How the VPN by Google One Works (2024)

How the VPN by Google One Works (1)

At Google, keeping our users safe online means continuously protecting the privacy and security of their personal information. We focus on three core principles: keeping data secure by default, building products that are private by design, and putting our users --you-- in control.

When it comes to networking privacy and security, we’ve long encouraged the use of Transport Layer Security (TLS) and other protections across the wider web and app ecosystems. Unfortunately, not every online service provider is committed to implementing rigorous data protection standards1, leaving gaps in how well consumers are protected and in how much control they have over who accesses their network traffic. And even if security protections are properly implemented, sensitive data such as your IP address and the sites you visit can be visible to others2.

When securely implemented, a VPN provides additional protection by:

  • Providing encrypted transit that hides your data and network activity from hackers and network nodes along the way, such as public WiFi hotspot or other service providers
  • Masking your IP address from trackers, sites and apps you visit, which could be used to track your location or your network activity

How the VPN by Google One Works (2)

Figure 1: how a VPN connection works

While a VPN removes the ability for intermediaries to snoop on your traffic, it puts the VPN provider in a privileged position to potentially access your sensitive data. Therefore, it is important to choose a VPN provider who provides robust privacy and security guarantees. Unfortunately, not all VPN providers have been proven to be trustworthy: some services are vulnerable3, others request unnecessary access or monetize their users network data, and others fail to deliver on the promise of not logging their users’ online activity4.

With growing demand for VPNs5 in a mixed landscape of solutions, we have used our expertise in privacy, cryptography, and networking infrastructure to build a Google-grade VPN. With VPN by Google One, users’ network traffic is not identifiable to the VPN and never logged by VPN. We will never use the VPN connection to track, log, or sell your online activity.

Transparent and verifiably private

We believe a VPN must be robust, and transparent. To demonstrate how our design works and provide independent assurance of our data and security practices, we have open sourced our client APIs (here) and conducted third party audits of our system (here).

In addition to this transparency and external verification, we’ve built VPN by Google One to address some of the potential vulnerabilities of traditional architectures. A traditional VPN could compromise a user’s sensitive data by linking their identity to their network traffic by means of a session ID. This ID could allow VPN operators, or attackers that compromise their infrastructure, to "eavesdrop" and identify users’ and their network activity.

We wanted to eliminate that vulnerability by separating the authentication of the user from their use of the service. By employing a cryptographic blind signing step between user authentication and connecting to the VPN, we give users a stronger guarantee that their network activity can't be tied back to their identity.

How the VPN by Google One Works (3)

Figure 2: VPN by Google One’s authentication with blind signatures

Architecturally, we’ve split authentication from the data tunnel setup into two separate services:

  • Authentication service: This service validates users’ access to VPN by Google One. The client first generates an OAuth token and a blinded token (see below for definition). Then, the authentication service validates and exchanges the OAuth token for a signed blinded token.
  • Key Management Service: The client can then ‘unblind’ this signed blinded token using cryptographic blinding. When the client connects to the data tunnel server, it provides only this signed unblinded token to the data tunnel server. Thus, the only piece that links the authentication server to the data tunnel server is a single, public key, used to sign all blinded tokens presented during a limited period of time.

The blinding algorithm employed was first described by Chaum in 19826, and is commonly referred to as ‘RSA Blind Signing’. The goal is to never use the same identifier in the Authentication server and the Key Management Service. To accomplish this, the client generates a token, hashes it using a Full Domain Hash, and combines it with a random value and the server’s public signing key to produce a blinded token. That blinded token is then signed by our authentication server. When the client wants to connect to the VPN, it can unblind the blinded token and its signature using the random value only it knows. The unblinded token and the signature are then verifiable by our Key Management Server.

The servers are physically distinct and only share a cryptographic root-of-trust to validate the signed unblinded token; they strictly share no other information. Due to this careful authentication architecture, it would be infeasible for an attacker to break the cryptographic protections of one of the services with enough time to break the second and thus be able to associate a user to their network activity. We’ve calculated that it would take years to break both services, even when using the equivalent of roughly Google’s entire global computational capacity.

VPN logging practices

The authentication step has already separated the user’s identity from the data tunnel that handles your network traffic. On top of that protection, the following data is never logged:

  • Network traffic, including DNS
  • IP addresses of the devices connecting to the VPN
  • Bandwidth utilized by an individual user
  • Connection timestamps by user

The VPN authentication and data plane services only record aggregate metrics —without any user identifiable information— for service reliability and performance optimization. These include aggregate throughput, uptime, latency, CPU/memory load and failure rates. Client applications running on the user's device may log additional metrics to understand product and feature adoption and engagement, prevent fraud, and to ensure VPN connection health. Client applications also provide the option to send feedback and errors to us, which include application and system logs, and are used for debugging purposes.

Using a VPN shouldn’t require that you completely turn over your trust to the VPN provider. A VPN provider should be able to transparently demonstrate how their service keeps your data private. Our VPN client-side code is open sourced so that users and privacy experts alike can verify how user data is handled, and we open up our implementation to rigorous external audits so you can be confident in our VPN’s privacy and security guarantees.

We believe an easy to use, highly private and performant VPN will significantly help improve user privacy online. So it should come as no surprise that we want to make VPN technology available to as many users as possible.

For more information about how VPN works, see:

  • Google One Help: Increase your online security with VPN by Google One
How the VPN by Google One Works (2024)

FAQs

How the VPN by Google One Works? ›

When you turn on the VPN, your network traffic is encrypted and re-routed through the VPN proxy servers. This ensures that your network traffic stays private to you and makes it harder for trackers, sites and apps to track you.

Is Google One VPN useful? ›

Normally, we would compare Google One VPN with each provider individually, but our verdict for all three is the same. Unless you are already using Google One on Android or want some of the non-VPN features, there is no real reason to use Google One VPN over any dedicated VPN product.

Is Google 1 a good VPN? ›

Is Google One VPN trustworthy? Google One VPN is trustworthy when it comes to its protection. But since Google is a data miner in its own right, and independent testing found back-door workarounds for Google to see your data, we're not sure if it's trustworthy against itself.

Can you use Google One VPN to change location? ›

To allow websites to show the right content for your region, VPN by Google One will assign you an IP address based on your current region. However, websites can't use this IP address to determine your precise location. You won't have the option to change your IP address region.

Is VPN by Google One at no extra cost? ›

Unlike other phones, VPN by Google One comes with Pixel phones at no extra cost, and is also available to anyone with an eligible Google One plan. Just activate it in the Google One app . With VPN by Google One built in, Pixel helps protect your online activity no matter what app or web browser you use.

What are the disadvantages of Google One? ›

Cons: The thing I really don't like is the way they pack all of the phone backup and recovery together. It doesn't allow you to switch phones and still have access to the text or apps from the backup instead the old phone's backup is basically useless.

Should I leave Google VPN on all the time? ›

Should I leave my VPN on all the time? Yes, you should leave your VPN on all the time. VPNs offer the best online security, so keeping it on will protect you against data leaks and cyberattacks, especially while you're using public Wi-Fi. It can also safeguard against intrusive snoopers such as ISPs or advertisers.

Why is Google discontinuing VPN? ›

When asked why Google is retiring the VPN service, a company spokesperson previously told ZDNET: "We're refocusing our efforts to support more in-demand features with Google One. To keep our subscription service fresh, we're discontinuing the VPN feature, as we found people simply weren't using it."

How does Google One VPN work? ›

When you turn on the VPN, your network traffic is encrypted and re-routed through the VPN proxy servers. This ensures that your network traffic stays private to you and makes it harder for trackers, sites and apps to track you.

Does Google know if I use a VPN? ›

This raises the all-important question: Can Google track you with a VPN? Well, the answer is yes! That is because unlike the majority of websites and apps, Google uses more than just your IP address for location determination.

Is Google VPN really private? ›

While a VPN removes the ability for intermediaries to snoop on your traffic, it puts the VPN provider in a privileged position to potentially access your sensitive data.

Does Google One VPN drain battery? ›

Yes, it will consume more battery. Keeping it turned on will block your ISP from spying/ viewing/ throttling your connection based on the website you're visiting.

What happened to Google One VPN? ›

Why was VPN by Google One discontinued? With the focus to provide the most in-demand features, VPN by Google One is discontinued. However, it'll continue to be available as a built-in capability on Pixel 7 and up devices and via Google Fi Wireless. What happens when VPN service is deactivated while I use it?

What is replacing Google One VPN? ›

CyberGhost offers a VPN app for iOS, Windows, macOS, and Android. Yet, unlike Google One VPN, it also supports Android Smart TVs, Firestick TV devices, and routers. It's an ideal all-arounder to replace Google One VPN after its shutdown, or perhaps, before that happens!

What is the number 1 free VPN for Android? ›

Proton VPN is the best unlimited free VPN for Android. It offers a free tier without monthly data caps, speed limits, or ads, making it the top choice for costless online protection. However, keep in mind that Proton VPN's free version is pretty limited compared to the paid tier.

Does Google One VPN block ads? ›

You can't use Google One VPN to access streaming content that's not available in your current region. You also don't get many other bells and whistles other VPNs offer. For example, you don't get an ad blocker. Plus, it's not clear how many servers in total Google One VPN actually has.

What are the benefits of Google One VPN? ›

You can use VPN by Google One to help: Shield your online activity from hackers, internet service providers, phone carriers, and public Wi-Fi providers. Prevent others from knowing your IP address from the sites and apps that you visit.

Is Google One VPN being discontinued? ›

Starting June 20, 2024, VPN by Google One will be discontinued.

What is the benefit of Google fi VPN? ›

On all phones on Fi, you get access to a VPN for an encrypted and private connection when you use cellular data and Wi-Fi. It helps shield you against hackers on unsecure networks (like public Wi-Fi), and prevents websites from using your IP address to track your location.

Top Articles
Latest Posts
Article information

Author: Clemencia Bogisich Ret

Last Updated:

Views: 6317

Rating: 5 / 5 (80 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Clemencia Bogisich Ret

Birthday: 2001-07-17

Address: Suite 794 53887 Geri Spring, West Cristentown, KY 54855

Phone: +5934435460663

Job: Central Hospitality Director

Hobby: Yoga, Electronics, Rafting, Lockpicking, Inline skating, Puzzles, scrapbook

Introduction: My name is Clemencia Bogisich Ret, I am a super, outstanding, graceful, friendly, vast, comfortable, agreeable person who loves writing and wants to share my knowledge and understanding with you.