We tested 17 VPNs and 8 of them were causing DNS leaks through their Chrome browser extension.
Update: Please note that this not a WebRTC leak. This involves DNS prefetching which is activated by default on all Chrome browsers. We’ve already informed some of the VPN providers about this issue and they’re in the middle of fixing this.
If your VPN provider is on the list or it leaks your DNS through browser extensions (take test here), please be sure to inform us or them so they could patch this.
It’s a solution to reduce latency delays of DNS resolution time by predicting what websites a user will most likely visit next by pre-resolving the domains of those websites.
When using a VPN browser extensions, Chrome provides two modes to configure the proxy connections, fixed_servers and pac_script.
In fixed_servers mode, an extension specifies the host of a HTTPS/SOCKS proxy server and later all connections will then go through the proxy server.
In pac_script mode on the other hand, an extension provides a PAC script which allows dynamically changing the HTTPS/SOCKS proxy server’s host by various conditions. For example, a VPN extension can use a PAC script that determines if a user is visiting Netflix by having a rule that compares the URL and assigns a proxy server that is optimized for streaming. The highly dynamic nature of PAC scripts means the majority of VPN extensions use the mode pac_script over fixed_servers.
Now, the issue is that DNS Prefetching continues to function when pac_script mode is used. Since HTTPS proxy does not support proxying DNS requests and Chrome does not support DNS over SOCKS protocol, all prefetched DNS requests will go through the system DNS. This essentially introduces DNS leak.
There are 3 scenarios that trigger DNS Prefetching:
DNS Prefetch Control
The first two allow a malicious adversary to use a specifically crafted web page to force visitors to leak DNS requests. The last one means when a user is typing something in the URL address bar (i.e. the Omnibox), the suggested URLs made by Chrome will be DNS prefetched. This allows ISPs to use a technology called “Transparent DNS proxy” to collect websites the user frequently visits even when using browser VPN extension.
Test Your VPN For DNS Leaks
To test if your VPN is vulnerable, do the following test:
Activate the Chrome plugin of your VPN
Go to chrome://net-internals/#dns
Click on “clear host cache”
Go to any website to confirm this vulnerability
If you find a VPN that is not listed, but leaks – please send us a screenshot ([email protected]) and we’ll update the list.
Users who want to protect themselves should follow the remediation:
1. Navigate to chrome://settings/ in the address bar
2. Type “predict” in “Search settings”
3. Disable the option “Use a prediction service to help complete searches and URLs typed in the address bar” and “Use a prediction service to load pages more quickly”
This research was put together with the help of File Descriptor – ethical hacker from Cure53.
P.S.Note that online DNS leak test services like dnsleaktest.com are unable to detect this kind of DNS leak because the DNS requests are only issued under specific circumstances.
We used the following sites (in addition to our own Chrome extensions test):
Unfortunately, this problem isn’t as far-fetched as it sounds.
We found leaks in as many as 15 of the 74 VPNs we’ve reviewed. That’s a whopping 21.62% of the ‘best’ VPNs in the marketplace.
Those 15 leakers also occupy bottom 15 ranking spots in our best VPN list. That’s no coincidence.
So which ones are they? Find out in this list of VPNs that threaten your internet security with different leaks.
15 VPNs That Leak
Hoxx VPN (free & paid version)
Hola (free version)
VPN.ht (paid version)
SecureVPN (paid version)
DotVPN (free version)
Speedify (free version)
Betternet (free version)
Ivacy (free version)
Touch VPN (paid version)
Zenmate (free version)
Ace VPN (paid version)
AzireVPN (paid version)
BTGuard (paid version)
Ra4w VPN (paid version)
VPN Gate (free version)
Below is a list of both free and paid VPNs where we found DNS, WebRTC, IP, or Chrome extensions leaks:
1. Hoxx VPN – DNS, WebRTC, and Chrome extension leaks found
Server used for testing: Canada
This was a VPN that failed just about every test that we put it through, including half of our leaks tests. WebRTC leaks were just one of the multitude of issues we faced with this problematic system.
They log your information and expose your IP, through both standard WebRTC leaks and Chrome extension leaks. Coupled with its outdated VPN protocols and encryption standards, you’re better off just not using a VPN like this one.
VPN.ht uses a series of adorable aliens to let you know that with their service, you can be completely anonymous.
But apparently, they don’t run leak tests on whatever planet these little guys are from. Aside from the leaks, it was a pretty good VPN. They don’t log any information and they exist outside of the established surveillance alliances. This winning combination always eases my security fears a bit.
I just couldn’t get past the leaks…
We found IP leaks, but Spoiler Alert: this isn’t the last time you’ll be seeing this product on the list.
This VPN claims to hold “the key to online privacy” on their official website. But we found IP leaks that completely undermine this claim.
It’s a shame too because there was really a lot to love about this VPN. Fast speeds coupled with Netflix functionality and torrenting capabilities made it a strong streaming product. But those leaks were just too much to overlook.
This company claims that they are “a better way to VPN.”
What they ARE is a slow (but affordable) VPN based out of Hong Kong. That means they’re free of the overbearing 5, 9, and 14 Eyes Surveillance alliances that pool government espionage information together. Yet still under China’s “government approval.”
They’re also ripe with WebRTC leaks. This VPN failed our usual WebRTC test.
… and proof of the old adage that you get what you pay for.
For starters, it’s the slowest app we’ve ever reviewed. If that’s not bad enough, the company sells ads based on your own activity. Security is a huge concern thanks to the company’s policy of data logging.
But all of that pales in comparison to the leaks we found when investigating this service. Betternet’s Chrome browser extension was the main culprit this time.
Leaks, limited torrenting, and no Netflix derail what looked on paper to be a decent VPN. This is another one that passed our WebRTC test but failed when we examined their Chrome extension. The presence of a kill switch helps, but not enough.
9. TouchVPN – 1 IP leak through Chrome extension
Server used for testing: United States
TouchVPN is free. But its porous browser extension means it’s still overpriced.
Free was the only positive thing we found to say about this VPN. It’s slow, logs your information, doesn’t work with torrenting or Netflix. Plus, they’re located within the 5 Eyes alliance jurisdiction. Steer clear.
This app left our IP address completely exposed. It has a decent server park and the built-in kill switch helps security somewhat.
But the presence of leaks plus a problematic logging policy forces us to question whether or not we can trust Zenmate.
Response from Zenmate:
The problem is that WebRTC, as a protocol, leaks IP Addresses under certain circumstances. The change we made that prevents leakage may prevent WebRTC from working, so the user has the ability to switch this off, and use WebRTC. Once switched off, we remind the user to switch is back on as much as we can, but it is up to the user to do so.
Also, our smart locations feature may cause leakage. This feature switches the user’s selected server based upon the website they are visiting so that it is more likely to work that otherwise. This feature, again, may leak IP Addresses under certain circumstances. This feature is valuable to a lot of users as it improves their geo-unblocking where they are not 100% concerned about total security. This feature is turned off by default, but the user has the option to turn it on.
All in all, we are as good as or better than all other VPNs on the market as far as preventing leakage, however not all of our users want this as it may prevent them accessing certain features and function. So, we made is user configurable and warn the user when they may be compromising their configuration. If the test still shows that they are detecting leakage, then it is most likely they need to upgrade their version of the client.
It’s hard to be “privacy-minded” when you’re suffering from DNS leaks. Another one, unfortunately, bites the dust.
On paper, it looked pretty good. No logging and there was Netflix/torrenting support. And with five simultaneous connections, it seemed like a decent VPN that the whole family could enjoy.
A lack of a kill switch coupled with the aforementioned leaks were some of the only dents in this program’s otherwise impressive armor.
13. BTGuard – 1 DNS leak detected
Server used for testing: Netherlands
BTGuard is extremely torrent friendly. Too bad it also suffers from DNS leaks. The point of VPN use while torrenting is to protect your system from malicious hacking attempts made by other users who are connecting to your system.
That protection is meaningless if your IP is exposed. While BTGuard focuses on torrenting services, it tends to ignore most other important features of a modern VPN. They log information, it’s a slow program, they don’t have a kill switch, and they only allow for one connection.
This VPN has secure encryption and an awesome customer service team, but it was undermined by both DNS leaks and some potentially malicious programs that we found in its install file. A kill switch could have gone a long way toward re-instilling some of my faith, but they don’t have one.
VPN Gate is a free VPN service from Japan. Unfortunately, that gate has a few holes in it in the form of DNS leaks. There’s not a lot to love here aside from the price point and the fact that it worked with Netflix.
Due to the leaks we found, it’s not recommended to use this VPN for anything other than light streaming. Nothing that requires anonymity.
Why Do VPNs Leak?
VPNs leak for a variety of reasons. DNS server issues and WebRTC API conflicts can cause your true location to shine through. The problem is that these often strike when you least expect it.
Your VPN connection looks legit. There’s no notifications or other errors. But your ISP, government agencies, or cybercriminals will see absolutely everything.
You can have strict no logging policies, exist outside of every major surveillance alliance, and have lightning speeds, but if a VPN is leaking your IP, you’re toast.
That’s why when you find a VPN that is airtight, with no leaks whatsoever, you should stick to it like glue. Here are some of our favorite.
How much does Google really know about you? We did a deep-dive into the data the company collects to find out…
Google might just know you better than anyone.
Thanks to the data the tech giant collects in order to sell ads, Google has a wealth of information on you — from what you look like to where you live and where you’ve traveled. The corporation may even be able to guess your favorite food.
Just how does Google know all of this? Jump to our infographic for a quick overview of everything Google knows about you, or check out our full guide by clicking on the icons below.
Although “Google it” has officially entered the cultural lexicon, the mega-corporation is much more than a search engine. It’s through its apps, internet-related services, acquired companies and more that the technology company collects data on you. Below, we’ve broken down the most common app, product or service Google uses to track data, as well as an overview of the specific data collected.
Locations visited, places searched, methods of transportation, dates of tavel
Upcoming plans and appointments
Videos watched, liked and uploaded
News sites visited, stories clicked on
Books read and searched
Products searched and clicked on
Directions and places searched, locations visited
From what you’ve searched online and the websites you’ve visited to who your contacts are and what you talk about, Google knows a lot about you. The company is then able to take this information and make informed decisions regarding what you might be interested in, which they show you in the form of ads.
Google’s apps give the company a wealth of information on you, from the personal details that make up who you are to your interests, your past travels and your future goals.
Who You Are
From facial recognition to audio recordings and intuitive search, Google is able to create a comprehensive — and unnervingly correct — profile about what makes you, you.
Thanks to facial recognition in Google Photos, the search engine probably has a pretty good idea of what you look like. In fact, you can create a “label” within Google Photos that’s essentially a tag for each person in your images, and Google is able to separate out that person from every photo you upload — even if the photo only includes a partial picture or is obscured.
If you’ve ever used voice commands with Google Home, an Android device, or any other Google product or device, the site has a log of it. In fact, not only can you view your past voice commands in the “Voice and Audio” section of Google’s My Activity section, you can hear them as well. The site keeps a full history of your audio commands, including voice recordings.
Your religious/political beliefs
Have you searched Google for how to donate to a political campaign? Visited a candidate’s website? Watched a sermon on YouTube? Google uses all of this information to build a comprehensive profile that covers everything from whether you’re more religious or spiritual to who you’re probably voting for in the next election.
Your health status
If you use Google Fit, the company probably has a pretty good overview of your health, from how active you are to the calories you burn a day to your fitness goals. But even if you don’t use this Google app, the site probably has a pretty good understanding of the state of your immune system — or at least how you view it — from your Google searches. In fact, compiling search engine data and cross-referencing it against patterns may even allow Google to tell if you’re getting sick or dealing with a medical issue.
Your personal details
Searched Google for the best lactose-free milk? For what to expect when you’re expecting? For how to learn Spanish fast? Everything you search is tracked by Google, which can be used to better understand personal details about your life, from whether you have dietary restrictions to what languages you speak.
Everywhere You’ve Ever Been
Location tracking is one of the areas Google excels in — thanks to advanced location recognition technology, the company knows everything from where you went on vacation two summers ago to what restaurant you eat at most often.
Your home and office
Android phones, which run off of Google’s services, and Pixel, Google’s own phone, track and record your location through several means, including Wi-Fi, GPS and cellular networks. This means that the phone knows everywhere you are, every day, and how long you’re there for.
Google is able to interpret that data and draw conclusions from it — for example, where you live is probably where your phone is for the majority of nights and weekends. In fact, it may only take Google Now three days to determine where you live. For those on Apple devices or other operating systems, Google Maps works in a similar way.
Places you visit
In addition to collecting information about where you live and work, Google is able to track the other places you visit most often. Do you have a favorite coffee shop? A running route? A daycare center you use every weekday? Google probably knows about it.
Places you’ve traveled
Google doesn’t just know the ins and outs of your everyday life. The tech company knows where you’ve traveled too, be it a weekend getaway or a month-long trip to a different country.
Not only can Google track the places you’ve traveled to, it can see what you did while you were there. If you visited a museum in Paris or went line-dancing in Texas, Google knows — down to the exact time you arrived, how long you stayed, and how long it took you to get from one destination to another. The location tracking can even tell the method of transportation you used, like if you walked or took a train.
Additionally, Google’s acquisition of Waze means the site can collect data on where you’ve been even if you’re not connected to Maps or on a Google device.
Who Your Friends Are
Between your contacts and conversations in Gmail and Hangouts and the appointments you make in Google Calendar, the company knows everything from who you’re talking with to when and where you’re seeing them.
Who you talk to
If you use Gmail for your personal or work email, Google has a list of all your contacts, including who you talk to the most: navigate to Google’s “Frequently contacted” section to see which of your Gmail contacts you spend the most time conversing with (and to check if Google’s assessment of who you like the most aligns with your own). Android and Pixel users also give Google access to their phone contacts and text messages.
Where you meet
Meeting a friend for coffee later? If it’s on your Google Calendar, the company knows about it — and, thanks to location tracking, can map your trip from your house to the coffee shop and back. If you take a picture with your friend at the shop and upload it to Google Photos, Google can use facial recognition to add them to their own specific photo album. You can also tag the location the photo was taken as well.
If, years later, you’re trying to remember who you grabbed coffee with that day, Google can help you remember.
What you talk about
Does Google keep track of what you talk about over Gmail? It’s an issue up for debate — the company announced in 2017 that they would stop reading emails for the purposes of creating targeted advertisements. Whether they’ve actually stopped reading them altogether is another matter.
What You Like and Dislike
Google is in the business of knowing what you’re into — it’s how the search engine creates and sells such a personalized advertising experience. From your favorite movie genre to your favorite type of food, Google knows your preferences.
Food, books and movies
Google can use search engine data, like recipes you’ve researched or book titles you’ve searched for, to form an idea of what you like and dislike. Certain apps like Google Books, which keeps tracks of the books you’ve searched and read, deepen this knowledge. Additionally, Google owns YouTube, which means they know which movie trailers you’ve been seeking out.
Google uses this information, as well as the websites you’ve visited and the ads you’ve clicked on, to create a profile of the subjects they think you’re interested in. You can see a full list of who they think you are — down to what shows you watch and what hobbies you pursue in your free time — in their ads dashboard.
Where you shop and what you buy
If you’ve ever used Google Shopping to compare the prices of online vendors, Google knows about it. They also know what products you’ve searched and clicked on through Google Search and can track your website visits and what products you’ve viewed on retailer websites through Google Chrome.
Your Future Plans
Google’s knowledge isn’t limited to what you’ve done in the past or are doing in the present. The company can also use data from their applications and search engine to make predictions about what you’ll be doing in the future.
What you’re interested in buying, seeing or eating
Interested in seeing a new movie? Checking out a new restaurant or taking a weekend trip to a new city? If you’ve used Google Search to look up the movie times, make an online reservation or scout out the best tourist activity, Google knows.
Upcoming trips and reservations
Have you searched restaurants to eat at and shows to go to in the city you’re visiting? Have you created an itinerary in Google Calendar? Google can collect that data in order to assess your upcoming trips. Google also scans your emails to see what flights you have coming up and can automatically add restaurant reservations to your schedule based on confirmations that have been sent to Gmail.
Future life plans
Have you been searching about homeownership? About when the best age to have children is? About tips for travelling to China? Google uses this information to understand more about you and what you want in the future, to better tailor online advertisements to your needs.
Your Online Life
At its most basic, Google is a search engine and internet services company. So, it’s no surprise that in addition to knowing a wealth of your personal details, the site also knows everything there is to know about what you do online.
Websites you’ve visited
Google keeps a comprehensive list of every site you’ve visited on Chrome, from any device. The site also keeps a running tab of every search you’ve run, every ad you’ve clicked on and every YouTube video you’ve watched.
Your browsing habits
From how many sites you have bookmarked to how many passwords Chrome auto-fills, Google has a comprehensive understanding of your browser habits, including:
Your apps from the Chrome Web Store and the Google Play Store
Your extensions from the Chrome Web Store
The browser settings you’ve changed in Chrome
Email addresses, addresses and phone numbers you’ve set to autofill in Chrome
All the website addresses you’ve ever entered in the address bar
The pages you have bookmarked in Chrome
All the passwords you’ve asked Chrome to save for you
A list of sites you’ve told Chrome not to save passwords for
All the Chrome tabs that are open across your devices
The number of Gmail conversations you’ve had
How many Google searches you’ve made this month
If you’re unnerved by the amount of information Google has on you, there are several steps you can take to get around the company’s relentless tracking.
Use a VPN
A Virtual Private Network (VPN) is a secure option to keep Google from tracking you while you’re online. Although virtual private networks can’t completely keep the company from accessing your data, they do hide your IP address, encrypt your internet traffic and make your browsing history private, keeping your online actions much more secure.
Use private browsing
Use Google’s Incognito Mode to ensure that the pages you access won’t show up in your browsing history or search history. Be aware, however, that other websites can still collect and share information about you, even when you’re using private browsing.
In Google Maps — as well as in your Android and Pixel device settings, if you use those products — disable location reporting to keep Google from tracking where you are and where you go. If you use Google Maps or Waze for directions, though, the company can still collect location data on you when you’re using those apps.
Use a different browser and search engine
To stop Google from tracking your searches and website visits, you can use another browser and search engine, like Microsoft’s Internet Explorer and Bing. However, this will only stop Google from tracking you — Microsoft (or whatever company owns the browser you switch to) will get your data instead.
Delete your Google accounts
To truly stop the tech giant from tracking you, you’ll need to take drastic measures — namely, disavowing the use of any of the company’s products. That means deleting any apps linked to the company, including Gmail, Google Drive and any Android devices, and moving to a different browser and search engine.
Google has made life a lot simpler in many ways. Google Search has made answers just a click away. Google Maps has made directions easy to find and understand. Google Drive has made working across multiple platforms seamless.
This convenience comes with a price: privacy. If you’re concerned about how Google is tracking you — and what they’re doing with the data — follow the steps above to keep yourself safe, and visit Google’s Privacy Site for a more comprehensive overview of what data Google is tracking and how they use it.
The bad news is that many of the bad ones siphon off so many resources that it makes web browsing a drag and streaming HD video content nearly impossible.
It could be the greatest anonymous system known to man, with no logging, unlimited torrenting, Netflix functionality, and a killer price tag.
But if it’s killing 95% of your speed, it’s not worth it.
There are four main reasons why a VPN will slow your internet speed to a crawl:
Encryption: When a VPN sends information across the web, it encases it in advanced encryption to keep prying eyes from seeing our activity and data. High-quality encryption pulls a lot of CPU power, so the better the encryption is, the more speed it’s going to pull away. That’s why we say that decreased speed is the cost of security.
Physical Distance from VPN Server: Signal deteriorates over distance, so where you are as it pertains to your VPN’s server will dictate speed loss.
User Overload: The more people pulling at a server the more bandwidth is eaten up. Low bandwidth means low performance which also means low speed. This is usually not an issue for higher quality VPN systems, because they’re built to handle the load.
Your ISP Speed: It stands to reason that the slower the speed you start out with is, the slower your VPN speed will be. Speed loss is more noticeable on systems that weren’t getting great speeds to begin with.
We tested 70+ VPN speed using speedtest.net. We used 100 Mbps up and 55 Mbps down Internet connection (cable). Read more about our review process here.
The 7 Fastest VPNs
We’ve reviewed 74 VPNs to date. Some were awesome. Most were ‘meh.’ And a few were downright shocking.
What’s interesting to note is that only one of these VPNs are in our top ten. And only one other is in the top 20.
How can that be? Let’s find out!
Overall Rank: 20/74
EU Download Speed: 73.78 Mbps
US Download Speed: 125.58 Mbps
Logging Policy: Logs Some Information
Leaks: IP Leaks Detected
Torrenting: Not Allowed
Netflix: Did Not Work
This is the fastest VPN we’ve seen. By far.
Check out these results:
Download: 125.53 Mbps (45% faster)
Upload: 29.38 Mbps (13% slower)
Download: 73.78 Mbps (15% slower)
Upload: 40.69 Mbps (21% faster)
The US server speeds were actually faster than our benchmark download speeds!
To put it mildly:
There’s a lot to love besides speed, too.
Witopia also offers four different VPN tunneling protocols (OpenVPN, L2TP, IPSec, and PPTP), plus bulletproof AES-256 encryption. This VPN doesn’t play around when it comes to safety.
Unfortunately, there were a few drawbacks.
For starters, they log your information. Like….a lot of it. There were tons of IP leaks, exposing our true location and shattering the anonymity of the product.
And while those speeds were awesome, the fact that you can’t watch Netflix or torrent means you can’t really get the full effect.
Hide All IP doesn’t just hurt your speed. It guts it with a rusty kitchen knife.
This Hong Kong-based VPN slows you down by upwards of 94%.
EU Speed Test:
Ping: 74 ms
Download: 5.1 Mbps (94.5% slower)
Upload: 3.16 Mbps (94% slower)
US Speed Test:
Ping: 149 ms
Download: 2.58 Mbps (97% slower)
Upload: 1.07 (98% slower)
This was an all-around bad VPN, with questionable logging policies, Chinese jurisdiction, and only one connection per account. On their poorly translated website, they tout their ability to provide geo-blocked streaming services.
And we found that Netflix worked on one (out of five) servers. Plus, they allow unlimited torrenting.
But incredibly, they’re not the lowest overall VPN on our list. Their 69th position means that there are still a few others with the distinction of somehow being ranked below the slowest VPN in the marketplace.
There are many factors that make a VPN great (or not). But speed is often the Achilles Heel.
I wrote this article to help you understand the difference between VPN tunneling protocols, such as OpenVPN, IKEv2, PPTP, and others.
A VPN will help to protect your privacy and secure your data whenever you’re using the internet. But, beyond choosing the best VPN, you’ll also need to choose the best VPN protocol for your needs.
The VPN protocol is how your VPN will secure the transferring of data. There’s a multitude of different protocols that are based on the operating system, platform, performance, and lot more.
Below we explore the most popular VPN protocols, so you can decide which one is best for you.
Here’s a quick breakdown of the seven biggest VPN protocols today:
High security (might be weakened by NSA)
Speedy, due to low encryption
Medium, due to double encapsulation
Not yet stable
Strong desktop support, but mobile could be improved. Requires third-party software.
Strong Windows desktop support.
Multiple device and platform support.
Multiple desktop and mobile OS support. No native operating system support.
Linux, being built for other platforms and operating systems.
Windows-platform, but works on other Linux distributions.
Limited platform support beyond Windows and Blackberry
Most recommended choice. Fast and secure.
Native on Windows. Weak security. Useful for geo-restricted content.
Versatile and secure. A decent alternative to OpenVPN.
Up and coming. Flexible, fast, and secure. A great alternative to OpenVPN.
Has promise to be fast and efficient. Still in development.
Faster and more secure alternative to PPTP and L2TP.
Secure, stable, and mobile-oriented.
1. OpenVPN – Recommended, Most Popular
OpenVPN is the VPN protocol you’ll want to be using. It’s the most recommended choice by leading VPN providers today. Kind of a no-brainer. It’s one of the newer VPN protocols, but it’s flexibility and security have made it one of the most commonly used.
It relies upon open source technologies like the OpenSSL encryption library and SSL V3/TLS V1 protocols. The open source nature of OpenVPN means the technology is maintained, updated, and inspected by a community of supporters.
When traffic passes through an OpenVPN connection it’s hard to differentiate between an HTTPS over SSL connection. The ability to hide in plain sight makes it less vulnerable to hacking, and more difficult to block.
Plus, it can run on any port, using both UDP and TCP protocols, so getting around firewalls won’t be a problem. However, if you’re looking for speed, then using the UDP port will be the most efficient.
In terms of security, it has a variety of methods and protocols like OpenSLL and HMAC authentication and shared keys. To take the security standards even further it’s commonly coupled with AES encryption. Other VPN protocols have been subject to NSA and other hacking, but so far, OpenVPN has managed to stay in the clear.
The additional cryptic algorithms it supports are:
It’s recommended to use AES encryption if security is your main concern. This is essentially the “gold standard”, and currently has no known weaknesses. It’s 128-bit block size also gives it solid capabilities to handle larger files, without a reduction in performance.
Still, OpenVPN isn’t perfect:
You’ll still need to install a third-party application to use this type of connection. It still isn’t supported by any platforms, but most third party software providers, like Android and iOS, are supported.
Setting up OpenVPN on your own can be a bit tricky. Especially, when compared to PPTP or L2TP. However, most VPN clients are able to offer a customized setup, which gets you around any configuration difficulties.
If you do want to set up OpenVPN yourself, the high level of configuration can be disadvantageous as you’ll be less secure if it’s set up the wrong way.
Plus, you can even use OpenVPN to connect over the mobile Apple iOS. Say hello to an encrypted and private mobile connection.
The Pros of OpenVPN:
The protocol can bypass most firewalls
It’s open source and vetted by third-parties
It has a very high level of security
It works with multiple methods of encryption
It can be configured and customized to your liking
It can bypass firewalls
It supports a variety of cryptic algorithms
The Cons of OpenVPN:
The setup process can be technical
It relies upon third-party software to operate
Desktop support and functionality are strong, but mobile is lacking
Think about the security standards of the web back in 1995. Did those even exist? Well, that’s when PPTP became a VPN protocol. It was developed by a consortium founded by Microsoft and was the standard for VPN connections back in the dial-up days.
PPTP, also known as point-to-point tunneling protocol, is over 20 years old by now. Even being that old, it’s still the standard for internal business VPNs. It’s a popular choice since it’s already installed on most devices and platforms, is easy to setup, it’s efficient, and no additional software is needed. To establish a secure connection all you need is a username, password, and server address.
For example, office buildings with older infrastructure, who need to internally secure data could use this connection. Or users who are running an older Windows operating system. If it’s all you have, it’s better than nothing.
When it was first released with Windows 95 there were a number of security weaknesses that were exploited. Today it’s upgraded it’s encryption protocols to 128-bit key encryption, which isn’t awful, but if security is a concern you could do better. Even Microsoft recommends that users looking for higher security standards should use SSTP or L2TP.
Still, this low level of encryption does help to make it one of the fastest VPN protocols.
It’s also been known to be easily decrypted and hacked by the NSA and other intelligence agencies. This decryption also took place at the time when security experts considered PPTP secure.
PPTP is usually only used today due to its high performance and stability. Think accessing geo-restricted content, or getting access to Netflix. Overall, it’s an old and outdated VPN protocol, but still serves a small purpose for users who aren’t concerned with security.
The Pros of PPTP:
It’s very fast
It’s already built into most platforms
It’s easy to configure and setup
The Cons of PPTP:
It has security holes (one of the least secure VPN protocols)
It’s been compromised by the NSA
It can be blocked by firewalls
L2TP is a VPN protocol that doesn’t offer any encryption or protection from the traffic that passes through the connection. For this reason, it’s usually paired with IPSec, which is an encryption protocol.
It’s an extension of the PPTP protocol and utilizes a process called double encapsulation (which led to its initial rise in popularity). The first encapsulation establishes a PPP connection, while the second contains IPSec encryption.
It does have support for AES-256 encryption algorithms, which are some of the most secure. But, the stronger encryption protocols you use the slower your performance will be.
This protocol is built into most desktop and mobile operating systems, which makes it easier to implement. But, it can only use UDP port 500 for a connection, which makes it pretty easy to block by NAT firewalls. So, additional configuration is needed if this is going to be used behind a firewall.
It does have an advantage in that this style of connection prevents the data from being accessed between the sender and receiver. So, this can help to prevent any middle-man hacking attempts.
IPSec encryption is secure. Yet, both Edward Snowden and John Gilmore, a founding member of the EFF, suggest that the protocol has been deliberately weakened by the NSA.
It’s a slower connection because traffic must first be converted into the L2TP form, and you have an additional layer of encryption on top of that. It’s not as an efficient solution as OpenVPN, but it is easy to set up.
The Pros of L2TP/IPsec:
It’s available on nearly all devices and operating systems
The setup process is easy
It has high (yet weakened) levels of security
It does support multithreading for improved performance
The Cons of L2TP/IPsec:
It can be blocked by firewalls
The NSA might have weakened the protocol, making it less secure
It doesn’t have the fastest speeds, due to double encapsulation
SoftEther is an open-source multi-protocol VPN software. What began as an academic project at the University of Tsukuba has grown into a VPN technology that’s used by millions of people worldwide.
The biggest reason for its widespread growth is that it’s free, and it works across the Windows, Mac, Linux, Android, FreeBSD, and Solaris operating systems. Not only that it supports multiple different protocols, like OpenVPN, EtherIP, SSTP, L2TP/IPSec, and a lot more.
Basically, you can set it up to run on your operating system of choice and use whichever VPN protocol you desire. This unparalleled flexibility and support across multiple platforms have led to its insane growth.
It utilizes 256-bit AES encryption, which is one of the most secure forms of encryption available.
With SoftEther you get a flexible and fast VPN, that utilizes the latest encryption protocols. It’s newer, so it doesn’t have the same legacy as OpenVPN, but it’s an up and coming alternative. It offers you a nice blend of performance and security.
The Pros of SoftEther:
It supports a multitude of desktop and mobile operating systems
It’s entirely open source
It can bypass most firewalls
It’s fast but doesn’t compromise on security
The Cons of SoftEther:
It’s relatively new
It doesn’t have native operating system support
A lot of existing VPNs don’t offer it, yet
WireGuard is an innovative and cutting-edge VPN protocol that’s been developed to optimize performance. The implementation is small, making it a much more lightweight project in terms of the code base. By having a simpler codebase it’s easier for developers to integrate.
The goal of the project is to create an alternative to IPSec, that’s lighter, faster, and leaner. It was originally released on the Linux platform, but it’s on its way towards cross-platform compatibility and can be deployed across a variety of different distributions.
WireGuard shines in its simplicity.
It only supports a single cryptographic suite, which keeps the design simple and leads to fewer security holes. The algorithm choice is also incredibly simple, which helps to reduce any security bugs, now and in the future.
However, keep in mind that WireGuard is not yet complete. It’s still a work in progress and the team is working towards a stable release.
Early signs point towards it being a widely used, fast and efficient VPN protocol in the future. If you want to deploy it keep in mind there may be some security vulnerabilities, and it won’t be as secure as other stable VPN protocols highlighted in this list.
The Pros of WireGuard:
It’s simple and lightweight
It’s fast and secure
It takes a minimalist approach to a VPN protocol
It has potential to become the VPN of the future
The Cons of WireGuard:
It doesn’t have a stable release
Only technical Linux users can effectively implement
It’s not as flexible as other VPN protocols
SSTP was developed by Microsoft and introduced with the Windows Vista release. It is still considered Windows-only even though there is support for other operating systems. Since it’s integrated into Windows it is a very stable VPN protocol.
There is support for other systems, like Linux, SEIL, and RouterOS, but the adoption isn’t as widespread.
It’s typically configured with AES encryption, so it’s incredibly secure and a much better option than the PPTP protocol. It also uses the SSL v3 connection (similar to OpenVPN), which will help to prevent any NAT firewall issues and blocking.
The SSTP protocol uses a similar authentication method to an SSL/TLS connection. In order for any data or traffic to be transmitted both ends of the connection must be authenticated with a secret key. This helps to create an incredibly secure connection.
However, SSTP is still owned and maintained entirely by Microsoft. Although no security holes have been reported, they do have a history of cooperating with the NSA. So, it hasn’t been proven, but there is speculation that there may be backdoors built in.
Overall, it offers a similar connection as OpenVPN but is more oriented towards Windows. It has better security than the L2TP connection and is all around better than PPTP.
The Pros of SSTP:
It can bypass most firewalls
It has a high level of security
Integrated into the Windows platform with Microsoft support
It supports a wide range of cryptic algorithms
It’s easy to use
The Cons of SSTP:
It’s entirely owned and maintained by the Microsoft Corporation
It only works well on Windows platforms
It hasn’t been audited by an independent third-party
IKEv2 is based upon IPSec and was created as a joint project between Microsoft and Cisco. Although it’s not technically a VPN protocol, it behaves like one and helps to control IPSec key exchange.
It currently comes installed on any generation of Windows, starting with Windows 7. Plus, there is an existing implementation for Linux, Blackberry devices, and other platforms. If you’re a Blackberry user, it’s one of the few supported VPNs.
If you want a consistent VPN connection, even while switching networks, then this protocol can be very useful.
It’ll make sure you keep a VPN connection, even if your internet or connection drops. Plus, it’s stable, secure, and has high performance.
The core focus is for mobile users who demand a secure and private connection. Since it offers support for MOBIKE, it’s very resistant to any network changes. So, as you switch from a wifi connection to a data connection the VPN connection will remain throughout.
It’s not widely supported but does offer better security levels than L2TP, as well as improved speeds and stability.
The Pros of IKEv2/IPSec:
It’s very secure and supports a wide range of encryption protocols
It’s very stable, even when the network connection is lost
It’s easy to setup
One of the fastest VPN protocols
The Cons of IKEv2/IPSec:
Its support for platforms is limited
It has the same drawbacks as IPSec
It can be blocked by firewalls
How Do The Different VPN Protocols Stack Up?
All the VPN protocols above have various strengths and weaknesses. Some are more widely used, while others serve more specific niches and problems.
Here’s a quick breakdown of how each VPN protocol stands out:
OpenVPN is the most often recommended, and widely used VPN protocol. It’s fast, secure, and open source, so it can be vetted and improved by third-parties. The only real downside is the difficulty in setup and configuration. Failing to set it up the right way could lead to security holes and lackluster performance.
PPTP is already installed on most older Windows operating systems, making it an attractive option. But, it’s generally very insecure and should be avoided, if privacy is a concern. It stands out with its compatibility, ease of setup, and speed. It can work for accessing geo-restricted content, but if you’re doing anything else, you should at the very least opt for L2TP/IPSec.
L2TP/IPSec is a solid VPN choice if you’re not exchanging sensitive data. It’s basically an improved version of PPTP. Some older devices and platforms won’t support OpenVPN, so this could be an attractive option. The only real downside is it’s security standards, which have been weakened and compromised by the NSA.
SoftEther is a newer VPN protocol, but don’t let its youth fool you. It offers similar features to OpenVPN but offers even greater levels of flexibility. With the ability to integrate across multiple different platforms and operating systems it’ll be hard to find a setup where this protocol can’t be used. Plus, it’s fast and secure. It doesn’t have the legacy and stability of OpenVPN but is a contender in its own right.
WireGuard is an up and coming VPN protocol. The current release is best suited for technical Linux users, but support for other platforms and operating systems is in the works. It shines in its lean nature, speed, and security. By having less moving parts and selection it’s easier to maintain and catch any security issues. It’s currently working towards a stable release, so it’s not recommended for non-technical users, but the future of this VPN protocol is bright.
SSTP is a solid choice for Windows users. It offers you similar security and speed as OpenVPN, but there is one big downside. Since it’s created by Microsoft there is no vetting by any outside third-parties. This means there could be backdoors built into the code, which compromises the overall security. Other platforms and operating systems can implement SSTP, but it’s poorly supported.
IKEv2/IPSec is a solid fast and secure VPN protocol. It stands out in its ability to maintain a secure VPN connection, even while the connection is lost, or you’re switching networks. Its primary use is for mobile networks. Also, if you’re a Blackberry user then this VPN protocol will be your protocol of choice.
Which VPN Protocol to Use?
By now your head is probably spinning trying to decide which VPN protocol to use.
Overall, it depends on your needs, and why you’re using a VPN. But, to keep things simple—you can’t go wrong when using OpenVPN.
Still not sure?
Here’s a breakdown that’ll help you choose the best VPN protocol:
OpenVPN is fast, flexible, and secure. No matter your operating system or platform, you’re covered.
PPTP should almost never be used. It’s easy to setup and fast, but it’s incredibly insecure.
L2TP/IPSec is a step up from PPTP, but it’s also one of the slowest connections, and its security is questionable.
SSTP is pretty good for Windows users. It’s fast and easy to setup, but once again you don’t know how secure and private your connection is.
IKEv2/IPSec is a pretty good choice for mobile users and a must-have for Blackberry users. But, beyond that go with OpenVPN.
SoftEther is good OpenVPN contender. If you’re willing to use a newer VPN protocol, instead of the legacy of OpenVPN, then this a great second choice.
WireGuard should really only be used by technical Linux users. Once the release is stable it may gain more traction, but general VPN users should wait it out.
Hopefully, you have more clarity on choosing the right VPN protocol for your needs. Currently, OpenVPN still reigns supreme as the best VPN protocol. But, with up and coming protocols like SoftEther, it’s hard to say how long it’ll be number one.
Still, have questions about which VPN protocol is right for you? Please share your comments, concerns, and questions in the comments below.
We tested VPN servers in 19 countries against five types of online purchases to see how much money you can save by changing your location.
Using a VPN is a must for those looking to protect their privacy and browse the internet anonymously. The benefits of using a virtual private network extend far beyond privacy and security. For example, did you know that using a VPN could save you between hundreds and thousands of dollars on online purchases?
Several online purchase sites change their rates depending on the country you’re located in or based on your previous online activity. Using a VPN allows you to circumvent location monitoring and web tracking and see the prices available in other countries.
How Much is Your Location Costing You?
To see how you can save by changing your location, we tested ExpressVPN, NordVPN and CyberGhost on popular online purchases. In total, we were able to save between $50 and $1,000, depending on the purchase.
Jump to our infographic to see how we did it, or check out our full findings on each purchase by clicking on the icons below.
The price of airline tickets commonly fluctuates depending on the location. Airfare sites use your browsing history (collected by tracking cookies) to determine if you’ve viewed a certain flight on their site before. If you have, they raise prices. Using a VPN allows you to circumvent this by hiding your browsing history, so airfare sites can’t raise prices based on return visits.
Additionally, the location you’re buying the ticket from can make a big difference. In fact, research has shown that retailers often use dynamic pricing to decide how much they’ll charge you.
Dynamic pricing allows online retailers to charge different prices based on how much they think a user will spend, taking factors like device type and zip code into consideration. For example, users located in zip codes or countries with higher income averages may see more expensive prices from online retailers.
To see how location affected our airfare prices, we used a VPN to compare the prices of booking a round-trip United flight from Malaysia’s Kuala Lumpur International Airport to California’s Los Angeles International Airport from 20 different countries. Our maximum amount saved (between the lowest price found through a server in Poland and the highest price in the United States), was $1,121.29.
Booking a Flight from KUL to LAX
Rental cars are another popular expense that varies in price depending on the location you’re in. The fluctuation in prices for rental cars is largely caused by location surcharges, local taxes, and insurance costs that vary depending on what country you’re in.
To demonstrate this, we looked at the price of renting a Mitsubishi Mirage from Enterprise Rent-a-Car for a week in Philadelphia from a server in the United States and a server in Spain. The cost per week for the United States was $265.76 without tax; it came to $400.74 with tax.
When we looked at the price of the car from a server in Spain, the price was €206,29 (or $238.17) — for the whole week. This is because the tax and fee details are included in the weekly price of renting from Europe, but not when renting in the United States.
Cost when IP address is set to the United States:
Cost when IP address is set to Spain:
Since not every country has an Enterprise Rent-a-Car website, we used also Kayak to get a better representation of how the price of renting a car varies across countries.
When we were connected to a server in the United States, we saw the set prize as $492.00. However, this price changed dramatically as we changed our location to other countries.
Cost when IP address is set to the United States:
Cost when IP address is set to Azerbaijan ($290.47 USD):
Cost when IP address is set to China ($301.65 USD):
Cost when IP address is set to Japan ($342.71 USD):
We looked at the cost of renting a Chrysler 200 in Philadelphia, which is the most expensive rental car market in the United States. In total, we found that the priciest place to rent the car from was the United States, at $492 per day, while the cheapest location, at $221.72 per day, was India.
Renting a Car in Philadelphia
Hotel booking sites operate in a similar way to airfare and other travel sites — they use dynamic pricing and track cookies to decide what to charge.
To demonstrate this, we looked at the cost of staying at the Sofitel in New York City. When searching from the United States, a room at the Sofitel will cost $482.00/night. We saw this number lessen slightly when we searched from Canada — the least expensive tested location — which came in at $474.90/night.
We found that the cost tended to increase, not decrease, as we switched servers. The most expensive pricing came in at over $100 more than our lowest cost: $584.22/night from a server in Brazil.
Staying at the Sofitel in New York
The pricing for subscription services, like music streaming or software subscriptions, often varies by region, often in order to offset exchange rates and currency differences. We took a look at two popular subscription services — Apple Music and Microsoft Office — to see how changing your location could get you a better deal.
Saving Money on Apple Music
We logged first logged into the U.S. server of NordVPN and took a look at the cost for an individual streaming subscription. In the United States, it costs $9.99/month for an individual subscription to Apple Music.
Cost when IP address is set to the United States:
We then logged in to several other servers to see how the price would vary location. In overall, we found that subscribers in Europe pay the most per month for an Apple subscription — the highest cost was from the United Kingdom, at £9.99/month or approximately $13.33/month. Other countries in that region, including Switzerland, the Netherlands, and Spain, followed closely behind.
Cost when IP address is set to the United Kingdom:
We found India to be the cheapest location to subscribe; the monthly cost when we set our location to NordVPN’s India server was ₹120/month, or about $1.75/month.
Cost when IP address is set to India:
In total, the maximum savings between the most expensive location (the United Kingdom) and the least expensive location (India) was $11.58/month, or almost $140/year.
Monthly Apple Subscription Service
Saving Money on Microsoft Office
Like with Apple Music, the cost for a yearly subscription to Microsoft Office products vary by region. We chose to compare the pricing of the popular Office 365 Home, which, when logged into a U.S. server, costs $99.99 for a yearly subscription.
Cost when IP address set in the United States:
As with Apple’s subscription streaming service, we saw prices increase for Microsoft Office’s yearly product when we set our location to countries within Europe. Poland had the highest cost, at 299,99 zł/year or about $116/year. Nearby countries Germany and the Netherlands saw similar price changes.
Cost when IP address set in Poland:
Countries near or in Asia had lower prices; Russia came in at the lowest cost, at 2 699,00₽/year or about $55.28/year. In total, the maximum savings between Russia and Poland was more than $50/year.
Cost when IP address is set in Russia:
Yearly Microsoft Office Subscription
A VPN is a smart investment, both from a security standpoint and from a financial one. If you’re planning to book a trip, rent a car or even simply stream music, one of our top VPNs for 2018 could save you hundreds — or even thousands of — dollars.
Unlike many other VPN review sites, we take things seriously.
When we review the VPN product, we actually buy and use it for a period of 1 week. We do a lot of speed test, leak tests as well as penetrate their customer support.
Here’s how we evaluate and stress-test every element of a VPN Service to keep things honest.
1. Used Same Computer & Network for Each VPN
What’s in the box?
Meet our battle-tested Lenovo IdeaPad 120S-141AP, or “Lenny” for short!
We run every single VPN we test on Lenny to keep the tech consistent. In fact, we bought Lenny just for that purpose!
It wouldn’t make any sense to test these VPNs on a bunch of different networks, so we use a wired cable connection on the same network in our HQ in Estonia. We speed tested our network multiple times across multiple weeks to measure out our average: 98 Mbps Upload, 53 Mbps Download:
2. Bought and Installed 74 VPN Apps
Here’s a look at Lenny’s desktop as of a few weeks ago for perspective:
This is the part where we pause and use bold type to make sure this is unmissable:
We do not accept any money, bribes, favors, in-kind donations, exotic pets, crypto currencies, homecooked meals, or ANY compensation in exchange for writing or editing a review. EVER.
In fact, we pay for every VPN service we try out of our own pockets to allow for complete honesty as an actual consumer.
All of our data is collected first-hand: unlike other reviewers, we don’t rip off numbers from other sites or just make it up. (Which is sadly too common.)
3. Read Through Countless Logging Policies
This is the least fun part of our reviews, but the most important: shady companies use tricky language to disguise the fact that they’re tracking and sharing your activity.
We read the fine print to make sure you’re not being taken advantage of.
4. Checked VPN History, Jurisdiction, and Company Name
Background and company name: Who runs the company? Where are they from? Do they have a history of violating user privacy, or leaks? We collect as much info as possible and bring it to you.
Jurisdiction: The jurisdiction a VPN is based in may play a major role in whether or not a VPN could be compelled to hand over your data to authorities if pushed. More on that here.
5. Run Multiple Speed Tests
It doesn’t matter how secure your VPN is if it takes three hours to download an episode of “Stranger Things.” We use speedtest.net to test Upload and Download speeds multiple times to account for fluctuations in service.
We also revisit these speed tests about once a year to see if anything has changed.
Unfortunately, some VPNs were VERY slow…
6. Tested Netflix Streaming Across 4 to 5 Servers
Netflix n’ chill? Only if it works. That’s why we don’t do a one-and-done test: we find out which servers (if any) actually work with Netflix and let you know, saving you time and headaches.
7. Read Through Their Torrenting/P2P Policy
Some VPNs crack down on P2P and torrenting. Some advocate for it directly. Others are sneaky about it. We get to the truth of the matter to make sure you can do what you like with the VPN you choose.
8. Tested For DNS, IPv4, IPv6, and WebRTC Leaks
TL; DR: IP leaks happen when your VPN fails to hide your actual IP as you browse. For example: if you went to load a geo-restricted show on Netflix, and the content was still blocked, your real IP might just have leaked.
We strategically test common points of failure to see how the VPN stands up.
9. We Graded Their Usability and User-Friendliness
The most secure VPN in the world won’t be much help if it takes a degree in Computer Sciences to use properly. We look for things like setup time, user-friendly interfaces, and ease of configuration to get a sense for how accessible the VPN will be to the average user.
10. Evaluated Each Software Security and Privacy Features
Different VPN services are more ideal for different use cases (e.g. business vs. personal), while some “premium” features really ought to be standard on every VPN. We evaluate…
Security protocols available
Kill-switch (instant disconnect if security is lost)
# of max connections (How many devices at once)
Number and locations of servers
And any unique features the VPN Service brings to the table, highlighting the good, the bad, and the ugly.
11. Gave Their Customer Support a (real!) Test Run
NEVER trust a company who promises “best in class” customer service. We submit support tickets, make phone calls, get on chat and more to test response speed and the competence of the support team on the other end when dealing with common VPN issues.
12. Tested Compatibility With Routers, TVs, TOR, and Consoles
If your VPN Service isn’t compatible with your gadgets, what’s the point? We test multiple different setups for compatibility to help you avoid buying a solution that won’t work on your devices.
We also test whether or not TOR can be used in conjunction with the VPN Service for an added layer of security – important to several power users and those in contentious environments/locations.
13. We Compared The Cost vs Value
Yep, pricing is important. So why evaluate it last? Because there’s no sense in a free product that compromises your privacy, or an expensive product that offers nothing superior to a cheaper one.
You Can Take It From Here…
Quite the process, right? Between reviewing those 13 points for 70+ VPN providers and revisiting past reviews to keep them current, it’s easy to see why we take a little while to put out new reviews!
We hope you appreciate the depth and transparency that goes into the work we do here – and that the information will be helpful to your decision.
In our digital world, almost every facet of our lives is out in the open. Unless you take the extra steps to protect and defend your privacy.
Email is something we use every single day. We spend hours in our inboxes and often share personal information we want to keep private.
An anonymous email account is a must-have for situations like:
Journalists who need to communicate privately with a source
People who are concerned about privacy and feel the need to go anonymous
Telling the truth, or whistleblowing, without a connection to your identity
Anonymous email gives you the ability to send an email that can’t trace back to you. It won’t contain any personal identifying information.
There are multiple methods of achieving this:
Sending emails through a proxy server, so your location is invisible.
Omitting personal information, like the identity of the user, the reply address, or the message time stamp
Using fake contact information when creating a general email account to mask your identity
Still, anonymous email accounts can be used for less than upstanding purposes. Like a hacker using an anonymous email address to send a malicious email containing a virus.
These emails will contain a link that’ll install a virus or malware on the user’s computer to gain sensitive information. I know you won’t do this, but there can be some negative associations built into anonymous emailing.
How Anonymous Email Works
There are many ways to send emails at varying degrees of anonymity.
The basic method involves entering a fake name and personal information when creating a Hotmail, Outlook, or Gmail account. This approach won’t get you complete privacy, and you’ll need a personal phone number to verify your account. But, it’ll grant you more privacy than your standard account.
The truly anonymous approach involves using a private email service. These tools and services need minimal personal information to get started.
Plus, they’re often equipped with features like:
Two-way email encryption
Hidden IP address, or IP address blocker
Email password protect
Automated email deletion or expiration
We’ll get more into these services and tools, and how to use them, below.
Anonymous Email vs. Regular Email
You’re probably wondering, what’s the difference between anonymous email and regular email?
They both accomplish the same core goal of sending an email. But, they differ in the level of privacy and protection each provides.
Why Use Anonymous Email?
Anonymous email affords you levels of security and privacy you can’t get anywhere else. You might not need it 24/7, but it does have certain benefits.
1. Freedom of Expression
Sometimes you need to convey information to a person, but don’t want to compromise your identity. It could be something that’ll ruin the relationship, or you’d like to remain anonymous nonetheless.
2. Send Private Confidential Information
If you have sensitive information you want to send to the authorities without revealing your true identity, then you can use anonymous email for this purpose.
You can easily send confidential information without fear of your identity being brought to light.
3. Whistleblowing Purposes
Whistleblowing can be a scary and stressful situation. With anonymous email, you can help to escape any harassment and persecution that might come with.
Think of it as giving an anonymous phone tip from a pay phone. Using anonymous email can be a way to whistleblow about any wrongdoing while protecting your identity.
4. Hide From Spammers
You could use a throwaway email account whenever you enter your email anywhere online. This can help to isolate your identity and any spam emails from your main inbox. But, you’ll still have a link back to your true identity.
With an anonymous email account, you can create aliases and segment your account to keep your information safe from spammers.
Why Use a Regular Email Account?
Even with the security and privacy anonymous email affords, a regular email account can be useful.
1. Build a Tangible Relationship
It can be tough to build a relationship with anyone over email if you’re completely anonymous. Think of it like contributing to an online forum. You may be able to help and make connections with people. But, it’ll be difficult to build a deep connection without actually knowing who you’re talking to.
2. Ease of Use
For those who aren’t very tech-savvy signing up and using a service like Gmail couldn’t be easier. This service, and others like it, are created to deliver the best user experience possible. They’re engineered so you need zero tech knowledge to get started.
3. Link to Apps and Services
Services like Gmail give you login privileges to other sites. Privacy buffs may scoff at this, but for some users, speedy login is a necessity.
Instead of creating multiple accounts, you can login to various sites and apps with your Google account.
How Much Does it Cost?
Some people shy away from using anonymous email, because of the associated costs. After all, services like Gmail and Hotmail are free. But, these services do run ads in your email account to make up for the “free” service.
The question becomes:
Would you rather pay for your email service with cash, or with your personal information that’s sold to third-party advertisers?
You’ll find a variety of paid and free anonymous email options.
There are pricier anonymous email services. But, you’ll also find a ton of free and cheap options.
Anonymous email, with all the protection features they provide, aren’t that pricey. Especially if you’re purchasing an account for yourself, and not for your entire organization.
Individual costs for an anonymous email account range from $25—$80+ for the entire year, with an average monthly cost of $5 per month.
And that’s just for the premium accounts, which are equipped with extra storage, and security features.
Almost every anonymous email provider also offers free accounts. These accounts are limited by the amount of email storage provided or the number of emails you can send per month.
How to Create Anonymous Email Account
Creating an anonymous email account is similar to creating any other form of email account.
For the tutorial below we’ll setup a free account with ProtonMail. The only limitation to the free account is the amount of storage provided. You’ll still have access to all the privacy features.
1. Select your account type
On this screen choose the ‘Select Free Plan’ option, unless you want to upgrade to a paid account.
2. Choose your username and password
Here you’ll create your anonymous email address and password.
You have the option to add a recovery email, in case you ever forget your password. But, this could create a link to an existing email account, so those looking for complete anonymity might want to leave this blank.
3. Prove you’re human
Now it’s time to prove you’re not a robot. Choose one of the four options to show that you’re a living breathing human being.
Then, click ‘Complete Setup’ and your account will be automatically created.
4. Complete your account setup
You’re now ready to send completely anonymous emails.
On this screen, you’ll see what looks like any traditional inbox. Here you can send and receive emails, as you would any other type of email account.
You’ll also be able to upgrade your account to further support the service an unlock additional features.
How to Send Anonymous Email
Sending an anonymous email couldn’t be easier. For this example, we’re going to use the same service from the example above ProtonMail.
First, navigate to the backend of your account, and click on the ‘Compose’ button.
Here a window will pop up and you’ll be able to compose an email, just as you would in Gmail.
You’ll also have additional options to further secure your email.
In the left-hand corner of the window, you can password-protect your email, and set an expiration date.
To set a password for the email click the box that looks like a lock.
Then, type in your secure password. Note that the recipient must have access to this password in order to view your email.
To set an expiration date for the email click on the box that looks like an hourglass.
Here you’ll be able to set a time window where the recipient can view the message before it’s deleted.
Once you’ve configured your privacy settings, then click the ‘Send’ button and your email will be delivered.
There are many different anonymous email providers. But, you’ll find that most have a simple setup process and mirror the features of your traditional email provider.
How to Send Anonymous Email Without an Account
Maybe you just want to send an anonymous email without a needing a response. There are multiple tools that’ll let you send one-way anonymous email without having to register an account.
The simplest method is using an online tool called Anonymous Email.
Guerrilla Mail is an encrypted email service that’s been operating for over a decade. Plus, you don’t have to sign up to send emails with the service. Just create your own email address, or use the scramble address feature for an entirely random email address.
MailFence offers you a complete email suite, along with features like encrypted email, no tracking or spam, and freedom from surveillance. Plus, with its location in Belgium, it has very strong privacy protection laws surrounding the company.
Mailinator lets you create and give out unlimited email addresses, and check messages for those addresses on their site. This helps to keep your identity private and effectively shield you from any risk. The email address itself is public, but you’re not connected to the email address in any way.
Tutanota is a secure email provider that offers end-to-end email encryption. Plus, it’s open source so it’s entirely free. Since IP addresses aren’t recorded, and you don’t need to provide any personal information to setup an account, you can use the service completely anonymously.
The Anonymous Email is a pretty basic tool that lets you send anonymous emails. The only information required to create an account is an existing email account. If you’re concerned about sharing your personal email, then you can create a burner email account to register for the service.
Secure Email is a fully anonymous email service. It routes all email traffic through an encrypted SSL connection, hides your IP address, and requires zero personal information to sign up. With the high-level of encryption offered no one will be able to read your emails, except you.
TorGuard has a built-in anonymous email service. If you’re already a member of their VPN service, then the service is free. This service has a lot of advanced privacy and encryption features to protect your emails. Plus, no personal information is required to create an account, so you can send emails totally anonymously.
Transitioning From Gmail to Private Email
If you’re concerned about your privacy and want to use an anonymous email provider 100% of the time, then you can transfer your existing traditional email account to a secure provider.
Below you’ll find a few walkthroughs that’ll help you transition from Gmail to three of the most widely used secure email providers.
The first transition step is emailing your most common contacts and letting them know about your email address change. The best way to do this is send an email from your Gmail account with your new ProtonMail address CC’d.
With that completed, follow the steps below:
1. Export and import your contacts
The first thing we need to do is export our contacts from Gmail.
Open up your Gmail account. On the top left-hand corner click the Gmail logo and then select ‘Contacts’.
Then, on the Google Contacts page select the ‘More’ option from the left-hand menu.
Finally, select ‘Export’ and choose the ‘Google CSV’ format.
Now, open up your ProtonMail account, and select ‘Contacts’ from the top menu.
Select the ‘Import’ option and upload the .csv file you just downloaded.
Your contact list has now been migrated to ProtonMail.
2. Import your Messages
The only way to import your existing messages to ProtonMail is to use a paid add-on called ProtonMail Bridge.
If you don’t want to upgrade to a paid account, then your best course of action is forwarding your Gmail messages to ProtonMail.
3. Setup Gmail forwarding
Login to your Gmail account and click on the gear icon, then select ‘Settings’.
Then select ‘Forwarding and POP/IMAP’.
Select ‘Add a forwarding address’, and enter your new ProtonMail email address.
Then you’ll receive a confirmation email in your ProtonMail account. Verify your email address and you’re all set.
Transitioning from Gmail to MailFence
If you’re a MailFence user then follow the steps below to add your Gmail contacts to MailFence and forward any new messages to your MailFence account.
Like the ProtonMail transition tutorial above it’s a good idea to send out emails to any contacts you regularly email about your contact change. That way they can add your email to their contacts and it won’t be marked as spam.
With that done, follow the steps below:
1. Link your Gmail account and migrate contacts
If you decided to use MailFence, then migrating your contacts over to Gmail is a very straightforward process.
First, you’ll need a MailFence account, so if you don’t have one do that now.
Once you’ve activated your account, click on the ‘Contacts’ button on the top navigation bar.
Then, click the three dots, and select Import.
Select ‘Google contacts’ and click ‘Import’.
On the next screen you’ll be asked to enter your Google credentials, and once it’s verified your Gmail contacts will be imported into MailFence.
2. Setup email forwarding within Gmail
To setup email forwarding between Gmail and MailFence, you’ll follow the exact same steps as the Gmail Forwarding section above.
So, scroll up a tiny bit and follow those same instructions.
Just enter your MailFence email address instead of the ProtonMail address.
Transitioning from Gmail to Mailinator
Since Mailinator is such a simple tool it isn’t something you’ll want to use as a replacement for Gmail.
That being said, you can still manage your anonymous emails sent from Mailinator within your Gmail inbox.
Here’s how you do it:
1. Login to your current Gmail account and select the gear icon in the upper right-hand corner, and select ‘Settings’.
2. Find the ‘Check email from other accounts:’ section and click on ‘Add an email account’.
3. Enter your email and click the ‘Next’ button.
4. Select the ‘Import emails from my other account (POP3)’ option and click ‘Next’.
5. Then enter your full email address in the ‘Username’ field, enter your account password into the ‘Password’ field, and leave the dropbox box as ‘pop.mailinator.com’ in the ‘POP Server’ field.
6. Click ‘Add Account’ and you’re all set. Your anonymous Mailinator emails will now show up in your existing Gmail account.
Can You Use Outlook for Anonymous Email?
A lot of people think that you can use aliases to hide your true identity when using Outlook.
Aliases can be used for purposes like creating a more secure password recovery address or creating a junk email account for those times when you’re forced to register for an online service.
But, these aliases don’t allow you to remain truly anonymous like the tools and services highlighted above. It’s simply a pathway to create a throw-away email address.
Now, if you want to use Outlook with the greatest level of anonymity possible, then you’ll want to use the Tor browser, and send emails from an Outlook alias.
That way your location won’t be known. But, your alias can still be traced back to you as a person.
If you truly want to send anonymous emails, then use some of the tools and services highlighted above.
There are a variety of different tools and services you can use to send anonymous emails. Some have powerful encryption protocols to secure your messages, while others do a great job of allowing you to send one-off anonymous messages.
If you’re serious about sending anonymous emails and also want your email communication to remain encrypted, then your best option is using a service like ProtonMail, MailFence, or Tutanota.
Services like these allow you to send and track your anonymous emails, send encrypted and password protected emails, create account aliases, and even have your emails deleted after a set period of time.
The method you choose for managing and sending anonymous emails depends upon your needs and privacy concerns.
Hopefully, you’re better equipped to navigate the world of anonymous email and can protect your privacy and personal information from falling into the wrong hands.
Have any questions about which anonymous email service is best for your needs? Please share your questions and concerns in the comments below.
But behind the scenes, it’s common knowledge. And unfortunately, VPN customers are often the victims. So we’re here to set the record straight.
Here’s the truth about VPN server claims (and how you can separate fact from fiction).
VPN Servers (Last updated 1st of May 2018)
Private Internet Access
Hide All IP
Hide My IP
Hide Me VPN
What is a VPN Server?
VPNs create a secure tunnel around your internet connection.
You’re still going through an internet service provider (ISP). But you’re also connecting to a VPN’s servers to help encrypt and scramble your data.
That way, both your ISP and the websites you visit are fooled.
Neither can see where you’re coming from, where you’re going, or who you really are.
That’s mostly a good thing.
It means your personal data can’t be tracked. Your internet can’t be censored. And you can’t be hacked by bad actors on the same network connection.
But here’s the problem.
Many (most?) VPN companies don’t actually own their own servers.
Instead, they’re often renting or leasing them from other entities.
Think about it:
Some claim they have servers in nearly every big city around the world.
You know how expensive leases for data centers would be?!
Not to mention, you’d need to hire people in each location to maintain the servers. Which means you’d also have to file to do business in each city, pay taxes to each country, and deal with all of their regulations.
Case in point:
Many companies say they have servers inside some of the toughest, most restrictive countries in the world. HideMyAss! says they’ve got two in North Korea.
All of these extra costs and regulatory hurdles… yet, the average service charges only around $6-9/month.
Something doesn’t add up here. Technically, none of it does.
Especially when it’s far cheaper and easier to simply find someone else who’s already running those data centers in each location.
Pay them a few bucks a month to rent access, and then resell that to your broad, worldwide customer base.
Unfortunately, this is just the beginning.
Because it causes a trickle down effect into many other areas.
Like logging, for instance.
Your VPN Doesn’t Log… But Does the Server Owner?
Visit any VPN website and you’ll see the exact same claim:
Every single one says it.
And yet, almost every single one is lying straight to your face.
Each gives a different reason.
Some say it’s for performance maintenance. Others say it’s for the benefit of the user.
Because we were actually connected to a server in France!
Think about the ramifications of this.
What if VPNs were illegal in your country? What if you were trying to avoid another jurisdiction that shares browsing data? What if you were trying to bank and credit card data secure while buying stuff online?
A single fake location like this could ruin you.
That’s why you need to know more about the company behind each VPN.
That’s why you need to know more about VPN servers in general.
Because there are still a lot of shady characters out there.
Many of which, might be promising you ‘security’ and ‘anonymity.’
In this in-depth research, I’ll uncover the 10 cheapest VPNs you can possibly use. P.S. Not all of them are recommended, though. Read why..
The marketplace for Virtual Private Networks is filled with countless service providers who claim to have the “Fastest and Most Affordable” VPN on the market.
As most of you probably know, 99% of these claims are absolutely bogus.
Cheap VPNs are notoriously unreliable, un-secure, and painfully slow, but there are a few hidden gems among the rubble that are worth your time and (an admittedly small portion of) your hard earned money.
To help you find the perfect VPN that keeps your wallet full and your browsing activity secure, I’ve compiled a list of the 10 cheapest VPN providers in 2018.
Over the course of this guide, I’ll not only be reviewing the pricing plans available for each provider, but I’ll also be looking at the speeds, servers, customer support, and a whole host of other factors to help you decide which cheap VPN is right for you.
Full disclosure: To compensate our time and money spent in testing VPNs, we’re using affiliate links. However, we never recommend a VPN service in exchange for money – find detailed review process here.
The 10 Cheapest VPN Providers in 2018
We’ve reviewed more than 70 VPN on thebestvpn.com and the VPNs contained in the following list were handpicked for their affordability and performance.
While there are cheaper VPN services that you can find, we included only the best providers who delivered a high-quality service in addition to a budget-friendly price.
So without any further ado, let’s dive in.
1. NordVPN: $3.99/mo
Although NordVPN provides truly premium services (ranked #2nd in our overall best VPN list) they are also one of the cheapest.
NordVPN does not increase the rate of your subscription after the first billing cycle and they allow customers to pay with a card, PayPal or even Bitcoin to ensure that your transaction is completely anonymous.
All purchases are protected by a 30-day money back guarantee and the company regularly runs promotions that give you 3 days for free.
Customers receive access to all major protocols, a VPN that is fully compatible with all major devices, a true no logging policy, and P2P support.
VPN tier offers customers an affordable and reliable way to secure their browsing experience.
CyberGhost is not the cheapest provider on this list but considering that they offer discounts, they might be the best option for someone on a particularly tight budget.
They offer a much more limited selection of payment options for potential customers and you can only purchase CyberGhost using a card, PayPal, or Bitcoin.
The contents of your CyberGhost subscription are pretty standard fare and include, access to over 2,900+ servers, unlimited bandwidth, 7 device simultaneous connection, no logging policy, and an ultra-strong double encryption.
Headquartered in Hong Kong, PureVPN is (by far) the cheapest provider on the entire list. Although their one month and 6-month plans are far from budget-friendly, costing $11.95 a month and $8.95 a month respectively, they offer an unbeatable 2-year pricing package for only $2.49/month.
The 24-month pricing does require that you pay for the entire 2-year period up front meaning that a subscription with PureVPN will set you back $69.99 for the next two years.
In exchange for this relatively nominal sum, PureVPN customers receive the following features.
790+ Servers including P2P optimized servers in 141 countries
Unlimited Data and Bandwidth
24/7 365 “Live” Customer Support
Compatibility with all major devices and access to all major protocols.
With no renewal fees and the option to pay with PayPal, Debit Card, Alipay, Paymentwall, Coin Payments, Cashu, and even gift cards, it’s easy to see why PureVPN has become the go-to budget provider.
And they don’t stop things there.
In addition to their incredibly affordable 24-month plan, PureVPN also runs regular promotions and discounts to entice potential customers even further.
A few recently concluded specials from PureVPN include:
Summer Sale Offer: Buy 1 year and get 2nd year for FREE
Holiday Season & Christmas Offer: Grab 2 years of VPN for the Price of 1.
Black Friday & Cyber Monday Deal: Double Up Offer for any PureVPN Subscription Plan for FREE.
Although it might be the second provider on the list, Private Internet Access or PIA is one of my all-time favorite VPNs.
PIA offers some of the most budget-friendly pricing plans that I’ve ever seen regardless of the length of time that you choose to use their services. With their yearly pricing package coming in at a mere $3.33/mo and 2 year plan at $2.91/mo PIA is one of the most affordable VPN providers in the world.
Here’s a complete breakdown of their pricing plan.
2 Years: $2.91/month billed at $69.95 every 24 months
Yearly: $3.33/month billed yearly at $39.95
Unlike PureVPN, PIA doesn’t directly offer coupons and regular discounts on their site and I have yet to see any holiday specials or last minute deals that would significantly affect their price.
However, when you consider what you get in exchange for the money, it becomes abundantly clear why PIA is one of the leading VPN providers regardless of your budget.
For only $2.91/month, PIA gives you access to more than 3,000 servers across 25 countries, unlimited bandwidth, P2P support, an ads blocker, SOCKS5 proxy, and access to all major VPN protocols.
At this time, PIA allows payments to be made with all major credit card providers, PayPal, Bitcoin, Amazon Pay, Cashu, OKPAY, Mint, and Z-cash.
As the third cheapest VPN on this list, Trust.Zone is one of the best budget providers on the market today and they provide users with a premium level VPN service for less than the price of a monthly latte.
At only $3.33/month for their yearly plan, Trust.Zone is almost as cheap as PIA although the monthly and quarterly plans are a bit pricier.
3 Day Free Trial: $0 and 1-Gb of bandwidth
3 Months: $4.95/month billed quarterly at $14.85
Yearly: $3.33 billed annually $39.95
Like PIA and PureVPN, Trust.Zone doesn’t change the price of your plan once you are locked in, so what you see is what you get, and you get a quite a bit.
Unlimited data transfer
3 simultaneous connections
Unlimited server switching
1 click install & run software
Although Trust.Zone rarely runs sitewide specials, if you are willing to search the web, they do offer a plethora of discounts and coupons, many of which allow you to enjoy their services for more than 50% off!
Trust.Zone also gives their customers a wide variety of payment methods to choose from including debit card, PayPal, Qiwi Wallet, Bitcoin, WebMoney, and Alipay.
Israel-based SaferVPN is another great provider that comes armed to the teeth with incredible features and benefits while charging less than $4 a month.
While their monthly and annual pricing packages won’t win them any awards with more frugal consumers, at only $3.49/month, their two-year plan is hard to beat.
Annually: $5.13/month billed annually at $71.99
Bi-Annually: $3.49/month billed bi-annually at $83.77
At the time of this writing (November of 2017) they are also offering a significant “Buy One Get One” discount meaning that you can purchase 2-years of SaferVPN’s services for only $71.96 or one year for $41.95!
Like many of their competitors, SaferVPN does not charge a renewal fee after the initial billing cycle so there’s no need to worry about getting hit with a nasty (and unexpected) upcharge when your service renews.
SaferVPN regularly runs steep discounts and holiday specials (like the one mentioned above) so if you do need to stretch your budget as far as possible and are willing to wait until the next holiday, you can often purchase their services at a 50% discount or higher.
In exchange for your subscription fee, SaferVPN provides all of their customers with unlimited bandwidth, speed, and server switching, compatibility with all major devices, and access to more than 700 servers across 34 countries.
Charging only $4.08/month for their 2-year pricing plan, Ivacy VPN is one of the best budget providers on the market.
Here’s how their pricing plans work out.
6 Months: $7.49 billed every six months at $44.95
12 Months: $4.08 billed every year at $71.99
After reviewing their ToS I can confirm that Ivacy does not charge a larger renewal price after the initial billing cycle so your prices are locked in until the company decides to increase their service prices sitewide.
Although Ivacy’s basic plans might not be the most budget-friendly options on this list, they regularly run insane specials that allow you to secure your VPN service for a significantly reduced rate.
In fact, over the past six weeks, the company has been offering an insane discount, allowing customers to purchase 2-years of VPN service for less than $2.04 a month!
So if you are on a budget or you don’t need a VPN today, wait until Ivacy’s next big sale and you will be able to steal 24 months of VPN service for only $50.
Ivacy does offer a 7-day money back guarantee to comfort any hesitant buyers, however, this refund is only applicable if you stay under 7 Gb of bandwidth usage and 30 sessions so keep a careful eye on your browsing bandwidth.
Like the other providers on this list, Ivacy allows customers to make their purchase using a wide variety of different methods including card, PayPal, BitCoin, Perfect Money, and Payment Wall.
Your VPN subscription includes access to 200 servers (many of which are P2P optimized), unlimited bandwidth, a 0 logging policy, a killswitch, and access to all major VPN protocols.
Founded in 2013 under the umbrella of Keep Solid Inc. VPN Unlimited has quickly gone from the new kid on the block to one of the leading budget VPN providers on the market, and it’s easy to see why.
7 Day Free Trial
12 Months: $4.17/month (billed annually at $49.99)
Infinity Plan: Unlimited lifetime access for $149.99
Yes, with VPN Unlimited, you can purchase lifetime access to their VPN service for only $149.99. Considering that their annual pricing plan only costs $4.17/month it should be pretty easy to see why VPN Unlimited has become so popular.
As an added bonus, VPN Unlimited allows you to pay with almost any method imaginable. From cards, to PayPal, to Bitcoin, to Subway gift cards (no I’m not kidding), there aren’t many limits to how you can pay for your subscription.
Luckily, there are no sneaky upcharges or pricing modifications after your first year of service. The prices listed above are locked in as long as you keep an active subscription with VPN Unlimited… Or until they decide to increase the rate across their entire company.
Your subscription includes access to more than 1,000 servers across 70 countries, compatibility with most major devices, access to all major VPN protocols, and a five device simultaneous connection limit.
Charging their customers a relatively small fee of $4.92/month, VPN Area has a feature rich and affordable service that is sure to delight the budget VPN enthusiast.
6 Months: $8.33 billed every six months at $50
12 Months: $4.92 billed every year at $59
(Sadly there is no 24-month offer available at this time)
There are no upcharges or changes to the original price after your first billing cycle but, as always, you should be aware that the company’s ToS does allow them to change the market price of their services which could result in an increase to your subscription.
At this time, VPN Area allows their customers to pay with only a handful of options including MasterCard, Visa, PayPal, Bitcoin, and Payza.
I haven’t seen the company run very many public promotions, however, I do know that there are numerous coupons and affiliate discounts available to the savvy bargain hunter.
In exchange for your patronage, VPNArea gives their customers access to hundreds of server across 69 countries, a 6 device simultaneous connection limit, a no logging policy, and unlimited bandwidth.
At $4.99 a month for their yearly plan, ZenMate isn’t the cheapest provider on this list, but they are a far cry from “premium pricing”.
Here’s how all of their pricing plans break down.
6 Months: $7.49 a month billed twice a year at $44.99
Yearly: $4.99 billed annually at $59.99
There are no upcharges on the initial price, but like the other providers on this list, ZenMate’s ToS clearly states that they reserve the right to increase or alter their pricing packages so if you do purchase a ZenMate subscription, be sure to keep a weathered eye on their pricing page.
While compiling my research for this list, I found a number of websites and third-party companies claiming to offer coupon codes for ZenMate, but my success rate with the codes was less than 10%.
Unlike many of their competitors, ZenMate doesn’t seem particularly fond of holiday specials or special discounts so it’s unlikely that you will be able to find their services for any cheaper than the above prices.
As far as payment methods go, ZenMate severely limits your options and only allows payments to be made via card, PayPal, or UnionPay/Qiwi Wallet.
ZenMate is compatible with all major devices and they provide their customers with unlimited bandwidth, servers in 30+ countries, and fully functioning applications for your mobile devices.
While all of the VPNs on this list offer a “What you see is what you get” pricing plan, there are plenty of cheap providers who will enroll their customers in an annual subscription at a discounted rate only to change the pricing agreement right before the renewal period.
If you do find another cheap VPN that isn’t included on this list, be wary of hidden renewal fees and read their Terms of Service very carefully (actually read it) to make sure that you don’t get roped into paying double the agreed upon rate.
*Please note that due to the nature of using a VPN with Netflix, compatibility can change (literally) overnight so please do your due diligence before purchasing a VPN based solely on its Netflix Compatibility.*
Are These Cheap VPNs Safe?
It’s important to note that just because a VPN is affordable does not mean that it’s safe to use.
The safety (or lack thereof) of a given VPN is typically dependent on two things.
The logging policy of the provider
While the logging policy is pretty straightforward (the fewer logs the better) I want to take a moment to discuss VPN jurisdiction.
Ever since Edward Snowden executed his infamous data breach, leaking hundreds of thousands of classified NSA files, the general public realized that our private lives aren’t quite as private as we’d like to believe.
In fact, there is a partnership known as the “Five Eyes Agreement” between the U.S., UK, Australia, New Zealand, and Canada that effectively allows each country to collect, analyze, and share sensitive data with one another, effectively circumventing the privacy laws of each respective nation.
For example, if there is a law that prevents the United States government from legally surveying and spying on one of their own citizens, they can easily sidestep this law and request that one of their partners do the dirty work for them.
Meaning that the privacy laws of each nation are effectively rendered null.
But things don’t stop there.
The five countries created a “Third Party Partnership” with Denmark, France, Holland, and Norway, thus expanding the initial network to “Nine Eyes”.
But wait! There’s more.
If that wasn’t enough, the original five eyes partners expanded their network once again adding Germany, Belgium, Sweden, Spain, and Italy to their list of partners.
The Snowden leaks also confirmed that Singapore and South Korea are also limited members of the new “14 Eyes” partnership.
So what does this have to do with VPN safety?
Basically, if you are using a VPN that is located anywhere within the 14 eyes partnership, the safety and privacy of your information are brought into question.
Although you should have very little to worry about if your VPN provider upholds their no logging policy, it’s important that you are cognizant of this partnership and its ramifications on your personal security.
Should I Choose an Expensive vs. Cheap VPN Software?
As with most things in this world, the answer to this question is far more complicated than it might first appear.
There are numerous factors to consider when selecting a VPN provider and the impact to your wallet is only one of those factors.
One of the most important things that you can remember is that a VPN is about your personal security and privacy.
Choosing the right VPN could be the difference between having all of your banking and personal information stolen and successfully thwarting a would-be hacker.
Choosing the right VPN can mean the difference between having your personal emails sent all over the internet and keeping your sensitive data safe and sound where it belongs.
If you live in or are visiting a country with draconian censorship laws, choosing the right VPN could literally mean the difference between life and death.
When you take these realities into consideration, it should quickly become apparent that finding the most budget-friendly VPN should never be your goal.
Finding the most effective VPN to suit your goals should.
While I personally believe that ExpressVPN is the best all-around VPN for 99.99% of consumers, if you do have real budget constraints, something like Private Internet Access or SaferVPN is probably your next best bet.
Cheap VPN Review Conclusion
At this point, it’s my hope that this guide has provided you with all of the information and insight you need to select the ideal budget VPN for your needs.
While every provider on this list offers a quality service, there can be only one “Lord of the Ring” er… Winner.
With every factor taken into consideration, Private Internet Access is the undisputed champion of the cheap VPNs.
I hope that this guide provided you with everything that you need to find the best and fastest VPN to suit your needs.
These are my results, but what about you? Have you used any of the VPNs on this list? If so, what was your experience like? Let me know in the comments or write your own review using the box below.