The WTFast GPN vs. VPN

What is a Virtual Private Network (VPN)?

History: The primary initial use case for VPN technology was to enable business people an encrypted connection to access their office network while they are at home or traveling. Over the last ten years, there has been a huge growth in VPN usage for consumers who want to encrypt all their Internet activity or access geo-restricted content. 

Encryption: A VPN encrypts all Internet traffic in and out of your machine, the VPN server, and then to the target server or computer. 

Traffic: VPNs usually tunnel all Internet traffic on your PC.

Routing: The VPN server connection will change the path that your data takes across the Internet. Depending on the VPN server location and network provider, the connection to your target server could be either harmed or helped. For example, if you live in Los Angeles and want to access a target server in Los Angeles (LA), if you pick a VPN server with a better network provider in LA, you may experience a better connection. In contrast, if you were to select a VPN server located in Hawaii, your connection will be degraded because you send the connection to Hawaii and then back to LA.

Access: An authorized VPN client is required on your machine to access the VPN. The VPN could be made up of a single server or a network of servers.

Performance: The performance of VPN servers can vary wildly depending on configuration and usage distribution. For example, if a bunch of people all at once decide to use a VPN server to stream a game download or Game of Thrones, this will impact the VPN performance. For this reason, VPN services are typically not reliable enough for latency-sensitive real-time communications, such as online gaming.

Online Gaming: Often, VPNs will be used to unlock geo-restricted content or to hide malicious online activity such as hacking, botting, or fraud. Sometimes game providers will block VPNs due to these malicious activities.  

What is a Proxy?

History: Proxy technology has been around for about as long as VPN technology. Adoption of proxy technology by consumers compared to VPN technology has been much slower. This is presumably because VPN technology is much easier to deliver to meet the largest market demand (encryption and unlocking geo-restrictions), so it has achieved greater market adoption.

Encryption: Depending on the configuration of the proxy technology, the proxy connection could be encrypted or not.

Traffic: Proxies typically only tunnel web/HTTP traffic, although it can be configured to handle other traffic types.

Routing: Like VPNs, proxy servers can also be used to change the routing of Internet data. The logic for proxy servers is the same as for VPN servers (see above VPN example); depending on the proxy server location, the connection to the target server may be improved or degraded. 

Access: Like VPNs, an authorized proxy client is required on your machine to access the proxy server. The proxy server could be made up of a single server or a network of servers.

Performance: Like VPNs, the performance of proxy servers can vary wildly depending on configuration and usage distribution. Typically proxy servers can be overloaded and have unreliable performance due to usage patterns (see above VPN example). For this reason, proxy services generally are not reliable enough for latency-sensitive real-time communications, such as online gaming.

Online Gaming: Like VPNs, proxies will be used to unlock geo-restricted content or to hide malicious online activity such as hacking, botting, or fraud. Sometimes game providers will block proxies due to these malicious activities.  

What is the WTFast ® Gamers Private Network (GPN) ®?

History:  WTFast and our GPN was launched in December 2009. WTFast was created initially to showcase our first patented technology. After creating WTFast, we saw a great opportunity in the marketplace to differentiate from existing VPN and proxy technologies. We wanted to create a proxy technology plug-and-play with automated networking intelligence and optimized for gaming. We are now the clear market and technology leaders and the first to truly innovate in this space, with 4 patents granted, 3 pending, and more to come. 

Encryption: WTFast does not encrypt or modify traffic. We relay traffic to the target server “as is.” We purposely do not encrypt traffic going through the GPN because we don’t want people using our network to hide what they are doing. The purpose of WTFast is to optimize online connections, not to hide activity or to access geo-restricted content.

Traffic: WTFast tunnels only selected real-time game communications and are capable of handling any traffic.

Routing:  Unlike VPNs or proxies, we have created a plug & play solution with automated networking. The ideal user experience is: you select your game, and we take care of the rest! We continue to improve the AI in our networking solution so the results will get better over time. If you would like to try some different servers for yourself, this is possible with manual selection. If you select (choose best), WTFast will attempt to pick the best server for you from that “choose best” choice. You can also manually select a single server.

Access: Like VPNs or proxies, WTFast requires an authorized software client on your machine to access the GPN.

Performance: Unlike VPNs or proxies, WTFast is a private server network focused on game traffic only. Our technology focuses only on optimizing real-time game communications. This means that you log in directly to the game server, and you download patches directly from the game provider. We aim to wait until you are in the actual game before sending your traffic over to our GPN for optimization. This extreme focus on your game connection only allows us to ensure the best network connection performance possible. Also, it ensures that our servers don’t get overloaded due to massive patches or downloads that can bog down a server.

Online Gaming: When we created WTFast, we were fully aware of how proxy and VPN technologies are used to bypass geo-restrictions and hide malicious activities in online games. We knew that WTFast had to be different. 

We aim to configure each game so that:

  1. You are logging in directly to the game server. This ensures that you cannot use WTFast to bypass geo-restrictions or to hide your real IP address from the game company.

  2. We only send your game session data over our GPN.

  3. We adjust each game config to work well with the security systems in place for each major game. If anything changes with the security settings, we will adjust our config.

  4. We optimize not only the average latency or ping for your connection, but we also focus on reducing flux (our interpretation of jitter), spikes, and packet loss. Flux/spikes/loss has a big impact on the smoothness of your game connection; they should be as low as possible.

The WTFast goal is to continue to drive innovation and be the market and technology leader in this space.

Previous
Previous

Ping, Spikes, Packet Loss and Your Game Connection

Next
Next

Our Team Participates in the 'Foodapalooza Challenge'