Choose a protocol for VPN. Compare OpenVPN, PPTP, L2TP/IPsec and IPsec IKEv2
Choose a reliable VPN: TLS authentication, connection port and session key
Choose a secure VPN: encryption algorithm, key length and data authentication
How hackers and security services hack VPN