How to Setup VPN on iPhone/iOS/iPad

Follow these 5 simple steps to Setup VPN on your iPad Air 2

  1. Go to ‘Settings’ on your iPad and tap on ‘General’ category. You will see ‘VPN’ option over there.
  2. Tap on ‘VPN’ option and select ‘Add VPN Configuration’. If you intent to configure multiple VPN services on your iPad, you can use this feature multiple times.
  3. Now you have to select the preferred encryption protocol, you can select from PPTP, L2TP/IPSec and IPSec (Cisco IPSec) from here.
  4. In next step, setup will ask for VPN credentials - enter details ‘User Name’ and ‘Password’ given by the VPN provider. Usually these credentials came on your registered email address. Few VPN services also provide preferred VPN server to connect initially. User can switch server later through VPN app.

Recommended VPN Providers for iPhone/iOS devices

This newly created VPN configuration will appear now in ‘VPN’ section. Settings > General > VPN. Tap on it and you will be connected to secure VPN network. Enjoy anonymous browsing.

For using OpenVPN protocol for iOS, you would be required to download the free app, OpenVPN Connect from the App store. Then you need to follow the following sets:

1.Install OpenVPN Connect App on your iOS device.

2.Download the connection setting file for OpenVPN (.ovpn file) from your VPN provider on your PC / Mac.

3.Connect your iPhone or iPad to your PC / Mac and open iTunes.

4.Select all the OpenVPN files and drag – drop them into OpenVPN documents.

5.Additionally you can email your .ovpn files to your iOS.

6.Now open the OpenVPN Connect app from your device.

7.Tab the “+” icon to install the .ovpn files.

8.Enter the details provided by your VPN provider (username, password, etc.).

9.Tab the ‘Save’ button and connect your VPN.

A very comprehensive guide indeed. But then one could simply just download a VPN app which usually already have the configurations and simply tap the ‘connect’ button.

The services you listed all have apps in the App Store which makes life a lot simpler.

Detailed guide with pictures :
How to setup vpn in iOS:
http://sahrzad.net/vpnsetupios.php

“Oh sure, let me pay a company money to tunnel all of my sensitive data straight into their datacenters”

PIA has its own app. It’s much more consistent than the manual setup. The manual setup, for me, disconnected frequently. The app keeps it connected for as long as I want. Even on LTE.

But you know that these companies that you are paying money to tunnel all your sensitive data through their data centers do not keep record of your activities (well most of them don’t). And, while the data is tunneled through, you are not traced by your ISP or your government eavesdropping on what you are upto over the web…

For me it’s the opposite. The openvpn app stays connected all day while the pia app disconnects all the time. I’m aware of disconnections because it stops my music streaming.

Any government agency who has access to your home line is going to have access to whatever datacenter your VPN endpoint is in. All you’re doing now is making it easier for an adversary to see what you’re doing by having all your data exit from the same location everyone else’s VPN traffic exists that uses that company and therefore they can expect sensitive data to be available there.

You’re basically leaving instructions at your door saying (all my sensitive stuff is over at 123 Park Ave. with everyone else’s so you can pick it all up with 1 tap.

I generally prefer using OpenVPN configs where possible.

Any government agency who has access to your home line is going to have access to whatever datacenter your VPN endpoint is in.

Yeah, I’m sure the U.S. has easy access to all those VPN endpoints in Russia. And vice versa.

All you’re doing now is making it easier for an adversary to see what you’re doing by having all your data exit from the same location everyone else’s VPN traffic exists that uses that company and therefore they can expect sensitive data to be available there.

Umm… yeah, SSL connections are end-to-end. The VPN provider can’t read the content even though it’s in the middle.

Perhaps but you see, a VPN has multiple endpoints meaning they have more than just 1 server and the traffic of hundreds and thousands of users passes through them, making it highly difficult for any government to decipher if the data belongs to you or not. Also, these VPN’s hide your IP address by masking it with the IP address of their own server - which in any case makes you anonymous.

If cracking down users of VPN was that simple, China won’t be banning them from their region, they would had instead traced down the users of VPN and dealt with them individually.

Joke’s in you. Thanks for the address. Now I’m gonna steal all of your goodies.

Umm… yeah, SSL connections are end-to-end.

Umm… yeah, SSL has been insecure for many years now. If you’re still using SSL then you’re extremely vulnerable to MITM attacks. You should be (and almost every website has been for the past decade) using TLS.

Also, these VPN’s hide your IP address by masking it with the IP address of their own server - which in any case makes you anonymous.

ProTip: Your cell phone doesn’t have a dedicated IP address. Most cellular networks use CGNAT. Some are switching to IPv6, but that’s what IPv6 privacy addresses are for.

So no, you’re not “hiding” your IP address since it was “hidden” to begin with (we’re still just talking about cell phones here).

Tracking down a VPN user is incredibly simple. How do you think the great firewall of China blocks VPN? They can see whose attempting to use VPN because they just block it.

Besides, they could just as easily intercept the VPN server addresses and respond with their own VPN service and let you connect to it, thus giving them access to all of your traffic. Your computer has a few trusted root certificates from the Chinese government so it wouldn’t be too difficult for them to pull off.

Only if the VPN service is based in the US.