Get more more info about NordVPN's offerings: nordvpn.com/animagraffs - Worth repeating: NordVPN agreed to allow me full control over all research and visuals. I firmly believe if more companies fund publicly available, objective research we're all better for it. My research has not been tampered with in any way, period. If you came here to comment as such, I know you didn't actually watch the video.
You're accepting a degree of risk when trusting anyone. Some VPNs have had outside audits from trustworthy companies to verify their internal practices, including whether they store information about you in any way that could reveal your identity. The hard-boiled techies online go straight for the extreme use cases and I get it. Once you know a thing really well, you tend to beat others over the head with it. Also, the VPN space in general has earned a lot of healthy scorn. On the hard-boiled side of things, yeah, there's no way to actually verify to 100% certainty. I accept a manageable risk every time I drive my car. I'm still happy with car usage even so, though I can't make it 100% safe. Not everyone is trying to theoretically evade the CIA, and not every VPN is keeping records. It's neither extreme, and for many users, VPNs are a really useful tool.
Finally a clear explanation of what a VPN does. I was especially intrigued about how ISPs can "guess" what kind of data is coming from the VPN. Amazing!!
Pattern matching usually. For example if they see a large constant flow it’s nearly always video media, short bursts of a set size will be audio etc. once you a ripped movie say “The Avengers” is 1.1134GB in size encrypted you can just have a rough guess with connection profiles that someone is downloading that ripped movie.
I'm only 1 min 34 seconds into this but wanted to say: Your content is endlessly gorgeous and informative. 200k subs is a joke compared to what you'll have in no time. Thank you!
Minor corrections at 4:15. Your data is only encrypted from your device to the VPN service. It is not encrypted between the VPN service and the destination. That traffic is done in the clear. Also, the VPN does not do the DNS lookup on its own. That must be done at your device. The VPN service may host the DNS itself, or you can make the DNS request through the VPN. You still have to tell the VPN service where you want to go (that means resolving to an IP address) before you can traverse the tunnel.
Nice video explanation but needs some corrections: *Your home router external IP is live on the Internet - your ISP does not NAT it (in most cases). Doing NAT at the ISP level would be EXTREMELY CPU intensive and would break connectivity for numerous applications. *DNS is an abbreviation for "Domain" Name System, not "Dynamic" Name System. You can host your own DNS servers or use an external provider, ie. Google. Yes, your ISP can still see your external queries unless you are doing DNS over TLS. *The VPN tunnel is between you and the VPN provider. It is not end to end. *Logging is very VPN provider dependent. Thank you for pointing out browser fingerprinting! Lots of people believe VPNs are a one size fits all solution to Internet anonymity and it is simply not so.
Bro, I am a software developer. And even i didnt fully understand what VPNs did. Your explanation and the graphics helped me understand the key thing VPNs do. Not using your ISP to directly access the internet. Using your ISP just to get to the VPN provider. Now your ISP doesnt even know your meta data (what website you go to). And your ISP can not censor internet. I am saving the link to this video to my computer networks folder.
I truly don’t mean this to be disrespectful, but I find it exceedingly difficult to understand how a professional software developer could not understand what a VPN does. I mean, I could see not knowing every single detail of how they accomplish their function, but to not even know the basic underlying idea of “tunneling” through an ISP to a remote network - it’s just hard to imagine how one could have acquired the requisite knowledge and understanding to be a software developer without also acquiring an ability to infer the general functionality of a VPN. I apologize if you legitimately are employed as a software developer. And even if you aren’t, as I said, I mean no disrespect; I just suspect the claim of being a software developer may have been an exaggeration of your credentials.
After watching a few videos of Animagrafs, it seems that the superlative quality of graphics and unhurried and lucid narration are the hallmarks. My grateful thanks.
As a former senior IT / network engineer and a current senior information security engineer of over 10 years, I was interested to watch this. To be fair, it's fairly accurate for the most part and covers some unexpected things like fingerprinting, but I have noted some corrections for those who want to know. (I've skipping over some simple and unimportant ones that were probably for the sake of simplicity.) 1. They're called Domain Name System / name servers, not Dynamic Name Servers. Dynamic DNS is a thing, though. 2. When a client is using a VPN, it always makes DNS lookup requests itself. It's forward web proxies where the proxy-aware app delegates that and the service itself does so. However, some VPN services do host DNS servers and offer protection by configuring your client to send DNS requests to them instead. 3. A fake Wi-Fi network attack is known as Evil Twin. A honeypot is used to trick attackers into thinking they're on a real system so that they divulge information about themselves, such as their intent or Tactics, Techniques, and Procedures (TTPs). 4. ISPs can't (usually) see your GPS location, but they can look up your public IP address' geolocation. 5. Geolocation is not defined by a country's physical borders. It's defined by the public IP subnet that's been assigned to that country and organisation and tracked in a database. Also, I'm skeptical about the claim that Deep Packet Inspection can determine the content of encrypted packets. Network Traffic Analysis perhaps.
"VPNs do not keep logs of what you do" that's what most people assume but you need to look at each country regulations of the VPN service you're using and what country you're connecting to. Plus you're just transferring your trust of your data from your ISP to the VPN service provider
You should correct your Video: VPN Provider -are- might not collect data. Your Data has to go out somewhere (otherwise, it would be just HTTPS) to get visible. It´s more like a Tunnel: You can pass certain blockades and safe from spying from the Air, but you can still be seen when entering the tunnel, or leaving it. Also someone with access to cameras in (in front of) the tunnel (VPN Provider, the VPN Providers ISP, Governments, Hackers..) may see you. It also doesn´t save you from burglers or disguised Officers since you are communicating with them openly.
Hi guys! First of all, i would like to thank the trainer of those animated videos. It's really great, as i could understand very and deeply about VPN in a matter of very few minutes, when i went through pages to try to understand VPN clearly. He did a very great job and at the same time so clear even for novice in computer studies to understand what is VPN. Thank you very much. You deserve more than our like ! Keep it up. Please, i will appreciate more if you could provide us some more videos about network protocols and also if possible some videos about Cyber security fundamentals. Thank you, all the best !
JON this is really great content. Please don't mind those comments that say you're doing this for nord. You deserve whatever you're getting for giving us such good animated videos that makes it easier for us to understand how things work. I think you don't have to reply to those few comments they know very little about how the world works. Please keep doing this. Your channel is going to grow.
What I find amazing about all of this is that it happens at the speed of light. All of the world’s information at your fingertips instantly. Imagine the possibilities if we used this technology for more than looking at cat videos
Another superb video, having just watched your Trafalgar, decided to see what else you had done and found this absolute gem as well. After teaching IT to kids, I went on to become a Microsoft Certified Trainer and delivered quite a few TCP/IP week long courses, certainly could have done with this animation as oppose the very bad ones Microsoft came up with for me to present to paying students. Often found Teckies knew how to set up their DHCP, DNS and IIS server because they had been shown what IPs and subnet masks were and assigned to them by the IANA but had difficulty comprehending the OSI 7 layer model and it's packeting make up. Having been out of the industry for 10 years, I now find a woeful ignorance of the most basic TCP/IP concepts by ISP and VPN support staff, who generally just tell you to try another protocol. This video in my opinion should be enforced watching several times by those who purport to provide VPN technical support, especially a company called SurfShark
This isn't an dis on Animagraffs; he puts together great education videos. This is a major dis on "VPN" providers. What they provide are NOT VPNs, they may use VPNs principles to do what they do, but the service they actually provide is a secure connection to an anonymizing proxy. Real VPNs, in simple terms, bury one network connection inside another (usually encrypted) in a way that allows two or more sites to form a single private network, regardless of physical location limitations.
The whole VPN space has this surrounding air of insecurity. I limit my work to knowable principles, because actually confirming what's going on at a big VPN company seems impossible. And people discussing VPNs are divided about every single part of the process.
@@animagraffs Yeah, I understand your approach to this. You cannot be an expert in everything, but you do put an amazing level of detail into your videos. But I have tertiary degree in computing, and 20+ years of experience in the computing industry. So, I do know what I'm talking about here. It just pisses me off to see all these "VPN" provides misleading the public all the time over what VPNs really are.
- the VPN software encrypts your data before it leaves your device, its already scrambled when reaching your router - from there your router forwards tge packet to your ISP which forwards the cipher text to your VPN server - the VPN handles the dns look up process/resolution
A VPN uses Layer 2 Tunneling Protocol with the IPsec security suite to secure the layer 3 internet layer. It uses AES encryption to encrypt the packets on top of the data. In essence, it is definitely "secure" from eavesdroppers including your ISP.
Good job. Some VPN service providers do not keep logs and some do. So it is incorrect to say the VPN providers do not keep logs (you may want to update the video)..
Amazing content! I have a question: Can a destination site detect that IP address of VPN is used instead of your real IP address? Or is it impossible to detect it?
This is amazing demonstration...i knew fairly little about vpns. thank you Animagraffs. But i do have one question. Does the router/wifi-hotspot see your browsed activities?
if you made a video explaining all the systems of an ordinary car to help people pass ASE exams; you would recieve so much profit. The videos are great
Would really like to know - "who owns and controls these VPN companies?" Don't see companies like Google, Microsoft, Norton, etc. Are these VPN companies based in Eastern Europe, China, where? Who are the major shareholders? How can we be sure the VPN company does not do nefarious things to know our data that is not encrypted? How can we feel safe if the owner of the VPN is secret?
Are packets sent from your Home router to the ISP's servers? Or is it sent to ISP routers or switches via local loop? Also, what about NAT on your Home Router?
I don't think NAT is really relevant, I think he avoided it as it's just additional complexity, so he just left it at how your router has one IP for all your devices.
I left college after just one year, in the early 2000's, and never went back. Not really because it was too easy, but because I was already getting into web design and 3D stuff, and college was expensive since I paid everything myself by working grueling summer jobs that I hated. Professors piled on the busy work and acted like I should be grateful, which really, really turned me completely off to the whole thing. The thrill of learning is what fuels the resulting hard work. I can't be part of a system that's only work and no thrill or fun. But you're partially right, I did drop out of college. lol. Way before it was "cool". And I never had student loans.
The quest for true anonymity is so deep, and falls outside the scope of a discussion on VPNs alone. In my research I saw that apparently even Tor connection points may be tampered with by state actors. Truly motivated folks were talking about using entirely separate computers for some activity, since even the operating system can give up tiny details about identity. It's a really deep rabbit hole to achieve actual anonymity, if it's possible at all.
wouldn't the VPN server un-encrypt the packet when it gets it then send it to the destinations and then re-encrypt it before sending it to your ISP. how else would the destinations understand what the packet is if it was still full encrypted
haha I love it! No repeating things we already know, begging for subscribers, or wasting time. When we're done, we're just done. I know it's kinda weird but the alternatives are so tired and overused.
@@animagraffs A simple fade out would suffice of both music and video. no need to beg for subscribers or anything like that. Other than that, amazing job
@@animagraffs Hahahaha fair enough then. Keep doing it how you want it then. If you are happy with it then thats all that really matters! keep up the great stuff
Hi Jake, You content is absolutely amazing. Thanks for the good work. I would love if you can make a video on how the car cooling system works. Thanks in advance.😊
I don't have an education in this kind of stuff so this might not make sense, but wouldn't the VPN be more secure if their servers were between you and the ISP in this process, rather than between the ISP and your destination? Because if the data goes from your house to the ISP, people can still snoop and know where you are roughly physically located, right?
At each stage of the journey, data is wrapped in new container packets. I showed some of that process -- where your router hides which device in your home sent the request from the outside world. When your VPN gets your data and sends it through their servers, it gets wrapped in a new packet that doesn't have openly visible GPS location from the original request. Only the new GPS location of your VPN server. My mockup is a bit limited to show this process, but that's what's actually happening at each stage.
@@animagraffs Thanks! So when you say your router hides which device in your home sent the request, it is still apparent that the request came from your router/home, right? It seems like with the setup shown, the ISP knows that you requested something from somewhere, whereas if the VPN server came in between you and the ISP, all the ISP would know is that someone requested some specific content. At a glance it sounds to me like it'd be more private for your identity to be hidden rather than the thing you're searching for.
That's basically impossible. ISPs exist to connect you to the Internet and VPN providers are on the Internet. That's kind of like saying why don't you just move the supermarket to your house so you don't have to use roads.
“Hey what if this guy just segues to *THIS VIDEO IS SPONSORED BY NORDVPN* because he’s talking about VPN...” *clicks video* *clicks description* Goddamnit I know TH-cam too well
thank you for fantastic Channel ! I have a question, my question is not about just the browser, it is about software I use on my pc , it means whole PC as device ! for example Adobe Apps, if I use VPN , it can protect my IP and Adobe don't get my real IP info? today all software try to call home! it means they try to connect to the Company which the create the Software, when it happen and you have VPN , it can prevent real IP address? Thanks sir !
Question on hidden ISP address IF the site you are connected through a VPN uses cookies and can see your computers details like windows 7, Java ect in order to communicate back and forth Yes? So why doesant the packets ect see your REAL address? and only the fake one from the VPN servers? Can a site or hacker get your real address whos might be hacked into the site thus avoiding outside encrypted tunnel man in the middle hack?
Get more more info about NordVPN's offerings: nordvpn.com/animagraffs
-
Worth repeating: NordVPN agreed to allow me full control over all research and visuals. I firmly believe if more companies fund publicly available, objective research we're all better for it. My research has not been tampered with in any way, period. If you came here to comment as such, I know you didn't actually watch the video.
How does one verify a VPN does not store logs?
@@__redacted__ That's the neat part. You can't.
You're accepting a degree of risk when trusting anyone. Some VPNs have had outside audits from trustworthy companies to verify their internal practices, including whether they store information about you in any way that could reveal your identity.
The hard-boiled techies online go straight for the extreme use cases and I get it. Once you know a thing really well, you tend to beat others over the head with it. Also, the VPN space in general has earned a lot of healthy scorn. On the hard-boiled side of things, yeah, there's no way to actually verify to 100% certainty. I accept a manageable risk every time I drive my car. I'm still happy with car usage even so, though I can't make it 100% safe.
Not everyone is trying to theoretically evade the CIA, and not every VPN is keeping records. It's neither extreme, and for many users, VPNs are a really useful tool.
@@animagraffs Dude your videos are stolen by someone else. Can you make a copyright strike?
@@KingKong-xp6so TH-cam notifies me of copies they find. What's the link?
Finally a clear explanation of what a VPN does. I was especially intrigued about how ISPs can "guess" what kind of data is coming from the VPN. Amazing!!
Sometimes they don't need ISP they own crypto and security companies that you pay extra to be secure :) i.e. en.wikipedia.org/wiki/Crypto_AG
Pattern matching usually. For example if they see a large constant flow it’s nearly always video media, short bursts of a set size will be audio etc. once you a ripped movie say “The Avengers” is 1.1134GB in size encrypted you can just have a rough guess with connection profiles that someone is downloading that ripped movie.
th-cam.com/video/WVDQEoe6ZWY/w-d-xo.html
The most hilarious part is "VPN server doesn't keep your logs!" Yeah, right.
I'm only 1 min 34 seconds into this but wanted to say:
Your content is endlessly gorgeous and informative. 200k subs is a joke compared to what you'll have in no time. Thank you!
looks like they doubled their subs in 7 months after this comment.
now almost trippled.
In March of 2023 more than tripled.
Minor corrections at 4:15.
Your data is only encrypted from your device to the VPN service. It is not encrypted between the VPN service and the destination. That traffic is done in the clear.
Also, the VPN does not do the DNS lookup on its own. That must be done at your device. The VPN service may host the DNS itself, or you can make the DNS request through the VPN. You still have to tell the VPN service where you want to go (that means resolving to an IP address) before you can traverse the tunnel.
*Your
Was waiting for this answer. Everyone talks about secure tunnel but no one mentions that it is only with your vpn server but not finial distention.
If the website uses https protocol as mentioned in the video shouldn't it be encrypted as well?
This type of quality, information and effort for a channel with 200k subs is absurd. You deserve 5M+
Nice video explanation but needs some corrections:
*Your home router external IP is live on the Internet - your ISP does not NAT it (in most cases). Doing NAT at the ISP level would be EXTREMELY CPU intensive and would break connectivity for numerous applications.
*DNS is an abbreviation for "Domain" Name System, not "Dynamic" Name System. You can host your own DNS servers or use an external provider, ie. Google. Yes, your ISP can still see your external queries unless you are doing DNS over TLS.
*The VPN tunnel is between you and the VPN provider. It is not end to end.
*Logging is very VPN provider dependent.
Thank you for pointing out browser fingerprinting! Lots of people believe VPNs are a one size fits all solution to Internet anonymity and it is simply not so.
Bro, I am a software developer. And even i didnt fully understand what VPNs did. Your explanation and the graphics helped me understand the key thing VPNs do. Not using your ISP to directly access the internet. Using your ISP just to get to the VPN provider. Now your ISP doesnt even know your meta data (what website you go to). And your ISP can not censor internet. I am saving the link to this video to my computer networks folder.
I truly don’t mean this to be disrespectful, but I find it exceedingly difficult to understand how a professional software developer could not understand what a VPN does. I mean, I could see not knowing every single detail of how they accomplish their function, but to not even know the basic underlying idea of “tunneling” through an ISP to a remote network - it’s just hard to imagine how one could have acquired the requisite knowledge and understanding to be a software developer without also acquiring an ability to infer the general functionality of a VPN.
I apologize if you legitimately are employed as a software developer. And even if you aren’t, as I said, I mean no disrespect; I just suspect the claim of being a software developer may have been an exaggeration of your credentials.
@@doomtho42 not everyone specializes in the same thing...
After watching a few videos of Animagrafs, it seems that the superlative quality of graphics and unhurried and lucid narration are the hallmarks. My grateful thanks.
The efforts put in making this video are on another level
As a former senior IT / network engineer and a current senior information security engineer of over 10 years, I was interested to watch this.
To be fair, it's fairly accurate for the most part and covers some unexpected things like fingerprinting, but I have noted some corrections for those who want to know. (I've skipping over some simple and unimportant ones that were probably for the sake of simplicity.)
1. They're called Domain Name System / name servers, not Dynamic Name Servers. Dynamic DNS is a thing, though.
2. When a client is using a VPN, it always makes DNS lookup requests itself. It's forward web proxies where the proxy-aware app delegates that and the service itself does so. However, some VPN services do host DNS servers and offer protection by configuring your client to send DNS requests to them instead.
3. A fake Wi-Fi network attack is known as Evil Twin. A honeypot is used to trick attackers into thinking they're on a real system so that they divulge information about themselves, such as their intent or Tactics, Techniques, and Procedures (TTPs).
4. ISPs can't (usually) see your GPS location, but they can look up your public IP address' geolocation.
5. Geolocation is not defined by a country's physical borders. It's defined by the public IP subnet that's been assigned to that country and organisation and tracked in a database.
Also, I'm skeptical about the claim that Deep Packet Inspection can determine the content of encrypted packets. Network Traffic Analysis perhaps.
"VPNs do not keep logs of what you do" that's what most people assume but you need to look at each country regulations of the VPN service you're using and what country you're connecting to. Plus you're just transferring your trust of your data from your ISP to the VPN service provider
These videos make my brain smile. I'm 100% a visual learner. Thank you!
Hello there Jake. I've been waiting for your upload. As always, insanely animated writen and done.
You should correct your Video: VPN Provider -are- might not collect data. Your Data has to go out somewhere (otherwise, it would be just HTTPS) to get visible. It´s more like a Tunnel: You can pass certain blockades and safe from spying from the Air, but you can still be seen when entering the tunnel, or leaving it. Also someone with access to cameras in (in front of) the tunnel (VPN Provider, the VPN Providers ISP, Governments, Hackers..) may see you. It also doesn´t save you from burglers or disguised Officers since you are communicating with them openly.
You almost just explained the whole Internet. Great video!
This is the best VPN ad I have ever seen.
Hi guys! First of all, i would like to thank the trainer of those animated videos. It's really great, as i could understand very and deeply about VPN in a matter of very few minutes, when i went through pages to try to understand VPN clearly. He did a very great job and at the same time so clear even for novice in computer studies to understand what is VPN. Thank you very much. You deserve more than our like ! Keep it up.
Please, i will appreciate more if you could provide us some more videos about network protocols and also if possible some videos about Cyber security fundamentals.
Thank you, all the best !
You just gain another subscriber, I'm an IT Network Engineer student 🇿🇦
Your videos are so informing for us normal people. Thank you
Damn! More IT vids should be made like this to make it easier for students learning.
Love it, Animagraffs!
JON this is really great content. Please don't mind those comments that say you're doing this for nord. You deserve whatever you're getting for giving us such good animated videos that makes it easier for us to understand how things work. I think you don't have to reply to those few comments they know very little about how the world works. Please keep doing this. Your channel is going to grow.
Yes!!!!! I can’t never find a video that explains VPN well. Thank you! 🙌🏼💜
Your visuals are amazingly informative and relatable... freaking love your channel now
this is probably one of the best explanations i have came across. Great video!
The best video I've found on TH-cam ❤
What I find amazing about all of this is that it happens at the speed of light. All of the world’s information at your fingertips instantly. Imagine the possibilities if we used this technology for more than looking at cat videos
We do though
Well not where I live...
These websites might travel the last few kilometers per bus.
Another masterpiece, my understanding has grown in leaps and bounds - thanks a ton!
Another superb video, having just watched your Trafalgar, decided to see what else you had done and found this absolute gem as well. After teaching IT to kids, I went on to become a Microsoft Certified Trainer and delivered quite a few TCP/IP week long courses, certainly could have done with this animation as oppose the very bad ones Microsoft came up with for me to present to paying students. Often found Teckies knew how to set up their DHCP, DNS and IIS server because they had been shown what IPs and subnet masks were and assigned to them by the IANA but had difficulty comprehending the OSI 7 layer model and it's packeting make up. Having been out of the industry for 10 years, I now find a woeful ignorance of the most basic TCP/IP concepts by ISP and VPN support staff, who generally just tell you to try another protocol. This video in my opinion should be enforced watching several times by those who purport to provide VPN technical support, especially a company called SurfShark
This isn't an dis on Animagraffs; he puts together great education videos. This is a major dis on "VPN" providers. What they provide are NOT VPNs, they may use VPNs principles to do what they do, but the service they actually provide is a secure connection to an anonymizing proxy. Real VPNs, in simple terms, bury one network connection inside another (usually encrypted) in a way that allows two or more sites to form a single private network, regardless of physical location limitations.
The whole VPN space has this surrounding air of insecurity. I limit my work to knowable principles, because actually confirming what's going on at a big VPN company seems impossible. And people discussing VPNs are divided about every single part of the process.
@@animagraffs Yeah, I understand your approach to this. You cannot be an expert in everything, but you do put an amazing level of detail into your videos. But I have tertiary degree in computing, and 20+ years of experience in the computing industry. So, I do know what I'm talking about here. It just pisses me off to see all these "VPN" provides misleading the public all the time over what VPNs really are.
"dns looks for closest ip for the website" this is incorrect. That assumes CDN. Dns will only look for the single ip configured to hostname
Correct.
Very nice presentation, well structured and styled.
Virtually the best explanation in youtube! Another great video! Please don't stop making videos.
The was really neat. Thanks, Jake, for your narration and visuals.
This is awesome Jake! Thanks for teaching me this today
Keep the videos coming!!. they help explain things in a easy way and i like how u show visual aswell 👍
I can't believe how good your content is. AMAZING JOB. Thank you!
Finally a clear explanation! I enjoyed the video very much. You just earned a sub!
Thank you for explanation how does VPN work! Keep up doing the great work!
Excellent visual and explanation
- the VPN software encrypts your data before it leaves your device, its already scrambled when reaching your router
- from there your router forwards tge packet to your ISP which forwards the cipher text to your VPN server
- the VPN handles the dns look up process/resolution
Well done, JON. Will you do an animation of the processes that convert solid waste ?
Amazing work! Thank you for putting this together.
A VPN uses Layer 2 Tunneling Protocol with the IPsec security suite to secure the layer 3 internet layer. It uses AES encryption to encrypt the packets on top of the data. In essence, it is definitely "secure" from eavesdroppers including your ISP.
Depends on the VPN and its configuration.
This is great! Much better than the "military grade" buzzwords going around.
Clear and direct information. Good job 💯
Best explanation of how a VPN actually works!!
next suggestion - how stock/forex exchanges work? how they are able to show the same price across all exchanges with little variations instantly?
Good job. Some VPN service providers do not keep logs and some do. So it is incorrect to say the VPN providers do not keep logs (you may want to update the video)..
beautiful presentation. like the engine video, makes the subject understandable at a high level.
Superb work !
Wow. That’s such a work. Keep it up!
Do a similar video on tor. Will be cool to watch.
this is the most convenient ad ever made!
This is why I still use the tube. Great content
Amazing content! I have a question: Can a destination site detect that IP address of VPN is used instead of your real IP address? Or is it impossible to detect it?
Clear, simple and thorough information. I just love it and I am amazed by your animation skills and your vulgarization! Please make more !! :)
nice explanation
Such a good explanation😃
Thank you, this is a really good video explaining how it works
Yeah, I was confused about "it encrypts your requests" thing when you need a server/computer/service to have specifivlc requests
Thanks!
One of the best channel
Amazing info! keep it coming
Very informative. Thanks
As someone with almost
5 years of *HTML*
4 Years of *Python* and
3 Years of *CSS*
You couldn't be more in the wrong.
Do you know all this stuff or do you think of something cool and research it. Your videos are really cool, i like how you visualise it.
These video's end more abruptly than Janet Jackson songs.
This is amazing demonstration...i knew fairly little about vpns. thank you Animagraffs. But i do have one question. Does the router/wifi-hotspot see your browsed activities?
Thank you, it was useful
Love you animations; I’m a tactile learner so this is amaze
"they don't keep logs" bahahahaha
What you said about china it's true we can't use whatsApp facebook in China without vpn
if you made a video explaining all the systems of an ordinary car to help people pass ASE exams; you would recieve so much profit. The videos are great
WOW :O
I am amazed. Great job
Would really like to know - "who owns and controls these VPN companies?" Don't see companies like Google, Microsoft, Norton, etc. Are these VPN companies based in Eastern Europe, China, where? Who are the major shareholders? How can we be sure the VPN company does not do nefarious things to know our data that is not encrypted? How can we feel safe if the owner of the VPN is secret?
Those questions seem unanswerable at the moment, so I didn't report on that info.
@@animagraffs Thanks - but isn't the owner of the VPN important in your mind, the owner can filter & grab data before encryption ?
vpns something we iranian use always . tnx for explaining the hople process
Nice video but I still don't understand how the first ISP server reroutes the traffic to the VPN server to make the rest. How does it work?
You guys should end on and that's how blank works so we know how the video ends. The ends are kinda abrupt.
Could you make a video regarding the engineering of Bluetooth?
Awesome!
Are packets sent from your Home router to the ISP's servers? Or is it sent to ISP routers or switches via local loop? Also, what about NAT on your Home Router?
I don't think NAT is really relevant, I think he avoided it as it's just additional complexity, so he just left it at how your router has one IP for all your devices.
Your videos are awesome 👏
Great videos! Keep it up.
your videos are tremendous. Are you or your brother engineers?
Something tells me this guy is the type who drops out of school because it's too easy...
I left college after just one year, in the early 2000's, and never went back. Not really because it was too easy, but because I was already getting into web design and 3D stuff, and college was expensive since I paid everything myself by working grueling summer jobs that I hated.
Professors piled on the busy work and acted like I should be grateful, which really, really turned me completely off to the whole thing. The thrill of learning is what fuels the resulting hard work. I can't be part of a system that's only work and no thrill or fun.
But you're partially right, I did drop out of college. lol. Way before it was "cool". And I never had student loans.
Regarding with anonymity, I beg you to briefly mention Tor network.
The quest for true anonymity is so deep, and falls outside the scope of a discussion on VPNs alone. In my research I saw that apparently even Tor connection points may be tampered with by state actors. Truly motivated folks were talking about using entirely separate computers for some activity, since even the operating system can give up tiny details about identity. It's a really deep rabbit hole to achieve actual anonymity, if it's possible at all.
@@animagraffs linux master race
4:00 "your VPN does not keep a log"
How can you prove that statement? Technically they can.
I can't prove that statement as it's outside the scope of this video. You'd have to do your own due diligence in trusting a particular company.
I would appreciate if you could make a video on the fuel cell used in automobiles.
Tor/Onion, next?
Please make video on How computer works full deep info , and how codes works on hardware software
wouldn't the VPN server un-encrypt the packet when it gets it then send it to the destinations and then re-encrypt it before sending it to your ISP. how else would the destinations understand what the packet is if it was still full encrypted
Can you do how a steam locomotive works???
You gotta working on the ending. It's always abrupt.
haha I love it! No repeating things we already know, begging for subscribers, or wasting time. When we're done, we're just done. I know it's kinda weird but the alternatives are so tired and overused.
@@animagraffs A simple fade out would suffice of both music and video. no need to beg for subscribers or anything like that. Other than that, amazing job
@@Schpit agreed. That's what I tried to convey. Feels like the ending is cut off just a second before the video is truly ended
@@mns5182 Still love it ... THERE SHALL BE NO FADE, and videos will end abruptly and uncomfortably FOREVER MORE
@@animagraffs Hahahaha fair enough then. Keep doing it how you want it then. If you are happy with it then thats all that really matters! keep up the great stuff
Hi Jake, You content is absolutely amazing. Thanks for the good work. I would love if you can make a video on how the car cooling system works. Thanks in advance.😊
does the isp know what data we have ordered to our device?
I don't have an education in this kind of stuff so this might not make sense, but wouldn't the VPN be more secure if their servers were between you and the ISP in this process, rather than between the ISP and your destination?
Because if the data goes from your house to the ISP, people can still snoop and know where you are roughly physically located, right?
At each stage of the journey, data is wrapped in new container packets. I showed some of that process -- where your router hides which device in your home sent the request from the outside world. When your VPN gets your data and sends it through their servers, it gets wrapped in a new packet that doesn't have openly visible GPS location from the original request. Only the new GPS location of your VPN server. My mockup is a bit limited to show this process, but that's what's actually happening at each stage.
@@animagraffs Thanks! So when you say your router hides which device in your home sent the request, it is still apparent that the request came from your router/home, right?
It seems like with the setup shown, the ISP knows that you requested something from somewhere, whereas if the VPN server came in between you and the ISP, all the ISP would know is that someone requested some specific content.
At a glance it sounds to me like it'd be more private for your identity to be hidden rather than the thing you're searching for.
That's basically impossible. ISPs exist to connect you to the Internet and VPN providers are on the Internet. That's kind of like saying why don't you just move the supermarket to your house so you don't have to use roads.
“Hey what if this guy just segues to *THIS VIDEO IS SPONSORED BY NORDVPN* because he’s talking about VPN...”
*clicks video*
*clicks description*
Goddamnit I know TH-cam too well
Yeah but did you actually watch it? Cause if you did, now you know how VPN works, which is why you clicked it, right?
Some VPNs DO keep the logs, they just don't tell you.
thank you for fantastic Channel ! I have a question, my question is not about just the browser, it is about software I use on my pc , it means whole PC as device ! for example Adobe Apps, if I use VPN , it can protect my IP and Adobe don't get my real IP info? today all software try to call home! it means they try to connect to the Company which the create the Software, when it happen and you have VPN , it can prevent real IP address? Thanks sir !
Question on hidden ISP address
IF the site you are connected through a VPN uses cookies and can see your computers details like windows 7, Java ect in order to communicate back and forth Yes? So why doesant the packets ect see your REAL address? and only the fake one from the VPN servers? Can a site or hacker get your real address whos might be hacked into the site thus avoiding outside encrypted tunnel man in the middle hack?
GREAT!