Configuration & Features: Operational Parameters
Beyond simple connectivity, the client provides granular control. These are not cosmetic preferences; they are operational parameters that affect privacy, security, and performance. Misconfiguration potentially can lead to reduced anonymity or connectivity drops.
MACE (Ad, Tracker, Malware Blocker)
Definition: A DNS-level sinkhole. It works by intercepting DNS requests to known advertising, tracking, and malware domains and returning a null response. It is not a system-wide ad blocker like a browser extension; it operates at the network level for all device traffic.
Comparative Analysis: Unlike browser-based blockers (uBlock Origin), MACE works for all applications, including mobile games and smart TV apps. However, it is less granular—you cannot whitelist specific sites. It's a blanket block based on maintained lists.
Practical Application for Australians: Enabling MACE can reduce data usage on metered mobile plans and increase page load speeds by preventing ad payloads from downloading. It also blocks many trackers used by Australian news sites and retailers. But it may break functionality on sites that rely on specific domains for essential services. If a banking app or myGov fails to load, MACE is the first setting to disable.
Kill Switch
Definition: A network traffic firewall that activates only when the VPN tunnel fails. It blocks all non-VPN internet traffic to prevent accidental exposure of your real IP address.
Comparative Analysis: Some VPNs implement a basic kill switch that only works when the app is running. PIA's can be set to a 'Always-on' mode at the system level, which persists even if the app crashes. This is a more robust implementation.
Practical Application: Critical for Australian users engaged in P2P/file-sharing, where exposure of a real IP to copyright trolls can lead to infringement notices from your ISP. Also vital for journalists or researchers in the country handling sensitive information, where a momentary IP leak could compromise a source.
Protocol Selection (WireGuard vs OpenVPN)
Definition: The cryptographic protocol that encapsulates your data. WireGuard is a modern, leaner protocol using state-of-the-art cryptography. OpenVPN is the older, battle-tested standard.
Comparative Analysis: According to the data from internal and third-party tests, WireGuard consistently provides faster connection times and higher throughput with lower CPU usage. OpenVPN is more configurable and can better bypass restrictive networks by masquerading as standard HTTPS traffic on TCP port 443.
Practical Application: For most Australian users on NBN Fibre, Fixed Wireless, or 5G Home Internet, WireGuard is the unequivocal choice for speed. However, if you are on a restricted network (corporate, university, some public Wi-Fi in places like Sydney Airport), and WireGuard fails, switch to OpenVPN TCP on port 443. The difference in performance may be negligible if the network is already slow.
Other settings—like data encryption level, handshake encryption, and remote port selection—are for advanced users. The defaults are secure. Changing them without understanding the trade-offs between security and speed is not recommended. I think the average user in Brisbane should never touch them.