Virtual Private Networks Prevent Internet Service Providers from Seeing User Browsing
Image: Pixabay

Virtual Private Networks Prevent Internet Service Providers from Seeing User Browsing

VPNs remain a key tool for online privacy, but here’s what’s changed since 2017

August 1, 2025

After Congress overturned FCC rules in 2017, ISPs nationwide gained the legal right to track and sell browsing data. In the years since, some states including California and Virginia passed their own privacy laws, but no federal consumer privacy law has been enacted. That makes virtual private networks, or VPNs, more important than ever for North Carolina users who want to keep their browsing hidden from ISPs, Wi-Fi hotspots and public networks. Here’s how VPNs work, what’s new in 2025, their limits and how to choose one you can trust.

How a VPN protects your traffic

A VPN creates an encrypted “tunnel” between your device and the VPN provider’s server. To your ISP it appears you connect only to that server rather than the full range of websites you visit. Key 2025 updates:

  • Modern VPN apps default to AES-256 encryption and WireGuard or OpenVPN protocols for faster, more secure connections
  • Mobile and desktop platforms now include built-in kill switches to block all traffic if the VPN connection drops
  • Multi-hop VPN chains route traffic through two or more servers for extra anonymity at the cost of speed

Privacy landscape since 2017

Federal privacy legislation remains stalled, but key developments include:

  • The California Privacy Rights Act gives residents rights to opt out of data sales and data minimization requirements
  • Virginia and Colorado enacted similar laws in 2021–22, with more states considering bills
  • GDPR in the European Union has forced many VPN providers to publish transparency reports and strengthen no-logs commitments

Limitations and risks of VPNs

  • Trust in the provider: Your VPN can see all unencrypted traffic. Only choose providers with audited no-logs policies and open-source apps
  • Performance impact: Encryption and server distance can slow connections, look for WireGuard-based services for minimal speed loss
  • Website blocks: Streaming platforms often blacklist known VPN IP addresses
  • Legal gray areas: Some countries block or restrict VPN use; always check local rules if you travel abroad

Alternatives and complements

  • Encrypted DNS (DoH/DoT): Prevents ISPs from seeing domain lookups without full VPN overhead
  • Tor Browser: Routes traffic through volunteer nodes for strong anonymity but slower speeds
  • Secure proxies: SOCKS5 or SSH tunnels can mask IPs for specific apps

Choosing a trustworthy VPN in 2025

  • Look for independent third-party audits (e.g. by Cure53 or Deloitte) of no-logs claims
  • Prefer providers headquartered outside the Five, Nine or Fourteen Eyes intelligence alliances
  • Choose paid plans, free VPNs often monetize user data or inject ads
  • Review server network: more locations and physical servers reduce overcrowding
  • Check for built-in leak protection (DNS, IPv6, WebRTC) and an automatic kill switch

North Carolina resources

  • File complaints with the NC Attorney General’s Consumer Protection Division at ncdoj.gov/consumer
  • Report ISP privacy violations or unfair practices to the FCC at fcc.gov/consumers
  • Attend free cybersecurity clinics at local community colleges, check your county’s Cooperative Extension office

VPNs remain the simplest and most effective way to hide browsing activity from ISPs and public Wi-Fi networks. By choosing a well-audited provider, using modern encryption protocols and combining VPNs with encrypted DNS or Tor for sensitive tasks, North Carolina consumers can reclaim control over their online privacy in 2025.