So right now, I am writing this post on a VPN, I have it, so I’ll use it.
My physical IP address is in Australia
My VPN address is in Switzerland
According to my computer, I am writing this to a reddit server at 151.101.65.140 which geolocates to San Francisco
Now I understand that this creates an encrypted pipe between my computer and the computer at the other end in Switzerland
But doesn’t that mean that the bit between the computer in Switzerland and the computer in San Francisco isn’t in the VPN network, and therefore not encrypted?
Likewise, my bank Geolocates to Sydney, NSW, Australia
So if I use a VPN to “Protect my data from hackers, spies, and middlemen”, is my data going from my computer in Brisbane, QLD, Australia via an encrypted pipe to Zurich, Switzerland, and then via an unencrypted pipe back to my bank in Sydney, NSW, Australia?
What stops a hacker seeing the bit between the computer at the other end of my encrypted VPN pipe and my bank?
Or the other end of my VPN pipe and Reddit?
I mean, doesn’t this make VPN providers a better place for hackers to target? I mean, if I connect to my bank via my connection it makes it’s own way from my house to the bank, hacker needs to find somewhere between me and the bank to get my data.
But if I use a VPN, why can’t the hacker just sit at the end point for the VPN’s and just attack everything that comes out of the end of the VPN?
Do VPN’s just aggregate the data and make it easier for attackers to attack at the end point?
Should I be using a VPN and something like TOR as well? So that I layer my protection? So like set my VPN to Australia but have TOR set to somewhere random like Kazakhstan? Or would that not work?