VPNCascades (multi-hop). How does it work? What do you have from it?

VPNServices are trying to protect users from monitoring and tracking on the Internet through technical features. normal VPNService provides encrypted access to your own VPNServers, which are operated in different countries. The data between the terminal (VPNClient) and the VPNService (VPN-Server) are encrypted. On the VPNService, the used IP address of the user is also changed to the outside and his own IP address does not appear in communication with web pages and web services anymore.

However, it is the case that the own Internet provider can still recognize the transferred data at least to the extent that he knows to which IP address the data of a user are sent. So the ISP can use the header data of the data packets to recognize VPNServer you have established a connection.

The functioning of a VPNCascade (multi-hop VPN)

This is usually not a problem for your own safety, but there are also technical solutions that allow further concealment. The data is indeed as usual to one VPNServer sends, but sends the data encrypted to another VPNServer continues. This makes it impossible for the observers of their own data to recognize which one VPNServer is used by a user to perform activities on the Internet. This technique is called: "VPN-Kaskadierung"Or also"Multi-Hop VPN"

Easy VPN-Connection

Easy VPN-Connection
Easy VPN-Connection

Um VPNTo understand cascades better, you have to look at the technical implementation of a normal one VPNView the connection. The data will be replaced by a VPNClient to one VPNEncrypted transfer server. Of the VPNServer then communicates with the destinations with its own IP address (identity).

✔︎ Simple VPNConnections are the standard at all VPNOr providers.


Easy VPNCascades (DoubleVPN)

Easy VPN Kaskade
Easy VPN Kaskade

Many providers offering such cascades of connections have established fixed routes for the users. So you connect to one VPN Server "A", then the data is always over another VPNServer "B" forwarded. This is already an improved protection, as doing the monitoring already more than 1 VPNSite would need to monitor.

✔︎ Simple VPNCascades (fixed routes) are offered by the following providers: NordVPN


Multiple and individual VPNCascades (multi-hop VPN)

Multiple VPN-Cascade
Multiple VPN-Cascade

It is even safer, though, if the VPNCascades themselves can be created. So the user himself at the beginning of a connection can specify, over which locations the connections are to be led. There are then some providers even up to 4 different consecutive options selected.

✔︎ Multiple and individual VPNCascades (individual routes) are offered by the following providers: FoxVPN and Perfect-Privacy VPN


Dynamic Cascading (Neurorouting)

Multiple dynamic VPNCascades (Neurorouting)
Multiple dynamic VPNCascades (Neurorouting)

Who else is still dynamic, so depending on the destination of the data on a VPN-Would like to manage the network, can with "Neurorouting" from Perfect-Privacy even enable this. Each individual data packet takes this over one VPN-Server has been sent its own way to the destination and that over several locations within the means of encrypted secure network VPNServers. This is itself no longer predictable which way or about which VPN-Server data to be sent and it also reduces the transmission paths of the data which are running over unsecured connections to a minimum.

✔︎ Multiple dynamic VPNCascades (neurorouting) is currently only offered by the following provider: Perfect-Privacy VPN


Warning: Two VPNUsing connections in parallel is not a cascade!

Some readers have the idea of ​​just two different ones VPN-Services parallel or nested to use and expect the same protection. But that is a fallacy and basically it causes some significant problems, so in this case simple VPNConnections are much more stable and secure.

nested VPNConnection (no cascade)
nested VPNConnection (no cascade)

The scenario in which you have two VPNConnections nested, offers both VPN-Services Access to data that can enable user identification. It is the case that the second "internal" connection is also the first one VPNTunnel through the header used corresponding information provides. In addition, attacks on the "external connection" can be carried out very easily and collapse. Which has the consequence that the "inside VPNConnection "breaks down by a sudden change of address as well. In this case, however, rules that have been met, eg Killswitch (as we have been able to prove in numerous tests), can not immediately prevent the transmission of your own IP address. This means that two interconnected compounds significantly worsen the stability of the compound as well as the potential for attack. Existing protective measures such as "KillSwitch" will become ineffective at short notice and thus reveal the users' own identity.

✘︎ A nested connection may work without any noticeable problems, but in any case will not provide enhanced protection against targeted exploration. Simple attack methods allow corruption of both connections and a clear identity determination. Therefore, these methods should be avoided!

The use of nested VPNConnections has significant disadvantages and is technically relatively easy to corrupt. The desired safety advantage is thereby completely eliminated and falls even behind "simple VPNConnections "due to the" instability of connections ".

Advantages of the VPNcascades

Who visites VPNCascades, it must be understood that sending the data across multiple locations will also have an impact on the achievable speed. Because the data will travel a longer distance to the destination. However, cascades also offer some technical advantages that can be effective when monitoring the Internet.

  • For the Internet provider is clear, which VPNServer one sends its data, but no longer over which one VPNServer you use the internet
  • Monitoring and prosecution by internationally active intelligence agencies is made drastically difficult or impossible. Because they can not monitor in real time multiple locations worldwide and synchronously. In the case of "dynamic VPNCascades ", it is also unpredictable over which way the own data uses the network.
  • Cascades can be used for targeted monitoring of individual persons / devices in order to continue to be able to send or receive data without being observed.

Disadvantages of VPNcascades

  • Large amounts of data will be transmitted noticeably slower, which also means that it is not ideal for applications such as torrent or file sharing. But you do not need it for that either VPNCascade because there will be no international monitoring of an individual.
  • Dynamic cascades can cause a web page or web service to be used by different IP addresses at the same time and may result in these services being unusable.

Summary to the VPNcascades

Of course, they are cascaded VPNConnections across multiple sites a significant technical improvement to protect against targeted tracking and monitoring on the Internet. But you also have to realize that these measures have some drawbacks in terms of response times and speed of data transmission. Few users will actually need this kind of protection, even if it makes it impossible for the authorities to capture or monitor activities. Anyone who thinks that he needs this kind of technical solution for their own protection, should be aware that there are different types, which also clearly differ in the possibilities.


Created on:06/30/2018

Leave a Comment