I personally use vpn.ac. I have been using their service for 2 years now and I have been very happy with their service and support. There based out of Romania. Looks like they currently have a 45% off black Friday/cyber Monday deal going on. Use the code CYBERWEEKEND
Disclosure: If you use that above link and end up buying their service I will get credited for a referral. Click Here for a link without the referral code.
I say it can be good or bad as same as others... You have their work that they will protect you, but there's no way to really know what they do or do not...
It seems a good VPN provider except that they keep some log for a day:
> We keep connection logs for 1 day to help us troubleshoot some problems our customers might encounter. These logs include source IPs and timestamps (connection start/end time).
If you care about not leaking your dns or ip address then use opensource software like Firefox and use a [paid VPN](https://vpn.ac]. Never rely to free products to protect your privacy.
Any of these but I used the Denver one.
https://vpn.ac/ovpn/AES-128-TCP/
They use TCP port 80 so it looks like normal web traffic. It is impossible to block port 80 without breaking the internet connection.
+1 for VNP.AC. Their software clients are relatively no fuss. I've generally been able to connect without issue.
I've yet to config my router with an OpenVNP solution. But they seem to have good guidance here: https://vpn.ac/tutorials
They have an explicit connection log policy, https://vpn.ac/faq :
> What exactly does "connection logs" mean?
> When you connect to a VPN server, the server (VPN daemon) will log your real IP address, connection start/end time, and total traffic transferred during the session (e.g. 100MB, 2GB etc). These connection logs with your IP address are generated by the VPN server/daemon and are stored for one day. All logs on this server are permanently deleted on a daily basis running a cron job. We do not log or store any sensitive data such as what you actually transfer during the session.
> [Out of order] Do you log/monitor my activity? What logs do you keep on servers?
> No, we do not log/monitor any kind of user activity such as visited web-sites, emails, files transferred, instant messages, DNS queries etc.
> We do, however, keep some connection logs (to our VPN service) for security and support purposes. These are kept on a separate, encrypted server (located in an undisclosed location) and are automatically erased on a daily basis. We don't keep any logs on servers, not even common Linux daemon logs.
> Keeping these logs also help us in identifying potential attacks against our service, such as brute-force and even some MiTM attack vectors.
I know openvpn have a few tricks up its sleve to avoid the national firewall. And i was going to recommend you set up a buyvm vps with your own openvpn. But while googleing i noticed that vpn.ac apply atleast one of the methods.
I have no personal experience with them but i think you will need to find one that mention it got support for connections from china.
I use Express VPN myself, that is a bit expensive but it allows me to run a vpn on up to 5 devices.
VPN.AC is very popular, reliable and not very expensive
https://vpn.ac/
One of the best ones I've used so far, and with WireGuard protocol as well, is vpn.ac .
The best test of a VPN is to use it in China, and this one was an absolute lifesaver that punched through a very heavily firewalled network in which N0rd couldnt even connect to a single server.
I am in Dominican Republic trying to make US calls with vpn.ac. This fixed it for me with a few other adjustments that I am not sure had anything to do with the solution.
I tried "prefer wi-fi or mobile data" before switching it from the carrier, but somehow it got switched back to carrier. I changed it back to "prefer wi-fi or mobile data" but only AFTER removing the SIM, then got it working with no SIM. I put the SIM back in and it worked fine.
FWIW, I installed the google phone app (blue icon) and preferred it over the default phone app for the Samsung s9 (default is a green icon). So try removing the SIM, it might be worth a shot. Also possibly relevant is that taking out the tray with the SIM and SD card jostled some of the apps installed on the SD card, then they started working right when reinserted.
Here you go....
STEP 1: DEFINE THE EXECUTABLE AND THE FIREWALL RULES
Open Control Panel\System and Security\Windows Firewall and open the Advanced Settings from the left column.
Add both Inbound and Outbound rules where you search for the torrent client executable:
New Rule... > Program > This program path (browse for torrent executable such as
%ProgramFiles% (x86)\qBittorrent\qbittorrent.exe) > Block the connection > check all 3
networks > give it a name ie. qbittorrent block
Action should be Block the connection and select all 3 networks (domain, private, public)
STEP 2: DEFINE THE IPS TO BLOCK
Open the rules you created, find the Scope tab, in Local IP Address add your local network
IP's (not the VPN) such as 192.168.0.0/16 and check These IP addresses:
For VPN we use 10.10.0.0/16 so you don't add that. Basically the Scope says "block the torrent software on all networks if the IP address of the interface matches the Scope defined network which is the LAN interface".
By defining the whole LAN subnet rather than PC's single IP address, you make sure that the rules apply even if your PC IP will change (it usually does if you use DHCP).
STEP 3: TEST TO SEE IF IT REALLY WORKS
Now without VPN try to download a Linux ISO torrent. See if it works. Close torrent, connect VPN, try again. Close VPN while torrent is active, it should stop.
Note that the "stop" looks more like a gradual one in most Bittorrent clients. In fact traffic stops instantly, but the torrent clients will show an average, gradually going to zero traffic.
Enjoy!
Follow This, fixed it for me.
So in order to enjoy this season to the fullest I got a subscription with a VPN provider for three months. The objective is to be able to watch Sporza and (probably less relevant now) RAI during spring. After some research I went with <code>vpn.ac</code> mainly because a) they have an exit node in Brussels, and b) they are one of the few providers that support Wireguard. (I have to deal with IPsec professionally so I’d rather avoid dealing with that insanity at home in my free time.)
Initially I was disappointed to find out that their Wireguard support is still in beta and not enabled on all exit nodes, the Belgian one not among them. However I contacted support (on a Sunday afternoon!) and they activated it in Brussels in under 24 h. That’s just amazing. The connection works great, I’m currently masking as a host in the Netherlands just for the fun of it. Can’t wait to test it in a real-world scenario of streaming a bike race on a weekend afternoon. Monuments and Classics, here I come!
I recently Purchased Surfshark VPN, I was using VPN.AC earlier. If you wanna talk about it, you can PING me in DM. I will tell you my experience and difference. It may help you to decide and buy.
Dude any VPN provider can change their logging policy after the so called Auditing. it is just for marketing purpose. I have used ExpressVPN, VyprVPN, TrustZone and VPN.AC for many years. I do aware of these things. I do appreciate your points, that is why I am asking for recommendations here in India. Are you using any VPN right now? and give me a suggestion. Till now I didn't see any recommendations from you :D That was my core question :D
Yes, they are, when you aks help they won't tell stories like other VPN's, they stick with the point and solve it ASAP. I like their customer care via WIRE.
I never really liked NordVPN, they are kinda overselling their service. I just needed a VPN for torrenting and privacy that is all. VPN.AC is the best in that category.
So far OpenVPN is robust and it is the one of the recommended VPN protocol to use. WireGuard may replace OpenVPN in near future. I am using VPN.AC , they also supports Wireguard protocol, I asked the same question to them they told me "its future proof" and they even recommended me to use it,
From my experience with WireGuard it is very fast, I am using it rarely on my iOS. I still prefer OpenVPN or IKEv2.
It is all about trust on your VPN provider and also on WireGuard. As far as privacy is concerned I would not recommend it to use it over OpenVPN.
I'm happy it's working for you.
​
FTR: I didn't just give up on PIA. I worked with their 'Support' group which was an absolute waste of my time and theirs. VPN.AC's support is significantly better too.
PIA had wildly inconsistent speeds for me. I pay for 75 and got between 3 and 60 with PIA. VPN.AC is much better more consistent speed wise 50-70. It's made a big difference to downloads and streaming.
Good suggestion however need to have Android 8.0 or higher. I am not willing to buy new phone for just this feature but it is something to keep in mind when upgrading.
https://vpn.ac/knowledgebase/111/How-to-use-the-Always-On-VPN-feature-on-Android.html
Well, I don't understand iptables well enough to do this correctly, but I have done it & it works. I followed this guide, and it didn't work because the WAN Up tab on the router's admin section didn't apply the rules, so I applied them myself from a computer through a shell session and it works fine.
Now, to route all ports but one (say 80, for example), you would need to change the last line to this:
iptables -t mangle -I PREROUTING -i br0 -s 192.168.1.151/24 -p tcp -m multiport --dport 1:79,81:99999 -j MARK --set-mark 1
adjusting the subnet mask and specific ports, of course. I'm sure there's a million better ways to do it, but this will work.
Just keep in mind that you need to run all the commands referenced on the vpn.ac knowledgebase in a shell logged in as root to the Tomato router every time you restart it - all of which you can automate from your computer.
Guide. It may be somewhat vague and confusing, so below is my explanation.
For each important app, I make 2x inbound rules, and 2x outbound rules which are the same as inbound:
Block all traffic for Private and Domain network profiles.
Block all traffic except VPN provider's internal subnet IP range(s).
After setting up both rules for one app, I just copy them, rename & change program location accordingly.
I have VPN.ac, I tried all three available servers and all worked (https://vpn.ac/status). Not gread speeds but I'm not from US and the Australia is probably furthest possible place networking wise.
In case this is what you mean (not live tv? that required sing up): http://i.imgur.com/T0ybqQw.png
Doesn't meet the privacytools.io criteria for VPNs (https://www.privacytools.io/#vpn). See the following in their Terms of Service:
> We only log access to our VPN Service for troubleshooting, service improvement and security purposes.
> We log customer's IP address, VPN session connect and disconnect time, amount of traffic transferred. All these session logs are stored on a secure (fully encrypted) server in a non-disclosed location and are deleted on a daily basis.
> We do not give your personal info to any third parties. We do not cooperate with any requests for information unless we are ordered by a court of competent jurisdiction.
Source: https://vpn.ac/tos
Also personal rule of thumb: Approach services offering affiliate programs with skepticism and scrutiny.
As an Australian I've had great success with https://vpn.ac/
I personally use vpn.ac. I have been using their service for 3 years now and I have been very happy with their service and support. Disclosure: If you use that above link and end up buying their service I will get credited for a referral. Click Here for a link without the referral code.
Ignoring it is about all you can do, but you should take steps to make sure it doesn't happen again. Disable ipv6 on the PC, and look into DNS leak as others have said. I seriously doubt a DNS leak is enough to get an infringement notice though, it just says you looked up the domain name to the server, it doesn't show what you did on that site or how long, or how much data you sent/received, if that traffic was routed over the VPN.
You should configure the system so that the traffic you want to hide can only be routed over the VPN, and if it goes down, it doesn't switch over to the non-VPN connection. I can't find the guide I used originally, but this one looks similar, just not as step-by-step. Basically, the firewall blocks the program from sending traffic out the default gateway, and only allows it to go out the VPN connection. So if the VPN goes down, or you forgot to start it, the traffic doesn't go anywhere.
This one might actually be a little easier though I haven't tried it.
I’m confused because the hidemyass link I posted above recommends a different method of configuring firewall than https://vpn.ac/knowledgebase/55/Windows-Firewall-rules-to-block-P2PorTorrent-traffic-if-VPN-disconnects.html and https://blog.ipredator.se/howto/restricting-utorrent-to-vpn-interfaces-part-1.html. The hidemyass guide says it’s sufficient if you check the boxes for Domain and Private but leave unchecked the one for Public (which is what the VPN is associated with), while the other two guides say you should check all three boxes and then limit the scope of blocked and allowed connections according to the IP addresses of your ISP IP address and your VPN IP address. Are both accomplishing the same thing? If so, the hidemyass method seems much simpler to do…
Also, the https://blog.ipredator.se/howto/restricting-utorrent-to-vpn-interfaces-part-1.html guide says “The uTorrent installer added two rules to the Windows Firewall. They allow uTorrent to communicate on every interface. These rules need to be removed. On the left pane of the Windows Firewall Management Console, click on Inbound Rules. Select the two uTorrent related rules (TCP-In and UDP-In). Click Delete in the right pane. A dialog appears asking if you want to delete the selected rules. Click Yes.” The other two guides don’t mention this at all. So is it necessary to first delete these default uTorrent rules before adding your own, or not?
It doesnt terribly matter. If you're in a situation where a third party can access those logs, chances are they can do more damage by compromising an active VPN session. There are scenarios where those logs matter, but people seem to be prioritizing the wrong thing with these logs, especially when most VPN providers probably DO log as vpn.ac notes:
>Q Some other VPN providers do not log anything. Not even the connection start/end time.
>A Some of them probably don’t, but we seriously doubt that all of them live up to their claims. There is simply no way to prove a provider’s claims, so it’s really a matter of trust between the user and the provider. VPN servers/daemons log such data by default as they are designed to do so. In most cases, the complete disabling of session logging capabilities requires source code modifications.
TL;DR logs really shouldnt be your primary concern. Trust, jurisdiction, technical security aspects, client support, and speed should all generally rank higher.
You said responded publicly. These are all very public responses. We are just waiting on the Liquid Viscosity update to get out of beta before posting all of the details in our blog... But besides the two tweets and 3 announcements https://www.liquidvpn.com/billing/announcements.php
there were 2 posts in our Network status section https://www.liquidvpn.com/billing/serverstatus.php?view=resolved one of which explains that as soon as we finish some testing and Viscosity rolls out their fix we will make a more detailed announcement but quite frankly the most important information is right there in the trouble ticket.
and
VPN.AC posted a public announcement here
https://vpn.ac/announcements/7/IMPORTANT-OpenSSL-TLS-Vulnerability.html
Just because providers are not posting here on reddit does not mean they are not responding publicly. I have cut way down on my posts here because I don't care for all of the infighting.