How it Works
Wi-Free virtual private networking (VPN) uses Internet technology to form connections between computers or mobile devices (smartphones, etc.) and isolated remote computer networks.
Using our VPN, a user’s Internet service provider (ISP) can form virtual connections with any Internet host. Our VPN technology provides high-speed, reliable data transfer for our users and secure network connections to ensure the privacy and security of your data.
It’s simple to use Wi-Free! To use our VPN, all you need to do is become a member and install Wi-Free client software on your computer or other device so that you can connect freely to our network. Although most standard operating systems include built-in software to connect remotely to VPNs, our unique proprietary software does much more and is necessary to install for Wi-Free service. Once you install our application, you’re able to use your computer to connect via tunnels to our networks around the world. If you require encryption of your data, the software can also be activated for this extra service to protect your data transfers from intrusion.
Wi-Free works by tunneling. This is a network technology that allows the information your computer sends over the Internet to be encoded using a different protocol or transfer system. Because many ISPs, such as Wifi hotspots, restrict access via standard protocols, our technology allows you to communicate with our network by using other protocols that the service provider may leave unrestricted. Windows VPN connections, for example, can use Point-to-Point Tunneling Protocol (PPTP) packets to send private network traffic, such as TCP/IP traffic, over a public network such as the Internet. Wi-Free works in much the same way, but provides several more tunneling options to help you gain Internet access no matter which service provider you connect through.
Once Wi-Free establishes a tunnel, our server prepares your data for transfer using a tunnel data transfer protocol header to attach to your data payload. Once it arrives at the tunnel server, the header is removed and the payload is forwarded to its target network as usual. On the return trip, data packets are run through the tunnel server to be marked as tunnel data before being returned to your device. In simple terms, the data you transfer always appears as regular tunnel data to any Internet service provider you might use, so that the ISP does not restrict your access through its networks. This creates a virtual private network to allow you fast and safe online access.