Setting up a Virtual Private Network (VPN)

Introduction to Virtual Private Networks (VPNs)

Virtual Private Networks can be an important part to protecting your students' privacy and the security of your client's data. What is a Virtual Private Network or VPN? Read the Center for Democracy & Technology's VPN Techplanation.

Below we describe a phased approach for students to practice setting up a virtual private network. The process can be broken into three main phases that allow students and staff to explore the advantages and disadvantages of its installation and management.

As students go through the steps, they should keep track of things that went well, things that were difficult or pain points, and ideas/opportunities for improving the process. They can use the tables below each section. Also, they can flag any “make sure you do this” thoughts that they have and add them to the short list of instructions in each phase.

Primary Option: Algo VPN

The first option to explore is Algo, an open source VPN project supported by Trail of Bits (https://www.trailofbits.com/).

Installation and Dependencies

Strengths Weaknesses Opportunities

Access and Deployment to AWS

Strengths Weaknesses Opportunities

VPN User Setup on Laptops and Mobile devices

  • Follow these instructions: https://github.com/trailofbits/algo#configure-the-vpn-clients
  • Users will download Wireguard to their phones and laptops.
  • Managers will share the setup configurations with users.
  • Users finish setting up the VPN by importing config file or scanning the QR code.
  • If WireGuard doesn’t work, users can use another setup method, but they will need more instructions.
Strengths Weaknesses Opportunities

Alternative Option: Outline

Beyond using Algo, students can also try setting up Outline by Jigsaw (a Alphabet/Google initiative) to provide "a safer way for news organizations and journalists to access the internet." Visit https://getoutline.org/.

Follow a similar phased setup approach.

Wrap Up

Consider the following questions:

  • Including security and usability, what other values should be considered when selecting a VPN?
  • What are the advantages and disadvantages of using Algo versus Outline? Consider your threat model.
  • What are the advantages and disadvantages of using either Algo or Outline versus a commercial VPN provider? Consider your threat model.
  • Which contextual factors (PESTLE) may influence selecting one solution over another?

Document your findings and present your recommendations based on your experiences and the answers to the above questions.


Last update: May 26, 2020