How does TC work?

Hi,
I’m trying to understand how TC works and what it does and doesn’t do.

I found:
“I could find no technical explanation of how CTC works. Is it correct that it wraps a VPN around communication between the end point and Comodo’s own (or contracted) servers, and then connects without VPN between those servers and the target hosts?
Yes, this is correct. The traffic between your PC (or whatever hardware you have) and Comodo server will be encrypted, but unencrypted beyond it. This does not apply to secure protocols though (such as HTTPS, ssh etc.) which are always encrypted by their nature.”

Now I’m sure this makes sense to some people, but to me it’s a lot of gibberish. Could you explain what VPN is, what the “end point” is? It sounds like there is no protection between “those servers and the target hosts” also “traffic between your PC (or whatever hardware you have) and Comodo server will be encrypted, but unencrypted beyond it”. What would protect that connection? What would protect my computer from the “keyloggers” I am now hearing about?

I am trying hard to understand all of this, please answer in plain English.

Thanks,
Bernadine

TrustConnect protects your data on the most dangerous part of way. In most cases, cyber criminals sniff data in the local network.

Also see more here: TrustConnect Overview