VPN (Virtual private network)
Virtual private network technology is based on the idea of tunneling. VPN tunneling involves establishing and maintaining a logical network connection (that may contain intermediate hops). On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, and finally de-encapsulated on the receiving side. For Internet-based VPNs, packets in one of several VPN protocols are encapsulated within Internet Protocol (IP) packets. VPN protocols also support authentication and encryption to keep the tunnels secure.
When your traffic reaches the PrivacyTunnel servers, it is decrypted and sent to one of several internal proxy servers. Each session will return to the same proxy server to ensure proper routing, but each user may use several proxy servers at any given time. Here the traffic is mixed with the traffic of thousands of other users, and sent out of the server to its destination. The traffic returns on the same path and is routed to the encryption server where it is returned to the user in an encrypted shell. Because so many users and connections are emanating from the same server, it is impossible to tell who generated the traffic. This is what provides your anonymity. Anyone that sees your IP address when chatting, gaming or using other software will actually be seeing the PrivacyTunnel Proxy address, so any attack levied against you will hit our servers and you will never even know it happened
PrivacyTunnel works Great with Usenet