![]() (e) MACE™: Protects users from malware, trackers, and adsġ0. (d) Shared IP System: We mix clients’ traffic with many other clients’ traffic through the use of an anonymous shared-IP system ensuring that our users blend in with the crowd. (c) DNS Leak Protection: This is built-in and ensures that DNS requests are made through the VPN on a safe, private, no-log DNS daemon. (b) IPv6 Leak Protection: Protects clients from websites which may include IPv6 embeds, which could lead to IPv6 IP information coming out. (a) Kill Switch: Ensures that traffic is routed through the VPN such that if the VPN connection is unexpectedly terminated, the traffic will not route. Yes, our users gain a plethora of additional protections, including but not limited to: Currently, the most secure and practical encryption algorithm that we recommend to our users would be our cipher suite of AES-256 + RSA4096 + SHA256.ĩ. Payment data is not linked nor linkable to user activity.Ĩ. We utilize a variety of payment systems, including, but not limited to: PayPal, Credit Card (with Stripe), Amazon, Google, Bitcoin, CashU, and any major store-bought gift card and OKPay. BitTorrent and file-sharing traffic are allowed and treated equally to all other traffic (although it’s routed through a second VPN in some cases). All this being said, we do not log and do not have any data on our customers other than their signup e-mail and account username.Ħ. This is all driven based upon our commitment to privacy. Every subpoena is scrutinized to the highest extent for compliance with both the “spirit” and “letter of the law.” While we have not received valid court orders, we periodically receive subpoenas from law enforcement agencies that we scrutinize for compliance and respond accordingly. That said, we have an active, proprietary system in place to help mitigate abuse.ĥ. We do not monitor our users, and we keep no logs, period. By Q3 2017, all of these third party tools will be transitioned to in-house solutions.Ĥ. We utilize some third-party tools in order to provide a better customer experience. All of our VPN systems and tools are proprietary and maintained in house. Additionally, since we operate from the countries with the strongest of consumer protection laws, our beloved customers are able to purchase with confidence.ģ. Private Internet Access is operated by London Trust Media, Inc., with branches in the US and Iceland, which are a few of the countries that still respect privacy and do not have a mandatory data retention policy. There are no logs for any person or entity to match an IP address and a timestamp to a user of our service. We do not store any logs relating to traffic, session, DNS or metadata. We specifically chose to leave room for detailed answers where needed. Providers who didn’t answer our questions directly or failed by logging extensively were excluded. What countries are your servers located in?īelow is the list of responses from the VPN services in their own words. Do you have physical control over your VPN servers and network or are they hosted by/accessible to a third party? Do you use your own DNS servers?ġ2. Do you offer a custom VPN application to your users? If so, for which platforms?ġ1. How do you currently handle IPv6 connections and potential IPv6 leaks? Do you provide DNS leak protection and tools such as “kill switches” if a connection drops?ġ0. What is the most secure VPN connection and encryption algorithm you would recommend to your users?ĩ. Which payment systems do you use and how are these linked to individual user accounts?Ĩ. Is BitTorrent and other file-sharing traffic allowed (and treated equally to other traffic) on all servers? If not, why?ħ. What steps are taken when a valid court order or subpoena requires your company to identify an active user of your service? Has this ever happened?Ħ. ![]() In the event you receive a takedown notice (DMCA or other), how are these handled?ĥ. Do you use any external visitor tracking, email providers or support tools that hold information about your users/visitors?Ĥ. What is the registered name of the company and under what jurisdiction(s) does it operate?ģ. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user/users of your service? If so, what information do you hold and for how long?Ģ. This is the main reason why we have launched a yearly VPN review, asking providers about their respective logging policies as well as other security and privacy aspects. In fact, some are known to keep extensive logs that can easily identify specific users on their network. Unfortunately, however, not all VPN services are as private as you might think. ![]() Millions of Internet users around the world use a VPN to protect their privacy online.
0 Comments
Leave a Reply. |