More stories

  • in

    Netgear Q4 rides Wi-Fi router, mesh networking upgrade cycle

    Netgear saw a 45% sales surge in the fourth quarter amid strong demand for new Wi-Fi 6 routers and mesh networking gear.
    The company reported fourth quarter earnings of 99 cents a share on revenue of $367.1 million, up 45% from a year ago. For 2020, Netgear reported earnings of $1.90 a share on revenue of $1.26 billion, up 25.7% from a year ago.
    Wall Street was looking for fourth quarter non-GAAP earnings of 84 cents a share on revenue of $346.3 million.
    Mesh networking vs. traditional Wi-Fi routers: What is best for your home office? | Remote work: 10 ways to upgrade your working from home setup
    Netgear CEO Patrick Lo said demand for its premium networking products is strong amid remote work and school arrangements during the COVID-19 pandemic. Lo said there is “rapid growth of a new premium segment that is defined by a Wi-Fi 6 mesh system with tri-band architecture.” Netgear, which is layering services on top of its hardware, also added 68,000 paid subscribers in the fourth quarter to end with 437,000.
    Recent products include:
    Netgear saw connected home sales surge 60% in the fourth quarter and SMBs were going for the company’s ProAV and work-from-home gear.

    As for the outlook, Netgear said first quarter revenue will be between $300 million and $315 million with non-GAAP operating margins between 8% and 9%. Netgear said there remains a lot of uncertainty in the market as well as transportation delays at its Southern California main distribution center.
    For the first quarter, Wall Street analysts were modeling revenue of $313.3 million.

    ZDNet Home Office Tours More

  • in

    The open-source Magma project will become 5G's Linux

    5G is one part hardware, one part standards — oh so many 5G standards, and one part software. Indeed, it wasn’t for 5G’s open-source technologies, 5G wouldn’t have gotten off the ground. Now, the software and hardware sides of 5G are getting closer together than ever with the cellular core, network software open-source stack Magma.

    Magma was developed by Facebook to help telecom operators deploy mobile networks quickly and easily. The project, which Facebook open-sourced in 2019, does this by providing a software-centric distributed mobile packet core and tools for automating network management. This containerized network function integrates with the existing back end of a mobile network and makes it easy to launch new services at the network edge.
    Magma operators can build and augment modern and efficient mobile networks at scale. It integrates with existing LTE and newly minted 5G networks. Several Magma community members are also collaborating in the Telecom Infra Project (TIP)’s Open Core Network project group. The plan is to define, build, test, and deploy core network products that integrate Magma with TIP Open Core disaggregated hardware and software solutions.
    The Linux Foundation will help oversee this new stage in Magma’s organizational future. Magma will be managed under a neutral governance framework at the Linux Foundation. Arm, Deutsche Telekom, Facebook, FreedomFi, Qualcomm, the Institute of Wireless Internet of Things at Northeastern University, the OpenAirInterface(OAI)  Software Alliance, and the Open Infrastructure Foundation (OIF). 
    You may ask, since Magma is already working with OIF, which is something of a Linux Foundation rival, why Magma will be working with both? Arpit Joshipura, the Linux Foundation’s general manager of Networking, Edge, and IoT, explained, “Magma has gotten great community support from several ecosystem players and foundations including OIF, OAI etc. What we are announcing today is the next evolution of the project where the actual hosting of the project is being set up under the Linux Foundation with neutral governance that has been accepted by the community for a long time. OIF, OAI, and LF will work with their communities of Software Developers to contribute to Magma’s core project.”
    Even if you’re already involved in 5G development and deployment you may not know much about Magma. You will. Joshipura said, “Magama provides application functions like Mobile Core that are complementary to existing telecom and edge open-source software like Open Network Automation Platform (ONAP) or Akraino.” 
    Magma will provide these features : 

    Allow operators to expand capacity and reach by using LTE, 5G, Wi-Fi, and Citizens Broadband Radio Service (CBRS).

    Allowing operators to offer cellular service without vendor lock-in with a modern, open-source core network.

    Enabling operators to manage their networks more efficiently with more automation, less downtime, better predictability, and more agility to add new services and applications.

    Enabling federation between existing mobile network operators (MNO)s and new infrastructure providers to augment mobile network infrastructure more efficiently.

    Supporting open source 5G technology and incubating future wireless network use cases like Private 5G,  Integrated Access Backhaul (IAB), Augmented Networks, and Non-Terrestrial Networks (NTN).

    Boris Renski, co-founder and CEO of FreedomFi, which uses Magma to enable anyone to build low cost, private, long-range, reliable, and secure 4G LTE and 5G networks, loves this plan. “We’ve been contributing to Magma upstream and doing customer deployments for over a year now and have built 20+ Private LTE networks using Magma.”
    Renski sees “Magma turning into what we believe is quickly becoming the Linux of the telecom network cores.” Further, “With industry giants like Arm and Qualcomm joining the effort and helping ensure compatibility of Magma with their platforms, we expect that other radio access network (RAN) and OSS vendors will rally around the effort to help further accelerate adoption.”
    Qualcomm believes this is happening too. Douglas Knisely, Qualcomm engineer, principal said, “Qualcomm strongly supports the evolution of the Magma core network efforts into a broader coalition among the key founding and contributing projects. This effort builds on the collaboration activities and code contributions from OAI into the Magma project and promotes the harmonization of a common 5G Core Network reference architecture, internal structure, APIs, and interfaces for all of the emerging 5G open source projects in the industry.”
    It’s not just vendors that see Magma’s potential. “Magma is one of the most exciting projects I’ve seen in years. In our world, connectivity is directly linked to progress, and Magma’s mission to improve network access for the under-connected is inspiring and meaningful,” said Jonathan Bryce, the OIF’s Executive Director.
    Want to get involved? You can join Magma at its Github. 5G’s future is waiting for you.
    Related Stories: More

  • in

    What is a VPN and how does it work? Your guide to internet privacy and security

    Whether you’re in corporate office or home office, on the road or in your home, a VPN is one of the best ways to protect yourself on the internet. How effective are VPNs? What’s the best one for you? What are the downsides? Our executive guide will answer all your VPN-related questions — including a few you probably haven’t thought to ask.
    Also: Best VPN services for 2021: Safe and fast don’t come for free
    What is a VPN?
    VPN is an acronym for Virtual Private Network. The purpose of a VPN is to provide you with security and privacy as you communicate over the internet.
    Here’s the problem with the internet: It’s inherently insecure. When the internet was first designed, the priority was to be able to send packets (chunks of data) as reliably as possible. Networking across the country and the world was relatively new, and nodes often went down. Most of the internet’s core protocols (methods of communicating) were designed to route around failure, rather than secure data.
    The applications you’re accustomed to using, whether email, web, messaging, Facebook, etc., are all built on top of that Internet Protocol (IP) core. While some standards have developed, not all internet apps are secure. Many still send their information without any security or privacy protection whatsoever.
    This leaves any internet user vulnerable to criminals who might steal your banking or credit card information, governments who might want to eavesdrop on their citizens, and other internet users who might want to spy on you for a whole range of nefarious reasons.
    A VPN creates a private tunnel over the open internet. The idea is that everything you send is encapsulated in this private communications channel and encrypted so — even if your packets are intercepted — they can’t be deciphered. VPNs are very powerful and important tools to protect yourself and your data, but they do have limitations.
    How does a VPN work?

    Let’s start with the basic idea of internet communication. Suppose you’re at your desk and you want to access a website like ZDNet. To do this, your computer initiates a request by sending some packets. If you’re in an office, those packets often travel through switches and routers on your LAN before they are transferred to the public internet through a router.
    Once on the public internet, those packets travel through a bunch of computers. A separate request is made to a series of name servers to translate the DNS name ZDNet.com to an IP address. That information is sent back to your browser, which then sends the request, again, through a bunch of computers on the public internet. Eventually, it reaches the ZDNet infrastructure, which also routes those packets, grabs a web page (which is a bunch of separate elements), and sends all that back to you.
    Each internet request usually results in a whole series of communication events between multiple points. The way a VPN works is by encrypting those packets at the originating point, often hiding not only the data but also the information about your originating IP address. The VPN software on your end then sends those packets to the VPN server at some destination point, decrypting that information.
    One of the most important issues in understanding the limits of VPNs is understanding where the endpoint of the VPN server resides. We’ll talk about that next.
    What are the two main types of VPNs?
    Most of us are familiar with the concept of a LAN, a local area network. That’s the private network inside of one physical location — be it a home, a corporate building, or a campus. But many businesses don’t run out of one location. They have branch offices, departments, and divisions that are geographically dispersed.
    In many cases, each of these offices also has LANs. But how do the LANs connect? For some very specialized solutions, companies lease private lines to connect the offices. That can be very expensive. Instead, most companies opt to geographically connect separated private LANs over the public internet. To protect their data, they set up VPNs between offices, encrypting the data as it traverses the public internet.
    This is corporate or enterprise VPN, and it’s characterized by the same organization controlling both endpoints of the VPN. If your company controls the originating point (say a sales office) and the endpoint (like a VPN server at your corporate HQ), you can be quite well assured (unless there’s a bug) that your data is securely transmitted.
    The second type of VPN is a consumer VPN. This is for those of you who compute in hotels or at coffee shops and connect to web applications like social networks, email, banks, or shopping sites. Consumer VPN services help ensure that those communications are protected.
    What does a consumer VPN service do?
    A consumer VPN service is, fundamentally, a software-as-a-service (SaaS) offering. The VPN service provides a secure tunnel between your computing device (whether laptop, phone, or tablet) and the provider’s data center.
    This is important to understand. Consumer VPN services protect your transmission from your location to their location, not from your location to the destination application you’re using. If you think about it, this makes sense: A consumer VPN service is operated by a completely different company than, for example, Facebook or your bank.
    The VPN service gives you an app that you run on your local device, which encrypts your data, and it travels in its encrypted form through a tunnel to the VPN service provider’s infrastructure. At that point, the data is decrypted and sent on its way.
    Two things happen here: First, if you’re using an https connection, your data is encrypted by your browser and then by your VPN app. At the VPN data center, your data is decrypted only once, leaving the original encryption provided by the browser intact. That encrypted data then goes on to the destination application, like your bank.
    The second thing that happens is that the web application you’re talking to does not get to see your IP address. Instead, it sees an IP address owned by the VPN service. This allows you some level of anonymous networking. This IP spoofing is also used to trick applications into thinking you’re located in a different region or even a different country than you are located in. There are reasons (both illegal and legal) to do this. We’ll discuss that in a bit.
    When should I use a VPN?

    We’ve already discussed the use of a VPN when connecting offices. Any time you have two LANs that need to link over the public internet, you should consider using VPN technology or an equivalent method of enterprise protection. In this case, the VPN software will probably run in a router, a server, or a dedicated VPN server hardware appliance.
    We talked about two use cases above for consumer VPN services: Protecting your data and spoofing your location. We’ll talk more about location spoofing later, so let’s just focus on data protection for now.
    When you’re away from home or the office and you connect to the internet, you’ll most often be doing so via Wi-Fi provided by your hotel or the restaurant, library, or coffee shop you’re working out of at that moment. Sometimes, Wi-Fi has a password. Other times, it will be completely open. In either case, you have no idea who else is accessing that network, and therefore, you have no idea who might be snooping on your traffic.
    I recommend always using a VPN when using someone else’s Wi-Fi network. Here’s a good rule of thumb: If you’re away from the office or home, and you’re using someone else’s Wi-Fi (even that of a family member or a friend, because you never know if they’ve been compromised), use a VPN. It’s particularly important if you’re accessing a service that has personally-identifying information. Remember, a lot goes on behind the scenes, and you never really know if one or more of your apps are authenticating in the background and putting your information at risk.
    Another reason you might choose to use a VPN is if you have something to hide. This isn’t just about folks doing things they shouldn’t do. Sometimes people really need to hide information. Take, for example, the person who is worried he or she might be discriminated against by an employer because of their sexual orientation or medical condition. Another example is a person who needs to go online but is concerned about revealing location information to a person in their life who might be a threat.
    And then, of course, there are those people in restrictive countries who need to hide their activity merely to gain access to the internet without potentially grave penalties.
    Are the free VPN services any good?
    There are some good free VPN services, but I avoid all free VPNs.
    Why? It costs quite a lot to provide the infrastructure to operate a VPN service, from the network pipes to the servers. That infrastructure has to be paid for somehow. If it’s not paid for by user fees, it’s likely to be paid for by advertising, data gathering, or some nastier reason.
    Here’s another reason not to use a free service, and this one is a lot scarier: Malware providers and criminal organizations have set up free VPN services that not only don’t protect you but actively harvest personal information and either use it or sell it to the highest bidder. Instead of being protected, you’re being plundered.
    What’s the best way to choose a VPN service?
    To be fair, not all pay VPN services are legitimate, either. It’s important to be careful about which you choose. I’ve put together an always up-to-date directory of quality VPN providers. Some are better than others (and that’s reflected in their ratings). But all are legitimate companies that provide quality service.
    Beyond my directory, it’s always good practice to Google a company or product name and read the user reviews. If you see a huge number of old complaints or new complaints suddenly start showing up, it might be that there’s been a change of management or policies. When I’m looking for a service, I always base my decision partially on professional reviews and partially based on the tone of user reviews.
    Finally, be sure to choose a service with the capabilities that meet your needs. You may need one or more features only provided by certain services. So, think through your needs as you make a decision.
    Can a VPN guarantee my privacy?
    Oh, heck no. A VPN can help make sure you’re not snooped on when connecting between your computer and a website. But the website itself is quite capable of some serious privacy violations. For example, a VPN can’t protect you against a website setting a tracking cookie that will tell other websites about you. A VPN can’t protect you against a website recording information about products you’re interested in. A VPN can’t protect you against a website that sells your email address to list brokers. Yada, yada, yada.
    A VPN does help protect you in the situations we’ve discussed in previous sections. But don’t expect a VPN to be a magical privacy shield that will keep everything you do private and confidential. There are many, many ways your privacy can be compromised, and a VPN will be of only partial help.
    Also: A VPN will not save you from government surveillance
    Will VPN software slow down my computer?
    That would be a definite maybe. Here’s the thing: Back in the day, the process of encrypting and decrypting packets would take a toll on CPU performance. Most current CPUs are now fast enough that most crypto algorithms can run without much of an impact on processor performance.
    However, network performance is another thing entirely. First, keep in mind that if you’re using a VPN, you’re probably using it at a public location. That public Wi-Fi service is likely to range in performance somewhere between “meh” and unusable. So, just the fact that you’re remotely working on a mediocre network will reduce performance. But then, if you connect to a VPN in a different country, the connection between countries is also likely to degrade network performance. Server locations matter.
    My rule of thumb is to use a domestic VPN and connect to servers as close to my location as possible. That said, I have had good nights and bad nights getting online. In my recent trip, I found most hotels’ networks to become unusable after about 9pm. My theory is that many of the guests were watching Netflix at that time, completely clogging the hotels’ pipes.
    Also: How to use a VPN to protect your internet privacy
    Do VPN service providers limit usage and how?
    Some do. Some don’t. Look at that directory I mentioned earlier because that’s one of the factors where a service might lose some points.
    Some VPN services will limit the total amount of data you can send and receive, either in one connection session or over a month. Other VPN services will limit the speed of the data, effectively sharing less of their pipe with you than might be optimal. That could slow your browsing experience to a crawl or completely prevent you from watching streaming video.
    Usually, it’s the free services that throttle your usage in these ways. Some paid services will offer a trial, where you can transmit up to a certain data cap before being asked to sign up as a paying customer. That’s actually pretty cool because it gives you a chance to try out the performance of their service before paying, but it also gives the vendor a chance to make the money necessary to operate the service.
    Many VPN services claim that if you pay their fee, they’ll provide you unlimited data transmission and won’t throttle your speeds. Generally, this is true, but I’ll give you my standard “unlimited bandwidth” warning: It’s been my experience that when a vendor says something is “unlimited,” it’s almost always limited. Somewhere, there will be a note in the fine print or terms of service that allows the vendor to limit you in some way. It pays to read those agreements.
    Also: Why free VPNs are not a risk worth taking

    How private are VPNs? Do they log everything I do?
    In my VPN directory, I tracked two types of logging. The first is whether they log traffic, DNS requests, and IP addresses. This is pretty nasty stuff. If a VPN service logs this, they would have the information you might choose to hide, like sites you visit, locations where you are, and possibly even information you might be sending.
    Although the use of these services will still protect you from Wi-Fi spies in your hotel or restaurant, I can’t recommend signing up for any service that does DNS, traffic, or IP logging. There are better, more private options.
    The second type of logging is more benign. VPN services that log bandwidth usage and connection timestamp data usually do so either to tune their own systems or manage any abuse of their services.
    I have less of a concern with services that just monitor bandwidth usage, as long as they don’t store any specifics. That said, we gave top marks to those services that don’t do any logging. When I choose a VPN service, those are the services I pick for my use.
    What do net neutrality changes mean for my VPN usage?
    Net neutrality has been severely under fire in the US. The Federal Communications Commission (FCC) has eliminated many of the consumer protections against internet service providers (ISPs) harvesting traffic data and selling that data to advertisers, or worse. 
    This could be bad. I’m not terribly concerned if Comcast discovers my secret passion for muscle cars and I get more ads for car customizing kits. It might be annoying, but I’m not doing anything I want to hide. Where the problem could occur is if ISPs start inserting their own ads in place of ads by, say, ZDNet. That could cut off the revenue that keeps websites alive, and that could have very serious repercussions.
    As for personal use and whether you should use a VPN at home because of net neutrality, I don’t think we’re there… yet. Certainly, if you’re working on confidential information and connecting to work, you should use a VPN. But we haven’t yet seen any evidence of ISPs being so intrusive that always-on VPNs are required at home.
    Stay tuned to this guide, because if that changes, we’ll let you know.
    Is it legal to use a VPN?
    That depends. VPN use is legal in most countries, but, according to VPN provider CyberGhost, VPN use is illegal in the United Arab Emirates, Turkey, China, Iran, North Korea, Saudi Arabia, and Russia. Vladimir Putin has recently banned VPN use in Russia. Also, be aware that the so-called proxy server alternative to VPNs is also illegal in many countries, which consider any form of IP spoofing to be illegal, not just those services labeled as VPN.
    Restrictions vary, as do penalties. China allows certain approved VPNs. In the UAE, if you use a VPN, you could go to jail or be fined a minimum of more than the equivalent of $100,000.
    Definitely research this before you visit a country. Many travelers mistakenly believe that just because they’re not citizens, and all they’re doing is linking back to a corporate system, they should be able to have unrestricted use of VPN software. This is a mistake.
    The bottom line: Check the laws of the country you’re in before connecting. It’s also a good idea to check with your VPN provider, both for insight as to whether it knows if there are issues and whether it’ll support connectivity from the country you’re visiting.
    Do I need to use a VPN if my hotel has a wired internet connection?
    Yes. It is almost totally unlikely that each room is on a dedicated subnet, so that means packets are traveling across a network shared by other guests. In addition, you never know whether someone in the front office has set up a packet sniffer for the express purpose of mining guest information.
    So, yes, use a VPN, even if there’s a hard-wired connection to the wall.
    Will a VPN service help me connect securely to my office network?
    If you’re trying to connect to your on-premises corporate network, you’ll most likely be assigned a VPN application by your IT department. This will allow you to establish a point-to-point connection between your local device and a server owned and operated by your company.
    But, if your company is cloud-based, and you’re connecting to SaaS applications like Salesforce or Google, you should probably use a VPN service, since you’re not actually connecting to your company but instead to a public cloud application.
    If your IT department does not specifically identify a VPN service you should use for accessing their public cloud applications, definitely look at our VPN directory and choose one of the higher-rated service providers.
    Can I get away with a VPN app, or do I need to bring my own router/bridge/dongle?
    Let’s talk about what happens when you use a VPN app on your computer or mobile device. Any VPN app will require an existing network connection to be able to connect to the VPN service provider. This means that even if you set your VPN app to automatically launch when your device boots, there will be a period when your computer is connected to the internet directly, not through your VPN.
    Some background services can send information across that initial, unsecured connection before the VPN loads. To be fair, the risk is relatively minor for most usage profiles. If you’re establishing a connection automatically to your corporate server, you will want to check with your IT team about how they want you to set things up.
    If you are interested in an added level of protection, there are intriguing gadgets called Tiny Hardware Firewalls. These devices range from about $30 to $70 and connect via a network port or a USB slot to your laptop. They make the initial network connection, and so your computer’s communication is always blocked before it calls out to the internet.
    Should I use a VPN on my phone or tablet?
    Both Android and iOS come with basic VPN capabilities to allow you to securely connect to your corporate networks. Your IT organization will generally advise you when you should use this feature, but as we’ve discussed, when away from your home or office, and especially if you’re using an open, public Wi-Fi connection, you should.
    If you’re connecting to web applications like email or Facebook, you should consider using a VPN service — particularly if you’re connecting via an open Wi-Fi network. Most good VPN services offer both iOS and Android clients.
    Do I need a VPN if I’m connecting my phone via LTE?
    That depends. Once again, your corporate IT department will let you know their policy for connection directly to their corporate network. Usually, you’ll use the VPN client built into your device’s operating system for that.
    But here’s the thing: It’s up to how much you trust your carrier, where you’re located in the world, and how secure you want to be. In the US, the carriers (net neutrality notwithstanding) can generally be relied upon to provide a secure connection from your phone to their network.
    That said, it is possible to compromise wireless phone service with a man-in-the-middle attack. This situation occurs when a malevolent actor places a device designed to confuse your phone and cause your phone to connect to what it thinks is the phone network, but, in fact, it’s a device designed for spying.
    Outside the US, it depends on what country you’re in. If you are really concerned about security, simply avoid bringing any devices into a foreign nation that you intend to use after your trip. Those devices can be compromised in the country or during customs inspections.
    Likewise, if you’re connecting via a nation’s local carrier, that carrier may be intercepting your traffic, particularly if you’re a non-native of that nation. In that situation, if you must connect back to applications and services at home, using a VPN is quite literally the least you can do. Also, keep in mind that if you use your phone’s hotspot to connect your computer to the internet, you’ll want to use a VPN on your computer as well.
    Finally, it’s worth reminding you, as we covered earlier in this guide, that some countries consider VPN use illegal. If you’re planning on traveling, be sure to research local laws exhaustively.
    What happens if a VPN connection fails while I’m on a remote connection?
    A lot depends on what VPN you’re using, how it’s set up, and where you’re connecting. That said, let’s look at the most likely scenario.
    Recall that when you’re online and connected to an internet application through a VPN, a few things are happening: Your data from your computer to the VPN service is encrypted by the VPN. Your data from the VPN service to the internet application may or may not be encrypted via https, but it’s not encrypted by the VPN service. And your IP address is spoofed. The online application sees the IP address of the VPN service, not of your laptop.
    When a VPN connection drops, you might just lose your connection. But because the internet is very good at routing around failures, what is more likely to happen is your computer will reconnect to the internet application, simply bypassing the VPN service. That means that — on failure — your local IP address may “leak out” and be logged by the internet application, and your data may be open to local Wi-Fi hackers at your hotel or wherever you’re doing your computing.
    There is a reasonably robust solution to that problem, and that’s next.
    What does a VPN kill switch do?
    Put simply, a VPN kill switch kills your internet connection if it detects that your VPN’s connection has failed. There are generally two types of VPN kill switches.
    The first runs in the VPN client app on your computer, so if the VPN connection fails while the VPN client app is running, that VPN client app can turn off the computer or mobile device’s internet connection. However, if your VPN connection has failed because the VPN client app itself crashed, then the kill switch may not work, and your IP and data may leak onto the internet.
    The second type of VPN kill switch is at the operating system level. These are usually driver-level systems that run whether or not the VPN application is running. As such, they provide a bit more protection for your surfing activities.
    Given that so many VPN products we reviewed in our directory support a kill switch, we recommend choosing a client with a kill switch feature. There may be a slight annoyance if you lose your connection, but that’s more than made up for in the added security.
    What do all those protocol names mean and which one should I choose?
    If you’ve been shopping for a VPN service, you’ve undoubtedly come across a bunch of names like SSL, OpenVPN, SSTP, L2TP/IPSec, PPP, PPTP, IKEv2/IPSec, SOCKS5, and more. These are all communication protocols. They are, essentially, the name of the method by which your communication is encrypted and packaged for tunneling to the VPN provider.
    There is a lot of debate among security purists about which protocol is better. Some of the protocols (like PPP and its tunneling variant, PPTP) are old and have been compromised. Others, like SSTP, are proprietary to one company or another.
    My recommendation — and the protocol I most often choose to use — is OpenVPN. OpenVPN is a non-proprietary, open-source implementation of a VPN communication layer protocol. It’s well-understood, well-regarded, generally quite secure, and robust. Also, it has the benefit of being able to communicate over port 443, which is the standard port for https communication, which means almost all firewalls will allow OpenVPN traffic — and most won’t even be able to detect that a VPN is being used.
    Yes, there are certainly other protocol choices, even some that might be more appropriate than OpenVPN in certain situations. But if that’s the case, either you’ve already made that decision, or your IT organization has specified a specific protocol you should use. As a default, however, if you’re not sure what to look for, look for OpenVPN.
    What does it mean when a VPN service talks about simultaneous connections?
    The term “simultaneous connections” generally refers to the number of devices that can be connected to the VPN service and talk to the internet at once. For example, when I was driving across the country and working in my hotel room at night, I often had both my MacBook Pro and iPad connected to the internet.
    I used the MacBook Pro for writing, keeping the iPad open to do searches and find supporting information. Both of these were connected to the internet at one time. This was possible because the VPN service I was using allowed up to three connections open at once.
    This is also a good way to provide support for more than one family member on a single subscription. Generally, there’s no good reason for a VPN provider to allow less than two or three connections. If your provider only allows one, find another vendor. We gave extra points in our VPN directory to those vendors who allowed three or more connections.
    When should I choose either dynamic or static IP?
    Every device connected to the public internet is assigned an IP address. It’s like a phone number for each device. To be able to connect to the internet, each device needs such an address.
    The term “dynamic IP address” means that when a device connects to the internet, it’s given an IP address taken from a pool of available addresses. While it’s possible to get the same IP address on multiple connections, generally each time you connect, you’ll get a different address.
    If you want to hide your address from the web applications you’re connecting to, you’ll want a VPN service that provides dynamic IP addresses. In our directory, we list the number of IP addresses each service offers. By using a service with more available IP addresses, the chances of you getting a repeated IP are quite small.
    There are some minor disadvantages to using a dynamic IP. If someone who previously had the IP address you’ve been assigned did something nefarious on a service you use, the IP address might be banned. Usually, VPN providers are very careful about checking their IP addresses against blacklists, so the chances of this being a problem for you are slim.
    By contrast, a static IP address is an address that’s assigned to you and only you. Most often, this is needed if you’re running a server. Usually, static IP addresses are used in corporate situations and are generally not practical for general remote access, like from a hotel or coffee shop.
    Unless you have a specific application that you know needs a static IP, you’ll want to be assigned a new dynamic IP address for each VPN session you initiate.

    What does it mean when a VPN service talks about server switching?
    As we mentioned in the previous section, when you connect into a VPN service, you’re usually assigned a dynamic IP address from a pool of addresses. But where are those addresses located? They’re attached to servers located, usually, throughout the world.
    Most VPN services allow you to connect to server locations in many different countries. In our VPN directory, we list both the number of servers the service maintains, as well as the number of countries. By default, you’ll usually be assigned a server located in your home country, but if you want to obfuscate your location, you may want to connect to a server location in a different country.
    Server switching is a feature — offered by most VPN service providers — that allows you to change what region or country you’re going to connect to. Most providers allow you to switch as often as you’d like (although you usually have to disconnect, then change your configuration, and reconnect). This may be useful if you’re trying to hide your location, or if you’re running into some communications glitches on the server you’re currently using.
    Can I use a VPN to spoof my location or country of origin?
    Because the VPN server you’re connected to presents its IP address to whatever web application you’re using, by choosing a server located in a different country, you can represent your connection as if you’re in a different country. This may be illegal in certain regions, so use caution when doing this. 
    In my testing, some VPN providers were able to successfully hide their originating country or the fact that they were VPNs, but others were not. You’ll probably want to do some testing. Of the services where I did in-depth testing, NordVPN and Hotspot Shield were able to successfully hide their VPN origins, while StrongVPN and CyberGhost were not.
    Can I use a VPN to watch a blacked-out program or video?
    Sometimes it is possible to watch a blacked-out sporting event or other show, although we certainly can’t advise you to do so. Spoofing your location to bypass broadcast restrictions may get you in hot water.
    Also, do be aware that some broadcasters have developed increasingly sophisticated methods to determine whether the IP address you represent is the IP address where you’re located. The VPN may be able to protect your original IP address from being seen, but there are characteristics of proxy communications (like a slightly longer time to transfer packets) that can be used to identify users who are trying to bypass watching restrictions.
    Also: Why a proxy server can’t protect you like a VPN can
    Is it true that a VPN is completely unhackable?
    No. No. Did I mention… no. Nothing is unhackable. As evidence…
    In January 2018, Cisco Systems (a very highly respected maker of internet communications hardware) revealed that a critical bug was found in its ASA (Adaptive Security Appliance) software that could allow hackers to remotely execute code.
    This is a bug in enterprise-level VPN systems used by corporations, so it’s very serious, indeed. Fortunately, responsible IT administrators can patch their systems to fix the bug. However, it goes to show how no system can be truly deemed absolutely secure.
    Another example was a bug in Hotspot Shield, a popular VPN service. This bug allowed a hacker to expose private information, including originating IP. Hotspot Shield issued an update, which gives us an excuse to remind you that you should always install updates, especially on your VPN client software.
    Who are the key players?
    We’ve done in-depth reviews of the following VPN services. If you’re considering a VPN, you might want to read these articles first:
    While there are a tremendous number of VPN vendors out there, we think the following are some of the best:
    For a more detailed review of each, visit our VPN directory.

    You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV. More

  • in

    Google's mega-capacity new transatlantic submarine cable is ready for action

    Dunant is one of Google’s recent private subsea cables.
    Image: Getty Images/iStockphoto
    Google’s Transatlantic Dunant submarine cable system is ready for service, almost two-and-a-half years after announcing the project to bolster network capacity and resilience for Google Cloud customers. 
    The Dunant subsea cable connects Virginia Beach in the US with Saint-Hilaire-de-Riez on the French Atlantic coast, becoming Google’s 14th subsea cable. Dunant is one of Google’s recent private subsea cables, including: Curie, between Chile and Los Angeles; Equiano, between Portugal and South Africa; and Grace Hopper, a cable connecting New York to London, UK and Bilbao, Spain. 

    Networking

    Dunant, says Google in a blogpost, “expands Google’s global network to add dedicated capacity, diversity, and resilience, while enabling interconnection to other network infrastructure in the region.”
    SEE: Nextcloud Hub: User tips (free PDF) (TechRepublic)
    The cable has the capacity to deliver a massive 250 terabits per second across the Atlantic. 
    Google explains Dunant features a 12 fiber pair space-division multiplexing (SDM) design, a first of its kind. This design allows pump lasers and optical components to be shared among multiple fiber pairs and improves system availability. 
    The new capacity from Durant should help customers run apps better in the cloud and take advantage of the latest in machine learning in the cloud. 

    The next subsea cable to come online will be the Grace Hopper, scheduled to go live in 2022. It will give Google Cloud a massive global network of fiber optic links and subsea cables to support its 24 Google Cloud Platform regions, and over 100 Cloud CDN locations.  
    Google parent Alphabet yesterday reported that Google Cloud brought in revenue of $3.83 billion on losses of $1.24 billion for Q4 2020. The cloud business includes includes Google Cloud Platform (GCP) and Google Workspace (formerly G Suite). 
    SEE: Microsoft 365 vs Google Workspace: Which productivity suite is best for your business?
    This was the first earnings update Alphabet broke out Google Cloud earnings. Google Cloud’s full-year 2020 revenues were $13,059 billion, up 50% year-on-year, but it made a hefty loss of $5.61 billion.    
    Google is beefing up its Google Cloud business. Google Cloud was the largest component of new hires in Q4 of 4,149 people.

    Google More

  • in

    South Korean telcos see profit jump in 2020 thanks to 5G and remote services

    South Korean telcos, SK Telecom and LG Uplus, saw their earnings in 2020 jump significantly thanks to an uptick in 5G subscriptions and higher demand for remote services.
    SK Telecom, the country’s largest carrier, said on Wednesday it posted sales of 18.62 trillion won and operating income of 1.35 trillion won for 2020. These were increases of 5% and 21.8%, respectively, from 2019.
    Wireless services contributed 1.02 trillion won in operating income, which was an increase of 7.5% from the previous year. The 7.5% improvement was primarily due to the continued growth of its 5G subscriber base, the carrier said.
    Meanwhile, media services recorded 230.9 billion won in operating income, a surge of 59.2% from 2019. Its online commerce and security services also saw high sales increases during the year, SK Telecom said.  
    In terms of the telco’s user base, SK Telecom said it has amassed 5.48 million 5G users as of the end of 2020. The company expects to secure 9 million 5G users in total by the end of 2021.
    LG Uplus, the country’s third largest carrier, reported sales of 13.41 trillion won and operating income of 886.2 billion won for 2020. This was an increase of 8.4% and 29%, respectively, from the previous year.
    Like SK Telecom, LG Uplus said there was a high demand for its 5G mobile and remote services throughout the year.

    The carrier counted 2.75 million 5G users as of the end of 2020, more than double that of 2019, it said. Sales of its IPTV service and high-speed internet, combined, grew by almost 10% from the previous year, it added.
    For 2021, LG Uplus said it plans to offer 5G at a lower price point than before. It also wants to strengthen online sales channel going forward.
    According to the Ministry of Science and ICT, South Korea, in total, has 10.93 million 5G subscribers as of November 2020.
    Related Coverage More

  • in

    StarHub sticks with Nokia in 5G standalone network rollout

    StarHub is sticking with Nokia as its equipment partner to build out its 5G standalone network. The move is touted to allow the Singaporean telco to run 5G services independent of existing 4G network technology. 
    The move comes six months after StarHub rolled out its non-standalone 5G services. In a statement Tuesday, it said it had again partnered with Nokia to tap the latter’s cloud-native Core platform to roll out standalone 5G services. This would include radio, software, security, and professional services, StarHub said, adding that it was projecting to begin offering services in the third quarter. 

    “With StarHub 5G services delivered via standalone architecture using the 3.5GHz spectrum, customers can enjoy new digital services such as augmented reality for entertainment, education, and healthcare,” the telco said. “The industry will have the opportunity to deliver the promised massive Internet of Things (IoT), allowing interconnection of many devices and applications for a smarter society. Businesses can use 5G enhanced mobile broadband service to enable e-sports and augmented/virtual reality live feeds anywhere.”
    It added that it would be able to use network slicing capabilities to create secure mobile campus networks that support localised functions. It could also tap mobile edge computing services to host applications powered by artificial intelligence, such as facial recognition services, as well as roll out advanced IoT applications, the company said.
    StarHub said it was working with various organisations including Nanyang Polytechnic and National University of Singapore to explore potential 5G applications that could enhance higher education experiences, and test use cases. The telco in January last year launched a test facility with Nanyang Polytechnic to develop and pilot proof-of-concepts running on 5G networks. 
    StarHub also teamed up with Malaysia’s U Mobile in December 2019 to trial multi-party roaming video conference calls over standalone 5G technologies, including cross-border holographic calls and emergency sea rescue operations.  
    StarHub CTO Chong Siew Loong said: “We are seeing strong demand for 5G phones and good take-up of our Mobile+ and Biz+ 5G-capable plans, [which were] launched last August. [These are] encouraging signs of the market’s appetite for 5G services, which are going mainstream in terms of deployment and adoption this year.”

    Singapore last year issued two two nationwide 5G licences to Singtel and joint bidders M1 and StarHub, with networks expected to be up and running by 2025. M1 last month announced it also had picked Nokia’s Core platform to deploy its 5G standalone network and was targeting to launch later this year.
    RELATED COVERAGE More

  • in

    Fastest VPN in 2021

    Most people choose to use a VPN for privacy and security reasons. They want to be able to obscure their location, change their apparent country of origin, prevent their data from being intercepted, and — sometimes — violate terms of service by watching entertainment they’re not supposed to access.
    But because all that data has to go through the VPN provider’s network, there’s natural friction applied to data transmission rates. With a few exceptions, using a VPN slows down your network access. Most of the time, that performance hit isn’t enough to reduce your quality of service, but it can have an impact on your network usage. As such, finding out which VPNs are the fastest — in other words, what VPNs don’t suck your performance away — can be important to your online experience.
    TL;DR: Which is fastest?
    Our in-house tests showed Hotspot Shield as the fastest. But when you aggregate average scores across the internet, and you factor in how consistent those scores are, NordVPN comes out on top, with Hotspot Shield and ExpressVPN close behind.

    Interesting options to enhance VPN protection
    Photo by Karl Köhler on Unsplash
    Simultaneous Connections: 6
    Kill Switch: Yes
    Platforms: Windows, Mac, iOS, Android, Linux, Android TV, Chrome, Firefox
    Logging: None, except billing data
    Countries: 59
    Servers: 5517
    Trial/MBG: 30 day
    NordVPN is one of the most popular consumer VPNs out there. Last year, Nord announced that it had been breached. Unfortunately, the breach had been active for more than 18 months. While there were failures at every level, NordVPN has taken substantial efforts to remedy the breach.
    Also: My in-depth review of NordVPN
    In our review, we liked that it offered capabilities beyond basic VPN, including support of P2P sharing, a service it calls Double VPN that does a second layer of encryption, Onion over VPN which allows for TOR capabilities over its VPN, and even a dedicated IP if you’re trying to run a VPN that also doubles as a server. It supports all the usual platforms and a bunch of home network platforms as well. The company also offers NordVPN Teams, which provides centralized management and billing for a mobile workforce.
    Also: My interview with NordVPN management on how they run their service
    Performance testing was adequate, although ping speeds were slow enough that I wouldn’t want to play a twitch video game over the VPN. To be fair, most VPNs have pretty terrible ping speeds, so this isn’t a weakness unique to Nord. Overall, a solid choice, and with a 30-day money-back guarantee, worth a try.
    View Now at NordVPN

    Astonishing performance
    Photo by Sergi Viladesau on Unsplash
    Simultaneous Connections: 5
    Kill Switch: Yes
    Platforms: Windows, Mac, iOS, Android, Linux, router, TV
    Logging: None, except billing data
    Countries: 80
    Locations: 115
    Trial/MBG: 45 days
    This is a company that has had some ups and downs in its coverage. That said, the company seems to have resolved its issues successfully. But I’m burying the lede for this story. Here’s what you need to know about Hotspot Shield: performance was astonishing.
    Also: My in-depth review of Hotspot Shield
    The company kept sending me bragging emails, claiming exceptional performance. Since reviewers often (always) get “we’re the best” emails, it’s something we ignore like the background noise it usually is. But then my editor challenged me to put Hotspot Shield to the test. And you know what? For most countries, while the VPN connection was active, it actually out-performed non-VPN connection speed. Go ahead and read my review. Surprised the heck out of me.
    View Now at Hotspot Shield

    A top-rated VPN provider
    Photo by Christian Englmeier on Unsplash
    Simultaneous Connections: 5
    Kill Switch: Yes
    Platforms: A whole lot
    Logging: No browsing logs, some connection logs
    Countries: 94
    Locations: 160
    Trial/MBG: 30 days
    ExpressVPN is one of the most popular VPN providers out there, offering a wide range of platforms and protocols. Platforms include Windows, Mac, Linux, routers, iOS, Android, Chromebook, Kindle Fire, and even the Nook device. There are also browser extensions for Chrome and Firefox. Plus, ExpressVPN works with PlayStation, Apple TV, Xbox, Amazon Fire TV, and the Nintendo Switch. There’s even a manual setup option for Chromecast, Roku, and Nvidia Switch.
    Also: ExpressVPN review: A VPN speed leader with a secure reputation
    With 160 server locations in 94 countries, ExpressVPN has a considerable VPN network across the internet. In CNET’s review of the service, staff writer Rae Hodge reported that ExpressVPN lost less than 2% of performance with the VPN enabled and using the OpenVPN protocol vs. a direct connection.
    While the company does not log browsing history or traffic destinations, it does log dates connected to the VPN service, amount transferred, and VPN server location. We do want to give ExpressVPN kudos for making this information very clear and easily accessible.
    View Now at ExpressVPN
    The challenge of VPN performance testing
    Coming up with a ranking of best-performing VPNs is quite difficult because of the number of variables involved. The biggest variable is where you are. What speeds I get from here in Oregon might be radically different from the speeds you get in the LaGuardia terminal in New York City. What countries are you connecting to? What kind of data are you trying to access? What time of day are you making your connection? How busy are the various trunk lines in your region and in the country you’re connecting to? Are you more concerned with ping time, download speed, upload speed, latency, or all of the above?
    It’s impossible to build a testbed to handle all of those variables. Even if we chose to put test rigs in 10 or 15 cities, we wouldn’t come close to being able to give you a truly accurate representation. After all, there are roughly 10,000 cities on the planet, and that doesn’t include all the tinier towns and villages. Performance in Kembleford, England is going to differ from performance in Lancaster, Pa., which is going to differ from performance in Bageshwar, India or Popanyinning, Western Australia.
    In this article, we attempt to solve this problem by taking a deep and wide look at VPN performance. Here at ZDNet, we did extensive benchmarking of five VPN services. We’re also doing a literature review of the findings of 10 other VPN evaluators and aggregating those findings. By looking at findings from many different testers across the Internet, we stand a better chance of creating a more reliable performance picture, despite the wide range of variables.
    ZDNet rankings
    Let’s start with our own testing. We tested NordVPN, Hotspot Shield, CyberGhost, IPVanish, and StrongVPN. For our tests, we measured download performance from a variety of locations across the world. We also measured ping time and connection time. One interesting observation was that not all services could reach the cities we wanted to test. IPVanish, for example, didn’t have any servers in Russia. StrongVPN didn’t have servers in Russia, Taiwan, or India.

    We also found that performance varied drastically by server location. NordVPN had, for example, exceptional connection speed with Russia, but could barely move a byte to India.
    The standout in terms of download speeds was Hotspot Shield. As counterintuitive as it may be, average performance while using the VPN increased overall in international connections. We discuss more about how that’s possible in our in-depth Hotspot Shield review. The other VPNs we profiled all lost performance (much more in line with expectations), with CyberGhost and NordVPN rounding out our top three.
    Chart: ZDNet/David Gewirtz
    When it comes to ping speeds, the results were also counterintuitive. All our profiled providers showed an improvement in average ping speeds compared to use without a VPN. The only reason this makes sense is if you realize that you’re probably reducing server-to-server hops to an international destination when you travel through a VPN. ‘Tis cool.

    Chart: ZDNet/David Gewirtz
    Finally, we looked at time to connect. When you start up the VPN service, how long does it take to achieve communication? While you’re not likely to make connections except once per session at your device, waiting as much as 16 seconds (as it was on average for NordVPN) can seem like an awfully long time compared to a little under two seconds (which we found, on average, for Hotspot Shield).

    Chart: ZDNet/David Gewirtz
    You can see the raw performance data for each of our profiled VPNs in the following reviews:
    What the internet thinks
    As mentioned before, there’s no easy way to give you a comprehensive evaluation of VPN performance, especially from one tester. So, we gathered up the results from ten separate sites (they’re listed at the end of the article). Across all 10 sites (plus ZDNet), we identified performance results for 30 VPNs.
    Of those 30 VPNs, 15 of them were only reviewed on one site. Because we’re explicitly trying to find performance across sites, we removed all of the one-hit wonders. We also removed another seven VPN providers that showed up on only two sites. None of them scored near the top of their respective reviewers’ lists, so there was no great loss.
    That left us with eight providers tested on three or more sites, giving us some useful aggregate data to examine.
    The VPN providers quickly stratified into three groups: ExpressVPN, Hotspot Shield, and NordVPN led the pack with average aggregate scores between two and three. The next group consisted of Private Internet Access, StrongVPN, and Surfshark, with average aggregate rankings between three and five. Finally, at the bottom of our list were CyberGhost and IPVanish, both of whom netted an average aggregate score of six or worse.
    Let’s take a look at our chart, and we’ll deconstruct a few more important aspects of our study.

    Chart: ZDNet/David Gewirtz
    There are two data series modeled on the chart. The vertical columns represent the average ranking for each vendor. Lower is better in this case, so a vendor with an average rank of 2.00 performs better than a vendor with an average rank of, say, 6.33.
    But it’s the line chart that helps put these numbers in perspective. The line chart represents the standard deviation of the score data on a vendor-by-vendor basis. Standard deviation is a measure of how spread out numbers are in a series of data.

    Take, for example, a VPN vendor who ranks in the No. 1 slot on one site and the No. 10 slot on another site. It’s going to be very hard to tell from those two data points just how reliable that VPN provider’s performance actually is. By contrast, if you have another vendor who ranks as No. 5 from the same two sites, you can be pretty sure that vendor is in the middle of the pack — because the rankings are consistent.
    That’s what we wanted to know in our aggregated data analysis. Take, for example, ExpressVPN which has an aggregate score of 2.33. Hotspot Shield has an aggregate score of 2.29. They’re both very close. But when you factor in that ExpressVPN’s standard deviation across all eleven sites is 1.37, you can see that the data is pretty consistent. ExpressVPN scored four 2’s and a 1.
    By contrast, Hotspot Shield’s scores have a standard deviation of 2.21. That means, compared to ExpressVPN’s 1.37, that Hotspot Shield’s scores aren’t as consistent. That’s born out by Hotspot Shield’s scores of five 1’s, a 5, and a 6. Yes, Hotspot Shield did score more No. 1 wins, but it also scored a couple of substantially lower grades, making us question whether its performance is reliably excellent or whether some of you might see substantially worse performance than others using the same product.
    By this measure, NordVPN is the clear winner. It’s got the best average aggregate score and the smallest standard deviation. That means its performance is consistent among all the testers and you can probably rely on it when making a buying decision. If you don’t want NordVPN, you can try out both Hotspot Shield and ExpressVPN, but because mileage did, in fact, vary, you’ll want to try them both out and see what performs best for you.
    In addition to ZDNet, we aggregated data from VPN ratings on the following sites: PCMag, TechRadar, CNET, Tom’s Guide, Comparitech, vpnMentor, ProPrivacy, Cloudwards, RestorePrivacy, and Top10VPN.
    Our advice
    I talked before about how your circumstances are going to be different from mine, and both of us will have connection situations that differ from everyone else reading this article or reviewing these VPNs. That’s why my strongest recommendation is to take advantage of the trial period for these products. Of the top three, NordVPN, Hotspot Shield, and ExpressVPN all offer money-back guarantees. NordVPN and ExpressVPN let you try out their wares for 30 days. Hotspot Shield gives you an extra fifteen, with a 45-day money-back guarantee.
    You should be able to tell within 30 days to 45 days which of the VPN offerings performs best for you. So, test before you buy.
    What VPN are you using? Are you seeing similar performance results to the ones we’ve modeled here? Let us know in the comments below.
    You can follow my day-to-day project updates on social media. Be sure to follow me on Twitter at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, and on YouTube at YouTube.com/DavidGewirtzTV.

    ZDNet Recommends More

  • in

    Why is my internet so slow? Here are 7 reasons and how to fix them

    As working from home is now quickly becoming entrenched in the workforce, a reliable internet connection is a must. 

    Bandwidth is now demanded by not only our PCs, but also our mobile devices, Internet of Things (IoT) products, smart TVs, gaming consoles, and streaming services. With so many of us now spending a substantial amount of time at home, especially when there are multiple people in the same property, the fight for capacity can lead to a host of connectivity issues. 
    Also: How to optimize your network for remote work and learning
    However, it’s not just a fight for access to social media or Netflix. Working remotely and homeschooling have now been added to the mix, and we are more dependent than ever on having a stable internet connection in our daily lives.
    Connectivity drops, bottlenecks, slow content streaming and downloads, or simply slow speeds are all common issues with home internet. 
    Below, we explore seven major reasons why your internet might be slow — and how to fix them. 
    Bandwidth caps
    A low-cost subscription from your Internet Service Provider (ISP) may have once served you well for occasionally checking your email or watching a YouTube video at home. Now, when you need a connection that can manage IoT, you need to maintain a remote Microsoft Teams work meeting, your child is using Zoom while attending a virtual lesson, and another person is gaming at the same time, if you have constant speed problems, this is the first thing you should consider. 

    Before examining your hardware, you should make sure you are on a package that is likely to be able to cope with today’s array of devices and demand. As noted by ZDNet’s Steven J. Vaughan-Nichols, a minimum speed of 30Mbps is recommended. 
    See also: Slow Wi-Fi? 8 ways to speed up your home office network
    What’s my speed?
    If you are already on a package such as fiber and there’s no reason why you are suffering slow internet speeds because of what you are paying for, head over to Speedtest.net to check your connection speed in real-time. 
    This free service will ping and check your download and upload speeds, as shown in progress below:

    If you are paying for a package of up to 30Mbps and are only receiving speeds of 2 or 3Mbps, for example, it may be an issue with your ISP and physical cables. At this point, it is worth checking in with your provider to see if there is an outage in the area. Flickering lights on your router may also indicate a problem outside of your home. 
    However, if it is only a specific service online that you’re having trouble with, go to Down for everyone or just me, type in the address, and check to see if your slow speed or failed connection to a domain is a third-party problem or outage. 
    Location, location, location 
    There are two general categories of hardware used to connect your home: a traditional router or a mesh network. 
    Traditional routers take on the role of a center point to link you to your ISP service. These routers are centralized hubs that manage traffic through one access point. 
    Also: Mesh networking vs. traditional Wi-Fi routers: What is best for your home office?
    In comparison, mesh networks are a relatively new entrant on the market that create a web of nodes for internet access. Instead of every home device connecting to one router, these products include a hub and nodes that can be dotted around different areas of your home — and devices will connect to the closest node to access the internet.
    If you are using traditional hardware, such as a default router provided by your ISP, you need to keep in mind that the further away you are, the higher the risk of connection problems, slow speeds, and dropouts. A simple solution is to move your router — perhaps, closer to your home office — or invest in a Wi-Fi extender to boost signal strength. 
    Objects, too, can impede connections between your devices and a router. If possible, try to keep clutter around your router to a minimum. 
    Larger properties or home offices located in a garden or yard, however, may simply not be serviceable by one centralized internet hub. If this is the case, moving your router won’t be enough, and it may be time to consider a mesh network instead. 
    On this note, both categories can provide reasonable speeds — but mesh networks do tend to sacrifice some speed for improved connectivity. If you require direct, high-speed connections for streaming, gaming, and power-hungry work applications, an upgrade to your standard router is a worthwhile investment and will likely perform better than a mesh setup. 
    There is also no point in signing up a high-speed internet plan if your old hardware cannot support it, and so you need to consider the age of your router if you are having trouble with slow speeds. 
    See also:  
    Check your wiring
    Something that may be overlooked but could cause connectivity or speed issues is the wiring linking your router to a phone jack or PC. If they are old, you may want to consider refreshing them and replacing older ADSL/Ethernet wires and see if this solves the issue. 
    Piggyback?
    If you are suffering slow speeds, this may be because someone else is hijacking your internet subscription. Routers usually come with a randomized password set as default and printed on a sticker on your router, but if you have changed your password to something weak or have a Wi-Fi hotspot open, this could indicate that others are using your network without consent. 
    To lock your connection or change your password, head over to your router’s configuration page in a browser. You will need to check your vendor’s specific router address use — which is usually something comparable to 192.168.0.1  — or perform a Google search with your router type and this should provide the address you need to access router settings. 
    Crowded channels
    Wi-Fi channels facilitate the sending and receipt of data. When you have too many connections, this may cause a bottleneck that slows down your broadband. Depending on which channels your router uses, you may be able to switch to less congested traffic paths. 
    There are different Android and iOS apps to analyze your Wi-Fi channels easily and reveal what devices are connected to your network. In order to change channels, you can sign in to your router’s configuration page and select from available options. 
    A slow VPN
    A virtual private network (VPN) is software that adds a layer of encryption to connections made between your device and servers, as well as masks your IP address. Now many of us are working from home, offices may require you to use a VPN to access corporate resources. 
    You can either subscribe to a VPN as a paying customer or opt for a free service. Paid options are usually faster but can still slow down your internet as you are using a relay for traffic — and if the VPN service is being used at peak times, there may also be congestion. 
    Also: Best VPN services for 2021: Safe and fast don’t come for free 
    A quick fix is often to try a different location option offered by your VPN; for example, London users set to a New York server could try using a different server located in the UK. Not all VPNs, either, are created equal, and there can be substantial differences between the speeds on offer. 
    Free VPNs are generally not recommended because in return for free access, there is always a trade-off — whether this is in security, your personal data, or speed. If you are using a free VPN option and the low speed is intolerable, you may want to consider signing up for a paid service instead. 
    Read on: 
    Further tips:
    Reset: Sometimes, the simplest explanation is the right one. If your speed is suffering, try unplugging your router, leaving it for 10 seconds or so, and restarting. In the same way that a PC sometimes needs a refresh, routers sometimes do, too. 
    Check your background usage: Some mobile apps and PC programs with heavy resource demands or streaming requirements may take up bandwidth that you otherwise need without you realizing it. 
    Keep your security up-to-date: Another factor not to be missed is the possibility of malware infections. If your internet has slowed down without reason, it may be that malware is hijacking your browser and exploiting your Wi-Fi connection. You should frequently scan your system to keep it clean.
    Previous and related coverage
    Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More