Posted on

When to Use a Mesh VPN and Four Signs You Shouldn’t

A mesh Virtual Private Network (VPN) is a secure, flexible way for remote teams to communicate over the internet.

Unlike traditional client-server VPNs that route traffic through a central server, a mesh VPN connects each device directly to others, allowing for faster, more efficient data transmission. This decentralized approach ensures that every team member can securely access the network without relying on a single point of failure.

Mesh VPNs can provide superior flexibility and security in certain scenarios, but they’re not always the best solution for every network.

Mesh VPN vs traditional VPN

Understanding the distinctions between these two networks will be easier if you are familiar with how a VPN works and basic network terminology. Let’s go through both in detail.

A traditional VPN (aka: client-server VPN or centralized VPN) runs on a main server that acts as a central gateway for all data. This is known as a hub-and-spoke model, where all of your data traffic — including files, emails, and VoIP calls from one team member to another — gets routed through the primary intersection point before reaching its destination.

The problem with this is that if the main server goes down, everyone loses access to the network. Likewise, if a cyber attacker gains access to the system, all user data becomes vulnerable.

Another major complaint regarding traditional VPN technology is its unreliability. Specifically, since every data packet must flow through one central hub, sudden increases in traffic can create bottlenecks that slow down performance. If this happens during peak hours, for instance, users will be battling for bandwidth and get frustrated by network latency as a result.

Of course, you can sometimes restore network performance by turning off your VPN, but then you leave your network open to outside threats.

SEE: Learn how to check if your VPN is working.

A mesh VPN is decentralized. Each device acts as both a client and a server, enabling direct communication with other devices in the network. In this way, it spreads network access across the entire system by connecting multiple devices, each acting as a point in the network.

Originally developed for military use, mesh technology was created to solve the problem of spotty connectivity in the field, keeping team communication secure and smooth in any location. Categorized as a Peer-to-Peer (P2P) model, the strength of a mesh VPN lies in its ability to route information among multiple pathways — which is much more efficient than routing through a central managing server.

SEE: Learn more about the differences between client-server and P2P networks.

On a mesh VPN, each node is its own access point, ensuring continued internet access for all users even if one loses connectivity. Instead of routing information along one pathway from the main server to each user, data travels from node to node along the fastest route available at any given moment, supporting faster service even with multiple users on the network.

With the traditional hub-and-spoke VPN, your central server gateway sits in one specific location. The farther you travel from this central hub, the slower and weaker your connection will be — especially as more family or team members hop onto the network. The solution offered by mesh VPN implements more hubs and/or nodes, creating a stronger connection across a wider space.

Smart devices such as phones and watches can act as nodes — and so can routers, desktop computers, gaming consoles, and additional servers. Together, these can all help create a convenient wireless network capable of providing reliable coverage across all areas of a home, an office building, or a remote working location.

Mesh VPNs still use at least one central server, called a control plane, to handle system-wide configurations and updates. From there, admins can customize various network settings, implement security measures, and adjust which nodes can communicate with each other. Keep in mind that you don’t have to manage this system yourself, as the best enterprise VPN providers offer cloud-hosted options, so you don’t have to manage it yourself.

Full mesh vs partial mesh VPN

In a full mesh VPN, every device or node is directly connected to every other device in the network. This means that data can be transmitted between any two nodes without needing to go through a central point. This design offers redundancy and flexibility, as multiple communication paths are available between devices. However, it also requires more careful management of each node’s connections and resources.

A partial mesh network connects only specific nodes, coordinating which devices can communicate with one another based on network needs or roles. This approach can reduce complexity and resource use, as fewer direct connections are needed. Each node in a partial mesh can be individually programmed, which makes it an ideal setup for testing new software, security features, or configurations on a small scale.

Downsides to mesh networks

Despite how mesh VPNs address many of the issues associated with traditional hub-and-spoke networks, there are some notable trade offs:

  • Higher latency: Since data passes through multiple devices before reaching its destination, the network can experience higher latency, particularly with larger networks.
  • Scalability challenges: While mesh networks scale well, the number of connections grows exponentially as more devices are added, potentially leading to performance issues or management difficulties.
  • Security risks: More devices connected directly to each other increases the attack surface, requiring robust security measures to mitigate risks.
  • Resource usage: Mesh VPNs use more system resources due to the need for each device to handle its own traffic and data management, potentially impacting performance.

Let’s talk about a few of these downsides, as they might surprise readers.

With security, for example, we’ve talked about how the decentralization of a mesh VPN has advantages — but it also comes with new vulnerabilities to network security threats. With more devices connected directly, the attack surface increases — each device connected to the mesh VPN becomes a potential entry point for malicious actors.

Network latency can be an issue, as well, especially in partial mesh networks where data is forced along a specific route. On really large networks, this can be a big problem.

These downsides can certainly be addressed. To ensure low latency for employees relying on a mesh VPN, for example, admins can optimize routing paths to prioritize direct, low-latency routes between devices. They use network monitoring tools to identify issues early, prevent congestion, and maintain smooth data flow.

When to use mesh VPN

The introduction of mesh VPNs provided a useful stop-gap solution for the increasing number of businesses moving toward a hybrid work model. By setting up remote VPN access, team members could work from any location using their home or Local Area Network (LAN) and access all shared private network resources. Today, many organizations still rely on this P2P model — which works really well for large teams operating from various locations.

Mesh VPN can also be configured to support an existing hub-and-spoke system, siphoning off some of the data burden to streamline the user experience. In fact, a hybrid system known as Dynamic Multipoint VPN (DMVPN) combines both the traditional and mesh approaches. With a central server acting as the primary gateway for incoming traffic, all intra-network communication occurs on the P2P network.

Nevertheless, larger companies with sizable IT budgets are ultimately moving toward more secure alternatives to VPN technology—and growing concerns over intra-network vulnerabilities have given rise to options such as Zero Trust Network Access (ZTNA) and Software-Defined Wide Area Network (SD-WAN).

While mesh VPNs focus on walling out external threats, both ZTNA and SD-WAN technology implement security measures within the network as well. These approaches treat even authorized users as potential threats, only allowing access to specific role-based files and pathways.

SEE: Check out my full post on when to use SD-WAN or VPN.  

That said, mesh VPNs remain a comparatively cost-effective solution for companies who need to share a reliable network and aren’t particularly concerned about the storage of highly sensitive data. At the end of the day, mesh system complexity — while greater than that of a traditional VPN — is much more manageable and easily scalable than ZTNA and SD-WAN.

So, while those alternatives are directly designed to tackle latency and cybersecurity issues, they are probably better suited for businesses with robust IT budgets, high-risk privacy concerns, and tons of users.

SEE: Learn network security architecture best practices and how to apply them.

Four signs you shouldn’t use a mesh VPN

1. It’s illegal in your country

VPNs are legal in the U.S. and many countries around the world. There are a few nations, however, that ban or restrict their use—such as China, Iraq, Russia, and North Korea. Be sure to double-check the regulations in your specific areas of operation before implementing this system.

2. Your team is small and centrally located

For home-based businesses and teams that operate within a smaller office space of around 5,000 square feet, a mesh VPN might be overkill. One central server may work just fine for your needs. The best VPN solutions for small businesses offer are fully-hosted, which means you don’t have anything to set up and zero maintenance moving forward — employees will just sign into the service.

3. You have many untrusted devices on your network

When you have a large number of untrusted devices on the network, such as contractors, or third-party vendors, using a mesh VPN can be risky. Any untrusted device can potentially compromise the security of the entire network. This makes it harder to enforce strict access controls and monitor user behavior, increasing the risk of unauthorized access or insider threats.

4. Your IT resources are limited

Setting up and maintaining a mesh VPN requires significant IT knowledge, especially when configuring multiple access points and managing the control plane. If your team lacks the expertise or time to properly manage these tasks, the complexity of a mesh VPN could lead to more challenges than benefits. In such cases, a simpler solution may be more appropriate to avoid ongoing maintenance issues.

Posted on

SD-WAN vs VPN: How Many Tunnels Do You Need?

A virtual private network (VPN) is a marvelous tool for protecting people and their data while browsing the internet, especially when working from unsecured or weakly protected networks like those at public libraries and coffee shops.

From a business perspective, VPNs keep business data secure when employees work with sensitive material like trade secrets and proprietary information. VPN tunnels are also instrumental, as they provide users with an encrypted connection between their device and the internet.

However, given the enriched data flow and volumetric information brought on by VPNs, you and/or your IT team should still monitor them regularly. The technical feedback you can gather by doing so will help you finetune and configure your VPN connections for optimal performance.

As an alternative to VPNs, SD-WAN (Software-Defined Wide Area Network) offers businesses many more use cases. For instance, organizations that lean heavily on Voice over Internet Protocol (VoIP) phone services can use it to simplify enterprise-scale network management.

What problems does SD-WAN solve?

I’m assuming most people interested in this post are comfortable with networking basics, like WAN (Wide Area Network) that spans a large geographic area, connecting multiple local networks (LANs) across cities, countries, or even continents. So we’re going to skip the basics. If not, check out this guide on essential networking fundamentals before continuing on.

SD-WAN represents a logical progression from traditional WAN, providing benefits like dynamic traffic management with centralized control. It allows users to deploy different connection types interchangeably by using software to abstract the network layer.

The fundamental benefit of SD-WAN over traditional WAN is its ability to intelligently route traffic across multiple connection types, optimizing performance, reducing costs, and providing greater flexibility and scalability.

SD-WAN offers businesses improved network performance, cost savings, enhanced security, and greater agility by enabling dynamic, intelligent traffic routing across diverse connection types, making it a more scalable and flexible solution compared to traditional VPNs.

Let’s walk through why

Traffic optimization and improved network efficiency

A key advantage of SD-WAN is its ability to avoid vendor lock-in by using a virtualized architecture, allowing businesses to combine various transport services. Unlike traditional network infrastructure, which is often rigid and hardware-dependent, the best SD-WAN vendors give organizations the flexibility to optimize bandwidth across multiple connection types, such as broadband, mobile, Wi-Fi, and satellite.

This flexibility enables network administrators to prioritize critical traffic more effectively, reduce reliance on centralized data centers by eliminating backhauling, and create more efficient, direct routing paths to improve overall network performance.

Providing cost-effective solutions

Even though WAN connectivity has been around for a while, one of its peskiest challenges has always been figuring out how to connect widely dispersed data centers in a cost-effective manner. Technologies like MPLS (Multiprotocol Label Switching), for instance, provided a respite — especially for organizations operating in rugged environments—but MPLS often brings a huge cost disadvantage.

SEE: Discover other reasons to avoid MPLS and better alternatives. 

SD-WAN, however, is more practical (to deploy) and much less expensive than MPLS because it doesn’t require specialized equipment to conduct routing over the internet.

Another cost-effective aspect of using SD-WAN is its ability to aggregate multiple, less expensive internet connections (such as broadband, LTE, and Wi-Fi) to create a more reliable and efficient network. This reduces the need for expensive, dedicated leased lines or private WAN circuits, allowing businesses to use more affordable and flexible transport services while maintaining high performance.

Increased control through application-level visibility

Nothing jams up the efforts of network administrators and cybersecurity professionals more than a lack of control over their organization’s online traffic.

That said, the application-level visibility provided by SD-WAN allows you to control traffic more effectively.

For instance, SD-WAN allows administrators to fine-tune Quality of Service (QoS) by prioritizing VoIP traffic over less critical data, ensuring consistent call quality. With real-time monitoring and dynamic traffic routing, SD-WAN can adjust network paths to avoid congestion, and ensure optimal performance for VoIP applications even during peak usage times.

Centralized management

SD-WAN is the network tool of choice for enterprises with multiple office branches that want to maintain a centralized oversight.

In general, a ton of network administrators face the challenge of having to orchestrate a gauntlet of deployed devices and endpoints, so

SD-WAN is a logical choice because it makes networks more manageable and cost-effective. With centralized management to handle data packets and workflows between branches, network operations are simplified company-wide.

Cybersecurity administration

Because of its centralized network management, SD-WAN allows you to deploy uniform security measures including dynamic encryption tunnels, IP security (IPsec), and next-generation firewalls (NGFW) to ensure that all traffic is protected. Additionally, SD-WAN offers advanced features like network segmentation, which isolates critical parts of the network to reduce risk, and intrusion protection to detect and block potential threats.

These built-in security features work together to provide end-to-end encryption, making SD-WAN a powerful solution for defending against network security threats, especially in environments with remote or distributed teams. By simplifying the process of managing network security, SD-WAN makes it easier for IT teams to protect sensitive data and maintain compliance with industry regulations.

What Problems Does a VPN Solve?

A VPN safeguards online activity by providing a measure of intrusion protection against unauthorized third parties and other rogue actors. They use encrypted data transmission to prevent the intercepting and eavesdropping of connections that can occur via packet sniffing and other snooping tactics.

The best enterprise VPN services achieve this protection through VPN tunneling, which creates an encrypted connection between the user’s device and the endpoint or remote server they are accessing. If you are potentially in the market for SD-WAN, I’d start with the enterprise VPN tools first, though you may be able to get by with the one of the best VPN solutions for small business if only a handful of your employees require the extra protections.

On the private side of things, everyday consumers use VPNs for streaming and non-commercial purposes.

Privacy and anonymity

A major role of VPNs is to provide users anonymity by hiding their identity and online activity. To achieve this, a VPN creates a private digital network from a public connection to mask the user’s IP address, making it difficult for anyone to track their internet activity.

Avoiding censorship

A VPN allows users to view content from anywhere in the world. As a result, users can access forbidden websites due to censorship or geo-restrictions. VPNs are legal in the United States, but this is not true in all countries.

Avoiding censorship and surveillance is a common practice for dissenting individuals and journalists residing in authoritarian regimes. It’s also common for people who want to stream shows that are blocked or too expensive where they live.

In addition to hiding your identity anonymously, VPNs also obscure your location by redirecting traffic through encrypted, remote servers. A good VPN ensures the user’s online activity remains invisible to their internet service provider (ISP), but it doesn’t always happen that way with all VPNs.

Providing stringent cybersecurity requirements

VPNs encrypt all data that moves through your network, fortifying and boosting an organization’s cybersecurity profile. They also minimize the effectiveness of Man-In-The-Middle (MITM) attacks, especially when employees are working remotely outside of their corporate networks. This safeguards corporate data from falling into the wrong hands if a staff member unknowingly works from a vulnerable or insecure connection.

Lastly, besides ordinary marketplace uses, many (if not all) national militaries deploy some kind of VPN for secure communication as a foundational part of their tactical kit.

Remote access connectivity

Users working off-site can use client-to-site VPNs on their personal devices to access their organization’s resources from a remote server. Naturally, remote access like this typically requires them to provide authentication credentials before they are granted access to company resources.

Setting up a remote access VPN is beneficial because you can utilize it for personal and professional purposes.

SEE: Learn more about the different types of VPNs and when to use them.

Network linking across multiple sites

Large and complex organizations often use site-to-site VPNs to scale their businesses. These VPNs enable them to combine and connect multiple internal networks across different locations within their organizations.

Intellectual property protection

VPNs enhance data security by preventing data interception in transit. This is key for safeguarding intellectual property such as trade secrets, industrial designs, and proprietary information — especially when companies need to share it with third parties and contractors.

SEE: Discover more ways to protect and secure your data.

Challenges managing access at scale with VPN vs SD-WAN

The biggest concerns with large-scale VPN deployments are performance bottlenecks from too many users, network latency issues caused by centralized traffic routing, and managing tunnels, as maintaining thousands of secure connections can overwhelm VPN servers and IT teams.

While VPNs have been a foundational tool for remote access, they face significant limitations as organizations grow. Here are the key challenges of scaling VPNs and why solutions like SD-WAN are becoming more critical for modern networks.

Scalability bottlenecks and tunnel overload:

VPNs struggle to handle large numbers of simultaneous connections, resulting in network congestion and degraded performance. Managing thousands of VPN tunnels can overwhelm servers and IT teams, creating bottlenecks that slow down critical applications and user access.

Performance and application latency:

VPNs route traffic through centralized servers, which introduces delays, especially when accessing cloud-based apps or services. This extra routing increases latency, reduces productivity, and impacts the performance of real-time applications like VoIP phone systems and video conferencing.

SEE: Learn how to future-proof your VoIP phone system

Security gaps in modern environments:

SD-WAN’s software overlay integrates well with modern security strategies like Zero-Trust Network Access (ZTNA) , offering a secure foundation for remote and hybrid workforces. Traditional VPNs rely on perimeter-based security models that don’t account for cloud services, IoT devices, or widespread remote work. They lack built-in tools like traffic inspection, micro-segmentation, and identity-based access controls, leaving organizations vulnerable to modern threats.

Connectivity flexibility and resource management:

Unlike VPNs, SD-WAN allows you to consolidate and control traffic across multiple networks, dynamically routing traffic based on conditions like bandwidth utilization to avoid congestion and packet loss. Its flexible, virtualized infrastructure lets IT teams make rapid changes within minutes, optimizing both performance and resource allocation.

What about both VPN and SD-WAN?

As organizations grow, the limitations of VPNs — like congestion, latency, and security gaps — become more obvious. While SD-WAN offers improved scalability, performance, and flexibility to meet the needs of modern networks, many businesses are combining both VPNs and SD-WAN alongside other security technologies. This approach helps companies balance the strengths of each solution, providing secure and reliable connectivity for remote and hybrid teams.

Looking ahead, cybersecurity trends indicate that organizations will increasingly adopt integrated network solutions that blend SD-WAN, VPNs, and advanced security models like zero-trust to stay agile, secure, and ready for future growth.

Posted on

The 5 Best VPNs with Free Trials in 2024

VPNs,
or

virtual
private
networks
,
are
some
of
the
most
accessible
ways
to
strengthen
your
privacy
online.
They’re
also
intuitive
and
convenient
tools
we
can
use
to
access
geo-restricted
content
on
the
internet.

The
problem
is
most
quality
VPNs
require
a
paid
monthly
or
yearly
subscription
to
use.
This
becomes
an
issue
since
a
business
can’t
know
for
sure
if
a
VPN
fits
their
needs
unless
they’re
able
to
test
it
out.


SEE:



10
Myths
about
Cybersecurity
You
Shouldn’t
Believe


(TechRepublic
Premium)

Fortunately,
there
are
a
number
of
VPN
providers
offering
functional
free
trials
that
allow
access
to
premium
VPN
features
without
paying
for
an
upfront
subscription.
In
this
article,
I’ve
gathered
some
of
the
best
VPNs
with
free
trials
in
2024.


Best
VPNs
with
free
trials:
Comparison

I’ve
gone
ahead
and
broken
down
some
of
the
best
VPN
free
trials
available
on
the
market
today.
In
particular,
you
can
check
out
trial
lengths,
feature
restrictions
and
number
of
servers
in
the
table
below:


Private
Internet
Access

CyberGhost
VPN

NordVPN

ExpressVPN

Proton
VPN
Length
of
free
trial
7
days
24
hours
for
desktop;
3–7
days
for
mobile
7
days
7
days
Free
version,
free
forever
How
to
access
trial
Via
mobile
apps
(usable
on
other
platforms
after)
Windows,
macOS,
Android,
iOS
Via
Android
only
(usable
on
other
platforms
after)
iOS
or
Android
only
Free
version
on
Windows,
macOS,
Linux,
Android,
iOS
Requires
payment
information
No No Yes Yes No
Feature
restrictions
None None None No
access
to
desktop
app
Slower
speeds;
access
to
only
five
server
countries
Pricing
of
paid
plan
$2.19
per
month
(2
years)
$2.19
per
month
(2
years)
$4.69
per
month
(2
years)
$6.67
per
month
(1
year)
$4.49
per
month
(2
years)
No.
of
servers
10,000–35,000
(reportedly)
9,000+
(reportedly)
6,300+ 3,000+
(reportedly)
4,900+
servers
Server
locations
91
countries
100
countries
111
countries
105
countries
91
countries

VISIT
PIA
VPN

VISIT
CYBERGHOST

VISIT
NORDVPN

VISIT
EXPRESSVPN

VISIT
PROTON
VPN

Private
Internet
Access
VPN:
Best
VPN
free
trial

Private Internet Access Logo
Image:
Private
Internet
Access

Private
Internet
Access
VPN
is
an
all-around
solution
that
carries
fast
speeds
and
an
extensive
server
network.
In
particular,
you
get
servers
spread
across
91
countries,
allowing
you
to
unblock
geo-blocked
content
easily
while
getting
good
speeds.

Free
trial
details

PIA
VPN
offers
a

seven-day
free
trial

that’s
accessible

via
its
mobile
apps

on
the
Google
Play
Store
and
the
iOS
App
Store.


SEE:



Free
VPN
vs
Paid
VPN:
Which
One
Is
Right
for
You?


(TechRepublic)

I
personally
recommend
PIA
VPN’s
free
trial
due
to
its

unlimited
simultaneous
device
connections
.This
lets
you
test
its
premium
VPN
on
multiple
devices,
as
its
unlimited
device
threshold
enables
you
to
use
PIA
VPN
on
your
desktop
or
other
devices
after
accessing
its
mobile
free
trial.

Customizable bookmarks in PIA VPN.
Customizable
bookmarks
in
PIA
VPN.
Image:
Luis
Millares

Does
it
require
payment
or
credit
card
information?

No,
PIA
VPN’s
free
trial
via
mobile

does
not
require
any
payment
information
to
access
.
When
I
tried
its
free
trial
using
my
Android
smartphone,
I
didn’t
have
to
input
any
credit
card
to
activate
the
seven-day
trial.

Pricing


  • 1
    month:

    $11.99
    per
    month.

  • 6
    months:

    $7.50
    per
    month.

  • 2
    years
    (+2
    months
    free):

    $2.19
    per
    month.

Features

  • Servers
    across
    91
    countries.
  • WireGuard,
    OpenVPN
    and
    IKEv2/IPSec
    protocols.
  • RAM-only
    server
    technology.

Pros

  • Unlimited
    simultaneous
    device
    connections.
  • Fast
    overall
    VPN
    speeds.
  • Customizable
    app
    bookmarks.

Cons

  • WireGuard
    protocol
    may
    be
    buggy.
  • No
    free
    version.

If
you
want
to
learn
more,
check
out
my

full
Private
Internet
Access
VPN
review
here
.

CyberGhost
VPN:
Best
desktop
free
trial

CyberGhost VPN Logo
Image:
CyberGhost
VPN

CyberGhost
VPN
is
a
superb
option
for
users
who
want
a
diverse
server
fleet
and
easy-to-use
specialized
servers.
Right
now,
CyberGhost
offers
servers
from
100
countries
and
smartly
segregates
its
servers
so
they
are
best
optimized
for
streaming,
gaming
and
torrenting.
Its
desktop
free
trial
is
also
one
of
the
most
accessible
on
this
list.

Free
trial
details

CyberGhost
offers
a

24-hour
free
trial

available
for

Windows
and
macOS

through
its
official
website.
It
also
offers
a

three-day
free
trial

for

Android

smartphones
and
a

seven-day
trial

for

iOS
devices
.

I
chose
CyberGhost
VPN
as
the
best
for
desktop
since
it
doesn’t
require
any
extra
hoops
to
access.
You
don’t
need
to
sign
up
via
its
mobile
app
or
create
an
account
on
a
different
device.
All
you
need
to
do
is
go
to
CyberGhost’s
official
website
and
start
a
trial.

CyberGhost VPN’s main Windows dashboard.
CyberGhost
VPN’s
main
Windows
dashboard.
Image:
Luis
Millares

This
is
on
top
of
not
requiring
any
payment
information
to
start
a
free
trial.
While
I
would’ve
preferred
the
trial
to
be
longer
than
24
hours,
it’s
still
the
easiest
way
to
get
a
desktop
VPN
trial
without
handing
over
credit
card
info.

Does
it
require
payment
or
credit
card
information?

No,
CyberGhost

does
not
require
any
credit
card
or
payment
information
to
access
.
CyberGhost
VPN
is
one
of
the
only
VPNs
that
offer
a
free
trial
of
their
premium
desktop
application
without
requiring
any
payment
details
to
activate.

Pricing


  • 1
    month:

    $12.99
    per
    month.

  • 6
    months:

    $6.99
    per
    month.

  • 2
    years
    (+2
    months):

    $2.19
    per
    month.

Features

  • Specialized
    servers
    for
    streaming,
    gaming
    and
    torrenting.
  • OpenVPN,
    IKEv2
    and
    WireGuard
    protocols.
  • 24/7
    live
    customer
    support.

Pros

  • Servers
    in
    100
    countries.
  • Free
    trial
    doesn’t
    require
    payment
    info.
  • 45-day
    money-back
    guarantee.

Cons

  • Desktop
    free
    trial
    could
    be
    longer.
  • Complicated
    company
    history.

If
you
want
to
learn
more,
check
out
my

full
CyberGhost
VPN
review
.

NordVPN:
Best
for
privacy
enthusiasts

NordVPN Logo
Image:
NordVPN

If
security
is
your
main
concern,
I
recommend
NordVPN.
This
option
includes
a
variety
of
security-focused
features,
such
as
built-in
threat
protection,
dark
web
monitoring
and
Meshnet
secure
file-sharing.
It
also
recently
increased
its
server
spread,
now
offering
servers
from
111
countries
compared
to
60
country
locations
in
2023.

Free
trial
details

NordVPN
has
a

seven-day
free
trial

accessible

via
its
Android
application
.
Fortunately,
you
can
use
NordVPN
on
other
platforms
after
you’ve
signed
up
for
a
trial
on
Android.

NordVPN’s Meshnet private network capabilities.
NordVPN’s
Meshnet
private
network
capabilities.
Image:
Luis
Millares

Does
it
require
payment
or
credit
card
information?

Yes,
NordVPN

requires
payment
info
or
a
credit
card

to
access
its
free
trial
on
Android.
While
it
would’ve
been
ideal
to
have
access
without
payment
data,
I
find
NordVPN’s
heavy
emphasis
on
providing
a
variety
of
security
features
to
be
worth
a
try.

Pricing

Below
is
an
overview
of
the
mid-tier
NordVPN
Plus
subscription:


  • 1
    month:

    $13.99
    per
    month.

  • 1
    year:

    $5.49
    per
    month.

  • 2
    years
    (+3
    months):

    $4.69
    per
    month.

Features

  • Servers
    in
    111
    countries.
  • 10
    simultaneous
    device
    connections.
  • Double
    VPN
    functionality.

Pros

  • Specialized
    security
    servers
    (Double
    VPN,
    Obfuscated).
  • Independently
    audited.
  • Built-in
    protection
    against
    malware
    and
    intrusive
    ads.

Cons

  • Priced
    relatively
    high.
  • No
    free
    version.
  • Free
    trial
    accessible
    only
    via
    Android.

If
you
want
to
learn
more,
check
out
my

full
NordVPN
review
.

ExpressVPN:
Best
mobile
free
trial

Express VPN Logo
Image:
Express
VPN

A
go-to
choice
for
many,
ExpressVPN
offers
one
of
the
most
intuitive
VPN
experiences
on
the
market.
It
has
an
extremely
easy
to
use
interface
and
consistently
fast
performance.
It
has
also
shown
a
strong
commitment
to
transparency,
being
one
of
the
most
prolific
VPN
providers
that
regularly
undergo
third-party
security
testing.

Free
trial
details

ExpressVPN
offers
a

seven-day
free
trial

for
its

Android
and
iOS
applications
only
.This
means
Windows
or
macOS
users
may
have
to
look
elsewhere
if
they
want
to
test
drive
a
premium
VPN.
Despite
this,
I
believe
ExpressVPN’s
top-tier
user
experience
is
a
great
option
for
users
who
only
plan
to
use
a
VPN
on
their
mobile
devices.

ExpressVPN on/off button on its Android app.
ExpressVPN
on/off
button
on
its
Android
app.
Image:
ExpressVPN

Does
it
require
payment
or
credit
card
information?

Yes,
ExpressVPN

does
require
payment
information

to
access
its
mobile
free
trial.
While
it
doesn’t
explicitly
ask
for
payment
details
when
you
sign
up
for
a
free
trial,
it’ll
automatically
link
your
trial
access
to
the
default
payment
data
linked
on
your
mobile
device.

Pricing

Here’s
a
rundown
of
the
Surfshark
One
mid-tier
subscription
plans:


  • 1
    month:

    $12.95
    per
    month.

  • 6
    months:

    $9.99
    per
    month.

  • 1
    year
    (+3
    months):

    $6.67
    per
    month.

Features

  • Servers
    in
    105
    countries.
  • 100%
    RAM-only
    server
    infrastructure.
  • 24/7
    customer
    support.

Pros

  • Unlimited
    simultaneous
    device
    connections.
  • Affordable
    paid
    subscriptions
    across
    the
    board.
  • Well-designed
    and
    intuitive
    application.

Cons

  • Free
    trial
    is
    for
    mobile
    only.
  • On
    the
    expensive
    side.
  • Lacks
    longer
    two-year
    subscription
    option.

If
you
want
to
learn
more,
check
out
my

full
ExpressVPN
review
.

Proton
VPN:
Best
fully
free
version

Proton VPN Logo
Image:
Proton
VPN

Proton
VPN
is
a
Swiss-based
VPN
that
has
a
generous
free
version,
which
I
believe
counts
as
a
viable
free
trial.
Being
based
in
Switzerland,
Proton
is
able
to
offer
some
of
the
world’s
strongest
privacy
laws
to
its
user
base

a
meaningful
value-add
to
those
conscious
of
government
surveillance.

Free
trial
details

While
Proton
VPN
technically

doesn’t
have
a
free
trial
of
its
premium
service
,
it
has
one
of
the

more
usable
and
complete
free
VPNs

available
today.
Proton
VPN’s
free
version
is
unique
in
that
it
offers

unlimited
data
,
compared
to
other
free
VPNs,
which
impose
monthly
data
caps
that
are
easy
to
use
up.

Proton VPN’s Quick Connect button on Windows.
Proton
VPN’s
Quick
Connect
button
on
Windows.
Image:
Luis
Millares

The
benefit
of
this
free
version
is
that
it’s

free
forever
,with
no
expiry
date
compared
to
full
free
trials.
The
downside,
on
the
other
hand,
is
that
you
don’t
get
to
try
Proton
VPN’s
premium
features
and
functionality.

Its
free
version
offers
servers
in
five
countries,
encrypted
VPN
servers
and
medium
VPN
speed.

Does
it
require
payment
or
credit
card
information?

As
a
free
version,
Proton
VPN
Free

doesn’t
require
any
payment
information

to
download
or
use.

Pricing

Below
is
a
rundown
of
Proton
VPN’s
Plus
subscription
tier:


  • 1
    month:

    $9.99
    per
    month.

  • 1
    year:

    $4.99
    per
    month.

  • 2
    years:

    $4.49
    per
    month.

Features

  • Secure
    Core,
    privacy-friendly
    countries.
  • VPN
    speed
    accelerator.
  • NetShield
    ad,
    malware
    and
    tracker
    blocker.

Pros

  • Very
    generous
    free
    version.
  • Under
    pro-privacy
    Swiss
    jurisdiction.
  • Unlimited
    bandwidth
    in
    the
    free
    version.

Cons

  • No
    dedicated
    free
    trial
    of
    premium
    plan.
  • Live
    chat
    support
    for
    paid
    users
    only.

If
you
want
to
learn
more,
check
out
my

full
Proton
VPN
review
.


Frequently
asked
questions
(FAQs)

Do
VPN
free
trials
work?

Yes,
VPN
free
trials
are
designed
to
work
as
a
regular
premium
VPN
subscription.
The
main
difference
is
that
VPN
free
trials
allow
access
to
the
software
for
a

limited
time
.

They’re
designed
to
give
users
a
chance
to
test
paid
software
without
paying
for
a
full
VPN
subscription.
In
terms
of
safety,
VPN
free
trials
should
be
as
safe
as
their
fully
paid
counterparts.

If
you’re
curious
to
know
how
safe
VPNs
are,
check
out
our
recent
explainer
covering


whether
VPNs
can
be
hacked

and
why
they’re
good
business
investments
in
the
long
run.

How
long
do
VPN
free
trials
last?

VPN
free
trials
will
often
last
for
as
short
as

one
day

or
as
long
as

seven
days
.

VPN
free
trials
vs.
free
VPNs

VPN
free
trials
differ
from
free
VPNs
in
that
they
offer

all
the
premium
features

of
a
given
VPN.
In
contrast,

a
free
VPN

will
have
a

limited
feature
set

compared
to
its
paid
counterparts.
This
typically
translates
to
not
having
access
to
the
whole
server
suite,
lower
VPN
speeds
or
a
monthly
data
cap.

One
upside
of
free
VPNs
is
that
they
are

free
forever
,whereas
VPN
free
trials
will
only
last
you
a
day
to
as
long
as
a
week’s
worth
of
use.

If
you’re
interested
in
learning
more
about
the
best
free
VPNs,
I
highly
recommend
checking
out
our
rundown
of
the


Best
Free
VPNs
for
2024
.

In
that
article,
we
highlight
the
best
overall
free
VPN,
the
best
VPN
for
beginners
and
other
options
you
should
consider
in
the
VPN
space.

Do
VPN
free
trials
require
payment
or
credit
card
information?


It
depends
.From
my
experience,
many
VPN
free
trials
require
payment
or
credit
card
information
to
access.
Either
they
ask
you
within
the
free
trial
process
for
payment
information
or
they’ll
use
the
payment
method
already
linked
to
your
device
of
choice.

However,
there
are
a
handful
of
VPNs,
like
CyberGhost
VPN
and
PIA,
that
offer
free
trials

without
payment
information
.

Personally,
I
think
more
vendors
should
adopt
this
approach
as
it
lowers
the
barrier
to
entry
into
trying
out
their
software.

VPN
free
trials
vs.
money-back
guarantees

You
might
have
seen

money-back
guarantees

if
you’ve
browsed
for
VPN
subscriptions.
Most
VPN
providers
allow
you
to
refund
your
subscription
after
a
set
period
of
time
through
money-back
guarantees
that
normally
span
30
or
so
days.

While
both
VPN
free
trials
and
money-back
guarantees
allow
you
and
your
organization
to
try
out
a
paid
VPN,
availing
of
a
money-back
guarantee
requires
you
to

pay
for
an
initial
subscription
and
then
refund
within
the
allotted
time
.

For
users
interested
in
knowing
how
much
a
VPN
typically
costs,
we
have
an
extensive
guide
covering


VPN
costs
and
saving
tips
.

On
the
other
hand,
VPN
free
trials

won’t
charge
you

until
after
the
free
trial
period
expires.
Better
yet,
some
VPNs
don’t
require
any
sort
of
payment
method
at
all
and
will
just
ask
if
you
would
like
to
subscribe
to
a
plan
after
the
allotted
trial
period.

If
you’re
curious
about
which
one
is
better,
that
will
depend
on
your
business’
needs.
On
one
end,

money-back
guarantees
are
more
straightforward
to
access

since
you’ll
go
straight
to
purchasing
a
subscription
as
usual.
However,
the

refund
process

can
be
a
hassle
and
varies
among
different
providers.

Meanwhile,

VPN
free
trials
have
fewer
strings
attached

and
won’t
charge
you
upfront.
The
caveat
here
is

there
may
be
some
extra
steps

you
need
to
take
to
test
out
their
software,
i.e.,
having
to
sign
up
via
mobile
before
testing
on
a
desktop
machine.


Methodology

In
my
rundown
of
the
best
VPN
free
trials
available
today,
I
considered
a
mix
of
how
accessible
each
trial
is
and
the
quality
of
the
VPN
software
itself.

For
the
free
trial,
I
looked
at
trial
length,
feature
limitations
for
each
trial,
how
easy
it
is
to
access
the
trial
and
whether
it
required
payment
or
credit
card
information
to
activate,
among
other
factors.

I’ve
also
personally
evaluated
each
VPN
listed
above.
All
the
VPNs
mentioned
have
gone
through
our
full
review
treatment,
which
was
conducted
through
a
combination
of
first-hand
testing,
extensive
product
research
and
expert
analysis.

Finally,
I
took
into
account
how
each
free
trial
and
VPN
service
could
be
useful
to
different
types
of
users
and
use
cases.
This
is
especially
important
since
businesses
will
have
varying
requirements,
depending
on
their
needs
and
circumstances.

Posted on

Can a VPN Be Hacked?

A

virtual
private
network

is
one
of
the
easiest
ways
users
can
protect
their
online
activity.
Through
what’s
called
a
tunneling
protocol,
VPNs
encrypt
a
user’s
online
traffic
and
make
their
data
unreadable
to
prying
eyes.


SEE:



Brute
Force
and
Dictionary
Attacks:
A
Guide
for
IT
Leaders


(TechRepublic
Premium)

This
additional
layer
of
security
has
become
a
go-to
option
for
both
businesses
and
consumers
alike
to
protect
their
privacy.
According
to
Statista,
over
24%
of
all
internet
users
in
2023
used
a
VPN
to
secure
their
internet
connection.

With
this
popularity,
one
can
be
forgiven
to
ask:
Are
VPNs
invincible
against
hackers?
Are
they
susceptible
to
being
hacked?
Can
VPNs
be
used
to
steal
user
data
instead
of
protecting
it?

We’ll
answer
these
questions
and
more
below.


Can
VPNs
really
be
hacked?

Like
any
software,

all
VPNs
are
technically
capable
of
being
hacked
.
No
software
is
100%
perfect,
and
VPNs,
like
any
internet-based
software,
can
fall
victim
to
different
attacks.
That
being
said,

a
quality
VPN
will
be
incredibly
hard
to
crack


especially
if
it
has
a
secure
server
infrastructure
and
application.


SEE:



4
Different
Types
of
VPNs
&
When
to
Use
Them


(TechRepublic)

VPNs
work
by
generating
a
private
connection
where
your
internet
activity
is
encrypted
and
made
unreadable.
Your
internet
data
is
routed
to
a
VPN
server,
which
masks
your
IP
address
and
provides
you
an
additional
layer
of
anonymity
online.

This
encryption
hides
sensitive
user
data
such
as
your
IP
address,
device
location,
browsing
history
and
online
searches
from
your
internet
service
provider,
government
entities
and
cybercriminals.

While
VPNs
have
varying
types
and
sizes,
this
is
how
most
VPNs
fundamentally
work.
If
you’re
interested
in
a
more
in-depth
explanation
of
VPNs,
we
encourage
you
to
check
out
our

explainer
on
VPN
software
.
Here
we
looked
into
the
different
types
of
VPNs,
VPN
benefits
and
drawbacks,
and
a
few
popular
VPN
providers
we
recommend.

By
encrypting
user
data
and
passing
it
through
a
secure
tunnel,
VPNs
serve
as
an
easy
way
to
add
protection
to
your
online
activity.
However,
this
doesn’t
make
them
invincible.

There
are
a
few
points
of
weakness
in
which
VPNs
can
be
exploited
or
attacked
by
hackers.
Let’s
go
through
a
few
of
them:


How
VPNs
can
be
hacked

Breaking
through
VPN
encryption

One
way
VPNs
can
be
hacked
is
by
breaking
through
the
encryption.
Hackers
can
make
use
of
cryptographic
attacks
to
break
poorly
implemented
encryption
ciphers.
However,
it’s
important
to
mention
that
breaking
encryption
takes
a
considerable
amount
of
effort,
time
and
resources
to
do
so.


SEE:



Free
VPN
vs
Paid
VPN:
Which
One
Is
Right
for
You?


(TechRepublic)

Most
modern
VPNs
use
what’s
called
the

Advanced
Encryption
Standard
or
AES-256
encryption

algorithm.
This
encryption
standard
uses
256-bit
key
length
to
encrypt
and
decrypt
data
and
is
widely
recognized
as
the
gold
standard
of
encryption.

This
is
because
AES-256
is
virtually
unbreakable

requiring
millions
to
billions
of
years
to
brute
force
and
crack,
even
with
today’s
technology.
That’s
why
many
governments
and
banks
use
AES-256
encryption
to
secure
their
data.

In
any
case,
most
modern
VPN
providers
use
AES-256
encryption
for
their
VPN,
so
there’s
not
much
to
worry
about
here.

VPNs
using
dated
tunneling
protocols

Another
way
hackers
can
hack
VPNs
is
by
exploiting
dated
VPN
tunneling
protocols.
Tunneling
protocols
are
essentially
a
set
of
rules
for
how
your
data
will
be
handled
and
sent
across
a
particular
network.

What
we
want
to
avoid
here
is
using
dated
protocols
such
as

PPTP
and
L2TP/IPSec
.
These
protocols
are
older
and
considered
to
have
medium
to
low
security
by
today’s
standards.


SEE:



Are
Password
Managers
Safe
to
Use?


(TechRepublic)

In
particular,
PPTP
is
based
on
older
technology
and
is
known
to
have
vulnerabilities
that
can
be
exploited
by
bad
actors.
L2TP/IPSec,
on
the
other
hand,
has
better
security
but
also
provides
slower
performance
than
newer
protocols
available.

Fortunately,
more
modern
VPN
protocols
like
OpenVPN,
WireGuard
and
IKEv2
provide
a
good
mix
of
both
high-end
security
and
speed.

Through
DNS,
IP
or
WebRTC
leaks

Malicious
actors
can
also
steal
user
data
through
VPN
leaks.
VPN
leaks
refer
to
user
data
being
“leaked”
out
of
the
secure
VPN
tunnel
due
to
some
flaw
or
vulnerability
within
the
app.
The
main
types
of
VPN
leaks
involve
the
following:


  • DNS
    leaks

    are
    when
    the
    VPN
    exposes
    your
    internet
    activity,
    such
    as
    DNS
    queries
    or
    browsing
    history,
    to
    the
    ISP
    DNS
    server
    despite
    being
    on
    an
    encrypted
    VPN
    connection.

  • IP
    leaks

    happen
    when
    your
    IP
    address
    is
    inadvertently
    revealed
    or
    exposed
    to
    the
    internet,
    defeating
    the
    main
    purpose
    of
    a
    VPN
    in
    masking
    your
    real
    IP
    address
    and
    location.

  • WebRTC
    leaks

    involve
    a
    leak
    with
    browser
    technology
    wherein
    websites
    get
    unauthorized
    access
    to
    your
    actual
    IP
    address
    by
    bypassing
    the
    encrypted
    VPN
    tunnel.

VPNs
themselves
logging
user
data

Finally,
hacking
can
also
occur
when
VPN
providers
themselves
take
hold
of
user
data
without
their
consent.

While
many
VPN
providers
claim
to
have

no-logs
policies
,
stating
they
don’t
record
user
data,
there
have
been
times
when
VPNs
were
found
to
have
stored
user
information
regardless
of
such
policies.


Real-world
examples
of
VPN
hacks

Here
are
some
concrete
examples
of
VPNs
being
hacked
or
compromised
by
malicious
third-parties.

Ivanti
VPN
zero-day
exploits
in
early
2024

In
January
2024,

five
new
zero-day
vulnerabilities

were
discovered
in
Ivanti
Secure
VPN.
The
vulnerabilities
allowed
an
unauthenticated
attacker
to
execute
remote
code
and
compromise
systems,
possibly
affecting
almost
30,000
Ivanti
Secure
VPN
appliances
connected
to
the
internet.

Ivanti
Secure
VPN
is
a
popular,
remote-access
VPN
used
by
organizations
around
the
world.
Since
the
discovery
of
these
zero-day
vulnerabilities,
Ivanti
has
released
patches
to
address
some
of
the
vulnerabilities.

But
if
you
were
interested
in
Ivanti
and
want
an
alternative
solution,
or
if
you
were
a
former
Ivanti
user
yourself,
we’ve
rounded
up
a
list
of
the

top
four
Ivanti
competitors
and
alternatives
.

NordVPN
breach
in
2018

In
2019,
NordVPN
announced
that
one
of
its
third-party
servers
was
breached
in
2018.
In
particular,
a
single
NordVPN
server
in
Finland
was
attacked.
According
to
NordVPN,
this
was
due
to
a
third-party
data
center’s
poor
configuration
of
the
server
that
they
weren’t
notified
about.

NordVPN
says
no
other
servers
or
user
credentials
were
affected
in
the
incident.
Following
the
breach,
the
VPN
provider
said
they
had
taken
all
necessary
measures
to
enhance
their
security
and
had
undergone
audits
to
confirm
these
efforts.

Since
the
incident,
NordVPN
has
been
widely
regarded
as
one
of
the
safest
VPNs
available
today.
You
can
read
our

full
NordVPN
review
here
.

VPNs
with
no-logs
policies
caught
logging
data

There
have
also
been
a
handful
of
instances
where
VPNs
with
no-logs
policies
were
seemingly
caught
or
suspected
of
logging
user
data.



  • IPVanish
    VPN
    in
    2016
    :
    IPVanish
    allegedly
    handed
    user
    data
    logs
    to
    the
    United
    States
    Department
    of
    Homeland
    Security
    to
    track
    down
    a
    child
    pornography
    suspect.
    This
    was
    in
    spite
    of
    an
    initial
    no-logs
    claim,
    eventually
    confirming
    they
    did
    in
    fact
    provide
    logs
    to
    government
    authorities.


  • Hotspot
    Shield
    VPN
    in
    2017
    :
    The
    Center
    for
    Democracy
    and
    Technology
    accused
    Hotspot
    Shield
    of
    logging
    user
    data
    and
    selling
    it
    to
    third-parties
    via
    its
    free
    VPN
    application.


  • Norton
    Secure
    VPN
    :
    Despite
    having
    a
    no-logs
    policy,
    Norton’s
    Global
    Privacy
    Statement
    states
    that
    it
    stores
    user
    data
    such
    as
    device
    names,
    IP
    addresses
    and
    URLs

    info
    that
    we
    primarily
    don’t
    want
    a
    VPN
    to
    ever
    have
    access
    to.

If
you’re
interested
in
a
rundown
of
the
best
no-logs
VPNs,
we’ve
got
you
covered.
Check
out
our

best
no-logs
VPN
roundup
here
.


Measures
to
enhance
VPN
security

Given
these
points
of
weakness,
there
are
several
key
things
you
can
do
to
improve
your
security
and
VPN
experience.

Invest
in
a
paid
VPN
over
a
free
one

While
free
VPNs
can
be
convenient
for
the
one-off
time
you
need
to
change
your
IP
address,
they’re
not
the
most
secure
solution
out
there.
VPNs
take
money
to
operate
and
run.
With
this,
some
free
VPNs
are
known
to
sell
user
data
to
third-parties.
This
may
be
to
serve
these
users
with
personalized
ads
or
for
other
purposes.

What’s
clear,
though,
is
that
a
paid
VPN
subscription
is
going
to
offer
a
far
more
secure
overall
experience.
With
premium
VPNs,
you
get
the
full
server
network,
better
customer
support
and
stronger
security.

Check
for
no-logs
policies
with
independent
audits

You
should
also
check
for
VPNs
that
offer
both
a

no-logs
policy
and
independent
audits
.
While
promises
of
no-logs
are
important,
we
can
only
leave
it
up
to
trust
if
providers
actually
abide
by
their
words
or
not.

A
good
way
to
combat
this
is
to
look
for
VPNs
that
have
been
independently
audited.
These
are
providers
that
have
had
third-party
firms
look
into
their
software,
audit
them
and
share
whether
their
services
pass
security
standards
or
not.

I
highly
recommend
looking
at
VPNs
that
offer
both
no-logs
policies
and
third-party
security
audits.

Use
modern
security
protocols

Another
useful
measure
is
to
use
modern
VPN
protocols
instead
of
older
ones.
In
particular,
I
recommend
using

OpenVPN,
WireGuard
or
IKEv2

protocols
as
your
main
tunneling
protocols
of
choice.

While
these
protocols
are
different,
they
all
provide
high-end
security
and
VPN
speed
that
won’t
affect
your
regular
browsing.
There
are
also
proprietary
protocols
from
VPN
providers
themselves,
such
as
ExpressVPN’s
Lightway
or
NordVPN’s
NordLynx.
These
are
also
viable
options
that
provide
good
security
and
performance.

Utilize
built-in
VPN
kill
switches

VPNs
come
with
a
number
of
included
security
features
that
further
enhance
your
security.
One
of
these
is
a

VPN
kill
switch
.

Kill
switches
automatically
block
any
connection
between
your
machine
and
the
internet
that’s
not
routed
via
an
encrypted
VPN
tunnel.
This
means
that
if
your
VPN
connection
drops,
the
kill
switch
will
immediately
prevent
any
of
your
sensitive
data
from
being
leaked.

Many
modern
VPNs
include
a
kill
switch
turned
on
out
of
the
box,
but
it’s
a
good
idea
to
double-check
your
VPN
settings
to
be
sure.


Why
you
should
still
invest
in
a
VPN

Even
after
learning
the
different
ways
VPNs
can
be
compromised,

using
a
VPN
is
still
far
more
secure
than
not
using
one
.
VPNs
allow
you
and
your
business
to
hide
your
IP
address
at
a
click
of
a
button.

Hiding
your
IP
address
is
important,
as
this
can
be
used
by
malicious
actors
to
serve
you
intrusive
ads,
gain
data
about
your
location
and
gather
data
about
your
personal
identity.
VPNs
are
some
of
the
easiest
and
most
accessible
ways
to
do
this.

For
larger
organizations,
VPNs
are
also
a
great
way
to
ensure
company
data
is
kept
secure

especially
if
your
business
consists
of
remote
workers
who
access
company
resources
over
the
internet.

VPNs
also
let
you
access
region-locked
content
by
using
a
VPN
server
from
a
different
location.
This
can
be
incredibly
useful,
especially
for
businesses
that
need
access
to
various
types
of
content
in
other
parts
of
the
world.