Connect with us


How to Make & Setup A VPN Server – 2020 DIY Guide

Republished by Plato



The Internet is no longer a safe place. Sometimes it seems that the Internet was designed to make it easy for governments, businesses, and snoops of all sorts to spy on regular people. So it is no surprise that vast numbers of people are using VPNs to protect themselves.

How to set up your own VPN

But even the best commercial VPN services have their weaknesses. That’s why more and more people are looking to create their own VPN.

It is also 2020 and with everything that is happening in the world you may be tight on money, looking to pass the time in lockdown etc.

In this article, we’ll look at the various reasons to set up your own VPN as well as reasons not to do so. We’ll also talk about three ways to get the job done and look at one of them in more detail.

By the end of this article, you should have a good sense of whether or not setting up your own VPN makes sense for you, and which approach you would like to take.

Reasons to Setup Your Own VPN

There are lots of reasons to use a VPN in today’s world. But since you are here, we assume you already know why you need a VPN. We further assume that you are trying to decide between using a commercial VPN Service like ExpressVPN or NordVPN or creating your own VPN.

To help you make that decision, here are some good reasons to setup your own VPN instead of subscribing to a commercial service:

  • You want the benefits of a VPN Service without the monthly payments.
  • You don’t want to take the chance that your online activities will be logged by a VPN Service. (Although, services like ExpressVPN have proven themselves to be zero log time and time again in various legal battles)
  • You want access to your home network from anywhere in the world.
  • You want access to local resources (your home Netflix account, for example) when you are in a different geographic location.
  • You want to give other people access to resources on your home network.

Reasons Not to Setup Your Own VPN

While there are some good reasons to set up your own VPN, there are also a lot of reasons not to do so. These include:

  • You don’t have a fast Internet connection – You need both fast upload and download speeds wherever your VPN Server is located or it will slow down everything connected to your personal VPN.
  • You need a VPN to connect to resources in other geographic locations – VPN Services with multiple servers let you make it appear you are located in any of dozens, even hundreds of locations around the world. Since your VPN would have only one server you can only appear to be located in one place.
  • You want to hide your IP Address – If you build your VPN Server on your own hardware, it will have an IP Address associated with your home network.
  • You don’t want to handle the maintenance – It falls on you to maintain and update the VPN Server as well as the hardware and software it runs on.
  • You have to have the technical ability to set up the VPN Server and clients.
  • You want to hide your payment and identity information fully. The VPN you setup yourself might be safe from logging, but if you purchased the server you tunnel through, with your real name and payment details you are much more vulnerable than using a VPN service.

VPN Basics

If you are considering setting up your own VPN, you’ve probably got all the basics down already, but just in case, we’re going to start at the beginning. If you are clear on this stuff already, go ahead and skip ahead to, “Three Ways to Setup a VPN of Your Own.”

When you connect your device to an Internet resource without a VPN, the contents of the messages going back and forth are potentially visible to snoops. In addition, for the Internet to know where to send the messages, each message must expose a header that contains your IP Address as well as the IP address of the Internet resource you are connected to.

Your IP Address Can Be Seen If You’re Not Using a VPN

So everything is visible to snoops with the right tool.

Many Internet resources try to stop snoops with HTTPS. This is an Internet protocol that automatically encrypts the contents of messages. This can definitely help since it prevents snoops from seeing the contents of the messages going back and forth.

But HTTPS doesn’t do anything to prevent snoops from seeing that you (a device at your IP Address to be more precise) are communicating with that particular Internet resource. Using a VPN eliminates this problem. Here’s why:

A VPN addresses this problem by putting a VPN Server in the middle of the conversation. The VPN Server sits between your device and an Internet resource. Your device only connects to the VPN Server. The Internet resource only connects to the VPN Server. The VPN Server passes messages back and forth between your device and the resource.

This helps because the VPN Server uses its own IP Address when communicating with the resource on behalf of your device. Anyone spying on the connection between the server and the resource would only see the IP Addresses of the VPN Server and the Internet resource. Your privacy is protected on this part of the connection because no one looking at this connection can see your IP Address.

VPN Diagram

But that still leaves the connection between the VPN Client and the VPN Server. To address this part of the problem, the client and server encapsulate messages passing between them. That is, they encrypt the entirety of the messages between the device and the resource. Then they include the encrypted messages inside another message. This second message is what goes back and forth between the client and the server.

The advantage of doing this is that only the second message’s header information needs to be visible to the world. And all that message’s header can reveal is that your device and a VPN Server are communicating with each other. Snoops can’t see anything of the original message because the whole message, including the header, is encrypted in the body of the outer message.

At the VPN Server, messages coming from your device are extracted from the body of the outer message and decrypted. Then, in the header of your device’s message, the IP Address of your device is replaced by the IP Address of the VPN Server. This modified message is what gets sent to the Internet resource.

Messages coming from the Internet resource arrive at the VPN Server. There, the IP Address of the VPN Server gets replaced by the IP Address of your device. This modified message then travels down the tunnel to the VPN Client in your device, where it is extracted, decrypted, and passed along to your device as if the VPN wasn’t in the middle of everything.

Guide on How to Setup Your Own VPN

As we’ve just seen, the VPN Server is the core of a functional VPN. In the rest of this article, we will look at ways to set up your own VPN Server and ignore the VPN Client. There are two reasons for this.

  • The VPN Server you set up will dictate how you need to set up your VPN Clients.
  • There are way too many devices you can connect to your VPN. If we tried to talk about the VPN Clients for each we would never finish writing this article.

As it turns out, setting up your own VPN Server is plenty complicated enough for one article. We’ll start exploring this topic by looking at the three ways to set up a VPN server of your own.

Three Ways to Setup a VPN Server of Your Own

There are three ways to setup your own VPN Server. The way you go will depend on what you plan to do with the VPN and what hardware you will be using. You can set up the VPN Server:

  • On your router – If you are using a router with built-in VPN capabilities, or your router supports custom firmware like DD-WRT or OpenWrt, you can set up the VPN Server on your router.
  • On your own computer – If installing the VPN Server on your router isn’t an option, you can set up a VPN Server on a spare computer, even something tiny and low-powered like a Raspberry Pi. This is relatively easy to do, particularly if you use a computer running Microsoft Windows, which has built-in VPN capabilities. Of course, if you go this route, you will need to keep the computer that hosts your VPN Server running whenever you want to use the VPN.
  • On a cloud service – This approach doesn’t require you to have any additional hardware. However, if you host your VPN Server on a cloud service, you need to keep in mind that the cloud service will be able to see whatever you do with the VPN.

Let’s look at each of these options in more detail.

Setting Up a VPN Server on Your Router

Some home and business routers have a VPN Server built right into them. To use it, you simply need to log into the router, then turn on and configure the VPN Server. If your router has this capability, the manual that came with it should give you instructions on how to activate it. If not, a search formatted something like this should lead you to those instructions:

Router name VPN configuration

A more common situation is where your router doesn’t have a built-in VPN Server but “supports” one. This typically means that you can install third-party firmware on the router and that when the right firmware is installed, the router will be able to function as a VPN Server.

Three types of third-party router firmware are the most popular. These are:

Not all routers support these firmware packages. To find out if yours does, you’ll either need to dig through your router’s documentation or check the site of the firmware you want to use.

  • DD-WRT has a Router Database where you can search for your router to see if it is supported.
  • The main Tomato page linked above lists the routers that are known to work with this firmware.
  • OpenWrt has a Supported Devices page with the information you need.

Even if your router does support one of these firmware packages, installing new firmware on a router is not a job for a computer beginner. While the sites provide detailed instructions for installing their firmware, there is a lot more involved than running an install program.

And one possible result of making a mistake is turning your router into a useless piece of junk that you can only throw away.

Here’s a high-level view of the DD-WRT installation process:

DD-WRT installation process

As you can see, this isn’t a spur of the moment project. But if you do decide you want to give it a go, you’ll find more information in our guide on ‘How to Set up a VPN on a Router.’

Setting Up a VPN Server on Your Own Computer

If your router doesn’t support third-party firmware, or you don’t want to take the chance of wrecking it, you can install a VPN Server on one of your own computers. Doing this will allow you to have access to files on the computer that hosts the VPN Server, as well as resources on your network that are accessible from the computer.

The easiest route is to use a Windows or Mac desktop that you are willing to leave running 24 hours a day. After all, a VPN Server does you no good if the computer it runs on is turned off when you need it.

Turning a Single-Board Computer into a Dedicated VPN Server

A slightly geekier approach is to take a small device like a Raspberry Pi and turn it into a dedicated VPN Server. This approach has the advantage of not tying up a larger, more expensive, more power-hungry computer for this single task.

Raspberry Pi – Photo courtesy Ruth Salinas Correa

Even a Raspberry Pi is potent enough for a basic VPN Server.

While this is a cool way to go and appeals to the geek side of your author, there are a few disadvantages to this approach:

  • You need a Raspberry Pi to dedicate to the task.
  • It adds an additional level of learning to the project if you aren’t already familiar with these devices.
  • The performance of the VPN could suffer. Encrypting, encapsulating, and decrypting messages takes a lot of computing power and small devices like this will do the job slower than full-sized machines.

If this approach appeals to you, we suggest you visit the PiVPN site. It shows you how to set up OpenVPN on a Raspberry Pi with a minimum of fuss and bother. Or watch this video:

Setting Up a VPN Server on a Cloud Service

Setting up a VPN Server on a cloud service eliminates the need for your own hardware. You don’t need to hack your router or dedicate a computer to playing the role of VPN Server. This can be a convenient way to go.

But there are drawbacks to this approach as well. When you set up a VPN Server on a cloud service, you do so by installing software on a virtual machine running on the cloud services servers. This means that your VPN Server will be slow since it will be running on distant, simulated hardware.

It also means that you need to trust the cloud service completely. Everything you do will happen on their hardware, using their virtual machines. This leaves you with the same problem as using a commercial VPN Service: you need to trust a third-party.

The difference here is that commercial VPN Services sell themselves on their commitment to protecting your privacy. Services like ExpressVPN and NordVPN base themselves in jurisdictions where your privacy rights are protected. They cannot easily be forced to log your activities and share that information with the NSA, MI6, or whoever else is out there trying to spy on you.

Cloud services have a very different business model and are often based in places like the USA, where your privacy is not well protected. In our opinion, the chances that a cloud service would log your activities on their own, or be pressured into it by their local government, are much higher than with a top-notch commercial VPN Service.

How to Set Up a Personal VPN Server on DigitalOcean

One of the triggers for writing this article was seeing some online claims that it is quick and easy to set up a VPN Server on a cloud service. With people claiming you could have a VPN Server up and running in 10 minutes for only a few dollars a month (or even free for the first year), we thought we should investigate.

What we found was not encouraging.

The approaches we found a FOSS VPN Server called Algo. Algo seems to be a great software and works as advertised. It provides encrypted communications between your devices, and the Algo VPN Server running on Amazon EC2, DigitalOcean, Microsoft Azure, and other similar services.

Algo VPN

But it doesn’t give you anonymity, and it doesn’t support the commonly-used OpenVPN protocol.

The problems come in with fast and easy claims. Unless you are a computer tech with Linux experience, setting up Algo isn’t easy or fast. It takes around 20 steps, many of which are done on the Linux command line. We had an experienced engineer set up Algo on DigitalOcean, and it took about 45 minutes.

To give you an idea of what you will need to deal with if you decide to install Algo on a cloud service, here are selected screenshots of the process.

First, you need to set up an account at the service (DigitalOcean in this example):

DigitalOcean Dashboard

Clicking the Get Started with a Droplet (the DigitalOcean version of a virtual machine) gave us the options shown in the next screenshot. We created a Droplet running Ubuntu 18.04 by clicking the relevant button and selecting the plan we wanted:

Create Droplets – DigitalOcean

After a few minutes of waiting while DigitalOcean created the Droplet for us, we had a virtual machine running Ubuntu 18.04 ready to roll:

Virtual Machine running Ubuntu 18.04

We logged into the Droplet and followed the instructions in the Algo Github repository to download and extract the Algo files, install Algo core and remaining dependencies. Then we opened the Algo Config.cfg file and edited it to include the list of users who would be able to log into the VPN:

Algo Config File

With all that out of the way we launched the Algo installer, and selected the DigitalOcean option:

Algo Installer

The Algo installer uses the DigitalOcean API to do most of the configuration work, so we sat back and waited about 15 minutes for the installation to finish.

As mentioned in the following screen capture, there are several values you must copy from the console once the installer finishes its work. Without these, you will not be able to add new users later:

Algo Installer – Last Step

With that, the Algo VPN Server is installed in a DigitalOcean Droplet.

Now all you have to do is manually configure every client device that will connect to the server. Depending on the device, setting up the client could be pretty easy, or not so easy. As with setting up the server, the Algo Github page has links to the details of setting up clients on various popular types of devices.

When you finish that task you will have a fully functioning VPN Service of your own. It will be a slow VPN. You will need to trust that DigitalOcean won’t snoop on you as we discussed earlier. And because it has only a single server, it will be of limited use compared to commercial VPN Services, but it will be yours.

Despite the articles talking about the benefits of doing so, we really can’t see much reason to create your own VPN using a cloud service other than as an exercise for hardcore techies.


There are some privacy and security advantages of setting up your own VPN. These are most pronounced when you set up a VPN Server on your own hardware. In this article, we looked at three ways to get the job done, two of which involve setting up the server on your own hardware.

This table summarizes the pros and cons of each of the three approaches, as well as those of using a commercial VPN Service.

Pros and Cons for Setting Up Your Own VPN

VPN Server on Your Own Router VPN Server on Your Own Computer VPN Server on Cloud Service Using a Commercial VPN Service
Protects Entire Network Specific Devices Specific Devices Specific Devices or entire network depending on service selected
Privacy No need to trust third-parties No need to trust third-parties Cloud Service could log activities VPN Service could log activities
Security Good Good Low Best
Speed Medium Slow Slowest Fastest
Ease of Setup Medium Low Low High
Ease of Maintenance Medium Low Low High

As we’ve seen, while setting up a VPN Server for your own use is doable, it can be a lot of work and requires much more technical expertise than simply subscribing to a commercial VPN Service.

If you do decide to go this route, remember that you’ll also need to set up VPN Clients for each device you want to connect to your server. If the VPN Server documentation doesn’t have instructions you need, you should be able to find them with a quick web search.

If setting up your own VPN isn’t for you, we suggest you check out our review of the Best VPN Services for 2019. To help you decide between them, we organized them by use case, best VPNs for beginners, best for streaming, best for use on mobile devices, and so on.


What is a VPN Server?
What is Internet Protocol?
What is Network Encapsulation?

Note: This article was last updated In April 2020.

Blokt is a leading independent privacy resource that maintains the highest possible professional and ethical journalistic standards.



Buyer of Jack Dorsey’s ‘genesis tweet NFT’ reportedly detained in Iran

Republished by Plato



Iranian Cyber Police have reportedly arrested Bridge Oracle CEO Sina Estavi, according to a tweet pinned to Estavi’s Twitter account.

A rough translation of the tweet reads:

“The owner of this account was arrested on charges of disrupting the economic system by order of Special Court for Economic Crimes. Official judicial authorities will provide additional information.”

The same tweet is also pinned to the official account of Bridge Oracle, a Tron Network-based public oracle system. At the time of writing, the price of Bridge Oracle’s native token, BRG, has taken a sharp dive, crashing by more than 65%, according to data from TradingView.

Bridge Oracle is said to be a Malaysia-based blockchain company, but Estavi’s other venture, cryptocurrency exchange Cryptoland, was operating in Iran. Cryptoland’s Twitter account shares the same pinned tweet. No further information was shared publicly by the authorities.

Estavi is known for his heated bidding battle with tech entrepreneur and Tron CEO Justin Sun to buy Jack Dorsey’s first-ever tweet as an NFT. Twitter’s first tweet is dated March 2006 and reads, “Just setting up my twttr.”

In the end, Estavi successfully purchased the NFT for more than $2.9 million, or 1,630 Ether (ETH). Dorsey converted the proceeds to Bitcoin (BTC) and donated them to a charity organization in Africa.

Earlier this year, Estavi was sued by former CEO Mate Tokay for allegedly failing to pay him for his services. In his claim, Tokay also alleged that there’s an inconsistency between the purported and actual circulating supply of BRG.

Cointelegraph reached out to Bridge Oracle for comment. This article will be updated should they reply.

Coinsmart. Beste Bitcoin-Börse in Europa

Continue Reading


Bank of America to Settle Stock Trades on Paxos Network

Republished by Plato



The information on or accessed through this website is obtained from independent sources we believe to be accurate and reliable, but Decentral Media, Inc. makes no representation or warranty as to the timeliness, completeness, or accuracy of any information on or accessed through this website. Decentral Media, Inc. is not an investment advisor. We do not give personalized investment advice or other financial advice. The information on this website is subject to change without notice. Some or all of the information on this website may become outdated, or it may be or become incomplete or inaccurate. We may, but are not obligated to, update any outdated, incomplete, or inaccurate information.

You should never make an investment decision on an ICO, IEO, or other investment based on the information on this website, and you should never interpret or otherwise rely on any of the information on this website as investment advice. We strongly recommend that you consult a licensed investment advisor or other qualified financial professional if you are seeking investment advice on an ICO, IEO, or other investment. We do not accept compensation in any form for analyzing or reporting on any ICO, IEO, cryptocurrency, currency, tokenized sales, securities, or commodities.

See full terms and conditions.

Coinsmart. Beste Bitcoin-Börse in Europa

Continue Reading


Is Bitcoin nearing another Black Thursday crash? Here’s what BTC derivatives suggest

Republished by Plato



Bitcoin’s 51.4% crash in March 2020 was the most horrific 24-hour black swan event in the digital asset’s history. The recent price activity of the past week has probably resurrected similar emotions for investors who experienced the Black Thursday crash. 

Over the past week, Bitcoin’s (BTC) price dropped 29% to reach a three-month low at $42,150. $5.5 billion in long contracts were liquidated, which is undoubtedly a record-high in absolute terms. Still, the impact of the March 2020 crash on derivatives was orders of magnitude higher.

To understand why the current correction is less severe than the one in March 2020, we will start by analyzing the perpetual futures premium. These contracts, also known as inverse swaps, face an adjustment every eight hours, so any price gap with traditional spot markets can be easily arbitrated.

Sometimes, price discrepancies arise during moments of panic due to concerns about the derivatives exchange’s liquidity or market makers being unable to participate during times of extreme volatility.

Bitcoin perpetual premium/discount vs. spot price, March 2020. Source: TradingView

On March 12, 2020, the Bitcoin perpetual futures initiated a much larger descent than the price on spot exchanges. This move is partially explained by the cascading liquidations that took place, creating a backlog of large sell orders unable to find liquidity at reasonable prices.

The aftermath of the bloodbath resulted in futures perpetual contracts trading at a 12% discount versus regular spot exchanges. BitMEX, the largest derivatives market at the time, went offline for 25 minutes, causing havoc as investors became suspicious about its liquidity conditions.

By comparing this event with the most recent week, one will find that sustainable price discrepancies are very unusual. Even a temporary 12% gap doesn’t occur, even during the most volatile hours.

Bitcoin perpetual premium/discount vs. spot price, May 2021. Source: TradingView

Take notice of how the perpetual contracts reached a peak 4% discount versus regular spot exchanges on May 13, although it lasted less than five minutes. Market makers and arbitrage desks could have been caught off guard but quickly managed to recoup liquidity by buying the perpetual contracts at a discount.

To understand the impact of those crashes on professional traders, the 25% delta skew is the best metric, as it compares similar call (buy) and put (sell) options’ pricing. When market makers and whales fear that Bitcoin’s price could crash, they demand a higher premium for the neutral-to-bearish put options. This movement causes the 25% delta skew to shift positively.

Bitcoin options 25% delta skew, March 2020. Source: Skew

The above chart displays the mind-blowing 59% peak one-month Bitcoin options delta skew in March 2020. This data shows absolute fear and an incapacity to price the put (sell) options, causing the distortion. Even if one excludes the intraday peak, the 25% delta skew presented sustained periods above 20, indicating extreme “fear.”

Bitcoin options 25% delta skew, May 2021. Source: Laevitas

Over the past week, the skew indicator peaked at 14%, which isn’t very far from the “neutral” -10% to +10% range. It is indeed a striking difference from the previous months’ negative skew, indicating optimism, but nothing out of the ordinary.

Therefore, although the recent 29% price drop in seven days could have been devastating for traders using leverage, the overall impact on derivatives has been modest.

This data shows that the market has been incredibly resilient as of late, but this strength might be tested if Bitcoin’s price continues to drop.

The views and opinions expressed here are solely those of the author and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk. You should conduct your own research when making a decision.

Coinsmart. Beste Bitcoin-Börse in Europa

Continue Reading
Blockchain4 days ago

US Investment Bank Cowen to Offer Crypto Custody Services

Blockchain4 days ago

Buterin Plugs UNI as Next Oracle Token

Blockchain5 days ago

Bitwise Launches ‘Crypto Innovators’ ETF

Blockchain5 days ago

Which ‘green’ cryptocurrency is Tesla likely to add for payments?

Blockchain4 days ago

Elon Musk Pokes Massive Hole in the Bitcoin Market After Halting Bitcoin Payments at Tesla

Blockchain5 days ago

Facebook’s Diem Enters Crypto Space With Diem USD Stablecoin

Blockchain5 days ago

Venture platform Cognitive Blockchain invests in cross-chain compute network Cudos

Blockchain5 days ago

Ethernity Chain Memorializes Tony Hawk’s Latest 540 Skate Trick With NFT

Blockchain5 days ago

Vitalik Buterin Dumps His SHIB, Price Tanks 30% In 1 Hour

Blockchain4 days ago

The STC Token is Live – And Over 10 Crypto Exchanges are Ready for It

Blockchain4 days ago

Diem parters with Silvergate bank to launch stablecoin in the US

Blockchain4 days ago

DeFi Staple UMA Launches “Optimistic Oracle”

Blockchain4 days ago

MicroStrategy Buys Another $15M Worth of Bitcoin at $55K

Blockchain5 days ago

In Less than A Week, How Internet Computer (ICP) Climbed To The Top 10

Blockchain4 days ago

Here’s why Ethereum, AAVE, ALPHA are unfazed by Bitcoin’s latest ‘Elon candle’

Blockchain5 days ago

Vitalik Buterin Has Dumped His Unsolicited Doge-Clones

Blockchain4 days ago

Central Bank of Bahrain and JPMorgan to work on digital currency settlement pilot

Blockchain4 days ago

Diem Relocates From Switzerland to the US to Launch an USD-Backed Stablecoin

Blockchain5 days ago

Government Adoption: Cryptos are property in Texas, Hungary to cut taxes

Blockchain4 days ago

AppSwarm’s DOGE division calls for a global dev teams to build off Dogecoin