Professional Documents
Culture Documents
VPN: Privacy and Anonymity For All
VPN: Privacy and Anonymity For All
VPN: Privacy and Anonymity For All
Citations:
-- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and
Conditions of the license agreement available at
https://heinonline.org/HOL/License
-- The search text of this PDF is generated from uncorrected OCR text.
VPN: PRIVACY AND ANONYMITY FOR ALL
John Park*
CITE AS: 2 GEO. L. TECH. REV. 129 (2017)
https://perma.cc/YQ5S-97HQ
INTRODUCTION ........................................................................................................................ 129
C O NC L U SIO N ............................................................................................................................. 13 5
INTRODUCTION
. GLTR Staff Member; Georgetown Law, J.D. expected 2019; Pepperdine University, B.A.
2014. © 2017, John Park.
1 Will Nicol, Everything You Wanted to Know
About VPNs, DIGITAL TRENDS (May 2, 2017,
8:00 AM), https://www.digitaltrends.com/computing/what-is-a-vpn/ [https://perma.cc/27KX-
UHUU].
2 See Digital Disruptors, Cyber Security Is a Business Risk, FORBES (Oct. 11, 2017, 1:06 AM),
https://www.forbes.com/sites/edelmantechnology/2017/10/11/cyber-security-is-a-business-
risk-not-just-an-it-problem/#3f23c6cf7832 [https://perma.cc/SBP7-BUNH].
3 See Adrian Bridgwater, VPNs: The Past, Present, and Future, COMPUTERWEEKLY.COM
(August 2013), https://www.le-vpn.com/history-of-vpn/ [https://perma.cc/YQ7V-ZBWV].
130 GEORGETOWN LAW TECHNOLOGY REVIEW Vol 2:1
VPNs have created connections that are more secure, thereby reducing the risk
of interception or hacks. While early iterations of VPNs suffered from slow
transfer of data and rendered use inefficient, VPNs today are employed for a
wide range of purposes. 4 Businesses, for example, use VPNs to develop
private connections between branch offices, allowing for safe remote access
and improving workforce efficiency.5 Meanwhile, individuals can use VPNs
to anonymize their behavior on the Internet or to access content that is
restricted.
EXPLANATION
4 See id.
5 See What Is a VPN, CIsco.coM, https://www.cisco.com/c/en/us/products/security/vpn-
endpoint-security-clients/what-is-vpn.html [https://perma.cc/L96Q-B2VE].
6 Difference between Client and Server, DIFFERENCE BETWEEN
http://www.differencebetween.info/difference-between-client-and-server
[https://perma.cc/5PN7-9EJW].
7 See Nicol, supra note 1.
8 What Is a Packet?, How STUFF WORKS (Dec. 1, 2000),
http://computer.howstuffworks.com/question525.htm [https://perma.cc/GBK4-53Y8].
2017 GEORGETOWN LAW TECHNOLOGY REVIEW 131
behavior and by extension, others may also gain such access. A VPN
addresses this problem by creating a secure connection where packets cannot
be read by the ISP.
A VPN performs its protective role as one process using three sub-
steps: Authentication, Tunneling, and Encryption.
Authentication
" How VPN works, MICROSOFT TECHNET (updated Mar. 28, 2003),
https://technet.microsoft.com/en-us/library/cc779919(v=ws.10).aspx [https://perma.cc/LLY8-
EGUC].
12 Id.
1 Jim Burns, How 802.lx Authentication Works, COMPUTERWORLD (Apr. 3, 2003, 12:00
AM) https://www.computerworld.com/article/2581074/mobile-wireless/how-802-lx-
authentication-works.html [https://perma.cc/VVH4-6N69].
1 Id.
1 Seth Rosenblatt & Jason Cipriani, Two-Factor Authentication, CNET (June 15, 2015, 1:39
PM), https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/
[http://perma.cc/AN29-P6SY].
2017 GEORGETOWN LAW TECHNOLOGY REVIEW 133
Tunneling
Encryption
RISKS
While a VPN can protect data and a client's privacy, there are some
drawbacks and risks involved. VPNs facilitate anonymity and privacy on the
Internet, but connections to VPNs remain limited by the quality of connection
provided by an ISP.22 Thus, using a VPN to access the Internet will not
change the reliability or performance of an Internet connection. Practically,
because VPNs add another layer of computing, speed and reliability may
actually be less efficient. 23
As mentioned before, a VPN is only as strong as its authentication.
Authentication processes can be subject to social engineering, viruses, and
keylogging. Even if there are complex authentication processes, VPNs can be
vulnerable when users are careless with their device security. 24
LEGAL IMPLICATIONS
CONCLUSION
2N. Madisen, What Are the Disadvantages of a VPN?, WISEGEEK (Oct. 24, 2017),
http://www.wisegeek.org/what-are-the-disadvantages-of-a-vpn.htm [https://perma.cc/LHS2-
GD93].
2 Steven Song, SSL VPN Security, Cisco, https://www.cisco.com/c/en/us/about/security-
center/ssl-vpn-security.html [https://perma.cc/YY89-GD7Y].
2 Harsh Maurya, Are VPNs Legal?, VPN MENTOR, https://www.vpnmentor.com/blog/are-
vpns-legal/ [https://perma.cc/72QW-BDSD].
26 See id.
27 See id.
136 GEORGETOWN LAW TECHNOLOGY REVIEW Vol 2:1