Categories
The Industry

Comcast Offers New Work-from-home Product

The pandemic has forced millions of people to work from home. This instantly caused heartburn for the IT departments of large corporations because remote workers create new security vulnerabilities and open companies to cyberattacks and hacking. Big companies have spent the last decade moving data behind firewalls and suddenly are being asked to let thousands of employees pierce the many layers of protection against outside threats.

Comcast announced a new product that will alleviate many of the corporate IT concerns. Comcast, along with Aruba has created the Comcast Business Teleworker VPN product. This product creates a secure VPN at an employee’s home and transports the VPNs for all remote workers to a remote datacenter where corporate IT can then deal with all remote workers in one place.  This isolates the worker connections from the corporate firewalls and employees instead deal with copies of corporate software that sit in a datacenter.

There is a perceived long-term need for the product since as many as 70% of companies say that they are likely to continue with the work-from-home model after the end of the pandemic. Working from home is now going to be a routine component of corporate life.

At the home end, the Comcast product promises to not interfere with existing home broadband. The only way for Comcast to do this is to establish a second data stream from a house using a separate cable modem (or utilizing modems that can establish more than one simultaneous connection). This is an important aspect of the product because one of the biggest complaints about working from home is that many homes have problems accommodating more than one or two workers or students at the same time. This new product would be ill-received by workers if implementing it means less bandwidth for everybody else in the home.

By routing all remote employees to a common hub, Comcast will enable corporate IT staff to mimic the work computing environment for remote workers. Many companies are currently giving remote employees limited access to core software systems and data, but this arrangement effectively establishes the Comcast hub as a secure node on the office network.

This is something that any ISP with a fiber network should consider mimicking. An open-access network on fiber already does this same thing today. An open-access network creates a VPN at each customer of a given ISP and then aggregates the signals, untouched, to deliver to the ISP. On a fiber network, this function can be done by fairly simple routing.  Fiber ISPs can also provide the home working path separate from the consumer path by either carving out a VPN or else providing a second data path – something most fiber ONTs already allow.

Comcast has taken the extra step of partnering with Aruba to enable a corporation to establish a virtual corporate data center at a remote site. But fiber ISPs don’t have to be that complicated and rather than offering this to only large corporate clients, a fiber network could deliver a secure path between home and office for a business with only a few remote employees.

This could even be provided to sole proprietors and could safely link home and office on a VPN.  That allows for the marketing of a ‘safe office’ connection for businesses of any size and would provide the average small business a much more secure connection between home and office than they have today.

Every fiber provider that serves both residential communities and business districts ought to develop some version of this product by year-end. If working from home is a new reality, then fiber-based ISPs ought to be catering to that market using the inherent robustness and safety of a fiber network to create and route VPNs over the local fiber network.

Categories
Regulation - What is it Good For?

FCC – Please Focus on Upload Speeds

I wrote a recent blog that talked about how the FCC is recommending to stick with the 25/3 Mbps definition of broadband for another year. In that blog, I mostly talked about how 25 Mbps download is out of touch when the FCC claims that 85% of homes today can buy 250/25 Mbps broadband.

Today I want to look at the second half of the definition – the upload speed. The FCC is proposing, in 2020 – the year when millions were sent home for work and school – that 3 Mbps upload is a sufficiently high definition of broadband. Sticking with the 3 Mbps definition of broadband makes no sense. I contend that 3 Mbps is massively out of touch with the needs of the average home. To make matters worse, the FCC will allow an ISP that offers 25/3 broadband to bid in and win grant funding in October’s RDOF grant – a network which the ISP then has six years to build. The FCC doesn’t just think that 25/3 is adequate broadband today, they think that is okay broadband size years from now.

The pandemic has made it clear to a lot of households that upload speeds matter. Before the pandemic, customers that cared about the upload speeds tended to be folks that sent huge files such as doctors, architects, engineers, photographers, etc. When they worked from home these folks have known for years that the upload speeds on the average home network are inadequate.

All of a sudden this year, millions of homes found out that they don’t have enough upload broadband speeds. Consider the amount of bandwidth that is needed to work from home. There are two uses of upload broadband that are new to most people – connecting to a school or work server and participating in Zoom or other online meetings.

Many home and work servers require the creation of a virtual private network (VPN). A VPN is a dedicated connection – the home connects and stays connected to a school or work server. It generally requires dedicating at least 1 Mbps of bandwidth, but usually more, to create and maintain a VPN connection. This means that somebody working at home on a VPN is going to tie up 1 – 3 Mbps of bandwidth that can’t be used for anybody else in the home.

Zoom calls also require upload bandwidth. The Zoom website says that a home should have a 2 Mbps connection, both upload and download to sustain a Zoom session between just two people. The amount of download bandwidth increases with each person connected to the call, meaning Zoom recommends the 2 Mbps upload, but a 6 Mbps download for a meeting with three other people.

There are other uses for upload bandwidth in the home as well. For example, a telemedicine call can use even slightly more bandwidth than connecting to work or school servers. Upload bandwidth is needed for gaming in the cloud. Upload bandwidth is also used to back-up data files, pictures, etc. into the cloud.

It doesn’t take complicated math to see why a 3 Mbps connection is inadequate for any household that wants to make more than one upload-heavy connection to the Internet at the same time. 3 Mbps is not enough bandwidth for multiple people in a home trying to connect to work and school servers or to make Zoom-like calls. I’ve heard from numerous people this year telling me they can’t have more than one person at a time using their home broadband connection. Many of these complaints came from households using broadband provided by the big cable companies, and many of these homes thought they had plenty of bandwidth until the pandemic hit.

For the FCC to stick with 3 Mbps upload as the definition of broadband is a slap in the face to every family where more than one person wants to connect to the web at the same time. With that definition, the FCC is blessing any ISP that delivers 3 Mbps upload speeds.

Even if the FCC doesn’t want to upgrade the download component of the definition of broadband, they can’t turn a blind idea to the millions of homes trying to make it through the pandemic. If social scientists are right, there will likely be millions of people who continue to work remotely even after the end of the pandemic. This is not a temporary problem that is somehow going to go away.

It’s hard to think that the minimum acceptable definition of upload speeds should be anything slower than 25 Mbps. Assuming a robust WiFi network, that’s enough bandwidth for 3 – 4 adults and/or students to work from home at the time. So FCC, please reconsider the definition of upload speeds. If you stick with 3 Mbps upload as the definition of broadband it means you don’t support broadband networks that can deliver the speeds that the average households need.

Categories
The Industry

Bandwidth Needed to Work from Home

The pandemic made it clear that the millions of homes with no broadband or poor broadband were cut off from taking the office or the school home. But the pandemic also showed many additional millions of homes that their current ISP connection isn’t up to snuff for working or doing schoolwork from home. Families often found that multiple adults and students couldn’t share the bandwidth at the same time.

The simplest explanation for this is that homes were suddenly expected to connect to a school or work servers, use new services like Zoom, or make telemedicine connections to talk to doctors. These new requirements have significantly different bandwidth needs when a home’s big bandwidth need was watching multiple video streams at the same time.  Consider the following bandwidth needs listed by Zoom:

Zoom says that a home should have a 2 Mbps connection, both upload and download to sustain a Zoom session between just two people. The amount of download bandwidth increases with each person connected to the call, meaning Zoom recommends 6 Mbps download for a meeting with three other people.

Telemedicine connections tend to be even larger than this and also require the simultaneous use of both upload and download bandwidth. Connections to work and schools servers vary in size depending upon the specific software being used, but the VPNs from these connections are typically as large or larger than the requirements for the Zoom.

Straight math shows fairly large requirements if three or four people are trying to do make these same kinds of 2-way simultaneous connections at the same time. But houses are also using traditional bandwidth during the pandemic like watching video, gaming, web browsing, and downloading large work files.

The simplistic way to look at bandwidth needs is to add up the various uses. For instance, if four people in a home wanted to have a Zoom conversation with another person the home would need a simultaneous connection of 8 Mbps both up and down. But bandwidth use in a house is not that simple, and a lot of other factors contribute to the quality of bandwidth connections within a home. Consider all of the following:

  • WiFi Collisions. WiFi networks can be extremely inefficient when multiple people are trying to use the same WiFi channels at the same time. Today’s version of WiFi only has a few channels to choose from, and so the multiple connections on the WiFi network interfere with each other. It’s not unusual for the WiFi network to add a 20% to 30% overhead, meaning that collisions of WiFi signals effectively waste usable bandwidth. A lot of this problem is going to be fixed with WiFi 6 and 6 GHz bandwidth which together will add a lot of new channels inside the home.
  • Lack of Quality of Service (QoS). Home broadband networks don’t provide quality of service, which means that homes are unable to prioritize data streams. If you were able to prioritize a school connection, then any problems inside the network would affect other connections first and would maintain a steady connection to a school. Without QoS, a degraded bandwidth signal is likely to affect everybody using the Internet. This is easily demonstrated if somebody in a home tries to upload a giant data file while somebody else is using Zoom – the Zoom connection can easily drop temporarily below the needed bandwidth threshold and either freeze or drop the connection.
  • Share Neighborhood Bandwidth. Unfortunately, a home using DSL or cable modems doesn’t only have to worry about how other in the home are using the bandwidth, because these services used shared networks within neighborhoods, and as the demand needs for the whole neighborhood increase, the quality of the bandwidth available to everybody degrades.
  • Physical Issues. ISPs don’t want to talk about it, but events like drop wires swinging in the wind can affect a DSL or cable modem connection. Cable broadband networks are also susceptible to radio interference – your connection will get a little worse when your neighbor is operating a blender or microwave oven.
  • ISP Limitations. All bandwidth is not the same. For example, the upload bandwidth in a cable company network uses the worse spectrum inside the cable network – the part that is most susceptible to interference. This never mattered in the past when everybody cared about download bandwidth, but an interference-laden 10 Mbps upload stream is not going to deliver a reliable 10 Mbps connection. There are a half dozen similar limitations that ISPs never talk about that affect available bandwidth.

The average home experiencing problems when working at home during the pandemic is unlikely to be able to fully diagnose the reasons for the poor bandwidth. It is fairly obvious if you are having problems with having multiple zoom connections if the home upload speed isn’t fast enough to accommodate all of the connections. But beyond the lack of broadband capacity, it is not easy for a homeowner to understand any other local problems affecting their broadband experience. The easiest fix for home broadband problems is for an ISP to offer and deliver faster speed, since excess capacity can overcome many of the other problems that might be plaguing a given home.

Categories
Current News

The Upload Crisis

Carriers continue to report on the impact of COVID-19 on their networks. One of the more interesting statistics that caught my eye was when Comcast reported that upload traffic on their network was up 33% since March 1. Comcast joins the rest of big ISPs in saying that their networks are handling the increased traffic volumes.

By ‘handling’ the volumes they mean that their networks are not crashing and shutting down. But I think there is a whole lot more to these headlines than what they are telling the public.

I want to start with an anecdote. I was talking to a client who is working at home along with her husband and two teenagers. The two adults are trying to work from home and the two kids are supposed to be online keeping up with schoolwork. Each of them needs to create a VPN to connect to their office or school servers. They are also each supposed to be connecting to Zoom or other online services for various meetings, webinars, or classes.

These functions all rely on using the upload path to the Internet. The family found out early in the crisis that their broadband connection did not provide enough upload speed to create more than one VPN at a time or to join more than one video call. This has made their time working at home into a major hassle because they are being forced to schedule and take turns using the upload link. This is not working well for any of them since the family has to prioritize the most important connections while other family members miss out on expected calls or classes.

The family’s upload connection is a choke point in the network and is seriously limiting their ability to function during the stay-at-home crisis. But the story goes beyond that. We all recall times in the past when home Internet bogged down in the evenings when everybody in the neighborhood was using broadband to watch videos or play games. Such slowdowns occurred when the download data path into the neighborhood didn’t deliver enough bandwidth to satisfy everybody’s request for broadband. When that download path hit maximum usage, everybody in the neighborhood got a degraded broadband connection. When the download path got overloaded, the network responded by giving everybody a little less bandwidth than they were requesting – and that resulted in pixelating video or websites that lose a connection.

The same thing is now happening with the upload links, but the upload path is a lot more susceptible to overload.  For technologies like coaxial cable networks or telephone DSL the upload path leaving the neighborhood is a lot smaller than the download path into the area. As an example, the upload link on a coaxial network is set to be no more than 10% of the total bandwidth allowed for the neighborhood. It takes a lot more usage to overload the download path into the neighborhood since that path is so much larger. On the upload path, the homes are now competing for a much smaller data path.

Consider the difference in the way that homes use the download path compared to the new way we’re all using uploading. On the download side, networks get busy mostly due to streaming video. Services like Netflix stay ahead of demand by downloading content that will be viewed five minutes into the future. By doing so, the neighborhood download network can have cumulative delays of as much as five minutes before the video streams collapse and stop working. The very nature of streaming creates a buffer against failure – sort of a network insurance policy.

Homes are not using the upload links in the same way. Connecting to a school server, a work server, or a video chat service creates a virtual private network (VPN) connection. A VPN connection grabs and dedicates some minimum amount of bandwidth to the user even during times when the person might not be uploading anything. A VPN carves out a small dedicated path through the upload broadband connection provided by the ISP. There is no buffer like there is with downloading of streaming video – when the upload path gets full, there’s no room for anybody else to connect.

The nearest analogy to this situation harkens back to traditional landline telephone service. We all remember times, like after 911, when you couldn’t make a phone call because all of the circuits were busy. That’s what’s happening with the increased use of VPNs. Once the upload path from the neighborhood is full of VPNs, nobody else is going to be able to grab a VPN connection until somebody ‘hangs up’.

Residential customers have historically valued download speeds over upload speeds and ISPs have configured their networks accordingly. Many technologies allow an ISP to balance the upload and download traffic, and ISPs can help upload congestion by providing a little more bandwidth on the upload stream. Unfortunately for cable companies, the current DOCSIS standards don’t allow them to provide more than 10% of bandwidth on the upload side – so their ability to balance is limited.

As I keep hearing these stories from real users I am growing less and less impressed by the big ISPs saying that everything is well and that their networks are handling the increased load. I think there are millions of households struggling due to inadequate upload speeds. It’s true, as the big ISPs are reporting, that the networks are not crashing – but the networks are not providing the connections people want to make. No big ISP is going to admit this to their stockholders – but I bet a lot of those stockholders already understand this first-hand from having troubles trying to work from home.

Categories
Improving Your Business Technology

Expect a New Busy Hour

One of the many consequences of the coronavirus is that networks are going to see a shift in busy hour traffic. Busy hour traffic is just what is sounds like – it’s the time of the day when a network is busiest, and network engineers design networks to accommodate the expected peak amount of bandwidth usage.

Verizon reported on March 18 that in the week since people started moving to work from home that they’ve seen a 20% overall increase in broadband traffic. Verizon says that gaming traffic is up 75% as those stuck at home are turning to gaming for entertainment. They also report that VPN (virtual private network) traffic is up 34%. A lot of connections between homes and corporate and school WANs are using a VPN.

These are the kind of increases that can scare network engineers, because Verizon just saw a typical year’s growth in traffic happen in a week. Unfortunately, the announced Verizon traffic increases aren’t even the whole story since we’re just at the beginning of the response to the coronavirus. There are still companies figuring out how to give secure access to company servers and the work-from-home traffic is bound to grow in the next few weeks. I think we’ll see a big jump in video conference traffic on platforms like Zoom as more meeting move online as an alternative to live meetings.

For most of my clients, the busy hour has been in the evening when many homes watch video or play online games. The new paradigm has to be scaring network engineers. There is now likely going to be a lot of online video watching and gaming during the daytime in addition to the evening. The added traffic for those working from home is probably the most worrisome traffic since a VPN connection to a corporate WAN will tie up a dedicated path through the Internet backbone – bandwidth that isn’t shared with others. We’ve never worried about VPN traffic when it was a small percentage of total traffic – but it could become one of the biggest continual daytime uses of bandwidth. All of the work that used to occur between employees and the corporate server inside of the business is now going to traverse the Internet.

I’m sure network engineers everywhere are keeping an eye on the changing traffic, particularly to the amount of broadband used during the busy hour. There are a few ways that the busy hour impacts an ISP. First, they must buy enough bandwidth to the Internet to accommodate everybody. It’s typical to buy at least 15% to 20% more bandwidth than is expected for the busy hour. If the size of the busy hour shoots higher, network engineers are going to have to quickly buy a larger pipe to the Internet, or else customer performance will suffer.

Network engineers also keep a close eye on their network utilization. For example, most networks operate with some rule of thumb, such as it’s time to upgrade electronics when any part of the network hits some pre-determined threshold like 85% utilization. These rules of thumb have been developed over the years as warning signs to provide time to make upgrades.

The explosion of traffic due to the coronavirus, might shoot many networks past these warning signs and networks start experiencing chokepoints that weren’t anticipated just a few weeks earlier. Most networks have numerous possible chokepoints – and each is monitored. For example, there is usually a chokepoint going into neighborhoods. There are often chokepoints on fiber rings. There might be chokepoints on switch and router capacity at the network hub. There can be the chokepoint on the data pipe going to the world. If any one part of the network gets overly busy, then network performance can degrade quickly.

What is scariest for network engineers is that traffic from the reaction to the coronavirus is being layered on top of networks that already have been experiencing steady growth. Most of my clients have been seeing year-over-year traffic volumes increases of 20% to 30%. If Verizon’s experience in indicative of what we’ll all see, then networks will see a year’s typical growth happen in just weeks. We’ve never experienced anything like this, and I’m guessing there aren’t a lot of network engineers who are sleeping well this week.

Categories
Technology

How Do VPNs Work?

After Congress clarified last month that ISPs have the right to monitor and use customer data I have read dozens of articles that recommend that people start using VPNs (Virtual Private Networks) to limit ISP access to their data. I’ve received several emails asking how VPNs work and will discuss the technology today.

Definition. A VPN is a virtualized extension of a private network across a public network, like the open Internet. What that means in plain English is that VPN technology tries to mimic the same kind of secure connection that you would have in an office environment where your computer is directly connected to a corporate server. In a hard-wired environment everything is secure between the server and the users and all data is safe from anybody that does not have access to the private network. If the private network is not connected to the outside world, then somebody would have to have a physical connection to the network in order to read data on the private network.

Aspects of a VPN Connection. There are several different aspects that are used to create the virtualized connection. A VPN connection today likely includes all of the following:

  • Authentication. A VPN connection always starts with authentication to verify the identity of the remote party that wants to make the VPN connection. This could use typical techniques such as passwords, biometrics or two-factor authentication.
  • Encryption. Most VPN connections then use encryption for the transmission of all data once the user has been authenticated. This is generally done by placing software on the user’s computer that scrambles the data and that can only be unscrambled at the VPN server using the same software. Encryption is not a foolproof technique and the Edward Snowden documents proved that the NSA knows how to read most kinds of encryption – but it’s still a highly effective technique to use for the general transmission of data.
  • IP Address Substitution. This is the technique that stops ISPs from seeing a customer’s Internet searches. When you use your ISP without a VPN, your ISP assigns you an IP address to identify you. This ISP-assigned IP address then can be used by anybody on the Internet to identify you and to track your location. Further, once connected your ISP makes all connections for you on the Internet using DNS (Domain Name Servers). For instance, if you want to visit this blog, your ISP is the one that finds PotsandPansbyCCG and makes the connection using the DNS system, which is basically a huge roadmap of the public Internet. Since they are doing the routing your ISP has complete knowledge of every website you visit (your browsing history).  But when you use a VPN, the VPN provider provides you with a new IP address, one that is not specifically identified as you. When you visit a website for the first time using the new VPN-provided IP address that website does not know your real location, but rather the location of the VPN provider. And since the VPN provider also does the DNS function for you (routes you to web pages) your ISP no longer knows your browsing history. Of course, this means that the VPN provider now knows your browsing history, so it’s vital to pick a VPN that guarantees not to use that information.

Different VPN Protocols and Techniques. This blog is too short to explore the various different software techniques used to make VPN connections. For example, early VPNs were created with the PPTP (Point-to-Point Tunneling Protocol). This early technique would encapsulate your data into larger packets but didn’t encrypt it. It’s still used today and is still more secure than a direct connection on the open Internet. There are other VPN techniques such as IPSec (IP Security), L2TP (Layer 2 Tunneling Protocol), SSL and TLS (Secure Socket Layer and Transport Layer Security), and SSH (Secure Shell). Each of these techniques handles authentication and encryption in different ways.

How Safe is a VPN? A VPN is a way to do things on the web in such a manner that your ISP no longer knows what you are doing. A VPN also establishes an encrypted and secure connection that makes it far harder for somebody to intercept your web traffic (such as when you make a connection through a hotel or coffee shop WiFi network). In general practice a VPN is extremely safe because somebody would need to expend a huge amount of effort to intercept and decrypt everything you are doing. Unless somebody like the NSA was watching you, it’s incredibly unlikely that anybody else would ever expend the effort to try to figure out what you are doing on the Internet.

But a VPN does not mean that everything you do on the Internet is now safe from monitoring by others. Any time you connect to a web service, that site will know everything you do while connected there. The giant web services like Google and Facebook derive most of their revenues by monitoring what you do while using one of their services and then use that information to create a profile about you.  Using a VPN does not stop this, because once you use the Google search engine or log onto Facebook they record your actions.

Users who want to be protective of their identities are starting to avoid these big public services. There are search engines other than Google that don’t track you. You can use a VPN to mask your real identify on social media sites. For example, there are millions of Twitter accounts that are not specifically linked back to the actual user. But a VPN or a fake identity can’t help you if you use a social media site like Facebook where you make connections to real-life friends. I recall an article a few years back from a data scientist who said that he only needed to know three facts about you to figure out online who you are. Companies like Facebook will quickly figure out your identity regardless of how you got to their site.

But a VPN will completely mask your web usage from your ISP. The VPN process bypasses the ISP and instead makes a direct, and encrypted connection to the VPN provider instead. A VPN can be used on any kind of data connection and you can use a VPN for home computers and also for cellphones. So if you don’t want Comcast or AT&T to monitor you and use and sell your browsing history to others, then a VPN service will cut your ISPs out of the loop.

Categories
What Customers Want

Productizing Safety

The Internet is becoming a scarier place by the day to the average user. It seems like a week doesn’t go by when there isn’t news of some new and huge data breach or other nefarious use of the web. But as much as those big events might create a general industry sense of unease, these announcements also make people worried about their own individual Internet security.

The big ISPs like AT&T crow about recording and monetizing everything that their customers do on the web. And with a likely weakening or elimination of Title II regulation by the FCC this is likely to intensify. Every web site parks cookies on the computers of their visitors, and the bigger sites like Facebook and Google gather every fact fed to them and peddle it to the advertising machine. There are hackers that lock down PCs and hold them hostage until the owner pays a ransom. There are smart TVs that listen to us and IoT devices that track our movements inside our homes. There was news this week that smartphones with a certain Chinese chip have been sending every keystroke back to somebody in China.

All of this has to be making the average Internet user uneasy. And that makes me wonder if there is not a product of some sort that smaller ISPs can offer to customers that can make them feel safer on the web.

Savvy Internet users already take steps to protect themselves. They use ad blockers to reduce cookies. They use browsers like DuckDuckGo that don’t track them. They use encryption and visit sites using HTTPS. They scrub their machine regularly of cookies and extra and unidentified files. In the extreme some use a VPN to keep their ISP from spying on them.

Small ISPs are generally the good guys in the industry and don’t engage in the practices used by AT&T, Comcast and Verizon. I know some small ISPs that try to communicate to their customers about safety. But I think safety is now one of the biggest worries for people and I think small ISPs can do more.

Customers can really use the help. It’s easy to assume that customers ought to understand basic safety procedures, but the vast majority of them load some sort of virus protection on their PC the day they buy it and never think of safety again. They repeatedly do all of the bad things that lead to trouble. They open attachments on emails. They don’t update their software to have the latest security patches. They use social media and other sites without setting basic privacy filters.

I think there is an opportunity for small ISPs to be proactive in helping to make their customers feel safer, and in the process can create more loyal customers. I think there are two possible ways to undertake this. One is an intensive education campaign to inform customers about better web practices. I’m not talking about the occasional safety reminder, but instead a steady and concentrated effort to tell your customers ways to be safer on the web. Brand yourself as being a provider that is looking out for their safety. But don’t pay it lip service – do it in a proactive and concentrated way.

I also think there is a space for a ‘safety’ product line. For example, I have clients who run a local version of the Geek Squad and who repair and maintain people’s computers. It would not be hard to expand on that idea and to put together a ‘safety’ package to sell to customers.

Customers could have a service tech come to their home for a day each year and you could ‘fix’ all of their safety weaknesses. That might mean installing ad blockers and a spyware scrubber. It would mean updating their browsers and other software to the latest version. It could mean helping them to safely remove software they don’t use including the junkware that comes with new computers. It might include making sure they are using HTTPS everywhere. It also might mean selling a VPN for those who want the highest level of security.

I have clients who have been selling this kind of service to businesses for years, but I can’t think of anybody who does this in any meaningful way for residential customers. But since the web is getting less safe by the day there has to be an opportunity for small ISPs to distinguish themselves from larger competitors and to also provide a needed service – for pay of course.

Exit mobile version