VPN Glossary

VPN Terms
Explained

A comprehensive glossary of VPN, security, and privacy terminology. Understand the technology protecting your online privacy.

A

AES (Advanced Encryption Standard)

Encryption

A symmetric encryption algorithm used by VPNs to secure data. AES-256 is considered unbreakable with current technology.

Authentication

Security

The process of verifying user identity before granting VPN access, typically through username/password, certificates, or tokens.

B

Bandwidth

Performance

The maximum data transfer rate of a network connection, measured in Mbps or Gbps. VPNs may reduce bandwidth due to encryption overhead.

Bridge Mode

VPN

A multi-hop VPN configuration where traffic passes through multiple servers for enhanced privacy.

C

Cipher

Encryption

An algorithm for encrypting and decrypting data. Common VPN ciphers include AES-256-GCM and ChaCha20-Poly1305.

Connection Log

Privacy

Records of when users connect/disconnect from VPN servers. No-log VPNs don't keep these records.

D

DDoS (Distributed Denial of Service)

Security

An attack that overwhelms servers with traffic. VPNs help protect against DDoS by hiding your real IP address.

DNS (Domain Name System)

Network

Translates domain names to IP addresses. DNS leaks can expose browsing activity even when using a VPN.

DNS Leak

Privacy

When DNS queries bypass the VPN tunnel, potentially exposing your browsing activity to your ISP.

Double VPN

VPN

Routing traffic through two VPN servers for additional encryption layers. Also called multi-hop.

E

Encryption

Encryption

The process of converting data into unreadable code to prevent unauthorized access during transmission.

End-to-End Encryption

Encryption

Encryption where only the communicating users can read the messages, with no middleman access.

F

Firewall

Security

A network security system that monitors and controls incoming and outgoing traffic based on security rules.

Five Eyes

Privacy

An intelligence alliance (US, UK, Canada, Australia, New Zealand) that shares surveillance data. VPN jurisdiction matters for privacy.

G

Geo-blocking

VPN

Restricting content access based on geographic location. VPNs can bypass geo-blocks by changing your virtual location.

Great Firewall

Censorship

China's internet censorship system that blocks foreign websites and VPN connections. Advanced obfuscation is needed to bypass it.

H

Handshake

Network

The initial communication between client and server to establish a secure connection, exchanging encryption keys.

HTTP/HTTPS

Network

Hypertext Transfer Protocol (Secure). HTTPS encrypts web traffic, but a VPN adds another encryption layer.

I

IP Address

Network

A unique numerical identifier assigned to each device on a network. VPNs mask your real IP with the server's IP.

IP Leak

Privacy

When your real IP address is exposed despite using a VPN, often through WebRTC or DNS leaks.

ISP (Internet Service Provider)

Network

The company providing your internet connection. Without a VPN, ISPs can see all your online activity.

K

Kill Switch

VPN

A VPN feature that blocks internet access if the VPN connection drops, preventing unprotected traffic.

Key Exchange

Encryption

The process of securely sharing encryption keys between VPN client and server.

L

Latency

Performance

The delay between sending a request and receiving a response, measured in milliseconds. Important for gaming and video calls.

Log Policy

Privacy

A VPN provider's rules about what user data they collect and store. No-log policies mean no activity records.

M

Man-in-the-Middle Attack

Security

An attack where someone intercepts communication between two parties. VPN encryption prevents this.

Mimicry

VPN

OrbVPN's protocol obfuscation feature that disguises VPN traffic as regular HTTPS, Zoom, or other traffic types.

Multi-hop

VPN

Routing VPN traffic through multiple servers sequentially for enhanced privacy and security.

N

NAT (Network Address Translation)

Network

A method of remapping IP addresses. NAT can cause connectivity issues with some VPN configurations.

No-Log Policy

Privacy

A VPN provider's commitment to not record user activity, connection times, or IP addresses.

O

Obfuscation

VPN

Disguising VPN traffic to look like regular HTTPS traffic, helping bypass VPN blocks and deep packet inspection.

OpenVPN

Protocol

An open-source VPN protocol known for security and flexibility. Slower than WireGuard but widely compatible.

OrbConnect

VPN

OrbVPN's proprietary protocol combining WireGuard speed with advanced obfuscation capabilities.

P

Perfect Forward Secrecy (PFS)

Encryption

A feature where new encryption keys are generated for each session, so past communications can't be decrypted if keys are compromised.

Port

Network

A virtual point for network connections. VPNs typically use ports like 443, 1194, or 51820.

Protocol

VPN

The rules and procedures for data transmission. VPN protocols include WireGuard, OpenVPN, and VLESS.

Proxy

Network

An intermediary server that forwards requests. Unlike VPNs, proxies typically don't encrypt traffic.

R

RAM-only Servers

Privacy

Servers that run entirely in volatile memory, ensuring no data persists after reboot.

RSA

Encryption

An asymmetric encryption algorithm commonly used for secure key exchange in VPN connections.

S

Shadowsocks

Protocol

An encrypted proxy protocol designed to bypass internet censorship, often used alongside VPNs.

Split Tunneling

VPN

A VPN feature that lets you route some traffic through the VPN while other traffic uses your regular connection.

SSL/TLS

Encryption

Secure Sockets Layer / Transport Layer Security. Cryptographic protocols for secure internet communication.

T

Throttling

Network

When ISPs intentionally slow down certain types of traffic. VPNs can bypass throttling by hiding traffic type.

Tor

Privacy

The Onion Router, a network for anonymous communication. Can be used with VPNs for additional privacy.

Tunnel

VPN

The encrypted connection between your device and the VPN server through which all traffic passes.

V

VLESS

Protocol

A lightweight protocol similar to VMess but more efficient. VLESS Reality provides advanced obfuscation.

VPN (Virtual Private Network)

VPN

A service that encrypts your internet connection and masks your IP address for privacy and security.

W

WebRTC Leak

Privacy

A browser vulnerability that can expose your real IP address even when using a VPN.

WireGuard

Protocol

A modern VPN protocol known for simplicity, speed, and strong cryptography. Uses only ~4,000 lines of code.

Z

Zero-Knowledge Proof

Encryption

A cryptographic method where one party proves knowledge of something without revealing the information itself.

Jump to Letter

Ready to Put This Knowledge to Use?

Try OrbVPN and experience enterprise-grade security made simple.

Get OrbVPN Free