The mountain is a lot like the Internet.
A train traveling through the tunnel represents a stream of raw data. It can tunnel through the Internet.
- For your device to initiate the tunnel, it requires authentication to our network. Once that is established each side of the tunnel generates some random source material and then encryption keys are generated from this random data. This method does not use keys bidirectionally. Meaning each side has distinct send, receive, encrypt and decrypt keys.
So authentication, encryption, and encapsulation are the three most important aspects of a VPN tunnel. It is something we take very seriously and have spent countless hours implementing.
You know you should be using a VPN when you…
Browse the web from hostile networks
The Internet presents countless opportunities for criminals to cash in on unsuspecting browsers accidentally leaking personal information. Every Internet access point should be considered hostile.
Are Torrenting and sharing files
Whenever you are torrenting, you should be using a VPN. LiquidVPN supports P2P on every server and never limits or blocks torrents.
Stream blocked or rate-limited content
Net neutrality is dying. ISPs rate limit our favorite content so they can extort money from the content providers. VPNs bypass rate limiting and content blocks.
Three tips for safe, simple, and anonymous web browsing
Enable Liquid Lock
Liquid Lock is the VPN firewall and kill switch. It is not enabled by default. It comes with an automatic mode that can be selected from the Liquid Lock tab in the LiquidVPN client settings.
Select your server
Before you connect, it is important to choose a server that is close to you and has good ping in the LiquidVPN software. For the most anonymity select a server outside of the country you’re in.
Test for data leaks
Once you connect to LiquidVPN, a box is displayed with a “more info” link. Click it and then run the advanced test. If no leaks are detected, it will come back with two all clear messages.