VPN Terms
Explained
A comprehensive glossary of VPN, security, and privacy terminology. Understand the technology protecting your online privacy.
A
AES (Advanced Encryption Standard)
EncryptionA symmetric encryption algorithm used by VPNs to secure data. AES-256 is considered unbreakable with current technology.
Authentication
SecurityThe process of verifying user identity before granting VPN access, typically through username/password, certificates, or tokens.
B
Bandwidth
PerformanceThe maximum data transfer rate of a network connection, measured in Mbps or Gbps. VPNs may reduce bandwidth due to encryption overhead.
Bridge Mode
VPNA multi-hop VPN configuration where traffic passes through multiple servers for enhanced privacy.
C
Cipher
EncryptionAn algorithm for encrypting and decrypting data. Common VPN ciphers include AES-256-GCM and ChaCha20-Poly1305.
Connection Log
PrivacyRecords of when users connect/disconnect from VPN servers. No-log VPNs don't keep these records.
D
DDoS (Distributed Denial of Service)
SecurityAn attack that overwhelms servers with traffic. VPNs help protect against DDoS by hiding your real IP address.
DNS (Domain Name System)
NetworkTranslates domain names to IP addresses. DNS leaks can expose browsing activity even when using a VPN.
DNS Leak
PrivacyWhen DNS queries bypass the VPN tunnel, potentially exposing your browsing activity to your ISP.
Double VPN
VPNRouting traffic through two VPN servers for additional encryption layers. Also called multi-hop.
E
Encryption
EncryptionThe process of converting data into unreadable code to prevent unauthorized access during transmission.
End-to-End Encryption
EncryptionEncryption where only the communicating users can read the messages, with no middleman access.
F
Firewall
SecurityA network security system that monitors and controls incoming and outgoing traffic based on security rules.
Five Eyes
PrivacyAn intelligence alliance (US, UK, Canada, Australia, New Zealand) that shares surveillance data. VPN jurisdiction matters for privacy.
G
Geo-blocking
VPNRestricting content access based on geographic location. VPNs can bypass geo-blocks by changing your virtual location.
Great Firewall
CensorshipChina's internet censorship system that blocks foreign websites and VPN connections. Advanced obfuscation is needed to bypass it.
H
Handshake
NetworkThe initial communication between client and server to establish a secure connection, exchanging encryption keys.
HTTP/HTTPS
NetworkHypertext Transfer Protocol (Secure). HTTPS encrypts web traffic, but a VPN adds another encryption layer.
I
IP Address
NetworkA unique numerical identifier assigned to each device on a network. VPNs mask your real IP with the server's IP.
IP Leak
PrivacyWhen your real IP address is exposed despite using a VPN, often through WebRTC or DNS leaks.
ISP (Internet Service Provider)
NetworkThe company providing your internet connection. Without a VPN, ISPs can see all your online activity.
K
Kill Switch
VPNA VPN feature that blocks internet access if the VPN connection drops, preventing unprotected traffic.
Key Exchange
EncryptionThe process of securely sharing encryption keys between VPN client and server.
L
Latency
PerformanceThe delay between sending a request and receiving a response, measured in milliseconds. Important for gaming and video calls.
Log Policy
PrivacyA VPN provider's rules about what user data they collect and store. No-log policies mean no activity records.
M
Man-in-the-Middle Attack
SecurityAn attack where someone intercepts communication between two parties. VPN encryption prevents this.
Mimicry
VPNOrbVPN's protocol obfuscation feature that disguises VPN traffic as regular HTTPS, Zoom, or other traffic types.
Multi-hop
VPNRouting VPN traffic through multiple servers sequentially for enhanced privacy and security.
N
NAT (Network Address Translation)
NetworkA method of remapping IP addresses. NAT can cause connectivity issues with some VPN configurations.
No-Log Policy
PrivacyA VPN provider's commitment to not record user activity, connection times, or IP addresses.
O
Obfuscation
VPNDisguising VPN traffic to look like regular HTTPS traffic, helping bypass VPN blocks and deep packet inspection.
OpenVPN
ProtocolAn open-source VPN protocol known for security and flexibility. Slower than WireGuard but widely compatible.
OrbConnect
VPNOrbVPN's proprietary protocol combining WireGuard speed with advanced obfuscation capabilities.
P
Perfect Forward Secrecy (PFS)
EncryptionA feature where new encryption keys are generated for each session, so past communications can't be decrypted if keys are compromised.
Port
NetworkA virtual point for network connections. VPNs typically use ports like 443, 1194, or 51820.
Protocol
VPNThe rules and procedures for data transmission. VPN protocols include WireGuard, OpenVPN, and VLESS.
Proxy
NetworkAn intermediary server that forwards requests. Unlike VPNs, proxies typically don't encrypt traffic.
R
RAM-only Servers
PrivacyServers that run entirely in volatile memory, ensuring no data persists after reboot.
RSA
EncryptionAn asymmetric encryption algorithm commonly used for secure key exchange in VPN connections.
S
Shadowsocks
ProtocolAn encrypted proxy protocol designed to bypass internet censorship, often used alongside VPNs.
Split Tunneling
VPNA VPN feature that lets you route some traffic through the VPN while other traffic uses your regular connection.
SSL/TLS
EncryptionSecure Sockets Layer / Transport Layer Security. Cryptographic protocols for secure internet communication.
T
Throttling
NetworkWhen ISPs intentionally slow down certain types of traffic. VPNs can bypass throttling by hiding traffic type.
Tor
PrivacyThe Onion Router, a network for anonymous communication. Can be used with VPNs for additional privacy.
Tunnel
VPNThe encrypted connection between your device and the VPN server through which all traffic passes.
V
VLESS
ProtocolA lightweight protocol similar to VMess but more efficient. VLESS Reality provides advanced obfuscation.
VPN (Virtual Private Network)
VPNA service that encrypts your internet connection and masks your IP address for privacy and security.
W
WebRTC Leak
PrivacyA browser vulnerability that can expose your real IP address even when using a VPN.
WireGuard
ProtocolA modern VPN protocol known for simplicity, speed, and strong cryptography. Uses only ~4,000 lines of code.
Z
Zero-Knowledge Proof
EncryptionA cryptographic method where one party proves knowledge of something without revealing the information itself.
Ready to Put This Knowledge to Use?
Try OrbVPN and experience enterprise-grade security made simple.
Get OrbVPN Free