VPN: A secure tunnel through the public network
Safe surfing
The internet is a public space. For many reasons, that's a good thing. But this also means that whenever you navigate the internet, you will be seen: Your own data traffic, the traces you leave behind, can be read or even manipulated by others – whether you access the internet from your computer at home or from your cell phone on the move.

VPN: A secure tunnel through the public network
Your own data traffic, the traces you leave behind, can be read or even manipulated by others – whether you access the internet from your computer at home or from your cell phone on the move.
Virtual private networks – or VPNs – are one way to avoid this. A VPN establishes a direct connection between the user and the network that the user wants to visit. VPN access uses the existing internet network, digging a private and secure tunnel to its destination, so to speak.
The data sent and received is usually end-to-end encrypted. This means that the data is encrypted on one end device, sent unrecognisably through the VPN tunnel, and decrypted only once it has reached the other end device. Even if unknown persons intercept the data traffic, they cannot read or manipulate it.
Not all VPNs are the same
There are three main types of VPN connections:
- Client-to-site VPN: An end device (desktop, notebook, tablet, smartphone, etc.) connects to a VPN gateway via a VPN tunnel and in that way to the target network.
- Site-to-site VPN: A VPN tunnel can also connect two networks with each other. In this way, an end device that is logged into one network can also access resources in the other network.
- End-to-end VPN: This type of VPN establishes a direct connection between several end devices. This is how the internet can be used to set up a local network.
One way or the other: For the target network, VPNs make it look as if the requests of the person navigating the internet via VPN originate from the proprietary local network.
The advantages for users:
- Users can navigate securely and anonymously. The encrypted data traffic cannot be viewed or modified by unauthorised third parties.
- A VPN tunnel can conceal the user's location by pretending to be from a different country of origin when the web service is accessed. This makes it possible to access content that would otherwise not be accessible due to geoblocking (including internet content from other countries such as TV channels or Netflix movies that are available only in a foreign country's catalogue).
- Older computer games whose multiplayer servers have been shut down can still be played over the internet using a VPN.
- Employees can securely access their company network from home via VPN, just as if they were sitting at the office.
- Using a VPN, companies can securely connect their distributed branch offices to the company network.
Simple installation – no cables needed
The term "virtual private network" may sound complicated – but it isn't. A VPN uses the existing public internet for the direct connection. This means that private individuals who want to protect themselves with a VPN don't have to lay any cables. All they have to do is download software from a trusted provider. Numerous VPNs are now available on the market – also from Swiss companies. It's worth browsing and comparing offers.
However: Even if you use a VPN, you're not automatically safe
- A VPN tunnel can also transport unencrypted data. Check the settings and specifications of the provider first.
- Complete anonymity cannot be guaranteed. The volume and frequency of the sent data can allow conclusions to be drawn about the nature of the data. Online behaviour can also be used to identify a person: For example, someone who always visits the same websites in the same sequence and time period – even anonymously – can still be identified. Finally, a VPN provider might also see what its customers are doing.
- Using a VPN tunnel merely establishes secure access to the internet. This doesn't mean that the websites you visit are likewise secure.
- A VPN tunnel protects only the data traffic between the endpoints. If your own end device is not secure, even the best VPN is useless. Basic cyber hygiene is still important. This means: Use antivirus protection, update software regularly and promptly, use strong and secure passwords, and add multifactor authentication for additional protection use common sense!