Anything from , I'm currently looking through the list for any providers with a POP in Australia as they would become your best option. Will update this post if I find any.
EDIT: List of providers on TF's list with Australian POPs:
How does get listed as Logging: No, Abuse Monitoring: No, User Identification: No... after using Wireshark to sniff traffic without even a court order???
How do they get listed as Abuse Monitoring: No when in their reply to Torrentfreak they said "we might temporarily install on the specific node a Wireshark or a TCPDump instance" ??
I've tried a few but I'm still quite new in the vpn game. First tried and experienced bad speeds transatlantic and in Europe where I'm located. Last one I've tried is , bedt do far. Good speed, plenty of locations to choose from. Easy software and seems to have good support services as well. Also the don't logg data and has gotten good reviews around the Web. My reason for getting vpn is hiding my torrent traffic and using streaming services in the US.
What's your threat model?
If it's governments or big corporations: FOSS apps, decentralized networks (Tor), systems that are designed to be trust-less (Same Tor for example).
If you want to be more secure rather then more private (but i guess it's r/security) you can keep most of what you use, simply get a VPN (), Veracrypt, firewall, password manager (BItWarden) no fingerprint, only passwords, 2fa (AndOTP, Google authenticator), maybe even hardware token (Librem key, Yubikey), ProtonMail.
If you wanna go hardcore privacy mode: Thinkpad with libreboot, Replicant as Android ROM, Tor always and everywhere, hardware key and very strong password for encryption, wifi/bluetooth turned off, only ethernet, keepass as password manager.
Looks like 2 things are happening.
1) is just that bad. I have a good VPN and even then it occasionally drops. I've found that reducing the speed to about 200K is good for overnight.
2) You haven't set up your torrent client to ONLY download through the VPN channel. Set that up correctly and it will stop dead if the VON drops.
General consensus is that the following VPN's are good: Viking, PIA, NordVPN, , and AirVPN
But to be honest, you can never be sure. You should always assume you might potentially be being logged. If you need to be truly truly anonymous, that's what Tor is for.
Edit: also, Mullvad. Forgot about them, but ya highly recommended.
Edit 2: Yes, keep the comments coming. It's good for potential VPN users to see the dirt and people's opinions.
They are the ones I use. You can always head over to /r/VPN for more suggestions. Although reddit seems to have a boner for Private Internet Access (PIA) but I'd avoid them because they just seem too good to be true and they're based in the USA. But that's just my opinion, so if you believe they have a good deal and trust them, then go ahead. Just beware that there is a reddit bias towards PIA and if you speak out against them you get downvoted. Just my 2 cents.
> Why are these questions being specifically posed towards pia? Are there providers that do provide a warrant canary? Are there other providers that do respond openly to the question?
has a warrant canary.
Here's their explanation for having it.
The internet disagrees because most VPNs today are based off of OpenVPN, which is open source and verifiably secure on the backend. There is the concern of the owners, but that's why you go for offshore or activist-owned VPNs, like AirVPN or .
Honestly, free VPNs can often be quite dodgy, as in if you torrent or stream movies illegally it's very likely that they will point any DMCA complaints they receive regarding you straight to your door. Secondly, with free VPNs you never know why they are free. The reason a lot of them are free are due to them collecting certain pieces of data about you and selling it. Same goes with proxies however free proxies often are people performing MITM attacks (collecting everything you send/ receive including passwords).
Honestly if you are gonna look for a free VPN download OpenVPN and look for a trusted VPN server to connect to on a site like VPNGate.
However. I have used several services which are very cheap such as PIA, Torguard, VyperVPN and ExpressVPN which I recommend you buy over using a free VPN.
If you are looking for a very cheap VPN check out AirVPN, .
Edit: Spelling
It sounds like a child pornography ring.
At least they were transparent about it and let everyone know that they will be monitoring the service for 7 days with Wireshark.
HMA didn't inform anyone that any monitoring was taking place, and they were monitoring everything all along.
Full Disclosure: I work for a competitor.
> has made it clear that they do not tolerate their services being used to harm human beings. If an organization comes to them with evidence of human rights violations, then they reserve the right to try to stop it. There are many organizations that monitor the exploitation and abduction of children that this company has already stated they would cooperate with.
AND WHAT ABOUT THE CHILDREN???
Seriously, a real VPN company shouldn't care about what their customers do. They sell privacy and they have to stand for it 100%. Any little exception is a severe harm of the business and trust modell and will be punished ASAP by the customers.
PIA is fine. They also have, by far, the best speeds of any VPN service. A lesser known one, but my favorite based on their answers to the torrent freak article, is . Like PIA, they have a fuck ton of locations, although their speeds aren't quite good enough for streaming stuff. I use PIA for accessing country restricted Netflix/Youtube/etc. even though I could probably just use Hola
Use a non forwarding proxy or a free VPN (PrivateInternetAccess, Windscribe, ProtonVPN, , AirVPN, NordVPN etc all have free tiers) and download the TOR browser for good measure. You CAN connect to the TOR network over VPN. Probably not necessary, but can't hurt. Besides, if you use the TOR browser ONLY for things like this, you won't have personal info to pollute it. It comes with noscript installed, so the chances of you being able to be traced are pretty slim if you're careful and don't log in to any accounts you normally do when you're being "you." Make a new one for whatever anon blog post you want to write.
TOR Browser
I ran it locally on my phone, both as root and not as root, and got
".DeadObjectException: Transaction failed on small parcel; remote process probably died at .BinderProxy.transactNative(Native Met od) at .BinderProxy.transact(:651) at .BinderProxy.shellCommand(: 98) at .runShellCommand( a:295) at .runUninstall(: 70) at (:166) at (:99) at .RuntimeInit.nativeFinish nit(Native Method) at (Runtime :309)"
Edit: It worked when I did it with ADB, but didn't work locally.
is a pretty solid one that's reasonably cheap, fast and won't sell you out.
I'm not at my PC but there's a website with a spreadsheet detailing the quality, security and trustworthiness of hundreds of available vpns
Edit: Here's the site -
Remember a few years ago when logged a server for 10 minutes to catch a hacker? We need a way to stop logging, the funny thing is has advertised that they don't log. We need TOR like network of VPNs where it's fast but still anonymous and impossible to trace a source.
Hmm. I've been using with no issues whatsoever. In fact I recently had to contact their customer service and not only was the response prompt, I dealt with the same rep for all of my communications. He/she was very friendly, to the point we even exchanged pleasantries about the holidays.
I hate seeing they aren't "recommended" as I've only had good service from them.
When you're using the Internet - they can mostly see what you're doing online. It doesn't mean that if the ISP sees this, they care. ISP has tons of other users.
If you want to avoid that, use a VPN. They will see that you're using one, but not what you're doing online. Not to mention it would be safer for your online privacy to use one (NordVPN, VPNArea, are no logs and offer high security).
Either that or screw it and get your own service
> never logs anything & runs everything from RAM.
Source
Ethical policy makes no mention of logs
If you are not picky and don't mind digging round you should give /r/opendirectories a try.
Really though you need a VPN. I've used a few different services and is the one liked the best and it was $5/month.
I personally think the stance the provider takes on privacy matters more. was never based inside 14 eyes and don't log, but they monitored servers with Wireshark just to give up some guy who was harassing a girl on Facebook.
So it's really about picking a provider you trust. I would personally trust Mullvad over a majority of providers based outside of 14 eyes.
A VPN can hide your IP address, which could be used to make new accounts to get around the ban you experienced.
Using a seperate browser is good, also an adblocker like ublock.
For the actual VPN company i would personally go with a non-US provider myself, like iVPN or . The US has a long history of bullying companies into cooperating with the surveillance state. Companies in fringe locations like these are more immune.
Also be aware, no matter how trustworthy a VPN company may seem, you will never be able to trust one 100%.
;pref=2&pli=1&sle=true
Never use a free VPN for torrenting. As already mentioned, they inject ads, sniff packets, and most importantly, they keep logs. This means they can easily pass your true IP address on to anyone that asks for it.
There are a couple free vpns that claim not to log (cyberghost) but they block torrents on their free servers.
Get a paid, non-logging VPN
Some good choices:
Currently with .
getting pretty good streaming speeds on a cable connection. about 5-7MBytes/s as opposed to my max of about 12MBytes/s.
ping time goes to hell connecting to the otherside of the world, but using it as a proxy for only certain programs helps.
I settled on AirVPN. Not too expensive, good privacy policy, and you can get a short pass for free to test it if you ask.
PIA will technically let you open one port, but if you're not using their client, it's... difficult. I couldn't get it to work and they would not support it, so I quit.
I also tried . Cheap, good privacy policy, but their tech support was not able to get my connection working reliably.
I hear some of the new AC routers can handle VPN encryption. I don't know which ones.
I use a PfSense router/firewall, running on an old Core2Duo PC. More info at /r/pfsense. Installation is straightforward, but writing firewall rules is a little over my head.
>?
I don't care much for their history of using wireshark to sniff packets when they get abuse complaints, and EFF's attorney stated that their policy was the "worst he had ever seen" (although apparently they have changed this). I think for now I'm not going to use , I don't know if I can fully trust them yet.
I wouldn't go with NordVPN, because they censor servers. They block P2P on their US servers (and say they do it by law, yet PIA, AirVPN, Mullvad and a few others all allow P2P on their US servers) it seems that they are just very lazy when it comes to handling DMCA notices. They do allow P2P on their CA servers, but if a provider is willing to block a whole protocol that isn't even illegal, then i wouldn't trust them. I just don't trust and never will after using wireshark over something as simple as someone harassing a girl. That shit happens every day on YouTube, you don't see them giving out logs.
Wow, 195Mbit? Lucky you.
I'm still testing , and speed-wise they're pretty good. I easily can max out my 75Mbps connection, depending on time of day.
I think you may want to make the fact that you were not using their highest tier of service a bit more prominent in that review. I mean they have servers everywhere, including the Isle of Man, which I assume would get you very decent speeds.
Not trying to argue for them, I probably won't end up using them after my month is up, but the speeds you are seeing is not really indicative of the speeds that are achievable.
uses 4096bit as well dumb ass. They are rolling it out slower then PIA because they are actually releasing the ovpn files for it unlike PIA were you have to use their shitty closed source program that could have a backdoor in it for anyone to find. I'm 99% sure that PIA could find users if they want to as well and i'm sure they have before.
I thoroughly recommend . They don't keep logs, as you'd expect -- buying with PayPal is safe because of this.
Well there is a difference between on vacation and in 5 completely different countries at one time ;) - But again, if they don't log how would they know? It would probably still be against any providers T&C regardless. I'd imagine for the small prices that providers charge it would be worth getting your own account to support the service, if everyone bought 1 account and let 4 friends use it then that would soon lead to less investment in the service.
If you're US based then look for a provider that can distance your torrenting from your base country, ie; Canada or perhaps South America. If speeds are good for you then services like offer servers in Panama which would be great. If you can reach Europe with good speeds then look for Icelandic, Dutch, Swedish servers.
It never said anything about monitoring servers for human rights complaints. I am not hacking or doing anything illegal I only want to protect my privacy from several agencies. is a joke and I am tired of hearing about it. Once again I state this. uses 1024bit RSA for handshakes. Do you really want such low form of security? Many people use PIA to hack I am sure of and I have never heard of ANYONE getting caught, I have also never heard of a PIA account being terminated. PIA respects users who want to obtain privacy but not ones who want to commit crimes. Besides if you want extra security just use a VPN and Tor with scripts globally disabled.
The only comment i disagree with is:
"Prior to recent NSA security leaks, RSA 1024 was considered a strong enough level of encryption."
This is not true. Security experts have been recommending 2048 en masse since at least 2010, some earlier.
Full disclosure: I work for a competitor.
GlobalProtect VPN does not mask your IP address. It does route your request through their DNS servers.
I highly recommend spending some money for an actual VPN service. The following VPNs: , Nordvpn, and Private Internet Access will work for MOST STUDENT's VPN needs.
or go to your local 7-11 to get a disposable credit card.
Get yourself a VPN (if you're willing to pay I recommend Nordvpn or , they are log free)
Ship to not your address ;). Maybe a house that is on sale on your block.
Good luck.
I have no experience with NordVPN personally, so can't really comment.
I also need to be fair here and say that with Viscosity, Windscribe and are MUCH better for me than previously... I spent my night setting up OpenVPN profiles and testing. So, perhaps it's just the client that's the issue in my case.
I'm going with Viscosity using ProtonVPN as my main, with Windscribe and profiles as backups since I have lifetime accounts with them.
The stance the provider takes on privacy matters a lot more then the country the provider pays to set up their company in. was never inside 14 eyes and were caught monitoring servers and gave up some guy for harassing a girl on Facebook a few years ago. BlackVPN used to send out DMCA notices to their users. Mullvad has been around for years, well known on the darknet and has an open source program. They were also one of the first providers to not block P2P on US servers. I'll leave it up to you if being inside 14 eyes really matters as much as people think it does over the stance the provider has for privacy.
Ik heb waar ik tot nu toe best tevreden over ben.
Zij geven ook proxys bij je vpn (zodat niet al je verkeer over de vpn hoeft maar je specifieke software (ahum, waaronder torrent clients) ip masking kan laten doen. Een goeie client kan vervolgens het verkeer encrypten en dat enforcen. Het voordeel hiervan is dat je gewoon een youtube filmpje kan kijken in 4k terwijl je iets download zonder dat dit allemaal door de vpn moet (en dus hoogstwaarschijnlijk gaat haperen)
..maar ik zie wel wat oranje vakjes bij dus ik ga er toch nog eens doorheen lezen :)
That's weird. I use and I can log in without the VPN, see that the game is blocked, close the window, turn on the VPN, then load back up again without having to log out and back in and the blackout is gone.
thus far seems to be the most trustworthy VPN company I've come across, and is worth checking out if you haven't. At least from their claims, no log files are kept, the system is run entirely in RAM, and they have an option to generate an authentication token after which your account data is deleted so there's really not much of anything left to seize even with a warrant (obviously, with your account data gone, don't expect any further customer support outside of the VPN continuing to work, but they are good about warning users of this ahead of time).
There is always the possibility of traffic correlation by the likes of 3 letter agencies and such (this has been detailed ad nauseum particularly after the Snowden revelations...), but within the confines of what you can reasonably expect any VPN to protect against, I've yet to come up with any improvements I'd like to see them make re: security/privacy.
PIA doesn't allow higher levels of encryption through config files via the open source OpenVPN clients.
You must use their proprietary clients if you want access to higher levels of encryption which is bullshit, and why I left them.
If you're after providers who allow higher levels of encryption (AES-256-CBC) through config files, two I can personally recommend are AirVPN and .
How often do they update it? I've seen it before, but when I looked at it, it's always been up to to date.. it's 29 hours old at this point.
Edit - n/m.. It's up to date. Failure was with my brain, not .
Most VPN services are. I am holding on for zero-knowledge based VPN services comes along. I know there are a few in the works. Until then, find a service that takes security and privacy seriously, and only keeps traffic in the RAM. is recommended.
I went with a 6-month bundle of on their Solid package, but their much cheaper Basic offering may suit your needs just fine if all you're after is USA-exit options.
The Windows and Android clients are both great so far. They might be blocking outbound SMTP on the standard port 25 but otherwise seems pretty easy-breezy. (You will be sharing the endpoint IP via effectively NAT, so it will impede your torrent and Skype activities.)
One tiny "gotcha" to be wary of is that your Website login credentials are NOT what you use for the VPN connection itself once you've picked a package - you need the generated user:pass pair they email to you (and can also be found through the member area on their website) to actually connect.
Both Mullvad and are in the process of updating their encryption. is already running updated encryption on some of their servers. So your argument is moot. Fact that they are still using 1024bit rsa keys is just sad. The fact that two providers are still using 1024bit keys and blowfish doesn't mean that is "on par" with other providers. Because 90% of providers are using AES and at least 2048 bit keys.
This submission has been linked to in 1 subreddit (at the time of comment generation):
This comment was posted by a bot, see /r/Meta_Bot for more info.
Just double checked not "off the top of my head" and out of 23 providers only 3 known providers (including the two I mentioned off the top of my head) and 1 more unknown provider allows P2P over their full range of servers, the missing one known provider is
A further remaining 1 provider allows P2P but in terms of VPN servers only have 1 in the Netherlands.
Really, where's your source for that?
Because here's my source for my statement, which I did the research for.
4 out of the 7 (PIA, Mullvad, ibvpn, and ) are using Blowfish for data channel.
You're also implying that AES-128 is somehow superior to 128-bit Blowfish (you do know, default key-length for BF-CBC is 128bit, and not 64-bit, right?), which I would disagree with. As strength is concerned, I think they're about equal. Just because an algorithm is old doesn't make it out-dated.
If you had read what I had wrote, you'd see that I agreed that using their client provides better levels of encryption.
I couldn't quote exactly but whilst looking around for a provider I have seen these both mentioned in a bad light/with bad comments.
(All you need now is for someone to comment that you work for )
This is default OpenVPN (and most VPN) behavior.
It makes large amounts of data harder to obtain, because you'll have to crack the keys for every hour of packets you've logged.
It does not make the cracking process any harder, like increasing the number of bits would.
Think of it from the "hacker's" point of view.
If you have an 8 hour log it may take:
1024: 12 hours + 12 hours + 12 hours + 12 hours + 12 hours + 12 hours + 12 hours + 12 hours = 96 hours total to crack all of the data encryption. (arbitrary number chosen, real world is probably about 2000 CPU-Hours based on the Pollard's Rho Algorithm progress over the last 2 years vs RSA, faster for someone with advanced knowledge and custom soft/hardware and an unlimited budget)
4096: 300 billion-billion-billion-billion... years to break the 1st hour...
It also not a feature unique to .
Full disclosure: I work for a competitor.
For a widely used VPN (200+ Nodes in 30+ Countries) that uses shared IP addresses , check out . What happens when one of their nodes get too many DMCA notices? They shut it down and open up a new one. That isn't saying "fuck em", that is using an option that is legally available. As a bonus, they are not based in the United States.
Mediahint should work on everything and is my first recommendation. There have been problems these past few days but people have been saying they are resolved. Otherwise, should work without any configuration as well. has plenty of Russian Servers in the $5/mo plan if you feel like paying and want it to be foolproof.
I agree, absolutely. Every single thread that comes up in regard to , twelph is there shilling. There is another as well, although I cannot remember their nick at the moment. Even after has proven that they do the things that VPN providers should not be doing, the shilling is nonstop.
I certainly hope that everyone that reads any thread in /r/VPN knows better than to simply go along with everything they read. Do your due diligence and make your own decisions. How many, "please just tell me what VPN to use cause I'm too lazy to do my own research..." threads have there been? Also, keep in mind that if something sounds too good to be true, it probably is. The Reddit "hive mindset" is probably not the winning strategy when dealing with your own personal security online.
Pick the node with the lowest ping to you. France would be your best bet most likely unless you get a VPN provider with nodes in portugal ( does on their more expensive plan). It doesn't matter what VPN provider you have. You will never max out your connection from a node on the other side of the world. It has to do with routing/peering. The program should tell you the lowest ping server. Try different ports in case your ISP is throttling or blocking ports.
It is possible. It also depends on the VPN provider. Some sell packages with a static IP add on. It would cost you more but guarantee you the same IP.
Some providers such as allow you to connect to a specific server and then end up with the same IP. Not all providers do and may assign a dynamic IP within a range, for example you could end up with the following...
183.0.0.1
183.0.0.2
183.0.0.3
etc.
Is it possible your work can allow an IP mask eg; 183.0.0.* then you would be more open to a range of providers.
How is their application shitty, its more simple than and they don't monitor the loads on the server nor do they log for humanitarian purposes. will even share information with 3rd parties if pressured. They also never refused to release the new files they just have a very small team and 600+ servers to deal with.
Have fun stomping off and being a little baby. PIA's application uses OpenVPN and of course OpenVPN is OPEN source just like you stated. All PIA's application does is ping servers and is a useful GUI to select what server you want. 's client is open source neither so stop whining.
After 2 days of 8 - 11 Mbit/s speeds with , I decided to buy a PIA account. With a UK node I got 80 Mbit/s, so basically the max of my connection. Lower pings too. So I was definitely not doing something wrong, PIA is just loads faster than .
Also I'm experiencing by far the fastest torrents speeds in my life. Sayonara to my ISP's traffic shaping.
Probably, but in the case of it was part of their T&C of the Ethics Policy not to allow actions which are considered "harmful to humans" so in that instance they've probably covered their own back.
Any company with brains will write something in their small print to cover their own backs, customers not reading that (as most of us don't) wouldn't have a leg to stand on.
In theory what you've said would be true though.
Hi mate appreciate your help, im a bit lost so can you please help. What my script is, is a proxy to get live tv on my emby and plex servers. i have setup a. sh file in termux boot called
in the file i have the following
python - hl
this starts the proxy at boot and on emby everything is great
however plex does not like this, 1. it does not like the fact that it starts at boot 2. It does not like face the proxy is running in the background, it only seems to work when you can actually see the proxy loading in termux
is there a way i can get this to work with either termux boot or task? and could you explain the steps appreciate all help as really trying get this working
thanks
My best advice is try multiple services. A VPN that works fine for one person might not work good at all for you, that's because of where the VPNs are located and what hardware/connection they use. I tried 2 services, NordVPN (didn't even bother responding to my ticket when I was on trial) and (a special mention for false advertising. half of their servers they include in statistics aren't even online.), before settling down on TorGuard.
It is also best to choose one with servers closest to you, that way the latency will be lowest.
Another advice is don't use free VPNs. If something's free, you are the product. Not only speed/bandwidth is usually crippled, they might also be logging your traffic.
The typical recommendation is Private Internet Access, they're like $40/year making them one of the cheapest without any sacrifices in quality per se. The downside is that they're a US company, which means they're much more vulnerable to NSA shenanigans than companies based in other countries.
I would recommend either or ExpressVPN. is around the same price as Private Internet Access and they're based overseas, but there was one incident where they logged traffic to stop someone using their servers maliciously. You can read about it here, but they seem to have one of the most solid services in every way.
Use a VPN like . They have servers in something like 50 different countries. If it is blocked in one, just jump to another server. They also have servers in various US states if you want to view US only content with a VPN.
Please do search around and find something that works for you. If you find someone better, please let me know! I was just sold on 's level of service and transparency, along with how cheap it is. Throw in the giftcard as payment and it felt like a good fit.
has been a good supplier for me recently. Global availability, great transparency, easy to use software and configs, lots of options at different price brackets and they'll even accept gift cards and whatnot as payment.
Affiliate link if you want to sign up
I can vouch for Private Internet Access and
As far as I know Tor is not illegal in any country, and you won't get arrested for it. Some people who run exit nodes get visited by the police if their exit node was used to visit child porn or something but that's different to what you're talking about which is using Tor as an average user for browsing.
I'm a bot, bleep, bloop. Someone has linked to this thread from another place on reddit:
[](#footer)^(If you follow any of the above links, please respect the rules of reddit and don't vote in the other threads.) ^([Info](/r/TotesMessenger) ^/ ^[Contact](/message/compose?to=/r/TotesMessenger))
[](#bot)
Are we looking at the same one? , 84 in the chart. It says there it's based in the Seychelles, and meets PrivacyToolsIO criteria (which I think means no personal data).
Do you know something that makes the chart wrong?
>
yeah it seems the paid VPNs work better or something... having little luck with Tunnelbear (works about half the time) which usually is amazing. I just dont wanna have to pay for VPN, pay for then not be able to still watch it on mobile when i can just browse here and get it for free... they should really treat it like netflix (blackouts that really aren;t enforced at all - as they just priced themselves out of market for me)
The spying is done with their own hardware at their location, nothing to do with the router. Unless you encrypt the entire connection using a VPN on your router(which would be impossible for pretty much every consumer router due to hardware limitations of the processor trying to encrypt gigabit speeds) then every device would need to be set up with the VPN. You then run into a problem finding a VPN that would even get close to allowing a gigabit connection to any of their servers. offers their boost service, but it might get a little pricy.
Right they put the cheapest one first but it has X's - the second cheapest one doesn't have X's so it appears to be the best deal. In fact it is the only one on the list without X's (except for Invisible Browsing VPN which is more expensive). is the clear winner in this list on price and features. Which makes it suspect.
Depends on what you mean by "privacy". If you just mean "spez and co won't be able to use my data", then you can create a new account, not link it to yourself in any way and you should be fine.
If you mean "spez and co won't be able to get my data", I'd only access the account through a VPN ( are good) or something similar.
Anything more than that will be tough, chans log IP's and the like, although they do regularly expunge data. That's probably maximum privacy that you'd want; assuming you're still using a trusted VPN, you can freely use boards, bbs, IRC, Usenet, and then hop over to Reddit for stuff you don't mind logged.
Anything more secure than that, we're talking about preventing surveillance rather than logging by a company, and that's where you fall into specialty encrypted chat protocols and meshnets and blockchains and Tor, and while I love studying that kind of stuff, it's probably not going to be too useful in a situation like this.
> That's a very subjective list.
works basically like a Wiki, everyone can participate. It's not subjective. We actually link to the news report about under "Related VPN information"
> NSLs/gag orders have been successfully challenged in court in recent years.
Maybe after servers have been raided and data was collected illegaly by three letter US agencies.
Confirmed Mullvad does this out of the box. You can either choose to flat out block IPv6 or route your IPV6 traffic through them via a checkbox.
says they do as well, but indicated required them getting one of their engineers involved on a per account basis.
Vypr doesn't support IPv6 at all and as such IPv6 traffic will leak out through your local connection and never be routed over the VPN.
Perfect-Privacy is a similar story, no IPv6 support.
Hey there, thanks for your kind words. FrootVPN was removed because they don't support Bitcoin, even though they have a Bitcoin icon the footer of the website. Once they support Bitcoins I'll include them again.
We've already linked to the same article in regards to below the VPN comparison table here: under "Related VPN information".
I'm not trying to dig up an old thread (as it is still relatively 'current'), but you remarked that are in the 'top 3' that you have researched and used. Can I ask what the other two are, and can you maybe narrow down what region you are based in? A continent, maybe?
I know different services each have their fans, but I tried and found it to be fast to the point where there were really no differences in downloading with VPN compared to no VPN (now I know that's probably not true, but let's just say the difference is often not noticeable).
Their control panel at their site has a list of all their network VPN nodes and how busy they are, so by selecting one that's not busy, my P2P dl speeds are about the same 1.5 - 2MB/s (depending on the torrent obviously) after connecting to the VPN.
Honestly, I thought I'd only use the VPN for P2P, but it's so hassle-free it's pretty much on all the time.
also has a warrant canary if you require things like that.
You keep saying "Box", are you using VPS to host or dedicated servers?
Couldn't they just freeze the ram before they mess with it and still get data?
Where are the servers located and where is the company based out of?
I'm pretty sure that runs off of ram as well, i wouldn't trust them as far as i can throw them though.
also anonymizes the connection though, a la TOR, as I understand it.
" doesn't even know which user was involved in the Bittorrent swarm. If they can't identify the user, they can't compromise his privacy."
had terrible routing, and speeds never over 20Mbps. Connecting to the SLC hub, went from Denver, to Dallas to San Jose, back to SLC. Same for the Denver location, which is also constantly over 100% load. Seems like they use data centers that aren't very well connected. They also don't mention anywhere which hubs you get access to when you buy a plan. I had to upgrade to even test the server I wanted to try.
IPVanish has some decent pings to a few of their servers, but I wasn't able to get over 30Mbps(most less than 10) to any of the US servers. In the speed test I did (from different sites), it would burst to 30, and then seemed like it throttled down considerably, even on servers they listed under 20% load.
So far PIA and LiquidVPN were the only ones that I could maintain over 50Mbps. Except on the LiquidVPN KC location which was under 20Mbps due to extra encryption, and the NJ one is just too far and I ran into routing delays during peak times.
I would like to know what you find. I also use PfSense and have tried and PIA, with mixed results.
I'm testing AirVPN now, and I find its speed lacking for my 50/25 Mbps connection.
However, AirVPN doesn't have servers where you want them.
Florida, Virginia, Chicago, California are all the locations they've got in the US.
just finished testing and has released their own ICANN/OpenNIC DNS servers. read about it here:
OP has not provided a source for his claim, instead saying only that it came to his attention. I tried doing a search to find the statement from but with no luck. His claim might be completely valid but until he can provide a source for this then we should take it with a pinch of salt.
Edit: u/twelph found it. See below.
looks attractive, regardless of price, until you start reading (on their own site) how they give out free accounts to anyone willing to shill for them. No matter what I read about them from any place, I never fully believe it because I just assume that people are trying to get free accounts.
> Find me a VPN provider that doesn't have have the exact same ability to do what this company has done.
Every VPN provider has the ability to do what they did, but they don't do it. Those that do will be shunned in exactly the same manner. Those with enough intelligence to do their own research will certainly avoid those providers. Sorry if that puts a dent in your referrals and prevents you from getting free service from , but it's the truth.
The RSA key (and symmetric key) is renegotiated once per hour by default on OpenVPN.
1024-bit is weak by today's standards.
What they are (poorly) saying is, that because the keys are refreshed every hour, it is harder to break a full data stream. If you're logging days and days of data you'll have to break the key for each hour, rather than breaking the key once and having all of the data.
It does not make the data more secure (like increasing the number of bits would), it just makes it take longer to access all of it.
Full disclosure: I work for a competitor.
I can also personally vouche for PIA, I also hear good things about
Also..
I don't use , but they are rolling out 4096-bit RSA for handshakes and it's up and running on some of their servers. PIA refuses to release the ovpn files for their new levels of encryption. So they might have not even released. Just because you don't hear about something doesn't mean it's not happening. I'm pretty sure the NSA was proof of that. It's a low level of security yet PIA was using it up till last month and still using it for people who don't want to use their shitty application. So your comment makes no sense at all. There are other VPN providers that have been using these levels of encryption way before the NSA scare.
OpenVPN is open source, that terrible application that PIA has isn't open source and no one knows what they do behind openvpn.
also shows every complaint they get. Once again, just because you don't hear about something doesn't mean it's not happening... I'm done replying to you, have a nice day.
Well, it is worded pretty badly, but they seem to only provide data on the political or religious content when it relates to either
Only issue is, providing a government can prove your data is harming another individual, would oblige their requests AFAIK
Private internet Access servers are subpar compared to any other provider. They are so congested. I'd suggest avoid anything US based. Even though got bad press by a funded article they still are holding up to their policies. PIA would hand over anyones dox in a heartbeat. I tried using pia and many others tested for boosting people in league of legends but their servers would add an additional 200 ping when we all live in california. A friend from the east coast too had the worst of it saying his increased up to 400 and he was using the east servers. Stay away from Private Federal Access