Disclosure: TheBestVPN is reader-supported. When you buy a VPN through links on our site, we may earn commissions. Learn more.

7 Fastest VPN Services in 2023

Rob Mardisalu

Rob Mardisalu

In this case-study, we tested 70+ VPNs and their download/upload speeds across the United States and Europe. Results? All VPNs slow down your connection a bit…

VPNs boost security, but slow speeds.

That’s unfortunate. And there’s no way to solve one without the other.

The extra VPN funnel to secure your entire connection adds layers of encrypted security, which inevitably dings server speeds.

fast vpn
Example of a fast VPN provider

But how do you find a fast VPN?

The good news is that the best VPNs in existence only see a negligible drop in performance.

The bad news is that many of the bad ones siphon off so many resources that it makes web browsing a drag and streaming HD video content nearly impossible.

It could be the greatest anonymous system known to man, with no logging, unlimited torrenting, Netflix functionality, and a killer price tag.

But if it’s killing 95% of your speed, it’s not worth it.

There are four main reasons why a VPN will slow your internet speed to a crawl:

  1. Encryption: When a VPN sends information across the web, it encases it in advanced encryption to keep prying eyes from seeing our activity and data. High-quality encryption pulls a lot of CPU power, so the better the encryption is, the more speed it’s going to pull away. That’s why we say that decreased speed is the cost of security.
  2. Physical Distance from VPN Server: Signal deteriorates over distance, so where you are as it pertains to your VPN’s server will dictate speed loss.
  3. User Overload: The more people pulling at a server the more bandwidth is eaten up. Low bandwidth means low performance which also means low speed. This is usually not an issue for higher quality VPN systems, because they’re built to handle the load.
  4. Your ISP Speed: It stands to reason that the slower the speed you start out with is, the slower your VPN speed will be. Speed loss is more noticeable on systems that weren’t getting great speeds to begin with.

We tested 70+ VPN speed using speedtest.net. We used 100 Mbps up and 55 Mbps down Internet connection (cable). Read more about our review process here.

The 7 Fastest VPNs

We’ve reviewed 74 VPNs to date. Some were awesome. Most were ‘meh.’ And a few were downright shocking.

What’s interesting to note is that only one of these VPNs are in our top ten. And only one other is in the top 20.

How can that be? Let’s find out!

1. PersonalVPN

PersonalVPN speed test
  • Overall Rank: 20/74
  • EU Download Speed: 73.78 Mbps
  • US Download Speed: 125.58 Mbps
  • Logging Policy: Logs Some Information
  • Leaks: IP Leaks Detected
  • Torrenting: Not Allowed
  • Netflix: Did Not Work

This is the fastest VPN we’ve seen. By far.

Check out these results:

US Server:

PersonalVPN US server results
  • Ping: 118ms
  • Download: 125.53 Mbps (45% faster)
  • Upload: 29.38 Mbps (13% slower)

EU Server:

PersonalVPN EU server results
  • Ping: 118ms
  • Download: 73.78 Mbps (15% slower)
  • Upload: 40.69 Mbps (21% faster)

The US server speeds were actually faster than our benchmark download speeds!

To put it mildly:

That’s amazing.

There’s a lot to love besides speed, too.

Witopia also offers four different VPN tunneling protocols (OpenVPN, L2TP, IPSec, and PPTP), plus bulletproof AES-256 encryption. This VPN doesn’t play around when it comes to safety.

Unfortunately, there were a few drawbacks.

For starters, they log your information. Like….a lot of it. There were tons of IP leaks, exposing our true location and shattering the anonymity of the product.

And while those speeds were awesome, the fact that you can’t watch Netflix or torrent means you can’t really get the full effect.

This is the fastest VPN we’ve ever seen. But in our official review, we did not recommend it.

2. Hide My IP

Hide My IP review
  • Overall Rank: 43/74
  • EU Download Speed: 81.66 Mbps
  • US Download Speed: 81.61 Mbps
  • Logging Policy: Some Logging
  • Leaks: No Leaks
  • Torrenting: Allows Torrenting
  • Netflix: Does Not Work With Netflix

Our Hide My IP EU and US speed tests were nearly identical in terms of download speeds. That’s a good thing, showing that they’re able to consistently post strong server speeds.

EU Speed Test:

HideMyIP EU speed test results
  • Ping: 44 ms
  • Download: 81.61 Mbps (16% slower)
  • Upload: 20.36 Mbps (61% slower)

US Speed Test:

HideMyIP USA speed test results
  • Ping: 113 ms
  • Download: 81.66 Mbps (16% slower)
  • Upload: 19.99 Mbps (62% slower)

Our benchmark means that your speeds might only decline a few percentage points with Hide My IP. You probably won’t even notice it, to be honest.

We also found no leaks at all. So it’s a strong system.

Where does it go wrong then?

Unfortunately, Hide My IP thinks it’s ok to log your information. They don’t track your activity, but they are keeping some of your personal data.

It allows torrenting with no restrictions, but none of the servers that we tested worked with Netflix. So, that’s a bummer.

Also, they’re located smack in the middle of the 5 Eyes Surveillance Alliance, which is an agreement between the US, UK, Canada, Australia, and New Zealand to share espionage information.

So if Hide My IP ponies up the information they’re logging, it’s going to be shared with four other governments. Read more about Hide My IP VPN in our review.

3. Private Tunnel

Private tunnel review
  • Overall Rank: 32/74
  • EU Download Speed: 90.59 Mbps
  • US Download Speed: 69.29 Mbps
  • Logging Policy: Some Logging
  • Leaks: No Leaks
  • Torrenting: No Torrenting
  • Netflix: Does Not Work With Netflix

Private Tunnel’s combined speed placed them as the third fastest VPN on our list.

EU Speed Test:

Private Tunnel EU speed test results
  • Ping: 35ms
  • Download: 90.59 Mbps (6.6% slower)
  • Upload: 46.37 Mbps (12.6% slower)

US Speed Test:

Private Tunnel USA speed test results
  • Ping: 121ms
  • Download: 69.29 Mbps (28.6% slower)
  • Upload: 24.62 Mbps (53.6% slower)

The EU test was much better than the US, but still, it was a strong outing across the board.

Not only is this VPN fast, but this company created the OpenVPN protocol (the industry-standard protocol today).

So they’re like celebrities in the cybersecurity space.

There are a few issues, though.

Their local US jurisdiction is a problem for those who don’t want their data shared across half the globe.

And for a VPN with such amazing speed, they offer no official torrenting support and Netflix was blocked on all five servers that we checked.

It might be the third fastest VPN we’ve seen, but we did not recommend using it in our official review.

4. Private Internet Access

PIA speed test
  • Overall Rank: 9/74
  • EU Download Speed: 81.46 Mbps
  • US Download Speed: 77.56 Mbps
  • Logging Policy: No Logging
  • Leaks: No Leaks
  • Torrenting: Torrenting Allowed
  • Netflix: Does Not Work With Netflix

Private Internet Access is the highest ranked overall VPN on this list.

We ranked this product as the ninth VPN we’ve reviewed. And with good reason.

Speeds were awesome, as should come as no shock.

We tested a number of servers and were very impressed. Take a look:

EU Speed Test:

PIA USA speed test
  • Ping: 41ms
  • Download: 81.46 Mbps (15% slower)
  • Upload: 40.30 Mbps (29% slower)

US Speed Test:

PIA speed test US
  • Ping: 118ms
  • Download: 77.56 Mbps (19% slower)
  • Upload: 36.75 Mbps (34% slower)

Those speeds, coupled with a strict no-logging policy, full torrenting allowance, and no leaks made this a fantastic option.

Of course, they weren’t perfect.

None of the servers we tested worked with Netflix, for starters, and their US jurisdiction does create some surveillance issues.

For more information, check out our official review.

5. BolehVPN

BolehVPN speed test
  • Overall Rank: 34/74
  • EU Download Speed: 88.41 Mbps
  • US Download Speed: 62.85 Mbps
  • Logging Policy: Logs Traffic
  • Leaks: No Leaks
  • Torrenting: Torrenting Allowed
  • Netflix: 1/5 Worked With Netflix

BolehVPN produced slightly mixed results.

The upload speeds were consistent across both servers. But the EU download speeds were significantly faster than the US one.

Take a look.

EU Speed Test:

BolehVPN EU speed test results
  • Ping: 47ms
  • Download: 88.41 Mbps (9% slower)
  • Upload: 36.63 Mbps (31% slower)

US Speed Test:

BolehVPN USA speed test results
  • Ping: 117 ms
  • Download: 62.85 Mbps (35% slower)
  • Upload: 35.38 Mbps (38% slower)

Plus, they allow torrenting and one of the servers worked with Netflix. So you can get full use of those strong speeds.

Why didn’t we recommend this VPN in our review, then?

It logs some information, has a limited number of servers, and we had an overall clunky experience working with the app.

6. VPN.ac

VPN.ac speed test
  • Overall Rank: 46/74
  • EU Download Speed: 90.22 Mbps
  • US Download Speed: 58.53 Mbps
  • Logging Policy: Logs Some Info
  • Leaks: No Leaks
  • Torrenting: Torrenting Limited
  • Netflix: Does Not Work With Netflix

VPN.ac produced blazing-fast EU speeds and pretty good US ones.

EU Speed Test:

VPN.ac speed test results in EU
  • Ping: 33 ms
  • Download: 90.22 Mbps (7% slower)
  • Upload: 48.76 Mbps (8% slower)

US Speed Test:

VPN.ac speed test results in US
  • Ping: 115 ms
  • Download: 58.53 Mbps (40% slower)
  • Upload: 25.60 Mbps (51% slower)

There were no IP leaks found in this VPN, and they don’t log any major information. (Just your email address which isn’t enough to identify you.)

That being said, they limit their torrenting services to a few servers. And none of the servers we tested worked with Netflix. That’s a shame with such impressive speed.

Overall, they were only able to come in at number 46 out of 74. Read more about their service in our review.

7. Astrill

AstrillVPN speed test
  • Overall Rank: 25/74
  • EU Download Speed: 69.08 Mbps
  • US Download Speed: 78.65 Mbps
  • Logging Policy: Logs Some Info
  • Leaks: No Leaks
  • Torrenting: Torrenting Allowed
  • Netflix: 3/5 Worked With Netflix

Rounding out our list of the seven fastest VPNs is Astrill, a strong middle-of-the-road option that doesn’t drop the server speed.

EU Speed Test:

Astrill speed test results in EU
  • Ping: 44 ms
  • Download: 69.08 Mbps (29% slower)
  • Upload: 53.30 Mbps (0.6% faster)

US Speed Test:

Astrill Speed test US
  • Ping: 182 ms
  • Download: 78.65 Mbps (19% slower)
  • Upload: 18.99 Mbps (64% slower)

Astrill VPN works well with torrenting. And this was also the best option for streaming services (3 out of 5 Netflix servers worked) on this list.

Unfortunately, some shady logging policies in their privacy policy undermine the good results we saw. We discuss it at length in our official review.

The 3 Slowest VPNs

You’ve seen the best.

Now here are the rest. Or worst, when it comes to speed.

These last three VPNs sap away speed at an alarming rate. But they’re not all bad. In fact, one of them even ranks higher than some of the earlier VPN services above.

Here’s how they shake out.

1. Avira Phantom

Avira speed test
  • Overall Rank: 33/74
  • EU Download Speed: 6.98 Mbps
  • US Download Speed: 4.34 Mbps
  • Logging Policy: Unclear Logging Policy
  • Leaks: No Leaks
  • Torrenting: Torrenting Allowed
  • Netflix: 1/5 Worked With Netflix

There’s no doubt about it.

Avira Phantom is a slow program. They do have some positive features, but the speeds are downright abysmal.

EU Speed Test:

Avira EU speed test
  • Ping: 40ms
  • Download: 6.98 Mbps (93% slower)
  • Upload: 9.02 Mbps (83% slower)

US Speed Test:

Avira US speed test
  • Ping: 194 ms
  • Download: 4.34 Mbps (96% slower)
  • Upload: 2.23 Mbps (96% slower)

That’s ridiculously slow.

That being said, torrenting is allowed and one out of five tested servers worked with Netflix.

But, as you can see in our official review, the speed loss coupled with a shady logging policy made us pass on this one.

2. Hide All IP

Hide ALL IP speed test
  • Overall Rank: 49/74
  • EU Download Speed: 5.31 Mbps
  • US Download Speed: 2.58 Mbps
  • Logging Policy: No Logging
  • Leaks: No Leaks
  • Torrenting: Torrenting Allowed
  • Netflix: 3/5 Worked With Netflix

Hide All IP doesn’t just hurt your speed. It guts it with a rusty kitchen knife.

This Hong Kong-based VPN slows you down by upwards of 94%.

EU Speed Test:

Hide ALL IP EU speed test
  • Ping: 74 ms
  • Download: 5.1 Mbps (94.5% slower)
  • Upload: 3.16 Mbps (94% slower)

US Speed Test:

Hide ALL IP US speed test
  • Ping: 149 ms
  • Download: 2.58 Mbps (97% slower)
  • Upload: 1.07 (98% slower)

This was an all-around bad VPN, with questionable logging policies, Chinese jurisdiction, and only one connection per account. On their poorly translated website, they tout their ability to provide geo-blocked streaming services.

And we found that Netflix worked on one (out of five) servers. Plus, they allow unlimited torrenting.

But both will be affected by such slow speeds.

Read more about why we don’t recommend Hide All IP in our official review.

3. Betternet

Betternet speed test
  • Overall Rank: 69/74
  • EU Download Speed: 3.18 Mbps
  • US Download Speed: 2.53 Mbps
  • Logging Policy: Some Logging
  • Leaks: IP Leaks Detected
  • Torrenting: Torrenting Allowed
  • Netflix: Did Not Work With Netflix

Betternet is a free VPN. And you get what you pay for in this case.

EU Speed Test:

Betternet EU speed test
  • Ping: 64 ms
  • Download: 3.18 Mbps (97% slower)
  • Upload: 12.41 Mbps (76% slower)

That is one slow system.

Our tests revealed that Netflix doesn’t work. Torrenting is allowed but with download speeds around two and three Mbps, you’re not going to download anything.

Betternet is the slowest VPN we’ve reviewed.

But incredibly, they’re not the lowest overall VPN on our list. Their 69th position means that there are still a few others with the distinction of somehow being ranked below the slowest VPN in the marketplace.

There are many factors that make a VPN great (or not). But speed is often the Achilles Heel.

For more on what makes a VPN truly impressive, check out our list of the 10 best VPNs.

Best Android VPN Apps (*UPDATED 2023)

Rob Mardisalu

Rob Mardisalu

Here’s what we compared: Download Speed, Usability on Android, Cost, User Reviews on Google Play, Jurisdiction and Logging Policy.

Protecting your internet connection while you’re at home or on your laptop on the go is important.

But why protect just one part of your internet use?

If you’re using an Android phone, you should be using a VPN whenever you connect to the internet.

Let’s talk about why that’s a good idea, then discuss the best VPNs for Android phones. We’ll go over our selection criteria, then provide our recommendations.

Why Use an Android VPN?

Just like the internet traffic that you send from your home or work computer, the traffic you send from your phone should be protected. A VPN provides that protection.

For a detailed explanation, check out our full beginner’s guide to VPNs. In short, though, using a VPN on your Android:

  1. Hide your IP so you can remain anonymous and private
  2. Bypasses geo-restrictions (especially useful for streaming Netflix, Hulu, Youtube etc…)
  3. Helps keep your personal data safe and secure
  4. Protects your anonymity online and online spying

You might not think that you have any reason to hide the internet traffic coming from your phone, but remember that you send texts, photos, and emails from it. Would you want someone spying on those? Even if you’re not sending anything particularly private, you still don’t want anyone snooping.

The Electronic Frontier Foundation recommends using VPNs to avoid surveillance by your ISP. The same is absolutely true of your mobile data provider, and for all the same reasons.

There are certainly other reasons you might use a VPN, but these are the most popular. Protected browsing is crucial for streaming and torrenting from your phone, but the security benefits alone are worth setting up a VPN.

5 Best VPN Apps for Android Devices

Without further ado, here are 5 top VPNs for Android devices that are fast, safe and secure:

1. NordVPN – Most VPN Servers With Different IP Addresses

NordVPN is a top contender in every category, but it stands out among Android VPNs for the remarkably high reviews it gets from its users: NordVPN’s app earned a 4.3 ranking on Google Play, one of the highest we’ve seen:

NordVPN review & rating
NordVPN rating on Google Play

In addition to one-tap access to over 5,200+ servers in 60 countries, the app also has a built-in adblocker so you can browse the internet more freely and use less data. All you need to do is tell NordVPN where you want to connect, and you’ll be instantly connected to their network.

We also love that they offer a no questions asked 30 days money back guarantee, so you can check out the Android app to see if you like it. If you don’t, all you have to do is cancel the service and request a refund.

NordVPN's Android app
NordVPN’s android app

We think you’ll like it, though; with solid speed scores (74 Mbps download on our 100 Mbps connection), industry-standard encryption, and a mind-boggling number of servers, there’s not a whole lot more you could ask for. It’s not the fastest out there, but it should be plenty fast for anything you’re doing from your phone.

Another great feature is NordVPN’s extra-secure Double VPN.

It routes your traffic through two VPN servers instead of a single one to give you doubly encrypted data. This feature might slow down your connection, but if you need to be absolutely sure that no one knows what you’re doing online, you can be confident in Double VPN.

When you top all of that off with a very affordable pricing structure, you get a winner. If you sign up for a two year plan with NordVPN, you’ll only pay $3.71 per month. Not many VPNs charge less than that.

Best VPN for android (NordVPN)
Visit NordVPN.com

Speed: 74% from the benchmark
Users Rating (Google Store): 4.3/5.0
Cost: $3.71/mo
Logging Policy: No Logs
Netflix: Working
Torrenting: Torrenting Allowed
Usability: 5/5

Read the full NordVPN review here.

 

2. ExpressVPN – Best for Security & Fastest Connections Speeds

ExpressVPN is one of the fastest providers that we’ve tested, clocking over 83 Mbps download speed on our 100 Mbps connection.

While the speed you get on your Android phone will vary largely based on your phone and your connection, you can be confident that you’ll get about as fast a speed as possible with ExpressVPN.

Express VPN's android app
Here’s how ExpressVPN app will look on Android

The Android app works with a variety of Android installations, from the latest version, Oreo, all the way back to Jelly Bean. Even if you’re running an old version of Android, your VPN will work and be secure.

One of the great features included in ExpressVPN’s Android app is the recommended location; as soon as you fire up the app, it will recommend servers to you based on where you’ll get the best connections. With a tap, you can connect to their fast servers all over the world. It doesn’t get much easier than that. You can also save your favorite servers for faster access.

We also like that the app defaults to OpenVPN, the most secure VPN protocol. And the 4.1 rating is confidence-inspiring, as well.

ExpressVPN Android app review on Google Play
ExpressVPN rating on Google Play

The only place ExpressVPN falls notably behind its competitors is in price. If you pay for a full year up front, it works out to $8.32 per month. If you pay 15 months upfront, it’s $6.67/mo.

That’s on the more expensive side of top-tier VPNs. That being said, if you’re going to use your Android VPN a lot—which we recommend—it’s worth it.

fastest VPN for android
Visit ExpressVPN.com

Speed: 83% from the benchmark
Users Rating (Google Store): 4.1/5.0
Cost: $6.67/mo
Logging Policy: No Logs
Netflix: Working
Torrenting: Torrenting Allowed
Usability: 5/5

Read the full ExpressVPN review here.

 

3. Surfshark – Cheap VPN for Streaming on Android

Surfshark's Android app
Surfshark’s Android app

Despite being a newcomer and offering a relatively small server pool, Surfshark is a great VPN choice for your Android device.

One of the big advantages of Surfshark is their cheap cost.

If you opt in for 2 years, you’ll get it at a monthly cost of $2.49, which sums up to $59.76 for 24 months. They also use strong VPN protocols (OpenVPN and IKEv2) and allow unlimited simultaneous connections.

Beyond that, the app has everything you’d expect from a top-tier Android VPN app. It’s super easy to use, has simple server choice, and offers a convenient Whitelister feature, which allows excluding some websites from the VPN connection.

The 4.1 rating on the Google Play Store is also reassuring:

Surfshark's rating on Google Play
Surfshark’s rating on Google Play

Although it doesn’t compete with NordVPN’s server range or speed, it’s a great option for buyers on a budget.

surfshark homepage
Visit SurfShark.com

Speed: 69% from the benchmark
Users Rating (Google Store): 4.1/5.0
Jurisdiction: British Virgin Islands
Cost: $2.49/mo
Netflix: Working
Torrenting: Torrenting Allowed
Usability: 5/5

Read the full Surfshark review here.

 

4. Private Internet Access – Most Flexible Android VPN

PIA is known for its high speeds. It maintained 81% of our 100 Mbps connection speed when we tested it on a PC, logging one of the fastest speeds we’ve ever seen. So if you’re looking for the fastest Android VPN, you should give Private Internet Access a shot.

The app also has a 4.0 rating in the Play Store—people really like it. It’s not hard to see why, with easy connections, automatic server recommendations, per-app VPN rules, and ad blocking.

PIA rating on Google Play
PIA rating on Google Play
PIA's android app
PIA’s android app

Although we recommend using a VPN for any internet connection on your Android, we understand that you might want more speed when you’re using certain apps. Letting some of them connect outside of the VPN will do that.

PIA has over 3,300 servers, which is staggeringly high. You’ll always be able to find one in the country you want that’s not getting slammed with traffic. And because you can get a two-year subscription that brings your monthly cost little over $3, it’s also one of the most affordable VPNs.

Private Internet Access review
Visit PIA

Speed: 81% from the benchmark
Users Rating (Google Store): 4.0/5.0
Jurisdiction: United States
Cost: $3.49/mo
Netflix: Not working well
Torrenting: Allowed
Usability: 4/5

Read the full PIA review here.

 

5. TunnelBear – Best Rating on Google Play

As we mentioned previously, the app itself has to be good for us to recommend an Android VPN. And TunnelBear has a fantastic app—which is one of the reasons why it’s currently rated 4.4 on the Play Store, one of the highest we’ve ever seen for a paid VPN.

TunnelBear rating on Google Play
TunnelBear VPN rating on Google Play

That’s not much of a surprise, considering how fun the app is to use. Like everything else made by TunnelBear, it’s full of fun graphics and cute bears. Which might not sound like it’s worth anything, but if the app is easy and pleasant to use, you’re more likely to use it.

And the VPN itself is great, too. Android, unlike iOS, gets 256-bit OpenVPN encryption, which means your traffic is secure. It’s not the fastest VPN out there (we got 52 Mbps download speed on our 100 Mbps connection), but it is stable and they have a no-logging policy that we really like.

TunnelBear's Android app on phone and tablet
TunnelBear’s Android app

Their paid plans, which start at $4.99 per month, paid annually, are some of the cheapest we’ve seen. And there’s a free plan so you can try the app out to see how it works for you. You’ll be limited to 500MB, but you shouldn’t need much more than that to see if it’s worth paying for.

TunnelBear for android
Visit TunnelBear.com

Speed: 52% from the benchmark
Users Rating (Google Store): 4.4/5.0
Jurisdiction: Canada
Cost: $5.00/mo
Netflix: Not working
Torrenting: No info
Usability: 4/5

Read the full TunnelBear review here.

 

Why We Don’t Recommend FREE VPNs for Android

Lots of people know that they should be using a VPN. But fewer are willing to pay for it. That’s why there are thousands of people out there looking for the best free Android VPN. As you’ll see in a moment, we don’t recommend any free VPNs.

Why not? Because free VPNs come with compromises. First, they’re often not very reliable. Providers of paid VPNs aren’t likely to prioritize the traffic of their free users, and if you aren’t willing to pay, you’re going to get second-rate service.

The same applies to speed. Free Android VPNs just aren’t going to be able to compete with paid options on speed. You’ll get faster, more stable connections from a paid provider, and that’s worth a lot.

Second, providers of free VPNs still have to make money. And if they’re not getting it from you, they’re getting it from advertisers. Free VPN providers are more likely to log your information, sell your data to third parties, and display ads while you’re connected. While ads are annoying, having your data collected and sold is a violation of your privacy.

And because privacy is one of the most important underlying principles of any VPN, that’s bad news.

For all of these reasons, we recommend that you always use a paid VPN for Android. You’ll get a faster, more stable service, and your privacy will be better protected. And with the low costs of many of the VPNs below, you can get those things affordably.

What We Look For in Android VPNs

So what makes a great Android VPN? In most cases, it’s the same factors that make any VPN a good one. High speeds. No logging of any kind (or, at the very least, minimal logging). Solid encryption for security and privacy.

We also prefer that VPNs not be headquartered in countries that have strict surveillance and data retention laws, like the US, Canada, the UK, and much of western Europe. Some VPNs in these places are very trustworthy, but we prefer that they are housed in more lenient jurisdictions. Though any worthy VPN will have servers all over the world.

Simple, straightforward apps are also a big plus. If you have to spend a long time figuring out how to get online with your VPN, you’re much less likely to use it regularly. And that could expose you to security and privacy risks. The easier it is to get online, the better.

We also look at app reviews in the Google Play Store to see how users feel about the app. If a VPN app has more one- and two-star reviews than other apps, it’s cause for a closer look.

And, of course, we look at the price. We know that an expensive VPN doesn’t fit into everyone’s budget, so we try to highlight the options with the best value.

The Best Android VPNs Are at Your Disposal

The five VPNs we listed above are fantastic options for Android users. They’ll keep your traffic private, help you get around geo-restrictions, and keep your ISP from throttling your traffic. And because they’re at least relatively affordable, they’ll do it all without breaking the bank.

  1. NordVPN – $3.71/mo
  2. ExpressVPN – $6.67/mo
  3. Surfshark – $2.49/mo
  4. Private Internet Access – $3.49/mo
  5. TunnelBear – $4.99/mo

If you’re not using an Android VPN, you should start doing it now. You can’t go wrong with any of these choices, so pick one and start browsing more safely today!

The 10 Best Cheap VPNs of 2023

Rob Mardisalu

Rob Mardisalu

In this in-depth research, I’ll uncover the 9 cheapest VPNs you can possibly use. P.S. Not all of them are recommended, though. Read why..

NordVPN special offer
NordVPN offers a special price for only $2.99/mo on the two year subscription.

Editor’s note: we’re in the process of reviewing these VPNs again

The marketplace for cheap VPNs is filled with countless service providers who claim to have the “Fastest and Most Affordable” VPN on the market.

As most of you probably know, 90% of these claims are not true.

Cheap VPNs are often notoriously unreliable, un-secure, and painfully slow, but there are a few hidden gems among the VPNs that are worth your time and money.

To help you find the perfect VPN that keeps your wallet full and your browsing activity secure, I’ve compiled a list of the 10 cheapest VPN.

Without further ado, here are the 10 best cheap VPN services you can buy for less than $4/mo:

The 10 Best Cheap VPNs of 2023

In order to find the cheapest VPN, we compared their cost, plan options, speed as well as features and logging/torrenting policies.

1. NordVPN

Number of Servers: 5200+ | Simultaneous Connections: 6 | OpenVPN + AES 256-Bit Encryption | No-Logging Policy | Torrenting Allowed | Works With Netflix

Although NordVPN provides truly premium services (ranked #1 in our overall best VPN list), they are also one of the cheapest.

NordVPN does not increase the rate of your subscription after the first billing cycle, and they allow customers to pay with all sorts of credit cards or even Bitcoin to ensure that your transaction is completely anonymous.

All purchases are protected by a 30-day money-back guarantee and the company regularly runs promotions between $2.99/mo to $3.99/mo.

Customers receive access to all major protocols, a VPN that is fully compatible with all major devices, a true no-logging policy, and P2P support.

They unblock Netflix, allow torrenting, and keep you 100% anonymous.

Visit NordVPN.com

Click here to read our NordVPN in-depth review

2. SurfShark

Number of Servers: 800+ | Simultaneous Connections: Unlimited | OpenVPN/IKEv2 Encryption | No-Logging Policy | Torrenting Allowed | Works With Netflix

surfshark pricing options
Current pricing at SurfShark.com

Surfshark is a newcomer in the VPN market, and that’s probably the reason why it’s also great value for money.

Its lowest price tag is only $2.49 per month, which is as low as it gets. Even though the rising VPN star still has some issues to work out, at this price point, we can’t complain too much.

What do you get at this price? Secure tunneling protocols such as IKEv2 and OpenVPN, 800+ servers in over 50 countries, and unlimited torrenting bandwidth.

Although the server numbers are pretty low when compared to some other providers, Surfshark tries to compensate it by offering unlimited simultaneous connections.

The only downside we found was their email support, which isn’t a huge problem since they’ve got a great live chat support team.

Surfshark accepts all major credit cards (American Express, Visa, MasterCard, and Discover). Privacy-focused buyers can also pay with cryptocurrency (BitCoin, Ripple, and Ethereum).

Visit Surfshark.com

Click here to read our Surfshark in-depth review

3. CyberGhost

Number of Servers: 3600+ | Simultaneous Connections: 7 | OpenVPN + AES 256-Bit Encryption | No-Logging Policy | Torrenting Allowed | Works With Netflix | Average Speed

cyberghost pricing options
Current pricing on CyberGhost.com

CyberGhost is another cheap VPN, and they also win the award for “VPN With the Coolest Sounding Name Ever”.

They slid onto this list with a price tag of only $3.50, well under the $5/month mark. CyberGhost brings a lot to the table.

CyberGhost is not the cheapest provider on this list but considering that they offer discounts, they might be the best option for someone on a particularly tight budget.

They offer a much more limited selection of payment options for potential customers, and you can only purchase CyberGhost using a card, PayPal, or Bitcoin.

The contents of your CyberGhost subscription are pretty standard fare and include access to 3600+ servers, unlimited bandwidth, 7-device simultaneous connection, no-logging policy, and ultra-strong double encryption.

Unfortunately, CyberGhost isn’t as fast as NordVPN. So you may experience some slow download speeds when torrenting or streaming.

Visit CyberGhost.com

Click here to read our CyberGhost in-depth review

4. Trust.Zone

Number of Servers: 170 | Simultaneous Connections: 3 | OpenVPN + AES 256-Bit Encryption | No-Logging Policy | Torrenting Allowed | Works With Netflix

Trust.Zone prices and plans
Current pricing on Trust.Zone
  • Monthly: $6.99/mo
  • 1 Year Plan: $3.99/mo
  • 2-Year Plan: $2.99/mo

At only $2.99/month for their 2-year planTrust.Zone is almost as cheap as PIA although the monthly and quarterly plans are a bit pricier.

Like PIA and PureVPN, Trust.Zone doesn’t change the price of your plan once you are locked in, so what you see is what you get, and you get a quite a bit.

  • Unlimited data transfer
  • Unlimited bandwidth
  • Unlimited server switching

Which is obvious because it’s not a free VPN.

Although Trust.Zone rarely runs sitewide specials, if you are willing to search the web, they do offer a plethora of discounts and coupons, many of which allow you to enjoy their services for more than 50% off.

Trust.Zone also gives their customers a wide variety of payment methods to choose from including debit card, PayPal, Qiwi Wallet, Bitcoin, WebMoney, and Alipay.

Visit Trust.Zone

Click here to read our Trust.Zone VPN in-depth review

5. SaferVPN

SaferVPN pricing current pricing
Current pricing at SaferVPN.com

Number of Servers:  700+ | Simultaneous Connections: 5+ | IKEv2 by Default + AES 256-bit Encryption | Questionable Logging Policy | Limited Torrenting | Works With Netflix

  • Monthly: $12.95/mo
  • 1 Year Plan: $5.49/mo
  • 2 Year Plan: $3.29/mo
  • 3 Year Plan: $2.50/mo

Israel-based SaferVPN is another great provider that comes armed to the teeth with incredible features and benefits while charging less than $3 a month.

While their monthly and annual pricing packages won’t win them any awards with more frugal consumers, at only $2.50/month, their three-year plan is hard to beat.

Like many of their competitors, SaferVPN does not charge a renewal fee after the initial billing cycle so there’s no need to worry about getting hit with a nasty (and unexpected) upcharge when your service renews.

SaferVPN regularly runs steep discounts and holiday specials (like the one mentioned above) so if you do need to stretch your budget as far as possible and are willing to wait until the next holiday, you can often purchase their services at a 50% discount or higher.

Visit SaferVPN.com

Click here to read our SaferVPN in-depth review

6. Ivacy VPN

current ivacy pricing
Current pricing at Ivacy.com

Number of Servers: 1000+ | Simultaneous Connections: 5 | OpenVPN + AES 256-Bit Encryption | No-Logging Policy | Torrenting Allowed | Does Not Work With Netflix

Here’s how their pricing plans work out:

  • Monthly: $9.95/mo
  • 1 Year Plan: $3.33/mo
  • 2 Year Plan: $2.25/mo

Charging only $2.25/month for their 2-year pricing plan, Ivacy VPN is, too, a quite cheap VPN on the market.

After reviewing their TOS, I can confirm that Ivacy does not charge a larger renewal price after the initial billing cycle so your prices are locked in until the company decides to increase its service prices sitewide.

Although Ivacy’s basic plans might not be the most budget-friendly options on this list, they regularly run insane specials that allow you to secure your VPN service for a significantly reduced rate.

Ivacy does offer a 7-day money-back guarantee to comfort any hesitant buyers. However, this refund is only applicable if you stay under 7 GB of bandwidth usage and 30 sessions so keep a careful eye on your browsing bandwidth. Like the other providers on this list, Ivacy allows customers to make their purchase using a wide variety of different methods including card, PayPal, BitCoin, Perfect Money, and Payment Wall.

Your VPN subscription includes access to 1000+ servers (many of which are P2P-optimized), unlimited bandwidth, a zero-logging policy, a kill switch, and access to all major VPN protocols.

Visit Ivacy.com

Click here to read our Ivacy VPN in-depth review

7. VPN Unlimited

VPN unlimited current pricing
Current pricing on VPNUnlimitedapp.com

Number of Servers: 400+ | Simultaneous Connections: 5 | OpenVPN + AES 256-Bit Encryption | Questionable Logging Policy | Limited Torrenting | Works With Netflix

  • Monthly: $9.99/mo
  • 1 Year Plan: $5.00/mo
  • 3 Year Plan: $2.78/mo

Founded in 2013 under the umbrella of Keep Solid Inc., VPN Unlimited has quickly gone from the new kid on the block to one of the leading budget VPN providers on the market, and it’s easy to see why. 

With VPN Unlimited, you can purchase lifetime access to their VPN service for only $149.99. Considering that their annual pricing plan only costs $5.00/month, it should be pretty easy to see why VPN Unlimited has become so popular.

As an added bonus, VPN Unlimited allows you to pay with almost any method imaginable. From cards to PayPal, to Bitcoin, to Subway gift cards (no, I’m not kidding), there aren’t many limits to how you can pay for your subscription.

Luckily, there are no sneaky upcharges or pricing modifications after your first year of service. The prices listed above are locked in as long as you keep an active subscription with VPN Unlimited… Or until they decide to increase the rate across their entire company. 

Your subscription includes access to 400+ servers across 70 countries, compatibility with most major devices, access to all major VPN protocols, and a 5-device simultaneous connection limit.

Visit VPNUnlimitedapp.com

Click here to read our VPN Unlimited in-depth review

8. VPNArea

VPNArea pricing options
Current pricing on VPNArea.com

Number of Servers: 230 | Simultaneous Connections: 6 | OpenVPN + AES 256-Bit Encryption | No-Logging Policy | Torrenting Allowed | Works With Netflix

  • Monthly: $9.90/mo
  • 1 Year Plan: $4.92/mo
  • 3 Year Plan: $2.99/mo

Charging their customers a relatively small fee of $5.00/month for 1-year plans, VPN Area has a feature-rich and affordable service that is sure to delight the budget VPN enthusiast.

There are no upcharges or changes to the original price after your first billing cycle but, as always, you should be aware that the company’s ToS does allow them to change the market price of their services which could result in an increase to your subscription.

At this time, VPNArea allows their customers to pay with only a handful of options including MasterCard, Visa, PayPal, Bitcoin, and Payza.

I haven’t seen the company run very many public promotions. However, I do know that there are numerous coupons and affiliate discounts available to the savvy bargain hunter.

In exchange for your patronage, VPNArea gives their customers access to 200+ servers across 70 countries, a 6-device simultaneous connection limit, a no-logging policy, and unlimited bandwidth.

Visit VPNArea.com

Click here to read our VPNArea in-depth review

9. Private Internet Access

Number of Servers: 3300+ | Simultaneous Connections: 10 | OpenVPN + AES 256-Bit Encryption | No-Logging | Torrenting Allowed | Only 1 Server Worked With Netflix

pia pricing

Here’s a complete breakdown of PIA’s pricing plan:

  • Monthly: $9.99/mo
  • 1 Year Plan: $5.99/mo
  • 2 Year Plan: $3.49/mo

Although it might be only the fourth provider on the list, they offer some of the most budget-friendly pricing plans that we’ve ever seen regardless of the length of time that you choose to use their services.

Their yearly pricing package comes in at a mere $5.99/mo and the 2-year plan at $3.49/mo.

Although PIA does not increase the price for your subscription after the initial billing cycle, it does state in their privacy policy that they reserve the right to alter the fees associated with their services which would be reflected after the initial 1, 12, or 24-month period.

Unlike PureVPN, PIA doesn’t directly offer coupons and regular discounts on their site, and I have yet to see any holiday specials or last-minute deals that would significantly affect their price.

For $3.49/month, PIA gives you access to more than 3,300 servers across 32 countries, unlimited bandwidth, P2P support, an ads blocker, SOCKS5 proxy, and access to all major VPN protocols.

At this time, PIA allows payments to be made with all major credit card providers, PayPal, Bitcoin, Amazon Pay, Cashu, OKPAY, Mint, and Z-cash (and even gift cards for staying anonymous).

Visit PrivateInternetAccess.com

Click here to read our PIA in-depth review

10. PureVPN

PureVPN current pricing
Current pricing at PureVPN.com

Number of Servers: 200+ | Simultaneous Connections: 5 | OpenVPN + AES 256-Bit Encryption | Keeps Some Logs | Torrenting Allowed | Does NOT Work With Netflix

  • Monthly Plan: $10.95/mo
  • 1 Year Plan: $3.33/mo
  • 2 Year Plan: not available

Headquartered in Hong Kong, PureVPN is (by far) the cheapest provider on the entire list. Although their 1-month plan is far from budget-friendly, costing $10.95/mo, they offer an unbeatable 1-year pricing package for only $3.33/month.

The 24-month pricing does require that you pay for the entire 2-year period upfront, meaning that a subscription with PureVPN will set you back $69.99 for the next two years.

In exchange for this relatively nominal sum, PureVPN customers receive the following features: 2000+ servers including P2P-optimized servers in 141 countries, unlimited data and bandwidth, 24/7/365 “live” customer support, compatibility with all major devices, and access to all major protocols.

With no renewal fees and the option to pay with PayPal, debit card, Alipay, Paymentwall, Coin Payments, Cashu, and even gift cards, it’s easy to see why PureVPN has become the go-to budget provider.

However, as a drawback, they’ve given log files to the FBI (so they keep some log files), and according to our tests, they didn’t seem to work with Netflix. Last but not least, they aren’t as fast as NordVPN.

Visit PureVPN.com

Click here to read our PureVPN in-depth review

What About the Renewal Prices?

While all of the VPNs on this list offer a “what you see is what you get” pricing plan, there are plenty of cheap providers who will enroll their customers in an annual subscription at a discounted rate only to change the pricing agreement right before the renewal period.

If you do find another cheap VPN that isn’t included on this list, be wary of hidden renewal fees and read their terms of service very carefully (actually read it) to make sure that you don’t get roped into paying double the agreed-upon rate.

The Best VPNs for Netflix and Torrenting

For those of you looking to stream Netflix or anonymously torrent files, you don’t have to purchase an expensive premium VPN in order to do so.

In fact, the following cheap VPNs will suit your needs just fine.

Cheap VPNs That Allow Torrenting:

  1. NordVPN
  2. Surfshark
  3. CyberGhost
  4. Private Internet Access VPN
  5. Trust.Zone

Cheap VPNs That Work With Netflix: 

  1. NordVPN
  2. Surfshark
  3. CyberGhost
  4. Trust.Zone
  5. Ivacy
  6. VPNArea

*Please note that due to the nature of using a VPN with Netflix, compatibility can change (literally) overnight, so please do your due diligence before purchasing a VPN based solely on its Netflix compatibility.

Are These Cheap VPNs Safe?

It’s important to note that just because a VPN is affordable does not mean that it’s safe to use.

The safety (or lack thereof) of a given VPN is typically dependent on two things.

  1. Their jurisdiction
  2. The logging policy of the provider

While the logging policy is pretty straightforward (the fewer logs, the better), I want to take a moment to discuss VPN jurisdiction.

Ever since Edward Snowden executed his infamous data breach, leaking hundreds of thousands of classified NSA files, the general public realized that our private lives aren’t quite as private as we’d like to believe.

VPN jurisdiction

In fact, there is a partnership known as the “Five Eyes Agreement” between the U.S., U.K., Australia, New Zealand, and Canada that effectively allows each country to collect, analyze, and share sensitive data with one another, circumventing the privacy laws of each respective nation.

For example, if there is a law that prevents the United States government from legally surveying and spying on one of their own citizens, they can easily sidestep this law and request that one of their partners do the dirty work for them.

Meaning that the privacy laws of each nation are effectively rendered null.

But things don’t stop there.

The five countries created a “Third Party Partnership” with Denmark, France, Holland, and Norway, thus expanding the initial network to “Nine Eyes”.

But wait! There’s more.

If that wasn’t enough, the original Five Eyes partners expanded their network once again adding Germany, Belgium, Sweden, Spain, and Italy to their list of partners.

The Snowden leaks also confirmed that Singapore and South Korea are also limited members of the new “14 Eyes” partnership.

So what does this have to do with VPN safety?

Basically, if you are using a VPN that is located anywhere within the 14 Eyes partnership, the safety and privacy of your information are brought into question.

Although you should have very little to worry about if your VPN provider upholds their no-logging policy, it’s important that you are cognizant of this partnership and its ramifications on your personal security.

Should I Choose an Expensive vs. Cheap VPN Software?

As with most things in this world, the answer to this question is far more complicated than it might first appear.

There are numerous factors to consider when selecting a VPN provider, and the impact on your wallet is only one of those factors.

One of the most important things that you can remember is that a VPN is about your personal security and privacy.

Choosing the right VPN could be the difference between having all of your banking and personal information stolen and successfully thwarting a would-be hacker.

Choosing the right VPN can mean the difference between having your personal emails sent all over the internet and keeping your sensitive data safe and sound where it belongs.

If you live in or are visiting a country with draconian censorship laws, choosing the right VPN could literally mean the difference between life and death. 

When you take these realities into consideration, it should quickly become apparent that finding the most budget-friendly VPN should never be your goal.

Finding the most effective VPN to suit your goals should. 

While I personally believe that NordVPN is the best all-around VPN for 99.99% of consumers, if you do have real budget constraints, something like Private Internet Access is probably your next best bet.

Cheap VPN Review Conclusion

At this point, it’s my hope that this guide has provided you with all of the information and insight you need to select the ideal budget VPN for your needs.

With every factor taken into consideration, NordVPN is the undisputed champion of cheap VPNs. If you want to go even cheaper, your choice should be Surfshark.

I hope that this guide provided you with everything that you need to find the best and fastest VPN to suit your needs.

How FREE VPNs Sell Your Data

Rob Mardisalu

Rob Mardisalu

We did an extensive research on multiple free VPNs and their privacy policy pages to find out if they have the right to sell/share your data. The results were shocking…

Selling data
Many free VPNs can sell or share your data to 3rd parties…

Editor’s note: Research was done in 2018, some facts are updated in November 2022.

At TheBestVPN, we generally advise against the use of free VPNs.

The reason is simple – many of them simply sell your data to 3rd party advertisers.

And this defeats the whole purpose of having a VPN in the first place.

But there’s more:

1. Many free VPN services are not transparent about how they make money from you using their services; in most cases, when you’re not being sold a product you are most likely the product.

2. Most free VPNs simply sell your data to affiliated/partnered companies or to the third party who is willing to pay the most.

3. Some free VPNs have gotten caught using shady practices like injecting ads, referring affiliate traffic and more (more info can be found on the CSIRO research and FTC complaint against a free VPN).

9 Popular Free VPN Services That Can Sell Your Data

The following free VPNs can sell your data to 3rd parties (according to their privacy policy)

There are probably more as many free VPNs aren’t really upfront about how they make money. Below are the ones that admit selling or sharing your data (or aggregated data sets) to third parties:

1. Hola (Free VPN, 10+ Million Users)

“We may share “Anonymous” information with third parties…”
“We may share your email with our marketing partners…”
“You may be a peer for Luminati network…”

Hola VPN shares your data with 3rd parties
Image from: https://hola.org/legal/privacy

Unlike other free VPNs, Hola gives you unlimited data without displaying ads — no wonder 152 million people use their service. Unfortunately, like mom told you, if it sounds too good to be true, it most probably is.

A group of security researchers discovered multiple flaws in Hola and found that they aren’t as noble as they claim.

Besides the fact that Hola turns your computer into an exit node, they also sell access to your computer and network to third-parties through their commercial brand, Luminati. How do you opt out of this? There’s only one way: by subscribing to their premium subscription (proving once again that nothing good comes free).

It even gets worse: it was proven that Hola can be exploited to allow anybody to execute programs on the computers of its users.

In Hola’s defense, they were at least upfront in their privacy policy. They even made it clear that they may share your email with their marketing partners.

HOLA VPN sharing your info
Image from: https://hola.org/legal/privacy

They also make it clear in their TOS that by using Hola you become a peer on their paid Luminati network — in other words, access to your computer could be sold to people paying to use their services:

Hola VPN uses you as a peer
Image from: https://hola.org/legal/privacy

Here’s exactly how Hola makes money on you:

  • They share your email with their marketing partners.
  • They sell your traffic to users of their business arm, Luminati.
  • They can share your “anonymous” information with third parties.
  • They sell access to your computer and network – making it serve as an exit node through which other users (including people paying them) can access the Internet – although they didn’t indicate this on their website, it has been widely reported (since 2015) by reputable media publications.

2. Betternet (Free VPN, 38 Million Users)

Advertisers may also place cookies in your browser that may allow them to collect certain information about your browsing history…

Betternet adds advertisers cookies
Image from: https://www.betternet.co/privacy-policy

If you’ve done more than a few minutes of research about free VPNs, you’ve probably come across Betternet. This VPN service recently came out of nowhere to become one of the leading free VPN service providers. They now boast over 38 million users. They make it clear that they make money by offering free sponsored apps and by displaying video and other ads. They also allow advertisers to track and log information of users of their free VPN:

Worse, the CSIRO research paper on free VPN apps found that Betternet has the highest number of tracking libraries of all free VPN services (14 in total).

Here’s exactly how Betternet makes money on you:

  • By allowing advertisers to track and log your data – basically giving them carte blanche access to as much of your information as they need.
  • By allowing advertisers to include cookies in your browser.
  • By displaying ads, including sponsored apps, videos, and other types of ads.

3. Opera VPN (Free VPN)

“Our services include third-party technology or code that may use the collected data. We may share anonymized data and/or aggregated sets of data with our partners…”

OperaVPN shares your data with 3rd parties
Image from: https://www.opera.com/privacy

Opera’s free VPN is a free VPN service that comes embedded in the Opera browser: you install the browser and have access to the free VPN service.

On the surface, the “catch” of the free VPN seems to be simple: to drive adoption of Opera’s browser. We wish it were that simple!

Research shows that Opera’s free VPN actually engages in other practices to make money off their free VPN user. Their privacy policy makes it clear that they share your data with third-parties and allow third-party services to monitor your data.

Here’s exactly how Opera VPN makes money on you:

  • By sharing your data with third-parties and marketing partners.
  • By allowing advertisers and marketing partners to track your data.

4. HotSpot Shield (Free VPN, 500+ Million Users)

Can share your information with their “ad partners”

Hotspot shield data selling policy
Image from: https://www.hotspotshield.com/privacy/

With over 500 million users, Hotspot Shield is undoubtedly the most popular free VPN service.

When you have that many users, you have data that is a potential goldmine for advertisers… and Hotspot Shield is certainly not just being charitable by providing free VPN to hundreds of millions of people.

They make money off users in a lot of ways:

While Hotspot Shield makes it clear in its terms of service that it displays ads to users of its free VPN service, it is not very upfront about the fact that it makes money off users through other unscrupulous means.

Less than a year ago, The Center for Democracy and Technology issued a complaint to the FTC claiming that Hotspot Shield not only shares data of its free VPN users, but it also redirects their traffic to third-party affiliate sites.

Here’s how Hotspot Shield makes money on you:

  • May share your data with 3rd parties.
  • By redirecting your traffic to affiliate partners (FTC Complaint in 2017).
  • By displaying advertisements in front of apps and websites you use.
  • By setting you a data cap of 500Mb/day.

5. Psiphon (Free VPN, 1+ Million Users)

“We may use technology such as cookies and web beacons. Our advertising partners’ use of cookies enable them and their partners to serve ads based on your usage data…”

Psiphon data sharing policy
Image from: https://www.psiphon3.com/en/privacy.html

When it comes to the free VPN game, Psiphon is no newbie. They’ve been offering their free VPN service since 2008, which is a long time in the Internet age. However, they support their ability to offer this free VPN by sharing your data with advertisers and letting advertisers track your data usage.

While they generally defer to their advertising partners’ privacy policies, the policies of these partners show that they do use and share your data. With annual revenue estimated to be over $2.2 million, Psiphon sure seems to be making some money!

Here’s exactly how Psiphon makes money on you:

  • By sharing your data with their advertising partners.
  • By allowing their advertising partners to track your Internet usage.
  • By displaying ads to you.

6. Onavo Protect (Free VPN)

“We may share (or receive) information, including personally identifying information, with our Affiliates…”

Onavo Protect policy
Image from: https://www.onavo.com/privacy_policy/

Onavo Protect is a VPN service owned by Facebook. Facebook has been in the middle of several scandals relating to how they collect and use user data, so it won’t be surprising to find that Onavo has the same issue — they were recently in the news due to their data usage practices. Onavo makes it clear from the get-go that they do log user data and share this information with third-parties:

Here’s exactly how Onavo Protect makes money on you:

  • They share your information with affiliates and third-parties.
  • They use your information for several purposes including advertising and marketing purposes.
  • They display ads to you.

7. ZPN (Free VPN, 8+ Million Users)

 “May share, sell and rent your personal information with affiliated companies/people..”

How ZPN sells/shares your data
Image from: https://zpn.im/privacy-policy

With more than 8.2 million users, ZPN is certainly not a free VPN service you can ignore. The 10GB monthly data they offer is generous compared to what is offered by other VPN services.

According to them, they won’t share your data with “non-affiliated” companies unless under conditions including…

Read that again.

What about “affiliated” companies?

According to their Privacy Policy, they seem to do that…

Here’s exactly how ZPN makes money on you:

  • There’s a high possibility of sharing your data with their partners.
  • By limiting your monthly data to 10GB per month in order to get you to upgrade to a paid plan.
  • By limiting your bandwidth in order to get you to upgrade to a paid plan.
  • By disabling P2P (and torrenting) and limiting your access to five locations in order to get you to upgrade to a paid plan.

8. FinchVPN (Free VPN)

“We may share with third parties certain pieces of aggregated information…”

FinchVPN data sharing policy
Image from: https://www.finchvpn.com/privacy

FinchVPN seems more secure than most free VPN services. They have a generous 3GB monthly data and seem to take user privacy more seriously than most free VPN services. However, they limit the number of servers you can access in order to get you to upgrade.

They may also share data of user activity with third parties.

Here’s exactly how FinchVPN makes money on you:

  • They may share aggregate data of users with third-parties.
  • They limit your monthly data to 3GB and restrict the number of servers you can access in order to get you to upgrade to a paid plan.

9. TouchVPN (Free VPN)

“We may share your “anonymous” information with third parties, for additional purposes, including marketing…”

TouchVPN data sharing policy
Image from: https://www.northghost.com/privacy
touchvpn marketing

TouchVPN is another shady, free VPN that adds Cookies, Pixel Tags, and Web Beacons to your browser while you use their service.

Though they are some-what upfront about sharing your “anonymous” data with third parties for marketing purposes.

Sadly, they don’t elaborate much on “anonymous data”.

10. Private Pipe VPN (Free VPN)

“We may share “personal data” and “anonymized information” with affiliated and non-affiliated third parties…”

Private Pipe VPN promises “a simple, no nonsense, VPN” that offers completely free service, unlimited data, and malware protection without requiring its users to have any technical knowledge. However, in their privacy policy, they do not hide the fact that they make money by sharing/selling user data:

privatepipevpn privacy policy 1

Now, while they claim that personal identifiers are removed in data they share/sell, another part of their privacy policy indicates that they may share “personal data” with affiliates — whatever that means!:

Privatepipevpn priacy policy 2
Image from: https://www.privatepipevpn.com/privacy-policy-us.html

Here’s exactly how Private Pipe VPN makes money on you:

  • By selling/sharing your data with advertisers.
  • By displaying targeted ads when you browse websites using their app.

11. #VPN by Apalon (Free VPN)

“We may share “aggregated information”… with third parties, including advisors, advertisers, and investors…”

With over 5,000 ratings on the Apple store, #VPN is one of the more popular free VPN services available to Apple device users. It promises multiple virtual locations and unlimited data to enable you access websites and apps privately. However, besides the fact that ads and in-app purchases are offered to users of #VPN, they also make it clear that they may share your information with third-parties:

#VPN by Apalon privacy policy
Image from: https://www.apalon.com/vpn/privacy_policy.html

Now, while they claim they only share aggregate information, they collect so much more information that it’s worrisome. #VPN collects the following information:

  • your timestamp
  • device information
  • location data
  • service provider information
  • hardware device information
  • they may also collect your movement data.

That’s more than is necessary for a free VPN app!

Here’s exactly how #VPN makes money on you:

  • By sharing your information with advertisers and third-parties
  • By displaying ads to you
  • By offering in-app purchases to you

12. Tuxler (Free VPN)

“We also share “technical data” that we collect about your browsing habits and your device…”

“Here at Tuxler, your privacy is our business – not someone else’s,” Tuxler boldly states on its homepage. But really?

While Tuxler touts the fact that users of its free VPN service can choose from “millions of locations,” we had to dig deeper to see what the catch is. We didn’t have to dig too long. It’s right there on their privacy policy page: they share data about your browsing habits and your device with advertising companies in order to allow them target ads to you.

Tuxler privacy policy
Image from: https://tuxler.com/privacy-policy/

Here’s exactly how Tuxler makes money on you:

  • By sharing your data with advertisers and third-parties.
  • By displaying advertisements to you.

13. GO VPN (Free VPN)

“We also cooperate with a third party in various ways to utilize data collected, processed and handled…”

If you’ve tried looking for a free VPN app on the Google Play Store before, you’ve most likely come across the GO VPN app offered by the VPN Master team. Like almost every other free VPN, this app promises unlimited data with no registration or settings. All you need to do is “install and push the ON” button.

Unfortunately, our investigation revealed that there is something sinister going on: The high number of permissions required should be the first red flag. This app requires the following permissions:

  • Access to your device and app history
  • Access to read your phone status and identity
  • Access to read, modify and delete your phone media
  • Access to read your phone status and identity
  • Access to check your Google play license
  • Access to prevent your device from sleeping

We believe that’s too much access for a VPN app, but some extra digging makes clear why: The GO VPN app is offered by Talking Data, a Chinese big data company that sells data and information to willing buyers, and their privacy policy makes it clear that when you use their apps you are giving them permission to share/sell your data to their partners, and that they will use your information to build their data database:

Talking Data privacy policy
Image from: https://www.talkingdata.com/privacy.jsp

Here’s exactly how GO VPN makes money on you:

  • By selling/sharing your data with third parties for marketing purposes.
  • By displaying advertisements to you when you use their free VPN.

14. Hexatech (Free VPN)

Hexatech promises 100 percent free unlimited VPN access to users — and with over 1 million installs there must be a catch!

Hexatech was created by Betternet, one of the major data abusers on our list. Don’t let the fancy name deceive you, though! Hexatech is governed by the same principles and privacy policies as Betternet, and the same rules apply: they allow advertisers to track and log your data and do with it whatever they please.

Here’s exactly how Hexatech makes money on you:

  • By allowing their advertisers to track and log your data — and to use your information however they deem fit.
  • By displaying ads — including sponsored apps, videos, and other types of ads.

We Don’t Recommend Using FREE VPNs

Besides the obvious, using you as a product, free VPNs often go an extra mile to get more money from you.

Despite advertising themselves as “free VPNs”, they often set a very low data cap (bandwidth) so you can only use their service a few hours a month. Common data caps are 250mb/day, 500mb/mo, 2GB/mo and 10GB/mo.

Many free VPNs like TurboVPN and Betternet also include additional ads in your browsing activity.

Last, but not least, the vast majority of free VPN servers are overwhelmed with other folks who make your browsing (or streaming) activity extremely slow.

Free VPNs also tend to leak your DNS and keep your log files.

In a nutshell, if you want to stay secure and safe, free VPNs aren’t the best option. You’d be better off relying on your ISP instead of a sketchy, money-hungry VPN provider.

19 Steps to Protect Your Online Privacy in 2022

Rob Mardisalu

Rob Mardisalu

This article was put together with the help of Dana Jackson (PrivacyHub).

privacy and security

Online privacy is a topic that grows in importance every single year.

With more and more web services, connected apps, and even home assistant devices that are gaining in popularity, it’s now more crucial than ever to understand what the dangers to your online privacy are and how to protect it consciously.

Here are 19 actionable steps to help you remain anonymous on the web and protect your online privacy. No sophisticated computer knowledge required.

Steps to protect your online privacy:

1. Consider getting a VPN

Normally, your connection to the web is unprotected by anything. It’s just your computer requesting a website (or a service, or a tweet, etc.) and then the server providing that website to you.

What’s problematic from an online privacy point of view here is that such a connection is public, can be intercepted, and every server helping on with the connection along the way can take a peek into what’s being transmitted. If it’s a sensitive email (or anything to that nature) then you really don’t want that.

This is where a VPN comes into play. VPN (or Virtual Private Network) is a service that allows you to connect to the web safely by routing your connection through a VPN server before it gets to its destination.

Here’s a quick visualization of what your connection looks like without and then with a VPN enabled:

what a VPN does for your online privacy

What a VPN actually does is encrypting the connection so that even if someone intercepts it, the information within will be scrambled and unreadable. In fact, no intercepting party will be able to determine where the connection is coming from or what it is about, thus giving you improved online privacy.

Even though the concept might seem complicated and intimidating at first, modern VPNs are actually very easy to use and don’t require any technical skills like server configuration or routing. All you need to do is literally install your VPN of choice and enable it with a single click.

We have a comparison of the best VPNs on the market right here. Many of the top VPN solutions also offer versions for mobile devices.

Be careful with free VPNs

VPN services are great. That’s more than true. However, not universally across the board.

As someone once said, “if you’re not paying for the product, then you’re the product”. And this is even more concerning considering that we’re dealing with the topic of online privacy. At the end of the day, no one wants to have their data compromised or sold to a third party purely because they failed to read the fine-print when signing up for a seemingly great free VPN service.

2. Use the privacy/incognito mode

All current versions of web browsers like Chrome, Firefox, Opera come with a privacy mode.

For example, in Chrome, if you press CMD+SHIFT+N (Mac) or CTRL+SHIFT+N (Win), you will open a new tab in privacy mode. In that mode, the browser doesn’t store any data at all from the current session. This means no web history, no web cache, no cookies, nothing at all.

incognito mode

Use this mode whenever doing anything that you’d prefer remain private and not able to be retrieved at a later date on the device that you’re using.

However! Let’s make it clear that privacy modes don’t make the connection more secure in any way. They just make it private in relation to your own device – meaning, they make it private on your end only.

(Privacy modes are also available in mobile browsers.)

3. Block web activity trackers

The main online privacy concern with the modern web is that you’re basically being tracked everywhere you go.

And this is not only about ads. Basically, every website that you visit will attempt to track your activity in multiple different manners. Just to name a few:

  • Traffic analytics – used commonly by most websites to get a better understanding of their audience, where they’re from, what devices they’re using, how much time they’re spending on the website, what sub-pages they’re interacting with, and so on.
  • Current location – commonly used by functional widgets like weather widgets, “near events”, and so on. But also used for general tracking and data analysis.
  • Social media – used to show you people’s activity in relation to the page or article that you’re reading. A specific example of this is the Facebook pixel:
  • Facebook pixel – those are meant to connect your activity with your Facebook profile, thus giving Facebook a better understanding of what your behavior is and what to show in your news feed (including which ads you’re most likely to enjoy).
  • Media trackers – for example, if there’s a YouTube video on the page, that video block is connected to your other YouTube activity, thus having an impact on what kind of videos YouTube is likely to recommend you next.

All of those trackers can make websites slower and generally less safe to use.

One of the viable solutions is to use a tool like Ghostery. It’s free and has versions for all major web browsers. The installation is simple, and it basically starts working right out the box.

Ghostery settings

4. Use ad blockers

Various sources (e.g. 1, 2) indicate that Google serves around 29 billion ads every single day.

But that’s only Google. What about Facebook? What about all the in-house ad inventory handled by webmasters themselves, without any ad network in between? It’s not unreasonable to estimate that the total number might grow to even 60 billion.

In simple terms, ads are everywhere. But their sole existence isn’t problematic from an online privacy point of view.

What is problematic is that ads are not “closed black boxes”. It’s quite the opposite – they take in a lot of data, “listening” to what you’re doing and taking note of every click and every action you take. That data can then be used to follow you on the web and serve you even more targeted ads the next time around.

All of the above is common market practice. It’s not illegal to do any of it. In fact, all those tracking algorithms are considered clever for how effective they are.

But then there’s also the other side of the coin. Some ads go even further and try to infect your computer with malware, trick you into installing unsafe software, or try getting accidental clicks by hiding the fact that they are ads in the first place (impersonating the design of the site they’re on).

The best solution to not get affected by any of this is to simply block ads altogether. The easiest way to do that is by installing an ad blocker extension in your browser. Such an extension will block out any ad and prevent it from displaying. Ad blockers usually work right out the box with no configuration needed.

5. Use Signal or Telegram for messaging

Not all online communication is equally secured or protects your online privacy enough.

For example, email in itself isn’t the most private form of communication due to all the connection layers and different servers that participate in order to get the email to its destination.

Using solutions like Facebook Messenger or direct messages on Twitter raises whole other privacy concerns related to those corporations’ agendas and ways of handling user data. It wasn’t that long ago when we heard about 32 million Twitter passwords potentially getting hacked and leaked, for instance.

A much better solution is to use other tools for casual communication and even sensitive conversations. Tools like Signal and Telegram, even though seeming like something that your younger cousin might use, are, in fact, top-of-the-line when it comes to making sure that whatever’s been said via the tool’s communication lines remains private.

Both Signal and Telegram employ end-to-end encryption. They even come with multiple mobile and desktop apps.

More than that, both apps also now enable voice calls, which presents a much safer and more private alternative to classic phone calls.

6. Don’t input sensitive personal data on non-HTTPs websites

In simple terms, HTTPS is the secure version of HTTP – the standard protocol that’s used to send data between your web browser and the website you’re reading.

Checking whether you’re connected to a website via HTTPS is very simple. All you need to do is take a look at your browser’s address bar and notice if the address starts with https:// plus if there’s a green padlock icon next to it. Like so:

paypal (https secure)

The important thing to remember here is to never enter any sensitive information on websites that don’t have HTTPS enabled. This includes things like your credit card information, social security numbers, address information, or anything else that you don’t want to have compromised.

Unfortunately, there isn’t “a fix” that you can do if a given website doesn’t have HTTPS. You simply have to avoid websites like that.

7. Clear your cookies regularly

Cookies are a popular term on the web, but very few people realize what they actually are. Technically speaking, cookies are quite simple. They’re just small text files that are kept on your computer (and your mobile devices as well). They store small packets of information related to your personal activity in connection with a given website.

The most classic use of a cookie is to keep you logged in to a certain website and not force you to re-enter your credentials every time you come back. But cookies can go much further than that.

These days, they’re also commonly used to store your shopping cart items (in case you decide to abandon your cart but then come back to the site later on and continue shopping), or to keep track of the content that you read previously on the site (thus helping with future content suggestions). These are just two of tens of possibilities.

Cookies are perhaps impossible to avoid entirely. If you disable them altogether, you’re effectively making it nearly impossible for yourself to use sites like Facebook, Twitter, most e-commerce stores, or other services where login is required.

What you can do, though, is at least clear your cookies occasionally. This can help keep your browser clean and also not let some websites take advantage of older cookies that they set up maybe even months ago, thus making it more difficult to track your online habits.

8. Only use secure email

As we said above when discussing online messengers (in #6), email is not the most secure form of communication online. On the other hand, it’s hard to imagine our life without email entirely, so, in some situations, we just need to bite the bullet and use email anyway.

However, there are still things that we can do to make it more secure.

First off, you can say goodbye to free email solutions like Gmail or Outlook.com, and instead opt for a premium one. One of the viable alternatives in that realm is the secure email service Tutanota that comes with a fully encrypted mailbox.

Other than that, you can attempt to add another layer of encryption on top of your existing free email inbox. For instance, if you use Gmail, you can get this Chrome extensions, which will enable end-to-end encryption on your messages as well as attachments. This sort of encryption makes sure that your conversation remains private.

Read more about anonymous email.

9. Review the permissions given to your mobile apps

Each app that you have on your iPhone, iPad, or Android device requires a certain set of permissions to deliver its functionality. Sometimes, though, certain apps become too demanding in this department, requesting access to more than seems necessary to make the app operational.

If you ever caught yourself wondering, “Why does a recipe app need access to my location all the time?” then you know what we’re talking about.

What you should do from time to time is go through your currently installed apps and review the permissions given to them. Most of the time, you can revoke part of those permissions without making the app useless (like the recipe app example).

On iPhone, you can do that by going to Settings, scrolling to the bottom, and then going through each app one by one.

app permissions

 

10. Update to a newer mobile device

It seems that every year companies like Apple, Samsung, Google try to convince us to buy the latest smartphone and toss our old ones away. Naturally, we resist. But we can’t resist forever. At least not if we don’t want our online privacy to take a hit.

What we need to remember is that modern mobile devices are computers. Just like your desktop PC or Mac, but only slightly less powerful. Therefore, they’re also prone to various security threats, and just like any other device, they require constant updates to stay secure.

New devices are being updated constantly, so that’s no problem. Older ones, not so much.

For example, Nexus 7 – a device that’s still relatively popular (you can buy them on eBay right now) – stopped getting security patches after June 2015. This means that whoever’s using it has been left on their own and exposed to new security threats for more than two years now.

Whether we like it or not, at some point, a new device is unavoidable.

11. Shred your files

Although sounds surprising, getting rid of a specific file once and for all isn’t that easy. Simply moving it to the bin and then emptying it won’t do. Any file removed through this standard operation is easily recoverable in full.

This is due to how the process of deleting anything actually works. In its most basic state, your operating system will just make a note that the space where your file used to be “is now free” with no actual deleting taking place. Therefore, if someone knows where to look, they can still access that file easily.

A safer solution is to take advantage of a “file shredding” tool. Those will allow you to remove sensitive, private files from your hard drive by overwriting them several times with random sets of data and in random patterns.

File shredder by Dr. Cleaner

12. Be careful with social media

The ideal case from an online privacy point of view would be to delete your Facebook account entirely, but that’s probably out of the question for most people. So, instead, at least be careful about what sort of data you share with your favorite social platform.

For once, don’t share your location with Facebook all the time and with every update you post. There have been multiple cases of people’s homes robbed after they posted updates about them being on vacation. For instance, three robbers in New Hampshire got away with $200,000 worth of stolen goods after breaking into 50 homes, all made possible by checking Facebook statuses of their victims beforehand.

A good rule of thumb is to not post any information that you’d consider sensitive from an online privacy point of view. Assume that the whole world is going to see your next status update.

13. Access the web via TOR

Tor has been getting a lot of bad reputation over the years, not always for all the right reasons. Tor, as a technology, is a very clever mechanism that allows you to remain completely anonymous while browsing the web.

Tor (short for “The Onion Router”) routes your web connection through a number of nodes before it gets to its destination. Because of that, no one is able to track it or view what’s being transmitted. In some aspects, Tor is similar to VPN. The main difference between the two is that VPN connects you through one additional server, while Tor uses multiple ones.

Getting started with Tor is simple – all you need is the official Tor web browser. There are versions available for all major systems. After getting it installed and fired up, you can establish a connection with the Tor network via a single click. At that stage, your connection is secure and anonymous. Here’s what the browser looks like:

TOR browser

14. Don’t use Windows 10 if you can

Windows 10 is notorious for its “loose” approach towards online privacy. On its default setup, the system is set to share all of your personal information (including your activity) with Microsoft and even third parties. It also synchronizes all your browsing history and other settings back to Microsoft servers.

On top of that, Cortana – the system’s assistant – records all your keystrokes and listens to all your activity.

If that’s not enough, Microsoft is also making it surprisingly difficult to set things the way they should be. Basically, every consecutive update of the system tends to bring back the factory settings, thus forcing you do carry through with your fixes once again.

At the end of the day, if it’s a viable option for you, say goodbye to Windows 10 entirely.

15. Consider not using Google

This goes not only for the main Google search engine but also all of the other tools – Google Analytics, Gmail, Google Apps, Google Drive, etc.

Due to its huge network and portfolio of tools, Google knows basically everything about you there is to know. Whether you’re comfortable with this from an online privacy point of view is up to you.

When it comes to the main search engine, DuckDuckGo is an alternative worth considering, or even Bing (but then we’re back in camp Microsoft).

As for things like Gmail and Google Drive, there are multiple viable solutions on the web. For example, SpiderOak is an interesting alternative to Google Drive and Dropbox that even has Edward Snowden’s approval.

16. Probably delete Facebook from your phone

There have been multiple stories appearing lately describing Facebook’s alleged “in the background listening” practices. Some people are reporting concerns related to the Facebook app listening on to the conversations they’re having over the phone and then suggesting ads based on the things mentioned in those conversations.

In all likelihood, or at least we’d like to believe so, this is not entirely plausible – and Facebook obviously denies. However, getting rid of the Facebook app from your phone surely won’t hurt your overall online privacy.

17. Do you really need that Amazon Echo?

As useful as those new home assistants can be, they also carry some serious online privacy concerns with them. Most of all, they’re in an “always on, always listening” state.

What this means is that Alexa is constantly listening to everything – everything(!) – you say around the house, and transmitting it over the internet to Amazon’s servers.

Ultimately, you have no control over how that data is going to be used and by whom. Though, full disclosure, Amazon says they don’t share your Amazon Echo data with third parties.

Google Home, however, is perhaps even more hostile to your privacy. Apart from microphone access (always listening) it also tracks your location and can share your data for advertising purposes with third parties (including Google’s other companies).

18. Use virtual machines

Virtual machines let you simulate a second computer (a virtual one) within an application. It’s basically a sandbox. The virtual machine can be limited in any way you need it to be, for instance, with the web connection disabled, or any other part of the system removed.

Virtual machines are great if you want to do a sensitive task on your computer that doesn’t necessarily involve a web connection. Or, even more so, when you want to make sure that the web connection is unavailable and that your actions are not logged for any future transmission to a third party.

In other words, if you want to open a file and you need to be sure that no one is watching over your shoulder as you do so, you can do that via a virtual machine. Then, after you’re done, you can delete that virtual machine and thus remove every trace of the operation.

Try out VirtualBox, a popular free solution that runs on Windows, Linux, and Mac.

19. Avoid public Wi-Fi

As much as everyone loves those free Starbucks Wi-Fi hotspots, you should perhaps be careful around them. Or, rather, not perhaps, but definitely.

Public Wi-Fi raises a number of online privacy concerns:

  • You never know who’s running the hotspot, what the software is, what the setup is, what sort of information is being logged, and so on.
  • You don’t have any certainty if the hotspot you’re using isn’t an “evil twin” – a hotspot created to impersonate the genuine Wi-Fi network that you actually intended to use. For example, let’s say that you see an open network called, “Starbucks Free Internet”, so you decide to connect. However, you have no way of telling if that network is actually the official one run by the coffee shop. Essentially, anyone with a mobile router can create a network like that and then steal the information of anyone who connects to it. Listen to the first episode of Hackable – a podcast by McAfee to learn more about this (available on iTunes).
  • You can’t be sure that using a VPN will protect you. In most cases, VPNs solve the problem, but if you’re dealing with a fake network then the person running it might still be able to see what’s going on. Additionally, there’s the issue of DNS leaks. In simple terms, your laptop can still be using its default DNS settings to connect to the web, rather than the VPN’s safe servers. Here’s more on the topic.

What can you do?

  1. Really avoid public Wi-Fi networks if you want to perform any sort of sensitive operation. Don’t access your online banking platforms or anything else where your privacy is of utmost importance.
  2. If you do use public Wi-Fi, also use a VPN. Do the DNS leak test available here to make sure that the connection is secure.
  3. Always ask what’s the exact name of the public network that you want to connect with – to avoid connecting to an evil twin.

 

Conclusion: Protecting Your Online Privacy is Simple

Online privacy is a topic that has been gaining in importance more and more over the last couple of years.

Apart from those basic, common-sense things that every web user should be doing in terms of their online privacy, there are also matters of new regulations and problematic net neutrality issues that have appeared quite recently.

These days, it seems that you can’t easily escape big corporations tracking you online, your ISP (internet service provider) recording your online activity and perhaps even selling the data to third parties (which is legal in the US).

All in all, this can be frightening. However, there still are viable things you can do and tools you can use to keep and protect your online privacy. We hope that the list above gave you a good overview of what’s possible and how easy to carry out most of those actions are. But you do need to be deliberate, and also review your online privacy optimizations every once in a while.

More helpful online privacy tools can be found here: PrivacyTools.io

Online Privacy Infographic

Best VPN Protocols: OpenVPN vs PPTP vs L2TP vs Others

Rob Mardisalu

Rob Mardisalu

I wrote this article to help you understand the difference between VPN tunneling protocols, such as OpenVPN, IKEv2, PPTP, and others.

Best VPN ProtocolsA VPN will help to protect your privacy and secure your data whenever you’re using the internet. But, beyond choosing the best VPN, you’ll also need to choose the best VPN protocol for your needs.

The VPN protocol is how your VPN will secure the transferring of data. There’s a multitude of different protocols that are based on the operating system, platform, performance, and lot more.

Below we explore the most popular VPN protocols, so you can decide which one is best for you.

Here’s a quick breakdown of the seven biggest VPN protocols today:

OpenVPN PPTP L2TP/IPsec SoftEther WireGuard SSTP IKEv2/IPSec
Encryption 160-bit, 256-bit 128-bit 256-bit 256-bit ChaCha20 256-bit 256-bit
Security Very high Weak High security (might be weakened by NSA) High High High High
Speed Fast Speedy, due to low encryption Medium, due to double encapsulation Very fast Fast Fast Very fast
Stability Very stable Very stable Stable Very stable Not yet stable Very stable Very stable
Compatibility Strong desktop support, but mobile could be improved. Requires third-party software. Strong Windows desktop support. Multiple device and platform support. Multiple desktop and mobile OS support. No native operating system support. Linux, being built for other platforms and operating systems. Windows-platform, but works on other Linux distributions. Limited platform support beyond Windows and Blackberry
Final Word Most recommended choice. Fast and secure. Native on Windows. Weak security. Useful for geo-restricted content. Versatile and secure. A decent alternative to OpenVPN. Up and coming. Flexible, fast, and secure. A great alternative to OpenVPN. Has promise to be fast and efficient. Still in development. Faster and more secure alternative to PPTP and L2TP. Secure, stable, and mobile-oriented.

1. OpenVPN – Recommended, Most Popular

OpenVPN is the VPN protocol you’ll want to be using. It’s the most recommended choice by leading VPN providers today. Kind of a no-brainer. It’s one of the newer VPN protocols, but it’s flexibility and security have made it one of the most commonly used.

The following VPNs use OpenVPN as a default protocol:

It relies upon open source technologies like the OpenSSL encryption library and SSL V3/TLS V1 protocols. The open source nature of OpenVPN means the technology is maintained, updated, and inspected by a community of supporters.

When traffic passes through an OpenVPN connection it’s hard to differentiate between an HTTPS over SSL connection. The ability to hide in plain sight makes it less vulnerable to hacking, and more difficult to block.

Plus, it can run on any port, using both UDP and TCP protocols, so getting around firewalls won’t be a problem. However, if you’re looking for speed, then using the UDP port will be the most efficient.

In terms of security, it has a variety of methods and protocols like OpenSLL and HMAC authentication and shared keys. To take the security standards even further it’s commonly coupled with AES encryption. Other VPN protocols have been subject to NSA and other hacking, but so far, OpenVPN has managed to stay in the clear.

The additional cryptic algorithms it supports are:

  • 3DES
  • AES
  • Camellia
  • Blowfish
  • CAST-128

It’s recommended to use AES encryption if security is your main concern. This is essentially the “gold standard”, and currently has no known weaknesses. It’s 128-bit block size also gives it solid capabilities to handle larger files, without a reduction in performance.

Still, OpenVPN isn’t perfect:

You’ll still need to install a third-party application to use this type of connection. It still isn’t supported by any platforms, but most third party software providers, like Android and iOS, are supported.

Setting up OpenVPN on your own can be a bit tricky. Especially, when compared to PPTP or L2TP. However, most VPN clients are able to offer a customized setup, which gets you around any configuration difficulties.

If you do want to set up OpenVPN yourself, the high level of configuration can be disadvantageous as you’ll be less secure if it’s set up the wrong way.

Plus, you can even use OpenVPN to connect over the mobile Apple iOS. Say hello to an encrypted and private mobile connection.

The Pros of OpenVPN:

  • The protocol can bypass most firewalls
  • It’s open source and vetted by third-parties
  • It has a very high level of security
  • It works with multiple methods of encryption
  • It can be configured and customized to your liking
  • It can bypass firewalls
  • It supports a variety of cryptic algorithms

The Cons of OpenVPN:

  • The setup process can be technical
  • It relies upon third-party software to operate
  • Desktop support and functionality are strong, but mobile is lacking

2. PPTP

Think about the security standards of the web back in 1995. Did those even exist? Well, that’s when PPTP became a VPN protocol. It was developed by a consortium founded by Microsoft and was the standard for VPN connections back in the dial-up days.

PPTP, also known as point-to-point tunneling protocol, is over 20 years old by now. Even being that old, it’s still the standard for internal business VPNs. It’s a popular choice since it’s already installed on most devices and platforms, is easy to setup, it’s efficient, and no additional software is needed. To establish a secure connection all you need is a username, password, and server address.

For example, office buildings with older infrastructure, who need to internally secure data could use this connection. Or users who are running an older Windows operating system. If it’s all you have, it’s better than nothing.

When it was first released with Windows 95 there were a number of security weaknesses that were exploited. Today it’s upgraded it’s encryption protocols to 128-bit key encryption, which isn’t awful, but if security is a concern you could do better. Even Microsoft recommends that users looking for higher security standards should use SSTP or L2TP.

Still, this low level of encryption does help to make it one of the fastest VPN protocols.

It’s also been known to be easily decrypted and hacked by the NSA and other intelligence agencies. This decryption also took place at the time when security experts considered PPTP secure.

PPTP is usually only used today due to its high performance and stability. Think accessing geo-restricted content, or getting access to Netflix. Overall, it’s an old and outdated VPN protocol, but still serves a small purpose for users who aren’t concerned with security.

The Pros of PPTP:

  • It’s very fast
  • It’s already built into most platforms
  • It’s easy to configure and setup

The Cons of PPTP:

  • It has security holes (one of the least secure VPN protocols)
  • It’s been compromised by the NSA
  • It can be blocked by firewalls

3. L2TP/IPsec

L2TP is a VPN protocol that doesn’t offer any encryption or protection from the traffic that passes through the connection. For this reason, it’s usually paired with IPSec, which is an encryption protocol.

It’s an extension of the PPTP protocol and utilizes a process called double encapsulation (which led to its initial rise in popularity). The first encapsulation establishes a PPP connection, while the second contains IPSec encryption.

It does have support for AES-256 encryption algorithms, which are some of the most secure. But, the stronger encryption protocols you use the slower your performance will be.

This protocol is built into most desktop and mobile operating systems, which makes it easier to implement. But, it can only use UDP port 500 for a connection, which makes it pretty easy to block by NAT firewalls. So, additional configuration is needed if this is going to be used behind a firewall.

It does have an advantage in that this style of connection prevents the data from being accessed between the sender and receiver. So, this can help to prevent any middle-man hacking attempts.

IPSec encryption is secure. Yet, both Edward Snowden and John Gilmore, a founding member of the EFF, suggest that the protocol has been deliberately weakened by the NSA.

It’s a slower connection because traffic must first be converted into the L2TP form, and you have an additional layer of encryption on top of that. It’s not as an efficient solution as OpenVPN, but it is easy to set up.

The Pros of L2TP/IPsec:

  • It’s available on nearly all devices and operating systems
  • The setup process is easy
  • It has high (yet weakened) levels of security
  • It does support multithreading for improved performance

The Cons of L2TP/IPsec:

  • It can be blocked by firewalls
  • The NSA might have weakened the protocol, making it less secure
  • It doesn’t have the fastest speeds, due to double encapsulation

4. SoftEther

SoftEther is an open-source multi-protocol VPN software. What began as an academic project at the University of Tsukuba has grown into a VPN technology that’s used by millions of people worldwide.

The biggest reason for its widespread growth is that it’s free, and it works across the Windows, Mac, Linux, Android, FreeBSD, and Solaris operating systems. Not only that it supports multiple different protocols, like OpenVPN, EtherIP, SSTP, L2TP/IPSec, and a lot more.

Basically, you can set it up to run on your operating system of choice and use whichever VPN protocol you desire. This unparalleled flexibility and support across multiple platforms have led to its insane growth.

It utilizes 256-bit AES encryption, which is one of the most secure forms of encryption available.

With SoftEther you get a flexible and fast VPN, that utilizes the latest encryption protocols. It’s newer, so it doesn’t have the same legacy as OpenVPN, but it’s an up and coming alternative. It offers you a nice blend of performance and security.

The Pros of SoftEther:

  • It supports a multitude of desktop and mobile operating systems
  • It’s entirely open source
  • It can bypass most firewalls
  • It’s fast but doesn’t compromise on security

The Cons of SoftEther:

  • It’s relatively new
  • It doesn’t have native operating system support
  • A lot of existing VPNs don’t offer it, yet

5. WireGuard

WireGuard is an innovative and cutting-edge VPN protocol that’s been developed to optimize performance. The implementation is small, making it a much more lightweight project in terms of the code base. By having a simpler codebase it’s easier for developers to integrate.

The goal of the project is to create an alternative to IPSec, that’s lighter, faster, and leaner. It was originally released on the Linux platform, but it’s on its way towards cross-platform compatibility and can be deployed across a variety of different distributions.

WireGuard shines in its simplicity.

It only supports a single cryptographic suite, which keeps the design simple and leads to fewer security holes. The algorithm choice is also incredibly simple, which helps to reduce any security bugs, now and in the future.

However, keep in mind that WireGuard is not yet complete. It’s still a work in progress and the team is working towards a stable release.

Early signs point towards it being a widely used, fast and efficient VPN protocol in the future. If you want to deploy it keep in mind there may be some security vulnerabilities, and it won’t be as secure as other stable VPN protocols highlighted in this list.

The Pros of WireGuard:

  • It’s simple and lightweight
  • It’s fast and secure
  • It takes a minimalist approach to a VPN protocol
  • It has potential to become the VPN of the future

The Cons of WireGuard:

  • It doesn’t have a stable release
  • Only technical Linux users can effectively implement
  • It’s not as flexible as other VPN protocols

6. SSTP

SSTP was developed by Microsoft and introduced with the Windows Vista release. It is still considered Windows-only even though there is support for other operating systems. Since it’s integrated into Windows it is a very stable VPN protocol.

There is support for other systems, like Linux, SEIL, and RouterOS, but the adoption isn’t as widespread.

It’s typically configured with AES encryption, so it’s incredibly secure and a much better option than the PPTP protocol. It also uses the SSL v3 connection (similar to OpenVPN), which will help to prevent any NAT firewall issues and blocking.

The SSTP protocol uses a similar authentication method to an SSL/TLS connection. In order for any data or traffic to be transmitted both ends of the connection must be authenticated with a secret key. This helps to create an incredibly secure connection.

However, SSTP is still owned and maintained entirely by Microsoft. Although no security holes have been reported, they do have a history of cooperating with the NSA. So, it hasn’t been proven, but there is speculation that there may be backdoors built in.

Overall, it offers a similar connection as OpenVPN but is more oriented towards Windows. It has better security than the L2TP connection and is all around better than PPTP.

The Pros of SSTP:

  • It can bypass most firewalls
  • It has a high level of security
  • Integrated into the Windows platform with Microsoft support
  • It supports a wide range of cryptic algorithms
  • It’s easy to use

The Cons of SSTP:

  • It’s entirely owned and maintained by the Microsoft Corporation
  • It only works well on Windows platforms
  • It hasn’t been audited by an independent third-party

7. IKEv2/IPSec

IKEv2 is based upon IPSec and was created as a joint project between Microsoft and Cisco. Although it’s not technically a VPN protocol, it behaves like one and helps to control IPSec key exchange.

It currently comes installed on any generation of Windows, starting with Windows 7. Plus, there is an existing implementation for Linux, Blackberry devices, and other platforms. If you’re a Blackberry user, it’s one of the few supported VPNs.

If you want a consistent VPN connection, even while switching networks, then this protocol can be very useful.

It’ll make sure you keep a VPN connection, even if your internet or connection drops. Plus, it’s stable, secure, and has high performance.

The core focus is for mobile users who demand a secure and private connection. Since it offers support for MOBIKE, it’s very resistant to any network changes. So, as you switch from a wifi connection to a data connection the VPN connection will remain throughout.

It’s not widely supported but does offer better security levels than L2TP, as well as improved speeds and stability.

The Pros of IKEv2/IPSec:

  • It’s very secure and supports a wide range of encryption protocols
  • It’s very stable, even when the network connection is lost
  • It’s easy to setup
  • One of the fastest VPN protocols

The Cons of IKEv2/IPSec:

  • Its support for platforms is limited
  • It has the same drawbacks as IPSec
  • It can be blocked by firewalls

How Do The Different VPN Protocols Stack Up?

how do different vpon protocols stack up

All the VPN protocols above have various strengths and weaknesses. Some are more widely used, while others serve more specific niches and problems.

Here’s a quick breakdown of how each VPN protocol stands out:

OpenVPN is the most often recommended, and widely used VPN protocol. It’s fast, secure, and open source, so it can be vetted and improved by third-parties. The only real downside is the difficulty in setup and configuration. Failing to set it up the right way could lead to security holes and lackluster performance.

PPTP is already installed on most older Windows operating systems, making it an attractive option. But, it’s generally very insecure and should be avoided, if privacy is a concern. It stands out with its compatibility, ease of setup, and speed. It can work for accessing geo-restricted content, but if you’re doing anything else, you should at the very least opt for L2TP/IPSec.

L2TP/IPSec is a solid VPN choice if you’re not exchanging sensitive data. It’s basically an improved version of PPTP. Some older devices and platforms won’t support OpenVPN, so this could be an attractive option. The only real downside is it’s security standards, which have been weakened and compromised by the NSA.

SoftEther is a newer VPN protocol, but don’t let its youth fool you. It offers similar features to OpenVPN but offers even greater levels of flexibility. With the ability to integrate across multiple different platforms and operating systems it’ll be hard to find a setup where this protocol can’t be used. Plus, it’s fast and secure. It doesn’t have the legacy and stability of OpenVPN but is a contender in its own right.

WireGuard is an up and coming VPN protocol. The current release is best suited for technical Linux users, but support for other platforms and operating systems is in the works. It shines in its lean nature, speed, and security. By having less moving parts and selection it’s easier to maintain and catch any security issues. It’s currently working towards a stable release, so it’s not recommended for non-technical users, but the future of this VPN protocol is bright.

SSTP is a solid choice for Windows users. It offers you similar security and speed as OpenVPN, but there is one big downside. Since it’s created by Microsoft there is no vetting by any outside third-parties. This means there could be backdoors built into the code, which compromises the overall security. Other platforms and operating systems can implement SSTP, but it’s poorly supported.

IKEv2/IPSec is a solid fast and secure VPN protocol. It stands out in its ability to maintain a secure VPN connection, even while the connection is lost, or you’re switching networks. Its primary use is for mobile networks. Also, if you’re a Blackberry user then this VPN protocol will be your protocol of choice.

Which VPN Protocol to Use?

which vpn protocol to use

By now your head is probably spinning trying to decide which VPN protocol to use.

Overall, it depends on your needs, and why you’re using a VPN. But, to keep things simple—you can’t go wrong when using OpenVPN.

Still not sure?

Here’s a breakdown that’ll help you choose the best VPN protocol:

  • OpenVPN is fast, flexible, and secure. No matter your operating system or platform, you’re covered.
  • PPTP should almost never be used. It’s easy to setup and fast, but it’s incredibly insecure.
  • L2TP/IPSec is a step up from PPTP, but it’s also one of the slowest connections, and its security is questionable.
  • SSTP is pretty good for Windows users. It’s fast and easy to setup, but once again you don’t know how secure and private your connection is.
  • IKEv2/IPSec is a pretty good choice for mobile users and a must-have for Blackberry users. But, beyond that go with OpenVPN.
  • SoftEther is good OpenVPN contender. If you’re willing to use a newer VPN protocol, instead of the legacy of OpenVPN, then this a great second choice.
  • WireGuard should really only be used by technical Linux users. Once the release is stable it may gain more traction, but general VPN users should wait it out.

Hopefully, you have more clarity on choosing the right VPN protocol for your needs. Currently, OpenVPN still reigns supreme as the best VPN protocol. But, with up and coming protocols like SoftEther, it’s hard to say how long it’ll be number one.

Still, have questions about which VPN protocol is right for you? Please share your comments, concerns, and questions in the comments below.

Vulnerability Alerts

TheBestVPN.com

TheBestVPN.com

TheBestVPN.com is an independent reviewer of VPN services.

As we begin the new decade, you should be mindful that your online activity is being monitored. While federal agencies may claim to do it to protect Americans, big-name companies like Google, Apple, and Facebook financially benefit from putting consumer data out on the auction block. 

What you do online is also susceptible to attackers who aim to hack into your applications, social media accounts, and, in some cases, seek to collect financial information. All of us are vulnerable when we connect to the internet, but some technology products are more prone to invasion. 

To examine technical vulnerabilities of various vendors and products, we used recent data from the National Institute of Standards and Technology’s National Vulnerability Database, which updates frequently. Our findings outline the type of vulnerabilities that users should be privy to and indicate the severity of attacks. 

Vulnerabilities Over Time

Consumer data, which should be kept private, might be more lucrative than oil – federal law allows internet service providers (ISPs) to profit from your data. However, your online activity is also susceptible to exploitation from attackers who seek “to gain unauthorized access or misuse your network and its resources.” 

Only 894 technical vulnerabilities were reported in 1999; 20 years later, that figure had increased nearly 14 times to 12,174. However, 2018 showed the highest number of vulnerabilities: 16,556. According to the National Vulnerability Database, Debian GNU/Linux, an open-source repository, was listed as experiencing 1,197 vulnerabilities in 2018. Due to the nature of open-source software, it’s licensed so that users are free to use, copy, study, and alter source cord within their own forked repositories.

Although such large numbers might be alarming, technical vulnerabilities are detected, on average, in 197 days and contained in 69, but a recent two-year iOS breach affecting thousands of iPhones terrified experts. Still, Android had the most vulnerabilities reported in 2016, 2017, and 2019, while iOS didn’t make the list at all.

Access Granted

There are various types of vulnerabilities: Some grant attackers the ability to access private information, while others enable unwanted commands or crash applications. The iOS breach was shocking because of how long it went undetected, but also because of its scope. Among “14 security flaws” accessed using a chain of code, the attack allowed predators to collect sensitive information about iPhone users, including passwords, and listen to encrypted communication. 

Code execution, which allows an attacker to execute arbitrary commands, was responsible for more than 1 in 4 technical vulnerabilities in 2019, followed by cross-site scripting (17.7%). Code execution was also the most common type of vulnerability in 2018 and accounted for 3,041 security holes. 

Denial-of-service (DoS) attacks were only responsible for about 10% of product vulnerabilities in 2019, but they outnumbered all other vulnerabilities in 2017. However, GitHub experienced the largest DoS attack ever seen in 2018 when its website went offline for about five minutes. Perhaps that’s why there were only 919 DoS attacks in 2019 – companies took note and fit their products with necessary defenses. 

HTTP response splitting is historically the least common type of technical vulnerability reported. This is likely because applications succeed in identifying foreign input values. 

Examining Vendors

Businesses have become more “reliant on digital data, cloud computing, and workforce mobility” in the last 20 years, which has increased their exposure to cyberattacks

Founded in 1975, Microsoft is one of the world’s most successful technology companies. There were 668 reported Microsoft vulnerabilities in 2019. Since 2009, Microsoft is listed as experiencing 6,814 technical vulnerabilities. 

However, Linux was identified in the NIST’s National Vulnerability Database as experiencing the most reported vulnerabilities per product at 139.4, which is likely because the software company is relatively young and has fewer products.

It should be noted that all vendor and product classifications are those identified by the database.

Trouble With Your Operating System?

In the last 20 years, free and user-friendly software Debian Linux was listed in the database as experiencing 3,067 reported technical vulnerabilities. According to its website, the community that uses Debian Linux is “very responsive,” and vulnerabilities are usually fixed within a few days

Android reported 54 more vulnerabilities than Debian Linux in 2019. This could be because Android phones are built with pre-installed third-party applications, ultimately exposing users to unchecked bugs

The three products that followed Android and Debian Linux were all from Microsoft: Windows Server 2016, Windows 10, and Windows Server 2019. 

Should You Worry?

Using the Common Vulnerability Scoring System (CVSS), which ranges from 0 to 10, we outlined the products with the vulnerabilities that posed the highest risks from 1999 to 2019. Looking at the top 50 products with the most vulnerabilities in the last 20 years, Adobe Flash Player had the highest weighted average at 9.4

Of the 15 products listed, watchOS and iTunes (both Apple products) experienced the least-severe product vulnerabilities (although their exposure still remained in the 7.0 range). 

Browsing in Private

Internet access is a human right, but experts report that the majority of Americans feel they have very little to no control over their privacy. And there is cause for worry. Our findings show that technology products housing your sensitive data have become increasingly vulnerable to bad actors over the past 20 years. Everything from your bank information to what you print out is susceptible, but that doesn’t have to be acceptable. 

Although roughly 6 in 10 Americans believe it is not possible to go through daily life without having their data collected, you can take control of your sensitive information. Consider setting up a virtual private network (VPN) to keep your browsing history and data out of criminal hands. Visit TheBestVPN.com for comparison guides and resources to help you choose the best VPN to keep your online activity private. 

Here’s a list of links what you might find useful if you’re searching for a VPN provider:

Methodology 

Using data from the National Institute of Standards and Technology’s National Vulnerability Database, which we accessed through the CVE Details security database, we explored the technical vulnerabilities of a number of technology vendors and consumer products. 

The data were available for every year from 1999 to 2019. Data for 2019 were pulled on Jan. 2, 2020, and included data for every month of that calendar year. Due to the fact that the database constantly updates, it’s possible that the numbers presented may have changed. 

The database looked at 13 types of technical vulnerabilities. We included all types in our analysis of the data. It should be noted that other sources may describe or name types of vulnerabilities slightly differently. We chose to keep the type names consistent with those in the database accessed through CVE Details.

All product and vendor classifications in this project were identified as such in the NIST’s database. We did not perform any manual classification and present the data as listed in the database. This may create potential issues with comparisons between different products and vendors. 

The vulnerabilities-by-product calculation was done by dividing a vendor’s total number of vulnerabilities by the number of reported products that the vendor makes. The calculation was done within the database. However, we recreated the calculation and rounded numbers up, whereas the database rounded the calculated values down. Therefore, the numbers presented here might vary slightly from the database. 

When looking at specific products, the lists of top products for vulnerabilities were calculated by the database. We chose to show the top 20 in our final representations of the data, with the exception of the CVSS scores where we included the top 25. 

With the product lists, it’s important to note that some products are defined multiple times with different names in the database. Therefore, our lists may contain the same product under different names. 

Finally, we examined the risk posed by product vulnerabilities. This was done using the Common Vulnerability Scoring System (CVSS). Vulnerabilities are given a score of 0 to 10 based on multiple metrics. More information on this system can be found here

The database provided CVSS weighted averages for the top 50 products by the total number of distinct vulnerabilities. Our final representation shows the top 25 products with the highest CVSS weighted averages. More information on how the weighted averages were calculated can be found here

Fair Use Statement 

We live in an increasingly connected world, and that comes with pros and cons. The best way to stay protected is to remain vigilant and informed. If someone you know would benefit from the information presented in this project, you’re free to share it for any noncommercial reuse. However, we ask that you link back here so that people can view the entire project and read the methodology. This also gives credit to our contributors whose efforts make projects like this possible.

14 Most Alarming Cyber Security Statistics in 2020

Rob Mardisalu

Rob Mardisalu

I’ve updated these statistics to reflect 2018 and 2019. If you want to point out any corrections, let me know.

Cyber attacks are growing in prominence every day – from influencing major elections to crippling businesses overnight, the role cyber warfare plays in our daily lives should not be underestimated.

In fact, billionaire investor Warren Buffett claims that cyber threats are the biggest threat to mankind and that they are bigger than threats from nuclear weapons.

We have been compiling a list of relevant cyber-security statistics for you for years now and have decided to update our list with the most alarming cyber security statistics for 2020:

1. Americans are more worried about being a victim of cybercrime than being a victim of violent crime.

Read that again and let it sink in for a minute.

According to a Gallup study, Americans are more worried about cybercrime than violent crimes (including terrorism, being murdered, and being sexually assaulted). Not only are Americans more worried about cybercrime than other crimes, but their worries about cyber crimes has been consistent for about a decade now.

Specially, Americans are more worried about identity theft and being hacked:

  • 71 percent of Americans are worried about having their personal or financial information hacked.
  • 67 percent of Americans are worried about being a victim of identity theft.

By contrast:

  • 24 percent are worried about being a victim of terrorism.
  • 22 percent are worried about being attacked while driving, 20 percent about being sexually assaulted, and 17 percent about being murdered.
  • 7 percent are worried about being assaulted at the workplace.
american cybercrime statistics

2. There were more than 1.76 billion records leaked in January 2020 alone.

The year has barely started, but 2020 is on track to be a dangerously interesting year as far as data leaks is concerned.

In January 2020 alone, exactly 1,769, 185,063 user records were leaked. These include records from the famous Collection #1 breach containing user info and plain text passwords for about 772 million people compiled from some of the biggest data breaches to have happened, a MongoDB instance containing 854GB of data that exposed CVs containing sensitive information about 202 million Chinese users, and an Oklahoma government data leak that exposed 7 years of FBI investigations.

3. Ransomware is expected to cost businesses and organizations $11.5 billion in 2020.

The WannaCry ransomware attack made many people cry in 2017 — including the British National Health Service (NHS). It affected an estimated 200,000 computers in 150 countries and caused damages estimated to be in the billions of dollars. Other popular ransomware attacks include CryptoLocker, CryptoWall, TeslaCrypt, and SamSam.

Ransomware attacks aren’t slowing down any time soon. They will cost organizations an estimated $11.5 billion this year alone — and from individual computer users to governments, nobody is exempt. In fact, just recently, the local government of Jackson County, Georgia, had to pay $400,000 in ransom due to a ransomware attack and North Carolina’s Orange County experienced its third ransomware attack in six years.

4. Microsoft Office extensions are the most malicious file extensions used by email hackers.

According to data from Cisco’s 2018 Annual Cybersecurity Report, the most malicious file extension used by email hackers in 2018 was Microsoft Office formats. This includes files in the Word, PowerPoint, and Excel formats.

While the .EXE executable file format used to be very popular among hackers, most email service providers now block attachments with these formats due to their tendency to be exploited to distribute Malware. Microsoft Office formats have now taken the top spot for malicious file extensions; these formats are being exploited with the hope of using macros embedded in the documents to evade email security checks and computer antivirus programs.

Cisco’s study shows that 38 percent of malicious file extensions are Microsoft Office files. This is followed by archive file formats (.zip and .jar) at 37 percent and PDF files at 14 percent.

5. The main cause of data breaches are malicious or criminal attacks — and they are responsible for 48 percent of all data breaches.

Several factors have been found to be responsible for data breaches. They include:

  • Human error (such as negligence on the part of employees or contractors)
  • System glitches
  • Malicious or criminal attacks (in which a business was intentionally targeted with malicious intent)

IBM and Ponemon’s Institute’s Cost of a Data Breach Study found that not only are malicious or criminal attacks the major cause of a data breach, they are also the most costly. According to the study, 48 percent of data breaches are as a result of malicious or criminal attacks (compared to 27 percent for human error and 25 percent for system glitch).

data breach root cause graph

These attacks commonly involve malware infections, SQL injection, phishing/social engineering, and criminal insiders. These attacks generally cost $157 per user, compared to that from system glitches that costs $131 per user and that from human error that costs $128 per user.

data breach root causes graph 2

6. The global average cost of a data breach is $3.6 million — and it keeps increasing every year.

IBM and Ponemon Institute’s Cost of a Data Breach study also found that the average cost of a data breach for organizations worldwide is $3.6 million.

For the 2018 version of the study, IBM and Ponemon Institute interviewed over 2,200 IT, data protection, and compliance professionals from 477 companies that have suffered from a data breach in the past 12 months and found that, globally, the average data breach costs $3.86 million. What is perhaps more worrisome is that this is a 6.4 percent increase from the average cost of a data breach from the previous year. In the U.S., however, data breaches are more costly at an average of $7.91 million.

7. The global cost of cybercrime is expected to exceed $2 trillion in 2020.

According to Juniper Research’s The Future of Cybercrime & Security: Financial and Corporate Threats & Mitigation report, the total cost of cybercrime is expected to exceed $2 trillion this year. According to Juniper, this is a four-fold increase when compared to the estimated cost of cybercrime in 2015 — just four years ago.

8. Mobile malware is on the rise but “grayware” could pose a more dangerous risk to mobile users.

According to data from Symantec’s 2018 Internet Security Threat Report, mobile malware is on the rise — with the number of new mobile malware variants introduced increasing by a massive 54 percent in one year. This is not helped by the fact that most mobile devices are running on older operating systems (only 20 percent of Android devices are running the newest release).

Despite the rise in mobile malware, a more alarming threat however is that posed by grayware; these are apps that appear to be safe but are rife with issues that put users’ privacy at risk. Symantec’s study found that 63 percent of grayware apps leak a device’s mobile number.

Remember that we recently released a study on how VPN apps ask for dangerous permissions? Specifically, 62 percent of top VPN apps ask for dangerous permissions and will qualify as grayware.

If you’re interested in reading more about VPNs, the following links might be valuable for you:

9. Cryptojacking is one of the more serious cyber threats to watch out for in 2020.

It’s highly unlikely you haven’t heard about cryptocurrency in the past few years.

There’s a new term you need to add to your vocabulary, however. It’s called “cryptojacking.”

Cryptojacking is when a hacker hijacks your computer and then uses its CPU power to mine cryptocurrencies.

According to Symantec’s 2020 Internet Security Threat Report, there were four times more cryptojacking events in 2018 than in 2017. Cryptojacking particularly peaked in 2018, and the month of January and February 2018 were particularly noteworthy — with Symantec blocking about 8 million cryptojacking attempts each month.

Cryptojacking will only rise in 2020, particularly as the cryptocurrency market continues to show new signs of life.

10. The number of groups using destructive malware increased by 25 percent in 2018.

Malware attacks is on the rise, but destructive malware more so. Destructive malware are malware that target computer systems with the aim of destroying them and rendering them inoperable.

According to Symantec’s 2020 Internet Threat Report, the number of groups using destructive malware increased by 25 percent in 2018. Notable attacks involving groups that use destructive malware that were exposed in 2018 involved the Thrip group compromising a satellite communications operator and then looking for and infecting computers running software that monitor and control satellites such as MapXtreme, Garmin, and Google Earth Server and the Iran-based Chafer group compromising a Middle East telecoms service provider.

thrip attack group malware infographic

11. Around 7 out of 10 businesses are not prepared to respond to a cyber attack.

We’ve taken a look at some shocking cyber statistics that show that the average cost of a data breach is in the millions and that malicious attacks are on the rise, yet a whopping 73 percent of businesses are not ready to respond to a cyber attack. This is according to the 2018 Hiscox Cyber Readiness Report. The study of more than 4,000 organizations across the US, UK, Germany, Spain, and the Netherlands found that most organizations are unprepared (cyber novices) and would be seriously impacted by a cyber attack.

worldwide cyber attack readiness graph

12. Phishing emails are responsible for about 91 percent of cyber attacks.

In most cases, 9 out of 10 successful cyber attacks can be traced to a phishing attempt. This is according to research conducted by PhishMe.

After sending 40 million simulated phishing emails to about 1,000 organizations, PhishMe found that 91 percent of cyber attacks start with a spear phishing email. Worse, these attacks are on the rise.

13. A staggering 92 percent of malware is delivered via email.

Email is a top contender when it comes to cyber attacks, and in line with PhishMe’s study above, according to Verizon’s 2018 Breach Investigations Report, email is responsible for 92 percent of malware.

The 2018 Verizon study that analyzed 53,308 security incidents and 2,216 data breaches in 65 countries found that email is responsible for 92.4 percent of malware while the web is responsible for a measly 6.3 percent.

14. More than 76 percent of cyber attacks are financially motivated.

As the cyberspace gets more sophisticated and intertwined with the real world, the stakes will continue to increase. More cyber attacks, hacks, and data breaches are motivated by financial purposes than anything else.

Verizon’s 2018 Breach Investigations Report also found that 76 percent of cyber attacks are motivated by money; most of these attacks (73 percent) are perpetrated by people outside of the organization, with the majority being carried out by organized criminal groups and 12 percent being carried out by nation-state or state-affiliated actors.

Our 13-Step Review Process

Thebestvpn review process

Unlike many other VPN review sites, we take things seriously.

When we review the VPN service, we actually open our wallets and become a paid customer. We never ask for free accounts. Here’s what we do:

  1. Buy the VPN subscription from each VPN service.
  2. Install the VPN app on our laptop (Windows 10 or Mac OS 10.13+).
  3. Run multiple speed tests from different locations using speedtest.net.
  4. Check for DNS, IP and WebRTC leaks from apps and browser extensions.
  5. Test VPN app’s usability and user-friendliness.
  6. Fact-check their logging policy and jurisdiction.
  7. Check if they unblock/work with Netflix.
  8. Check if they allow torrenting and P2P.
  9. Test our their customer support.
  10. List out their main security and privacy features.
  11. Check compatibility (TOR, Game consoles, Routers etc..).
  12. Compare the cost vs value.
  13. Rank them accordingly on our homepage.

Here’s how we evaluate and stress-test every element of a VPN service:

1. Same computer & network for each VPN

What’s in the box?

Our testing PC

Meet our battle-tested Lenovo IdeaPad 120S-141AP, or “Lenny” for short!

vpn testing laptop

We run every single VPN we test on Lenny to keep the tech consistent. In fact, we bought Lenny just for that purpose!

It wouldn’t make any sense to test these VPNs on a bunch of different networks, so we use a wired cable connection on the same network in our HQ in Estonia. We speed tested our network multiple times across multiple weeks to measure out our average: 98 Mbps Upload, 53 Mbps Download:

vpn speed test benchmark

 

2. Bought and installed 78 VPN apps (ongoing…)

Here’s a look at Lenny’s desktop as of a few weeks ago for perspective:

Lenovo Desktop

This is the part where we pause and use bold type to make sure this is unmissable:

 We do not accept any money, bribes, favors, in-kind donations, exotic pets, crypto currencies, homecooked meals, or ANY compensation in exchange for writing or editing a review. EVER.

In fact, we pay for every VPN service we try out of our own pockets to allow for complete honesty as an actual consumer.

payment for vpn

All of our data is collected first-hand: unlike other reviewers, we don’t rip off numbers from other sites or just make it up. (Which is sadly too common.)

 

3. Read through their logging policy

Have you EVER read a logging or privacy policy in detail? We have. Over 40 times. Until our eyes watered and our heads hurt.

sketchy logging policies

This is the least fun part of our reviews, but the most important: shady companies use tricky language to disguise the fact that they’re tracking and sharing your activity.

We read the fine print to make sure you’re not being taken advantage of.

 

4. Check their jurisdiction and history

Background and company name: Who runs the company? Where are they from? Do they have a history of violating user privacy, or leaks? We collect as much info as possible and bring it to you.

Jurisdiction: The jurisdiction a VPN is based in may play a major role in whether or not a VPN could be compelled to hand over your data to authorities if pushed. More on that here.

Jurisdiction

 

5. Run multiple speed tests

It doesn’t matter how secure your VPN is if it takes three hours to download an episode of “Stranger Things.” We use speedtest.net to test Upload and Download speeds multiple times to account for fluctuations in service.

We also revisit these speed tests about once a year to see if anything has changed.

Unfortunately, some VPNs were VERY slow…

slow VPN

 

6. Tested Netflix streaming across 3 to 6 servers

Netflix n’ chill? Only if it works. That’s why we don’t do a one-and-done test: we find out which servers (if any) actually work with Netflix and let you know, saving you time and headaches.

Netflix VPN streaming error
Netflix VPN streaming error

Find best VPNs for Netflix here.

7. Read through their torrenting/P2P policy

Some VPNs crack down on P2P and torrenting. Some advocate for it directly. Others are sneaky about it. We get to the truth of the matter to make sure you can do what you like with the VPN you choose.

torrenting policies

 

8. Test for DNS, IPv4, IPv6, and WebRTC leaks

TL; DR: IP leaks happen when your VPN fails to hide your actual IP as you browse. For example: if you went to load a geo-restricted show on Netflix, and the content was still blocked, your real IP might just have leaked.

We strategically test common points of failure to see how the VPN stands up.

PersonalVPN leaks your DNS

 

9. Graded their usability and user-friendliness

The most secure VPN in the world won’t be much help if it takes a degree in Computer Sciences to use properly. We look for things like setup time, user-friendly interfaces, and ease of configuration to get a sense for how accessible the VPN will be to the average user.

 

10. Evaluate each VPN security and privacy features

Different VPN services are more ideal for different use cases (e.g. business vs. personal), while some “premium” features really ought to be standard on every VPN. We evaluate…

  • Security protocols available
  • Encryption type
  • Kill-switch (instant disconnect if security is lost)
  • # of max connections (How many devices at once)
  • Browser extensions
  • Number and locations of servers

And any unique features the VPN Service brings to the table, highlighting the good, the bad, and the ugly.

protocols and encryption

 

11. Give their customer support a (real!) test run

NEVER trust a company who promises “best in class” customer service. We submit support tickets, make phone calls, get on chat and more to test response speed and the competence of the support team on the other end when dealing with common VPN issues.

Celo VPN Customer Support

 

12. Test compatibility with routers, TVs, TOR, and consoles

If your VPN Service isn’t compatible with your gadgets, what’s the point? We test multiple different setups for compatibility to help you avoid buying a solution that won’t work on your devices.

We also test whether or not TOR can be used in conjunction with the VPN Service for an added layer of security – important to several power users and those in contentious environments/locations.

available VPN devices

 

13. Compare the cost vs value

Yep, pricing is important. So why evaluate it last? Because there’s no sense in a free product that compromises your privacy, or an expensive product that offers nothing superior to a cheaper one.

vpn ac pricing

 

You can take it from here…

Quite the process, right?

Between reviewing those 13 points for 70+ VPN providers and revisiting past reviews to keep them current, it’s easy to see why we take a little while to put out new reviews.

We hope you appreciate the depth and transparency that goes into the work we do here – and that the information will be helpful to your decision.

Browse 10 Best VPNs

Booking Your Flight With a VPN

TheBestVPN.com

TheBestVPN.com

Booking Your Flight With a VPN

More Americans traveled outside the U.S. than ever before in 2018. Although the numbers are still coming in for 2019, the U.S. International Air Travel Statistics Program reports that nearly 76 million people journeyed outside the country by plane, which could make 2019 the most significant travel year to date. 

Although millions of people fly, some have to go the extra mile to book an affordable flight. But what if we told you it’s possible to book from Norway without using the Norwegian Airlines trick? That’s right: No Google Translate, just a virtual private network (VPN). 

Unlike perusing flights in incognito mode, a VPN might be more effective because it allows users to browse the internet completely anonymous. To determine whether you can save on a flight by changing your IP address to a different country – a trick called geo-spoofingwe searched the same five round-trip flights from 20 countries. Read on to see which countries offer the best savings.

Book Anonymously and Save Significantly 

Average Difference in Flight Prices When Using a VPN

The cost of airfare takes up a large chunk of Americans’ travel budgets. However, if a flight is booked using a VPN, the price may fluctuate because airlines are unaware of previous site activity or your location. 

Of the 20 countries analyzed, flight prices checked from Vietnam were the cheapest, followed by Mexico and India. Compared to booking from the U.S., using an IP address based in the Southeast Asian country saved $138. Conversely, flights purchased from Brazil, Switzerland, and Portugal were the most expensive, with Brazil averaging $261 more than the U.S. 

While there’s no clear explanation for this trend, Brazil has the fourth-highest number of internet users, after the U.S., India, and China, but its population is significantly smaller. Taking this into consideration, perhaps a larger percentage of Brazilians search for flights compared to the other three countries.

Are Savings Consistent?

Change in Flight Price When Using a VPN

An experienced traveler knows where you fly from (and to) can impact airfare costs. So, let’s have a look at our five flight departure and return locations. Do travelers save on all routes? 

Vietnam is a sure thing: All five flight routes were less expensive when booked from Vietnam. However, a round trip from New York City (JFK) to London (LHR) saved the least ($4). Conversely, Miami (MIA) to Tokyo (HND) cost $307 less than booking from the U.S. 

The No. 1 money saver, however, was booking a flight from New York City to London from a Mexican IP address. Travelers stood to pocket $615 compared to booking from the U.S. But Mexico lost its charm once we searched the Miami-to-Tokyo route, which cost $454 more than the U.S. 

Japan is a compelling case: The rise in tourists visiting the country is “statistically off the charts.” Between 2012 and 2017, Japan saw a 250% increase in international tourism. And Japanese Prime Minister Shinzo Abe wants 40 million visitors in 2020, which suggests that no matter where you’re located, searching for a flight destined for Tokyo could be costly. 

If you want to increase your chances of saving a buck, don’t set your IP location to Brazil, Malaysia, Thailand, Portugal, or Switzerland. The Miami-to-Tokyo route was over $1,240 more expensive than the U.S. in those regions. Instead, purchase from Vietnam, Singapore, Greece, Italy, New Zealand, and Ireland – you’ll save at least $65 (Ireland) and at most $307 (Vietnam).

Savings at a Glance

How Much Can You Save When Purchasing a Flight Through a VPN?

We’ve shared a great deal of information so far – let’s have a review. Flight routes from Miami to Tokyo were the most expensive across the board and averaged $400 more than booking with an American IP address. However, the New York City-to-London route was the cheapest, averaging $116 in savings. Los Angeles to Toronto, Chicago to Frankfurt, and Seattle-Tacoma to Paris fell in the middle. 

Here’s What It All Costs

Flight Prices When Using a VPN

Twenty countries and five flight routes later, you’re looking at 100 prices. Although all of the searches were done on the same day, the rates varied, and we laid them out for you in U.S. currency. Sometimes, it helps to see how much your spending, not only what you save. 

The most costly flight, Miami to Tokyo, was $3,677 at its most expensive and $2,074 at its cheapest. If you’re a frugal traveler, set your IP address to Mexico and book a flight from New York City to London. But take into account that the Los Angeles-to-Toronto route costs less than $800 in all locations except the U.S. Outside of Miami to Tokyo, none of the other four routes exceeded $1,355. 

Use a VPN: Travel for Less 

Gone are the 2 a.m. Tuesday alarms so you can search for cheap flights – save big on popular travel destinations without losing sleep. Our findings suggest that using a VPN to geo-spoof while perusing flight routes might be favorable. However, it’s important to consider trends: For example, while a flight from Miami to Tokyo fluctuated in price, the savings weren’t significant when compared with the U.

Are you excited about booking your next flight? Think about setting up a VPN so you can browse airline websites anonymously and from a country where you’ll save more on your ticket. Visit us at TheBestVPN.com to browse comparison guides and resources – we’ll help you find the VPN that most suits your travel needs.

Methodology

We used a virtual private network (VPN) service to check variations in prices of five international flights based on the country from which the prices were checked. We recorded prices across 20 countries for a total of 100 data 

Using a VPN, we connected to a metasearch engine for flight prices. We collected prices for round-trip travel from New York City (JFK) to London (LHR), Los Angeles (LAX) to Toronto (YYZ), Chicago (ORD) to Frankfurt (FRA), Seattle-Tacoma (SEA) to Paris (CDG), and Miami (MIA) to Tokyo (HND). All flights were for travel departing on Jan. 3, 2020, with return on Jan. 10, 2020. Some flights included stops but remained consistent for each flight.

Prices were obtained on Dec. 10, 2019. Prices were obtained from the same metasearch engine for airfare. The parameters to obtain each flight were the departing airport, arrival airport, departing date of Jan. 3, 2020, and the arrival date of Jan. 10, 2020. This search was repeated across 20 countries with the same parameters using a VPN. The suggested “best price” for each flight was used across all countries. All prices were then converted to U.S. dollars as of Dec. 10, 2019. All searches were conducted in private browsing mode for Google Chrome.

Limitations

It is possible that with a greater sample of flights for each country, we could have gained more accurate insight into how accessing flight prices from different countries may influence the price of the ticket.

Although all prices were recorded on the same day, it is possible that regular fluctuations in prices may have affected specific countries more than others based on the order and speed in which the data were collected.

The data presented here are based on means alone and are for informational and exploratory purposes. Individual experiences may vary.

Fair Use Statement

Flight deals shouldn’t only happen when your airline decides you deserve a deal. With a VPN, you can reward yourself any day of the week, and that information is worth sharing. So, please pass our content and graphics on for any noncommercial reuse. We just ask that you link back here so those you share with can access the entire study and review the methodology. This also gives credit to our contributors for their work.