<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>VPN Services &amp; Guides</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/security/vpn-services-guides.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:44:05 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/security/vpn-services-guides.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>Best VPN Review: StrongVPN. Download Speed Τest, Torrenting, Netflix, BBC, HULU, DNS Leak Test, Security, VPN Options, Device Support and more</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/best-vpn-strong-vpn-review.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/best-vpn-strong-vpn-review.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn-top-rated.png" alt="strongvpn top rated" width="189" height="113" style="margin: 7px; float: left;" title="strongvpn top rated" />StrongVPN</strong> is one of the most <strong>popular </strong><strong><a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="VPN service">VPN service</a>&nbsp;</strong>around the world. With a presence in over <strong>23 countries</strong>,<strong>+650 servers</strong>, <strong>cheap prices</strong>, <strong>Strong Encryption</strong> and <strong>blazing fast download speeds</strong> – it rightfully deserves the <strong>No.1 position</strong> in our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Review"><strong>Best VPN Review</strong></a>.</p>
<p style="text-align: justify;">This in-depth review took weeks to write as we performed <strong>extensive testing</strong> on <strong>workstations</strong> and <strong>mobile clients</strong>, <strong>downloading</strong>, <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN torrenting"><strong>VPN torrenting</strong></a>, <strong>performing security tests</strong>, <strong>VoIP &amp; Video latency</strong>, <strong>gaming </strong>and more, in an attempt to discover any flaws, issues or limitations the VPN service might have.</p>
<p style="text-align: justify;"><strong>Key Topics</strong>:</p>
<ul>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#overview" title="Overview">Overview</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#ease-of-use-strongvpngui-interface" title="Ease of Use – StrongVPN GUI Interface">Ease of Use – StrongVPN GUI Interface</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#vpn-client-platform-availability" title="VPN Client Platform Availability">VPN Client Platform Availability</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#router-vpn-support" title="Router VPN Support">Router VPN Support</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#vpn-privacy-security-and-encyrption" title="VPN Privacy, Security and Encryption">VPN Privacy, Security and Encryption</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#dns-leak-protection-test" title="DNS Leak Protection Test">DNS Leak Protection Test</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#kill-switch-protection-test" title="Kill Switch Protection Test">Kill Switch Protection Test</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#webrtc-protection-test" title="WebRTC Protection Test">WebRTC Protection Test</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#speed-test-and-reliability" title="Speed Test and Reliability">Speed Test and Reliability</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#strongvpn-for-netflix-and-region-blocks" title="StrongVPN for Netflix and Region Blocks">StrongVPN Unblocks Netflix, BBC iPlayer, HULU and Region Blocks</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#strongvpn-for-torrenting" title="StrongVPN for Torrenting">StrongVPN for Torrenting</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#voip-and-video-calls" title="VoIP &amp; Video Calls">VoIP &amp; Video Calls</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#does-strongvpn-keep-logs" title="Does StrongVPN Keep Logs?">Does StrongVPN Keep Logs?</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#support-response-time-and-quality" title="Support – Response Time and Quality">Support – Response Time and Quality</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#value-for-money" title="Value for Money">Value for Money</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/#summary" title="Summary">Summary&nbsp;</a></li>
</ul>
<p style="text-align: justify;">Without any further delay, let’s take a look and see what StrongVPN was able to deliver during these very challenging tests!</p>
<p style="text-align: justify;"><strong>Positives:</strong></p>
<ul class="check">
<li style="text-align: justify;"><span><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html#StrongVPN" target="_blank" title="Ranked No.1">Ranked No.1</a></span> in our Best VPN Service review</li>
<li style="text-align: justify;">Superfast Download/Upload Speeds supporting Torrents</li>
<li style="text-align: justify;">Very low Latency</li>
<li style="text-align: justify;">Strong Encryption</li>
<li style="text-align: justify;">Zero-Log Policy</li>
<li style="text-align: justify;">Effective DNS Leak, IP Leak &amp; WebRTC Protection</li>
<li style="text-align: justify;">Cheap for 12 month signup plans&nbsp;</li>
</ul>
<p style="text-align: justify;"><strong>Concerns:</strong></p>
<ul>
<li>Kill-switch</li>
<li>5 day money-back guarantee period</li>
</ul>
<p style="text-align: center;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Visit StrongVPN"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/button-blue-visit-strongvpn.png" alt="Visit StrongVPN" title="Visit StrongVPN" /></a></p>
<h2 style="text-align: left;"><a name="overview">Overview</a>&nbsp;</h2>
<p style="text-align: justify;"><strong>StrongVPN</strong> is one of the oldest in the industry, beginning as a humble PC company in 1994. A subsidiary of Reliable Hosting, the company was created after a move to San Francisco prompted the sale of VPN services.</p>
<p style="text-align: justify;">The US-based company doesn’t promise a whole lot on its website, but under the hood it’s a <strong>fast VPN</strong> with a <strong>no-log policy</strong> and <strong>great customer service</strong>. It supports&nbsp;<strong>5 concurrent connections</strong> for <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="$3.8 per month"><strong>$3.8 per month</strong></a> under a <strong>yearly package</strong>!</p>
<p style="text-align: justify;">While some of the best VPNs focus on a wide range of servers, StrongVPN prioritises speed and the ability to <strong>unblock Netflix</strong>. It has servers in 45 cities across <strong>23 countries</strong>, most of which can bypass region blocks.</p>
<p style="text-align: justify;">Such functionality has made this StrongVPN very popular in China and other countries with aggressive blocking policies. This review will analyze the benefits for a new, global audience.</p>
<h2 style="text-align: left;"><a name="ease-of-use-strongvpngui-interface">Ease of Use – StrongVPNGUI Interface</a></h2>
<p style="text-align: justify;">StrongVPN’s install is as simple as it gets. Users are presented with a regular installer and just have to hit next until it’s complete. StrongVPN intelligently installs TAP drivers, requiring no extra prompts. After completion, the application will launch automatically.</p>
<p style="text-align: justify;">At first glance, StrongVPN’s interface is simple. It presents your location, a list of servers, and VPN protocol used to encrypt traffic. Most users will never have to go outside of this interface, leaving a minimal, simple experience.</p>
<p style="text-align: center;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Visit StrongVPN"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn_windows.png" alt="The StrongVPN client - Probably not the best looking GUI but surely the best service" title="The StrongVPN client - Probably not the best looking GUI but surely the best service" /></a></p>
<p style="text-align: center;">The StrongVPN client - Probably not the best looking GUI but surely the best service</p>
<p style="text-align: justify;">Once you drill down into settings, things get more complex. Though well-labelled, there’s a lot of information with no tooltips or tutorial. However, these are presented as <strong>advanced</strong> options so, naturally, they are targeted at power users.</p>
<p style="text-align: justify;">They also provide some information that’s useful to everyone. By default, StrongVPN launches an <strong>Information page</strong>, which gives account details, launcher version, subscription length, and more. This makes it easier to provide relevant details to support agents, and isn’t something you see often:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn_windows_advanced.png" alt="StrongVPN client information window" title="StrongVPN client information window" /></p>
<p style="text-align: center;">StrongVPN client information window&nbsp;</p>
<p style="text-align: justify;">It isn’t the <strong>best VPN client</strong> we’ve seen in terms of ease of use, but the default screen is still <strong>simple</strong> and the <strong>advanced options provide unprecedented customization</strong>. Though it was a slightly slow to connect to some servers, that was mitigated by a <strong>stable experience&nbsp;</strong>afterwards.</p>
<h2 style="text-align: left;"><a name="vpn-client-platform-availability">VPN Client Platform Availability</a></h2>
<p style="text-align: justify;">The clunkiness of StrongVPN’s client can also be forgiven by its availability. It’s one of the few clients that states supports for all modern versions of Windows, from <strong>Windows XP through to Windows 10</strong>. <strong>Mac support is solid too</strong>, with an installer from <strong>Yosemite</strong> upwards. For Mac users on older systems, there’s a legacy client that works just fine.</p>
<p style="text-align: justify;">Like all of the best VPNs, there’s support for Android and iOS, too. iPhones, iPads and iTouch devices are supported on iOS 9 and up. Android goes back a little further, with support for Ice Cream Sandwich (4.0) and above.</p>
<p style="text-align: justify;">For other platforms, StrongVPN provides some of the most comprehensive guidance we’ve seen. There’s tutorials for <strong>Windows Phone</strong>, <strong>Windows Mobile</strong>, <strong>Microsoft Surface</strong> and more.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn_android.png" alt="StrongVPN Mobile client - Great looking interface with heaps of options" title="StrongVPN Mobile client - Great looking interface with heaps of options" /></p>
<p style="text-align: center;">StrongVPN Mobile client - Great looking interface with heaps of options</p>
<p style="text-align: justify;">The mobile apps aren’t the prettiest we’ve seen, but it’s <strong>hard to deny the simplicity</strong>. StrongVPN has gone for a very barebones interface with a <strong>simple button</strong> to <strong>enable</strong> and <strong>disable</strong> the connection. Though the settings menu isn’t quite where you’d expect it to be, it presents information in a much simpler format than the desktop client.</p>
<p style="text-align: justify;">However, things get a little more complex once you move to Linux. StrongVPN doesn’t provide a dedicated installer for any of the distributions. That’s a very common move, as it’s difficult to provide options for all the different versions, and Linux users tend to be more advanced anyway.</p>
<p style="text-align: justify;">Thankfully, StrongVPN does provide some excellent guidance that makes it much easier. Picture guides are provided for <strong>Linux</strong> in general and&nbsp;<strong>Ubuntu</strong>. Some of these take the form of forum posts, while others are detailed picture guides.</p>
<p style="text-align: justify;">Reliable Hosting also gives recommendations to users that are stuck between&nbsp;<strong>PPTP</strong>, <strong>L2TP</strong>, and <strong>OpenVPN</strong>. <strong>PTTP</strong> is <strong>recommended for Ubuntu</strong> as it’s the simplest setup and deemed adequate for casual browsing, video streaming, gaming, VoIP/Video calls and other.</p>
<p style="text-align: justify;">Despite this, <strong>OpenVPN</strong> is quite easy to get working with StrongVPN. The guide for Ubuntu requires minimal command line input and, for other distributions, command line and network manager tutorials are available.</p>
<p style="text-align: justify;">Of course, you can set up <strong>OpenVPN</strong> on <strong>Windows</strong> and Reliable Hosting has picture guides for that too. The setup is a little more involved than some, requiring a <strong>different username</strong> and <strong>password&nbsp;</strong>than the usual client. Those details are hidden away in a sub-menu, but thankfully the tutorial points you to the right place.&nbsp;</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/openvpn_windows_strongvpn.png" alt="Connecting to StrongVPN using OpenVPN client" title="Connecting to StrongVPN using OpenVPN client" /></p>
<p style="text-align: center;" align="center">Connecting to StrongVPN using OpenVPN client</p>
<p style="text-align: justify;">With a little effort, we were able to get <strong>OpenVPN</strong> working with the service just fine. Support was also happy to help with this, and provided valuable advice.</p>
<h2 style="text-align: left;"><a name="router-vpn-support">Router VPN Support</a>&nbsp;</h2>
<p style="text-align: justify;">It’s clear that Reliable Hosting has some of the <strong>best VPN guidance</strong>, and that extends to routers. Though StrongVPN doesn’t have its own OS, it does support a wide range of router firmwares via <strong>PPTP</strong> and <strong>OpenVPN</strong>.</p>
<p style="text-align: justify;">In fact, Reliable Hosting has some of the <strong>best VPN router guides we’ve seen</strong>. The company provides setup tutorials for the popular <strong>DD-WRT</strong> and <strong>TomatoUSB</strong>. However, it also goes a step further, with support for the&nbsp;<strong>Sabai</strong> and <strong>Mikrotik Router OS’s</strong>.</p>
<p style="text-align: justify;">There are options for less advanced users. StrongVPN sells <strong>routers pre-flashed</strong> with <strong>SabaiOS</strong> so that no setup is required. The <strong>Tomato-based router OS</strong> makes it simple to use VPNs with routers, and requires very little configuration.</p>
<p style="text-align: justify;">Though the routers are shipped by Sabai technology, Reliable Hosting handles the payment. You can also <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="buy a VPN subscription">buy a VPN subscription</a>&nbsp;alongside it for less micromanagement.</p>
<h2 style="text-align: left;"><a name="vpn-privacy-security-and-encyrption">VPN Privacy, Security and Encyrption</a></h2>
<p style="text-align: justify;">StrongVPN’s multitude of platforms is enhanced by its support for various encryption options. As with most modern clients, StrongVPN uses <strong>OpenVPN&nbsp;</strong>with either <strong>UDP</strong> or <strong>TCP</strong> by <strong>default</strong>. However, it also supports <strong>PPTP</strong>, <strong>L2TP</strong>, and <strong>SSTP</strong>.&nbsp;</p>
<p style="text-align: justify;">Though StrongVPN used to offer different encryption levels depending on your package, that’s no longer the case as all packages now have access to all supported encryption methods. This opens up connections on more niche devices, and provides varying degrees of <strong>speed</strong> and <strong>security</strong>. You can find out more about the various protocols in <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="our beginner’s guide to VPNs">our beginner’s guide to VPNs</a>.</p>
<p style="text-align: justify;">Despite the options, <strong>OpenVPN</strong> will be the choice of most users. StrongVPN provides up to <strong>256-bit AES encryption</strong> via this method, its highest amount. It’s the <strong>best VPN encryption</strong> in the industry used by <strong>law enforcement and privacy experts</strong>.</p>
<p style="text-align: justify;">StrongVPN comes with <strong>kill switch functionality</strong>. The option isn’t immediately obvious, labeled as <strong>Allow direct traffic while reconnecting. </strong>Unchecking the option will make sure your PC doesn’t transmit any data if the VPN connection drops. However, it’s worth noting that its implementation is questionable, as we have covered below.</p>
<p style="text-align: justify;">To further its <strong>anonymous browsing features</strong>, Reliable Hosting provides its users with its <strong>StrongDNS service for free</strong>. This mitigates issues like <strong>DNS leaks</strong>, which you can read more about <a href="https://www.firewall.cx/vpn/vpn-guides-articles/1183-dns-leak-protection-testing-prevention.html" target="_blank" title="here">here</a>. The user is given the IP address of dedicated DNS servers via a separate client or through manual setup.</p>
<h2 style="text-align: left;"><a name="dns-leak-protection-test">DNS Leak Protection Test</a></h2>
<p style="text-align: justify;">It would be unusual to provide a standalone DNS service if it didn’t prevent leaks correctly. However, as a precaution, we ran several tests with <strong>StrongDNS</strong>. Using the guidance from our <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS leak guide">DNS leak guide</a>, we first tested with <a href="https://dnsleaktest.com/" target="_blank" rel="nofollow noopener" title="DNSleaktest.com"><strong>DNSleaktest.com</strong></a>, StrongVPN connected, and StrongDNS disabled.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/dnsleaktest_1_strongvpn.png" alt="Testing StrongVPN for DNS Leaks" title="Testing StrongVPN for DNS Leaks" /></p>
<p style="text-align: center;" align="center">Testing StrongVPN for DNS Leaks</p>
<p style="text-align: justify;">As with many of the best VPNs, StrongVPNseems to have some built-in protection, changing the DNS address in its TAP driver automatically. The only IP that shows is Reliable Hosting’s Netherlands server. We got the same result using a separate test by <a href="https://cryptoip.info/" target="_blank" rel="nofollow noopener" title="CryptoIP"><strong>CryptoIP</strong></a>, which displayed an identical address:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/cyrptoip_test_1_strongvpn.png" alt="cyrptoip test 1 strongvpn" title="cyrptoip test 1 strongvpn" /></p>
<p style="text-align: justify;">Enabling the <strong>StrongDNS tool&nbsp;</strong>shows similar results. To test correctly, we set&nbsp;<strong>StrongVPN TAP drivers</strong> to automatically determine DNS servers. Testing <strong>without&nbsp;</strong>StrongDNS enabled points to a Dyn DNS from Saudi Arabia. While still a reliable hosting DNS, it isn’t as dedicated or safe:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/cyrptoip_test_2_strongvpn.png" alt="Testing StrongVPN for DNS leaks without StrongDNS enabled" title="Testing StrongVPN for DNS leaks without StrongDNS enabled" /></p>
<p style="text-align: center;" align="center">Testing StrongVPN for DNS leaks without StrongDNS enabled</p>
<p style="text-align: justify;"><strong>Enabling</strong> the&nbsp;<strong>StrongDNS tool</strong> has the same effect as correctly configured TAP drivers – it forces the computer to use <strong>StrongVPN’s dedicated DNS servers</strong>.&nbsp;</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/cyrptoip_test_3_strongvpn.png" alt="StrongVPN enabled with StrongDNS passed the DNS leak test" title="StrongVPN enabled with StrongDNS passed the DNS leak test" /></p>
<p style="text-align: center;" align="center">StrongVPN enabled with StrongDNS passed the DNS leak test</p>
<p style="text-align: justify;">Despite having the same effect, there are some advantages to using the StrongDNS tool. It protects users&nbsp;<strong>regardless of the protocol</strong>, and changes automatically when StrongVPN phases in and out of different servers.</p>
<p style="text-align: justify;">Despite this, users should still ensure their system is properly configured against DNS leaks. There are several factors in play, each of which is explained in our <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS leak guide">DNS leak guide</a>.</p>
<h2 style="text-align: left;"><a name="kill-switch-protection-test">Kill Switch Protection Test</a>&nbsp;</h2>
<p style="text-align: justify;">The next feature to test was <strong>StrongVPN’s Kill Switch</strong>. We found the implementation very difficult to test. StrongVPN’s implementation didn’t kick in when simply disabling TAP drivers like other VPNs.</p>
<p style="text-align: justify;">In fact, disabling TAP drivers cut the VPN connection, displaying our true IP, without any indication from the client. This happened despite having “Allow direct traffic while reconnecting” <strong>unticked</strong>. That’s slightly concerning, and points to a faulty implementation.</p>
<p style="text-align: justify;">Instead, we tried ending the OpenVPN process in task manager. This cut the VPN connection once more, but this time to client was able to detect it. However, despite a “reconnecting” dialogue, our true IP still leaked.</p>
<p style="text-align: justify;">Confused, we spoke to support about the matter. An agent confirmed to us that the <strong>kill switch functionality</strong> is <strong>not currently working</strong> with StrongVPN:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/livehelp_killswitch.png" alt="StrongVPN – Asking Live Chat about the Kill Switch feature" title="StrongVPN – Asking Live Chat about the Kill Switch feature" /></p>
<p style="text-align: center;">StrongVPN – Asking Live Chat about the Kill Switch feature</p>
<p style="text-align: justify;">Naturally, we asked if the feature would be fixed anytime soon. The support agent replied, “<em>sorry, we don't have ETA for that task. it may be fixed in one of the next vpn client releases.”</em></p>
<p style="text-align: justify;">The feature is <strong>not advertised by StrongVPN</strong> on the site, so the implementation isn’t particularly misleading. However, it’s definitely something to note. You will have to set up a <strong>kill switch manually</strong>, which is actually far safer than the implementation of even the best VPNs.</p>
<p style="text-align: justify;">Though it can be tricky on some systems, we have extensive guidance in our <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN for torrenting article">VPN for torrenting article</a>.</p>
<h2 style="text-align: left;"><a name="webrtc-protection-test">WebRTC Protection Test</a></h2>
<p style="text-align: justify;">Though StrongVPN doesn’t protect against connection loss, its <strong>WebRTC prevention is very good</strong>. For those unfamiliar, WebRTC is a communications protocol. It allows for <strong>real-time file</strong> and <strong>video sharing</strong> in the browser without the need for extra plugins. Unfortunately, it also lets websites use javascript to <strong>discover</strong> a user’s <strong>true IP address</strong>, <strong>even if they’re using a VPN</strong>.</p>
<p style="text-align: justify;">Using the <strong>StrongDNS tool</strong> and <strong>ipleak.net</strong>, we found <strong>no issues withWebRTC</strong>. Though it was enabled in our browser, only a Shared Address Space IP was revealed:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/web_rtc_strongvpn.png" alt="StrongVPN protects against WebRTC leaks" title="StrongVPN protects against WebRTC leaks" /></p>
<p style="text-align: center;" align="center">StrongVPN protects against WebRTC leaks</p>
<p style="text-align: justify;">Only the best VPNs can provide such functionality and, in this case, it’s thanks to StrongVPN’s dedicated DNS servers. Even with <strong>StrongDNS disabled</strong>, the service <strong>maintained anonymous browsing</strong>.</p>
<h2 style="text-align: left;"><a name="speed-test-and-reliability">Speed Test and Reliability</a></h2>
<p style="text-align: justify;">Other than anonymity, <strong>speed</strong> is an important factor in VPN purchases. Encryption always means a slowdown of some sort, but the amount can vary depending on provider. We run tests on all of the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="best VPN providers">best VPN providers</a> to determine the fall off from different locations.</p>
<p style="text-align: justify;">Using the popular <strong>Speedtest.net</strong>, we first ran a test from a <strong>100 Mbps UK connection without</strong> the VPN enabled on the San Jose server. It came back at a solid <strong>89.84 Mb/s</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn-test-1.png" alt="Speedtest without a VPN" title="Speedtest without a VPN" /></p>
<p style="text-align: center;" align="center">Speedtest without a VPN&nbsp;</p>
<p style="text-align: justify;">This initial test confirmed we had the ability to <strong>utilise almost 100%</strong> of our link to the internet.</p>
<p style="text-align: justify;">Next, we <strong>enabled our StrongVPN</strong> and tried the same test again and the results were <strong>staggering</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn-test-2.png" alt="StrongVPN truly impressed us with its superfast download speeds and low latency" title="StrongVPN truly impressed us with its superfast download speeds and low latency" /></p>
<p style="text-align: center;" align="center">StrongVPN truly impressed us with its superfast download speeds and low latency</p>
<p style="text-align: justify;">We experienced an expectedsmall drop off using the <strong>San Jose server</strong>, down to <strong>82.48 Mb/s</strong> which is really negligible considering our connection had additional overhead due to the <strong>heavy encryption</strong> and we also introduced an <strong>additional hop</strong> (VPN server) between our location and the San Jose Speedtest.net server.</p>
<p style="text-align: justify;">The round-trip ping came in only&nbsp;<strong>156ms</strong> – that’s only a <strong>16ms increase in latency</strong> which is <strong>very impressive</strong>!</p>
<p style="text-align: justify;">That’s a <strong>very fast VPN</strong>, with&nbsp;<strong>fast downloads/uploads</strong> and <strong>very low latency</strong> while gaming. The download and upload speeds are up there with the best VPNs and certainly fast enough to support any scenario.</p>
<h2 style="text-align: left;"><a name="strongvpn-for-netflix-and-region-blocks">StrongVPN Unblocks Netflix, BBC iPlayer, HULU and Region Blocks</a></h2>
<p style="text-align: justify;">The service was able to <strong>unblock Netflix successfully</strong>. It seems to work with every U.S. server except Miami and Atlanta. Here’s an example from a New York Server:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/netflix_strongvpn.jpg" alt="US Netflix successfully unblocked with StrongVPN" title="US Netflix successfully unblocked with StrongVPN" /></p>
<p style="text-align: center;" align="center">US Netflix successfully unblocked with StrongVPN&nbsp;</p>
<p style="text-align: justify;">While most of the best VPN providers can <strong>unblock Netflix</strong>, StrongVPN is particularly impressive. Not only does it work for almost all US servers, it’s also able to <strong>unblock Netflix around the globe</strong>. In our short testing we were able to access Netflix from the following countries:</p>
<ul>
<li style="text-align: justify;">US</li>
<li style="text-align: justify;">UK</li>
<li style="text-align: justify;">Australia</li>
<li style="text-align: justify;">Canada</li>
<li style="text-align: justify;">China</li>
<li style="text-align: justify;">Czech Republic</li>
<li style="text-align: justify;">Germany</li>
<li style="text-align: justify;">Israel</li>
<li style="text-align: justify;">Japan</li>
<li style="text-align: justify;">Italy</li>
<li style="text-align: justify;">Korea</li>
<li style="text-align: justify;">Latvia</li>
<li style="text-align: justify;">Luxembourg</li>
<li style="text-align: justify;">Malaysia</li>
<li style="text-align: justify;">Mexico</li>
<li style="text-align: justify;">Netherlands</li>
<li style="text-align: justify;">Norway</li>
<li style="text-align: justify;">Romania</li>
<li style="text-align: justify;">Singapore</li>
<li style="text-align: justify;">Sweden</li>
<li style="text-align: justify;">Switzerland</li>
<li style="text-align: justify;">Turkey&nbsp;</li>
</ul>
<p style="text-align: justify;">The only notable ones missing were Spain and France. This is the <strong>best VPN functionality we’ve seen</strong> from any VPN provider we’ve tested. Combined with <strong>fast VPN speeds</strong>, streaming is quick and available from&nbsp;<strong>almost anywhere on the planet</strong>.</p>
<p style="text-align: justify;">StrongVPN advises users to report services that are blocked by sending a tracert report. If there’s a genuine problem, they’re usually good at fixing it.&nbsp;</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/bbciplayer_strongvpn.png" alt="StrongVPN unblocks BBC iPlayer " title="StrongVPN unblocks BBC iPlayer " /></p>
<p style="text-align: center;">StrongVPN unblocks BBC iPlayer&nbsp;</p>
<p style="text-align: justify;">The unblock Netflix functionality extends to other services. Using a fast VPN connection from the UK, we were able to access <strong>BBC iPlayer</strong> without any issues. Though it currently only supports less secure protocols, StrongVPN is clearly the top in its class at <strong>bypassing region blocks</strong>. Much of this is down to its StrongDNS tool, which helps to convince websites the connection is genuine.</p>
<h2 style="text-align: left;"><a name="strongvpn-for-torrenting">StrongVPN for Torrenting</a>&nbsp;</h2>
<p>VPNs are popular for <strong>torrenting</strong> and <strong>peer-to-peer downloads </strong>and StrongVPN certainly did not disappoint. Using a legal download of Ubuntu, we first tested <strong>without the VPN enabled</strong> from the UK:</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/torrent-download-without-strongvpn.png" alt="torrent download without strongvpn" style="display: block; margin-left: auto; margin-right: auto;" title="torrent download without strongvpn" /></p>
<p style="text-align: center;">Torrent downloading <strong>without</strong> VPN enabled</p>
<p>Torrent download speeds were not the greatest despite our fast connection but there are many factors at play here, including variation in healthy peers and ISP bandwidth caps.</p>
<p>We then enabled our StrongVPN connection and re-tested the same download <strong>noticing a significant increase in download speed</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/torrent-download-with-strongvpn.png" alt="torrent download with strongvpn enabled" style="display: block; margin-left: auto; margin-right: auto;" title="torrent download with strongvpn enabled" /></p>
<p style="text-align: center;">Torrent downloading speed increased <strong>with</strong> StrongVPN <strong>enabled</strong></p>
<p>This test also confirms the results we saw during the writing of our <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN for Torrenting">VPN for Torrenting</a> article where our<strong> download speeds increased</strong> from <strong>1.2Mb/sec</strong> to <strong>3.1Mb/sec</strong> <strong>after enabling our StrongVPN client</strong>.</p>
<p>As a general rule of thumb users downloading via torrent should be using a VPN to help ensure their download speeds are not capped by their ISP. While no ISP will admit they are in fact throttling connections, when using a VPN we can clearly see the difference.</p>
<p><strong>StrongVPN's no-log policy</strong> also helps ensure user data is not tracked or logged.</p>
<h2 style="text-align: left;"><a name="voip-and-video-calls">VoIP &amp; Video Calls</a></h2>
<p style="text-align: justify;"><strong>VoIP</strong> and <strong>Video calls</strong> are one of the toughest tests when it comes to VPNs mainly because VoIP is very sensitive to <strong>latency</strong> (delay). Generally any <strong>one-way delay&nbsp;</strong>greater than <strong>150ms</strong> (0.15 seconds) will be evident to everyone that’s participating in the call.</p>
<p style="text-align: justify;">We wanted to test StrongVPN under the most extreme conditions so we decided to perform <strong>VoIP and video calls&nbsp;</strong>from <strong>Australia to Australia</strong> via a <strong>StrongVPN server</strong> located in the <strong>United States</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn-voip-video-calls-latency-test.png" alt="strongvpn voip video calls latency test" title="strongvpn voip video calls latency test" /></p>
<p style="text-align: justify;">We connected our mobile VPN client with a StrongVPN server in <strong>Washington DC</strong> and then launched three different VoIP/Video applications: <strong>Viber</strong>, <strong>Skype</strong> and <strong>Zoiper</strong>. We made VoIP and video calls to users located in Australia forcing packets to travel to the USA and then back to Australia as shown in the diagram above.</p>
<p style="text-align: justify;">The results were surprisingly great as there were very few times we had delays which were barely noticeable. Video and audio worked great without any issues and our Viber application continuously reported <strong>Excellent Network Quality</strong> even during video calls:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/strongvpn-voip-testing.png" alt="VoIP and Video calls work great with StrongVPN" title="VoIP and Video calls work great with StrongVPN" /></p>
<p style="text-align: center;" align="center">VoIP and Video calls work great with StrongVPN</p>
<h2 style="text-align: left;"><a name="does-strongvpn-keep-logs">Does StrongVPN Keep Logs?</a>&nbsp;&nbsp;</h2>
<p style="text-align: justify;">Though StrongVPN has some considerable security features, it can still be compromised if the service keeps logs. When browsing, a user hides behind a VPN’s server IPs. However, logs allow a government agency or copyright holder to discover the user’s true identity via a legal request. This is particularly important for StrongVPN, as it’s based in the US. The US has many surveillance programs and is part of the <a href="https://en.wikipedia.org/wiki/Five_Eyes" target="_blank" rel="nofollow noopener" title="five-eyes intelligence alliance">five-eyes intelligence alliance</a>.</p>
<p style="text-align: justify;">Thankfully, StrongVPN does not keep VPN connection logs of any kind. Its privacy policy reads as follows:</p>
<p style="text-align: justify;"><em>“StrongVPN does not collect or log any traffic or use of its Virtual Private Network service.</em></p>
<p style="text-align: justify;"><em>We will only comply with all valid subpoena request that follow the letter of the law. We cannot provide information that we do not have. StrongVPN will not participate with any request that is unconstitutional.”</em></p>
<p style="text-align: justify;">This is a relatively recent change. In the past, StrongVPN was known for keeping logs, both for fourteen days and indefinitely. It’s great to see the service adapting to modern requirements and providing its users with more privacy as a result. Bear in mind the service has been around for 20 years, before the extent of mass surveillance was known. This gives a little leeway to its old policies.</p>
<p style="text-align: justify;">However, even the best VPNs tend to keep logs on their website. StrongVPN is no different in this regard. Reliable Hosting collects cookies, Google analytics, and other such services. This is used to improve the service and isn’t sold to third parties.</p>
<p style="text-align: justify;">Account information is stored too. This includes your billing address, name, email address and more. The logging policy differs depending on the payment method you use, however. <strong>StrongVPN does support Bitcoin</strong>, which provides significantly more <strong>anonymity</strong>. You can also use a fake name and email address to circumvent some of these worries.</p>
<h2 style="text-align: left;"><a name="support-response-time-and-quality">Support – Response Time and Quality</a>&nbsp;</h2>
<p style="text-align: justify;">StrongVPN says its support is second to none and, in our usage, that was the case. The <strong>24/7 live chat</strong> has a strict hierarchy and <strong>dedicated tech support</strong>, something we haven’t seen with any other service. This was refreshing, as support agents had <strong>in-depth knowledge</strong> about what they were discussing and how to provide help.</p>
<p style="text-align: justify;">Response times were very quick, and we managed to get in contact with a human within a few minutes, even at peak times. We presented a number of issues, including connection errors and OpenVPN setup. Tech support solved both quickly, and provided more details about the service. They were clearly typing information personally, rather than copying and pasting answers.</p>
<p style="text-align: justify;">StrongVPN also has <strong>email support</strong> for non-urgent cases. The response is much the same, with detailed, personalized answers in a short time frame. It never took more than a couple of hours to get a reply, which is definitely acceptable when there’s <strong>24/7 support via livechat</strong>.</p>
<p style="text-align: justify;"><strong>All in all, StrongVPN’s support is exceptional</strong>. Naturally, it depends on the support agent but we were impressed with their admittance of broken features, where others would try to skirt around the issue. Though the service might be considered expensive by some, it does come with some of the <strong>best VPN support</strong> around.&nbsp;</p>
<h2 style="text-align: left;"><a name="value-for-money">Value for Money</a>&nbsp;</h2>
<p style="text-align: justify;">On the topic of price, StrongVPN’s value really depends on what you’re using it for. The $3.80 subscription fee is very cheap, and not at all extortionate.</p>
<p style="text-align: justify;">Those who want to <strong>bypass region blocks</strong> or be <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="safe on public WiFi">safe on public WiFi</a> will be much more suited to this service. It’s the <strong>best VPN we’ve seen to unblock Netflix</strong>, and is a <strong>fast VPN aswell</strong>. Its offering of <strong>23 countries</strong> is more than enough, and platform availability is also a strong point.</p>
<h2 style="text-align: left;"><a name="summary">Summary</a>&nbsp;</h2>
<p style="text-align: justify;"><strong>StrongVPN</strong> has changed a lot in recent years, and it’s worth keeping an open mind. &nbsp;Its <strong>fast download speeds</strong>, simple but&nbsp;<strong>effective VPN client</strong>, <strong>strong encryption</strong>, <strong>zero-log policy</strong>, awesome ability to <strong>unblock Netflix</strong>, <strong>LuLu</strong> and <strong>BBC iPlayer</strong> makes it a clear <strong>winner</strong>. And if you aren’t happy with the service, StrongVPN still has a <strong>five-day money back guarantee</strong>.</p>
<p><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Visit StrongVPN"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-strongvpn/button-blue-visit-strongvpn.png" alt="Visit StrongVPN" style="display: block; margin-left: auto; margin-right: auto;" title="Visit StrongVPN" /></a></p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Wed, 21 Jun 2017 23:06:06 +1000</pubDate>
		</item>
		<item>
			<title>Best VPN Review: Private Internet Access (PIA) Features, Pricing, User Experience, Benchmarking &amp; Torrenting</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/best-vpn-private-internet-access.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/best-vpn-private-internet-access.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="Private Internet Access VPN"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/private-internet-access-best-vpn-review.png" alt="Private Internet Access PIA VPN Review" style="margin: 7px; float: left;" title="Private Internet Access PIA VPN Review" /></a>The market for <strong>Virtual Private Networks</strong> has exploded over the past few years. A wealth of new providers has appeared, promising logless browsing, true anonymity, and fast speeds. Through all that noise, it’s becoming increasingly difficult to find the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Review">Best VPN</a> for your needs.</p>
<p style="text-align: justify;">Thankfully, there are some established brands that stand above the rest. One of these is <a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="PIA VPN Service"><strong>Private Internet Access</strong></a> (<strong>PIA</strong>), launched by London Trust Media in 2010. <strong>PIA</strong> is very popular for <strong>P2P downloads</strong>, allowing torrents on every server via secondary VPNs.</p>
<p style="text-align: justify;">In addition, PIA keeps <strong>no logs</strong> and eliminates <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="Understanding, Testing and Avoiding DNS Leaks"><strong>DNS leaks</strong></a>, <strong>IPv6 leaks</strong>, <a href="https://www.firewall.cx/security/vpn-services-guides/anonymous-browsing-secure-your-online-identity.html" target="_blank" title="How to Avoid Web Tracking"><strong>web tracking</strong></a> and <strong>malware.</strong> It boasts over <strong>3200 servers</strong> across <strong>24 countries</strong>, as well as a <strong>free <a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html" target="_blank" title="Ultimate Guide to Free Socks - Socks5 Proxies">SOCKS5 proxy</a></strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/private-internet-access-best-vpn-review-gateways.png" alt="PIA’s VPN Gateways provide thousands of servers across the globe" style="display: block; margin-left: auto; margin-right: auto;" title="PIA’s VPN Gateways provide thousands of servers across the globe" /></p>
<p style="text-align: center;" align="center">PIA’s VPN Gateways provide thousands of servers across the globe</p>
<p style="text-align: justify;">It’s a fast VPN and quite wide-reaching. All of this comes at a price of <strong><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="Cheap PIA VPN Internet Access">only $3.33 (US) a month</a></strong>, though there are a few caveats.</p>
<p><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="Private Internet Access VPN Pricing"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/private-internet-access-best-vpn-review-plans.png" alt="PIA VPN represents an amazing value for money" style="display: block; margin-left: auto; margin-right: auto;" title="PIA VPN represents an amazing value for money" /></a></p>
<p style="text-align: center;" align="center">At only $3.33/month US, PIA represents an amazing value for money</p>
<p style="text-align: justify;">Primarily, there is a slightly limited ability to bypass region blocks. PIA might require logging into a few VPN servers to find one that successfully unblocks Netflix or Hulu, but does work without a problem with BBC and other geo-restricted content. Additionally, its popularity means users are more likely to be incorrectly blacklisted from sites.</p>
<p style="text-align: justify;">While the desktop VPN client seems fairly simple, the iOS and Android clients are have a more pleasing look and interface. Despite the simplified desktop interface PIA still remains one of the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Review">Best VPNs</a> around offering great value for money.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/private-internet-access-best-vpn-review-features.png" alt="Quick overview of VPN features offered by Private Internet Access" style="display: block; margin-left: auto; margin-right: auto;" title="Quick overview of VPN features offered by Private Internet Access" /></p>
<p style="text-align: center;" align="center">Quick overview of VPN features offered by Private Internet Access</p>
<h2 style="text-align: left;">PIA VPN Client Installation</h2>
<p style="text-align: justify;">Although it may not be the most beautiful VPN client out there, the sign-up and install process for PIA is simple, and the website is nice enough to make the signup and client installation an easy-to-follow process even for novice users. Registration requires only a couple of clicks and an email address. PIA takes care of the password for you, sending your user and login details via those details. You’re also given a link to the client installer for each platform, guides, and a dedicated new user support thread. It’s all fairly fool-proof.</p>
<p>In fact, the install process is so easy that you probably won’t need the support. Users just have to open the file and everything is taken care of. No hitting next, no choosing install locations. A command prompt window opens and installs everything you need.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-vpn-client-settings.png" alt="pia vpn client settings" style="display: block; margin-left: auto; margin-right: auto;" title="pia vpn client settings" /></p>
<p style="text-align: center;" align="center">PIA VPN Client has a simple, yet effective, interface with plenty of useful options</p>
<p style="text-align: justify;">Despite the client’s simplistic design, it does provide all the functionality you need in an easy-to-use interface. Connecting to a VPN server can be managed straight from the system tray, and right-clicking offers more options. Its usability is up there with the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPNs Review">Best VPNs Review</a>.</p>
<h2 style="text-align: justify;">VPN Client Platform Availability</h2>
<p style="text-align: justify;">This ease of use extends to most of the major platforms. PIA has a <strong>Windows</strong> and <strong>Mac OSX</strong> client, as well as an app for <strong>iPhone</strong>, <strong>iPad</strong>, and <strong>Android</strong> smartphones/tablets. Platforms like <strong>Windows Mobile</strong> do not have a dedicated client, but can utilize the less secure L2TP protocol via settings. In general, we found the apps easy to use, more so than the desktop client. They have a modern GUI and the ability to start the VPN in one click. Without doubt PIA has one of the <strong>best VPN apps</strong> out there on the <strong>mobile platform</strong>.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-vpn-client-mobile-platform.png" alt="pia vpn client mobile platform" style="display: block; margin-left: auto; margin-right: auto;" title="pia vpn client mobile platform" /></p>
<p style="text-align: center;" align="center">PIA Mobile VPN Client – Great features and easy to use</p>
<p>There’s also support for <strong>Linux</strong>, although the complexity depends on distribution. <strong>Ubuntu 12.04+</strong> is the most supported, and has a dedicated installer that can be run through terminal:</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-linux-vpn-client.png" alt="pia linux vpn client" style="display: block; margin-left: auto; margin-right: auto;" title="pia linux vpn client" /></p>
<p style="text-align: center;" align="center">The PIA Linux VPN Client installation process and login</p>
<p style="text-align: justify;" align="center">Most other distributions can install PIA via package manager commands. The exact ones depend on the version of Linux but, generally, it looks something like this:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-linux-openvpn-client-installation.png" alt="pia linux openvpn client installation" style="display: block; margin-left: auto; margin-right: auto;" title="pia linux openvpn client installation" /></p>
<p align="center">PIA OpenVPN Client Installation</p>
<p style="text-align: justify;">However, some users are subject to restrictive network policies, causing issues with the dedicated Linux VPN client. In this case, they must use the <strong>standalone OpenVPN client</strong>. On Linux, this is a bit complex. Though PIA doesn’t have a dedicated support thread, a forum post details the steps for various Debian distributions. It would be good to see a bit more support, but the OpenVPN application isn’t controlled by PIA so it’s forgivable.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-openvpn-client-login.png" alt="pia openvpn client login" style="display: block; margin-left: auto; margin-right: auto;" title="pia openvpn client login" /></p>
<p style="text-align: center;">PIA OpenVPN (Windows) Client Login</p>
<p>Windows users have an easier time of things. They can use the OpenVPN client by following <a href="https://helpdesk.privateinternetaccess.com/" target="_blank" rel="nofollow noopener" title="OpenVPN Client Installation Guide">this guide</a>. All it takes is a simple installer and a configuration file. Naturally, you will not have access to the <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="VPN Features and Guide">best VPN features</a> like <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS leak protection">DNS leak protection</a>, a <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="VPN Guide &amp; Features - Kill Switch">kill switch</a>, and <strong>PIA MACE</strong> (Analysed below). However, it does offer a fast VPN service that can bypass network restrictions.</p>
<h2>Router VPN Support</h2>
<p>Some users find it easier to set up a VPN on their router rather than running VPN clients on every machine. This way, all connections on the network are encrypted by default. Unlike some other VPN providers, PIA does not offer a dedicated application/firmware that users can load on compatible hardware routers but this can be easily overlooked as PIA is fully compatible with open source alternatives such as DD-WRT, Tomato router software and even PfSense.</p>
<p style="text-align: left;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-tomato-vpn-setup.png" alt="pia tomato vpn setup" style="display: block; margin-left: auto; margin-right: auto;" title="pia tomato vpn setup" /></p>
<p style="text-align: center;">PIA Tomato VPN setup</p>
<p style="text-align: justify;"><strong>Private Internet Access</strong> team has <a href="https://helpdesk.privateinternetaccess.com/" target="_blank" rel="nofollow noopener" title="PIA Support for OpenVPN">extensive guidance</a> on this and all three solutions use <strong>OpenVPN</strong>. It isn’t the easiest process, but it’s possible with a little effort.</p>
<h2>Privacy, Security and Encryption</h2>
<p style="text-align: justify;">With a name like <strong>Private Internet Access</strong>, you would expect PIA to have considerable security. Fortunately, it does live up to its name. It supports <strong>PPTP</strong>, <strong>OpenVPN</strong>, and <strong>L2TP/IPSec</strong> encryption methods. These each have advantages and disadvantages, as stated in our <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="beginner’s guide to VPNs">beginner’s guide to VPNs</a>.</p>
<p style="text-align: justify;">By default, PIA utilizes <strong>OpenVPN</strong>, which is standard for all the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="best VPN review">best VPNs</a>. Users can choose between <strong>AES-128 level encryption</strong> and the slower, more secure <strong>AES-256</strong>. They can also choose between <strong>SHA-1</strong> and <strong>SHA-256 data authentication</strong>, and various handshake methods. You can customize PIA to give maximum protection, none, or somewhere in the middle. Combined with the variety of platforms, these features ensure users can stay safe even on <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="Protecting your privacy when connecting via public WiFi">public WiFi</a>.</p>
<p style="text-align: justify;">Private Internet Access also tries to mitigate other security issues. A dedicated PIA <strong>MACE</strong> setting blocks information leaks due to ads, trackers, and malware. MACE uses a <a href="https://helpdesk.privateinternetaccess.com/" target="_blank" rel="nofollow noopener" title="configuring custom DNS server">custom DNS server</a> so that requests from unwanted domains return an incorrect IP address. This is a step further than many providers.</p>
<p style="text-align: justify;">PIA also promotes a <strong>Kill-Switch</strong> feature. When the VPN cuts out or drops, the client disables a user’s internet connection. This is so their real identity is never revealed. What’s more, it reconnects automatically after <strong>sleep mode</strong> – a handy feature not found on many VPN clients. Although PIA previously had issues with the <strong>VPN Auto-Connect</strong> feature, this has been resolved in the latest release.</p>
<p style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS leak">DNS leak</a> worries are addressed too, via a dedicated toggle. Often, OS issues cause a user’s IP address to become public through the <a href="https://www.firewall.cx/networking/network-protocols/dns-protocol.html" target="_blank" title="Domain Name System">Domain Name System</a>. PIA has taken the time to resolve this, despite it being more of an OS issue than a VPN one.</p>
<p style="text-align: justify;">IPv6 leaks are another concern, and the PIA client has protection for those. Again, this is optional, and is <strong>off</strong> by <strong>default</strong>. If all that’s still not enough, PIA provides a <a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html" target="_blank" title="SOCKS5 proxy"><strong>SOCKS5 proxy</strong></a> that can be layered on top of a VPN connection. This provides no extra encryption, but does further obscure the IP address.</p>
<h2>DNS Leak Protection Test</h2>
<p style="text-align: justify;">Unfortunately, you can’t always trust what VPN providers put on their websites. Where possible, you should do independent tests of key features. The best VPN providers have security teams consistently testing for vulnerabilities. However, gaps in security can still happen without the provider knowing. As a result, we tested PIA’s functionality, starting with <strong>DNS Leak Protection</strong>.</p>
<p style="text-align: justify;">First, we used <strong>DNSleaktest.com</strong> to run an advanced test without <strong>DNS Leak Protection</strong> enabled. We got the following result:</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/dns-leak-test-disabled.png" alt="dns-leak-test-disabled" title="dns leak test disabled" /></p>
<p style="text-align: center;" align="center">DNS Leak test <strong>without</strong> PIA’s DNS Leak Protection enabled</p>
<p style="text-align: justify;" align="center">The test returned the IP address of the VPN server (Choopla) and our IP address 81.139.58.46 (British Telecom). No surprises there, our OS wasn’t optimized to stop this.</p>
<p style="text-align: justify;" align="center">However, PIA’s <strong>DNS leak protection</strong> setting is supposed to mitigate that issue. With the setting <strong>enabled</strong>, DNSleak.com came back with this:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/dns-leak-test-enabled.png" alt="dns-leak-test-enabled" title="dns leak test enabled" /></p>
<p style="text-align: center;" align="center">DNS Leak test with PIA’s DNS Leak Protection enabled</p>
<p style="text-align: justify;">This time, only the IP address of the VPN shows up. PIA’s feature seems to work perfectly, giving true anonymous browsing. Just to be sure, we tested again using a different site, <strong>cyptoip.info</strong>.</p>
<p style="text-align: justify;">Initial test was <strong>without enabling</strong> PIA’s <strong>DNS Leak Protection</strong> option:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-dns-leak-test-without-protection.png" alt="pia-dns-leak-test-without-protection" title="pia dns leak test without protection" /></p>
<p style="text-align: justify;">Again, the test confirmed there is a DNS Leak as it returned the IP address of the VPN server (Choopla) and our IP address 81.139.58.46 (British Telecom).</p>
<p style="text-align: justify;">Next, we disconnected from the VPN server, <strong>enabled DNS Leak Protection</strong> in our VPN client and reconnected to the VPN server. Executing the DNS Leak test provided the following results:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-dns-leak-test-protection.png" alt="pia-dns-leak-test-protection" title="pia dns leak test protection" /></p>
<p style="text-align: justify;">Once more, PIA successfully <strong>resolved DNS leak issues</strong>. Though we can’t vouch for it on every system, it’s a solid indication. To be certain, users should always modify system settings as per our <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS leak guide">DNS leak guide</a>.</p>
<h2 style="text-align: left;">Kill Switch Protection Test</h2>
<p style="text-align: justify;">So, PIA’s <strong>DNS leak protection is pretty solid</strong>. How about the ‘kill switch’ feature? It’s hard to test consistently, but we didn’t run into any problems. Disconnecting from the VPN immediately turns off the Wi-Fi connection and no web pages will load:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-kill-switch-blocks-internet.png" alt="PIA’s Kill Switch blocks internet access when not connected to the VPN" title="PIA’s Kill Switch blocks internet access when not connected to the VPN" /></p>
<p style="text-align: center;" align="center">PIA’s Kill Switch blocks internet access when not connected to the VPN</p>
<p style="text-align: justify;">However, this doesn’t mean that no leak is occurring. Even slight delays to block internet traffic might cause our IP address to leak for a couple of seconds. To test further, we monitored for any IP changes during connect and disconnect with ipleak.net. We found the real IP address was not displayed at any point. That’s a definite plus that helps keep your identity hidden.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-kill-switch-test.png" alt="pia-kill-switch-test" title="pia kill switch test" /></p>
<p style="text-align: justify;">However, it’s worth noting that PIA’s Kill Switch feature does not work if you use more than one network interface. It can also cause connectivity issues in rare cases. You should only use the feature if you need <a href="https://www.firewall.cx/security/vpn-services-guides/anonymous-browsing-secure-your-online-identity.html" target="_blank" title="anonymous browsing">anonymous browsing</a>, and ought to disable any extra network interfaces.</p>
<h2 style="text-align: left;">WebRTC Protection Test</h2>
<p style="text-align: justify;">Occasionally, VPNs offer protection against <strong>WebRTC</strong>. For those unfamiliar, WebRTC is a communications protocol that <strong>enables video conferencing</strong> and <strong>file transfer</strong> without extra browser plugins. However, a flaw lets websites discover the true IP address of a user even if they’re using a VPN.</p>
<p style="text-align: justify;">With features like <strong>PIA MACE</strong>, it can be difficult to tell what is included in “tracking protection.” We contacted support, asking what it covers. In regards to WebRTC, we got this reponse:</p>
<p style="text-align: justify;">“WebRTC is a browser issue, not a VPN problem, and not unique to our service. Mace <strong>does not protect</strong> from WebRTC.”</p>
<p style="text-align: justify;">Our own tests were shaky. Using the <a href="https://browserleaks.com/webrtc" target="_blank" rel="nofollow noopener" title="Browserleaks WebRTC test">Browserleaks test</a> we did confirm a WebRTC connection in unmodified browsers:</p>
<p style="text-align: center;"><span style="font-size: 11pt; line-height: 107%; font-family: 'Calibri','sans-serif';"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-webrtc-test.png" alt="pia-webrtc-test" style="border: 1px solid #000000;" title="pia webrtc test" /></span></p>
<p style="text-align: justify;">This happens even with PIA’s extra security measures enabled. However, the IP address WebRTC detects seems to point to the VPN server IP, not ours. PIA seems to route <strong>STUN requests</strong> through its servers to hide the client’s real IP address. So, there does seem to be some protection, but it’s not related to <strong>MACE</strong>.</p>
<p style="text-align: justify;">However, it’s hard to say how comprehensive this solution is. WebRTC isn’t PIA’s responsibility, as the support agent pointed out. Even the best VPNs can’t substitute for user configuration.</p>
<h2 style="text-align: left;">Does Private Internet Access Keep Logs?</h2>
<p style="text-align: justify;">PIA provides great security, and it doesn’t lie about its features. Still, this functionality is useless if it keeps logs. A warrant from law enforcement or the NSA and your private data is in the open. This has happened several times, including <strong>hidemyass </strong>(another VPN provider) in 2011. <strong>Private Internet Access</strong> claims it does <strong>not keep traffic logs</strong> and <strong>provides true, anonymous browsing</strong>.</p>
<p style="text-align: justify;">However, it’s difficult to trust a provider’s word with so much pressure from law enforcement. IN PIA’s case we can be quite certain. Court documents from <strong>multiple bomb threats in 2016</strong> show the <strong>FBI could get no useful information from PIA</strong> (see page 12, section 33).</p>
<p style="text-align: justify;">“<em>All of the responses from 1&amp;1, Facebook, Twitter, and Tracfone have been traced by IP address back to a company named <strong>London Trust Media dba privateinternetaccess.com</strong>. This company is an anonymizing company whose purpose is to allow users of the internet to mask their original IP address where they are sending messages from. A subpoena was sent to <strong>London Trust Media</strong> and the <strong>only information they could provide is that the cluster of IP addresses being used was from the east coast of the United States</strong>.</em>”</p>
<p style="text-align: justify;">That’s a big endorsement, and shows that <strong>PIA is trustworthy</strong>. It seems unlikely that the FBI wouldn’t pull all the cards for such a serious threat.</p>
<p style="text-align: justify;">While PIA doesn’t keep traffic logs, it does track some aspects of its website usage. Its privacy policy reveals LTM (Private Internet Access) retains email addresses, payment data, and temporary cookies. It also keeps apache web server logs, anonymous Google analytics data, and credit card protection. It seems the “anonymous browsing” claim does not refer to accessing its website.</p>
<p style="text-align: justify;">However, PIA does seem to use this information in a genuine manner. An email address is essential for payment confirmation, and Apache web server logs are “regularly pruned,” with no usernames or passwords involved. Users can also pay by <strong>Bitcoin</strong> or connect through <a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html" target="_blank" title="Guide to TOR VPN Networks"><strong>TOR</strong></a> if they’re concerned.</p>
<p style="text-align: justify;">Despite the London name, PIA is based in the <strong>United States</strong>. This means considerable scrutiny from law enforcement and other bodies. However, company lawyer John Arsenault says there’s a <a href="https://arstechnica.com/tech-policy/2013/10/how-one-small-american-vpn-company-is-trying-to-stand-up-for-privacy/" target="_blank" rel="nofollow noopener" title="PIA backup plan">backup plan</a> if the climate there goes south. From 2012-2013, the company received eleven requests for user data, three of which were from outside the US. Of those, no user data was disclosed.</p>
<h2>Speed Test and Reliability</h2>
<p style="text-align: justify;">Alongside its privacy features, we found Private Internet Access to be a relatively fast VPN. From the <strong>UK</strong>, we used speedtest.net’s <strong>San Jose, CA server</strong>. <strong>Without PIA</strong>, we got a <strong>download speed of 90.26 Mb/s</strong>, an <strong>upload of 97.40Mb/s</strong>, and <strong>140ms ping</strong> (latency).</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-speed-test-without-vpn.png" alt="pia-speed-test-without-vpn" title="pia speed test without vpn" /></p>
<p style="text-align: center;" align="center">Non-VPN Speed Test with Speedtest.net San Jose</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">A connection with PIA’s closest UK VPN server netted a slight decrease in both download and upload speed:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-speed-test-with-vpn.png" alt="pia-speed-test-with-vpn" title="pia speed test with vpn" /></p>
<p style="text-align: center;" align="center">VPN-Enabled Speed Test with Speedtest.net San Jose</p>
<p style="text-align: justify;">Our <strong>download speed took close to a 10% hit</strong>, and <strong>upload fell by 6.42 Mb/s</strong>. That’s quite a <strong>fast VPN</strong> for all the encryption that’s going on. Ping also fell within the expected range.</p>
<p style="text-align: justify;">In all, PIA provided more than acceptable upload and download speeds. London Trust Media has over 3200 servers across 24 countries. That means coverage isn’t much of an issue, though we’d like to see a few more on the list.</p>
<p style="text-align: justify;">We did, however, experience a few problems with reliability. At times, the speed of servers seemed to drop – likely due to high traffic. However, you can lodge speed complaints straight from the client and they may be resolved. Despite its popularity, Private Internet Access was a fast VPN and, although it sometimes slowed, it never cut out completely.</p>
<h2 style="text-align: left;">Private Internet Access for Netflix and Region Blocks</h2>
<p style="text-align: justify;">Unfortunately, the popularity does come with some other issues. While some of the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="best VPNs">best VPNs</a> manage to unblock Netflix, PIA is a little shaky. <a href="https://www.firewall.cx/security/vpn-services-guides/anonymous-browsing-secure-your-online-identity.html" target="_blank" title="Anonymous browsing">Anonymous browsing</a> comes at a cost, and connecting from a US California server resulted in the well-known streaming error code F7111-1331-5059</p>
<p style="text-align: justify;">Netflix appears to regularly identify and remove IP addresses owned by PIA. However, we did manage to unblock Netflix from the US Texas server:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-netflix-unblocked.jpg" alt="pia netflix unblocked" title="pia netflix unblocked" /></p>
<p style="text-align: center;" align="center">The Magicians, not available on UK Netflix.</p>
<p style="text-align: justify;">So, watching Netflix with PIA is possible, but it may take some searching around to find a VPN server that is not blocked by Netflix. It’s a constant battle between any VPN provider and Netflix, and London Trust Media can’t afford to keep buying new servers. Due to legal issues, support agents are not able to help users unblock Netflix, either. That means you’ll have to test each server manually.</p>
<p style="text-align: justify;">This also applies to the local VPN server (in most cases). We couldn’t find a UK server that unblocks Netflix, despite testing from there. As a result, you may have to forego encryption while you watch. Not ideal, but the fault is Netflix’s rather than PIA’s. In Australia, this wasn’t an issue, as the servers haven’t been blacklisted yet. The Usefulness varies depending on country.</p>
<p style="text-align: justify;">Thankfully, the issue is also mostly limited to Netflix. We could access BBC iPlayer with ease from the UK London VPN server. It depends entirely on the service and how strictly they police. However, to fully unblock Netflix, you’ll want to check out our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Guide - Review">Best VPN Guide</a>.</p>
<h2>Private Internet Access for Torrenting</h2>
<p style="text-align: justify;">Though London Trust Media doesn’t support the download of illegal content, nothing is done to stop P2P downloads. We enjoyed a great experience downloading several legal torrents. There was a drop of no more than <strong>1 MB/s</strong>, and only slight differences in reliability. Our download speeds without VPN were averaging around <strong>8.7MB/s</strong> with a drop to <strong>7.7Mb/s</strong> after connecting to our PIA VPN.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/utorrent-download-without-vpn.png" alt="utorrent download without vpn" title="utorrent download without vpn" /></p>
<p style="text-align: center;" align="center">A BitTorrent download with no VPN enabled</p>
<p style="text-align: center;" align="center">&nbsp;</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/utorrent-downloading-with-pia-vpn.png" alt="utorrent downloading with pia vpn" title="utorrent downloading with pia vpn" /></p>
<p style="text-align: center;" align="center">BitTorrent downloading Using Private Internet Access</p>
<p style="text-align: justify;">&nbsp;Torrent functionality works on all servers and, on “high-risk” ones, PIA routes traffic through a secondary VPN to further hide IP addresses. In addition, PIA keeps no logs, so it can’t comply with requests from copyright holders.</p>
<p style="text-align: justify;">To verify the safety of P2P downloads with PIA, we ran the <strong>ipMagnet test</strong>, as per our <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN for torrenting guide">VPN for torrenting guide</a>. Only the VPN provider was shown, proving that PIA can hide the IP address even during P2P. For further safety, PIA provides a <strong>SOCKS5</strong><strong> proxy</strong>. Though this doesn’t offer encryption, it does give another layer to hide an IP address. You can see the initial, <strong>SOCKS5 IP address</strong>, followed by the VPN IP when it was disabled:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-ipmagnet-test.png" alt="pia-ipmagnet-test" title="pia ipmagnet test" /></p>
<p style="text-align: justify;">All of this makes <strong>Private Internet Access</strong> an excellent option for <strong>torrenting</strong>. It should also provide anonymous browsing on torrent sites, and bypass ISP throttling on download. $3.33 for fast VPN torrenting is almost a steal.</p>
<h2>Support – Response Time and Quality</h2>
<p style="text-align: justify;">No service is infallible, and it’s important to have support services in place. PIA no longer offers a 24/7 live chat service, instead opting for an email system. The average wait time is listed as <strong>4-6 hours</strong>.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/pia-average-support-response-time.png" alt="pia average support response time" title="pia average support response time" /></p>
<p style="text-align: justify;">However, we found this to be significantly less in practice. In three separate support cases, two received replies in exactly <strong>half an hour</strong>, and the third around <strong>45 minutes</strong>. That may not be as fast as a live chat, but it’s acceptable. This may just be to stop users being impatient if replies aren’t instantaneous.</p>
<p style="text-align: justify;">The quality of support was also good. Responses were a mixture of personalized content and copy-pasted guides for extra information. The agents answered questions clearly, were knowledgeable about the product, and even sent follow up emails.</p>
<p style="text-align: justify;">Unfortunately, PIA does not offer phone call support. This may be an issue if you have an urgent problem, but for anything else email should be fine. There’s also a variety of forum posts and FAQs covering a range of topics, so even that may not be necessary. It’s not the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="best VPN">best VPN</a> support around but for most users it will be plenty.</p>
<h2>Value for Money</h2>
<p style="text-align: justify;">Private Internet Access manages to deliver some of the <strong>best value for money in the industry</strong>. The subscription is cheaper than most VPN providers at its <strong>$3.33US/month</strong> based on a <strong>yearly subscription</strong>. Other tiers are a lot more expensive, six months adding up to $5.99 a month and one month $6.95. However, this is still lower than some of our best VPN providers.</p>
<p style="text-align: justify;">Despite the low fee, users still get a complete service. For less than a coffee each month, you get anonymous browsing and torrenting, good support, and more than enough speed. Though the ability to unblock Netflix is limited, there are a few servers that work and PIA can still dodge most geo-blocking. The <strong>free SOCKS5 proxy</strong> is another plus, allowing users to trade encryption for speed where needed.</p>
<p><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="Visit PIA VPN"><img src="https://www.firewall.cx/images/stories/vpn/vpn-review-pia/button-blue-visit-pia.png" alt="Visit PIA VPN" style="display: block; margin-left: auto; margin-right: auto;" title="Visit PIA VPN" /></a></p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">You’re also paying for the brand. Not to show-off to your friends, but in its certifications. London Trust Media has been around for ten years now, and is one of the few with tangible evidence to back up its no log policy.</p>
<p style="text-align: justify;">However, if users aren’t happy, PIA does have a <strong>seven-day money back guarantee</strong>. That should be more than enough time, and refunds are given with no questions asked. Unless Netflix blocking is your biggest use, the value for money is unmatched. That amazing price point is why we named Private Internet Access one of the best VPNs this year.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Sun, 26 Mar 2017 18:06:56 +1100</pubDate>
		</item>
		<item>
			<title>The Ultimate TOR vs VPN Guide – How TOR/VPN Works, Comparing Security, Speeds, Advantages and Disadvantages</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html</guid>
			<description><![CDATA[<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-1a.jpg" alt="Tor vs VPN Guide" style="margin: 7px; float: left;" title="Tor vs VPN Guide" />Back then, the Internet was so very young. Those were the times of Windows Maze Screensaver, of the classy Minesweeper, of grey-white MS Paint, and of silvery floppy disks. Gone are those days. Now, after completing its silver jubilee, the Internet has grown to be almost a multiverse of information, every micro-second its network mushrooms like anything. But even maturity comes with its own struggle. This enhanced version of the Internet carries its own <strong>privacy concerns</strong>.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">But not to worry, there are plenty of technologies and software developed to preserve your Internet privacy. <strong>TOR and VPN</strong> are the popular ones. So, here we explore and share which of the two comes out to be a better way to achieve a superior level of privacy on the Internet.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Before diving deep into the topic, let’s see what’s covered:</p>
<ul style="margin-top: 0cm; text-align: justify;">
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#what-is-internet-privacy" title="What is Internet Privacy">What is Internet Privacy?</a></li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#how-tor-works" title="How ToR Works">How TOR Works</a>
<ul>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#tor-onion-routing" title="ToR Onion Routing">ToR Onion Routing</a></li>
</ul>
</li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#how-vpns-work" title="How VPNs work">How VPNs Work</a></li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#vpn-protocols" title="VPN Protocols">VPN Protocols</a>
<ul style="margin-top: 0cm;">
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">PPTP – Point to Point Tunnelling Protocol</li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">L2TP/IPSec – Layer 2 Tunnel Protocol / IPSecurity</li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">SSTP – Secure Sockets Tunnelling Protocol</li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">OpenVPN</li>
</ul>
</li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#when-to-use-tor" title="When to use TOR VPN">When to use TOR</a></li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#when-to-use-vpn" title="When to use a VPN">When to use VPN</a></li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#tor-advantages-disadvantages" title="TOR Advantages and Disadvantages">TOR vs VPN – TOR Advantages and Disadvantages</a></li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#vpn-advantages-disadvantages" title="VPN Advantages and Disadvantages">TOR vs VPN – VPN Advantages and Disadvantages</a></li>
<li style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html#tor-vs-vpn-summary" title="TOR vs VPN Summary">TOR vs VPN Summary</a></li>
</ul>
<h2 style="text-align: left;"><a name="what-is-internet-privacy">What is Internet Privacy?</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">What if, at all times, someone is keeping an undersea eye on what you browse over Google, always peering into the messages as you chat with other people? Wouldn’t that make you uneasy? This is Internet privacy. That is, whatever information you share, or browsing you do over the Internet, keeps itself only to you, until you want it public.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">We continually hear about governments and ISPs spying on users and even other countries, which shows how unsafe the internet is. Thankfully, user awareness on internet privacy is continually improving as more and more users seek out bullet-proof methods to encrypt their communications and <a href="https://www.firewall.cx/security/vpn-services-guides/anonymous-browsing-secure-your-online-identity.html" target="_blank" title="Protect your Online Privacy">protect their online privacy</a>.</p>
<h2 style="text-align: left;"><a name="how-tor-works">How TOR Works</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-1b.jpg" alt="How ToR Works" style="margin: 7px; float: left;" title="How ToR Works" />TOR</strong> or <strong>The Onion Router</strong> is a free, open source software that comes under the development and maintenance of The Tor Project, a non-profit organisation funded by the US Government. TOR enables users to preserve their anonymity over Internet communications.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">To download, simply go to <a href="https://www.torproject.org" target="_blank" rel="nofollow noopener" title="ToR Project URL">www.TORproject.org</a>. There’s two bundles available for downloading, one is <strong>Vidalia</strong>, which requires a web browser pre-installed on your system. However, the other one, the <strong>TOR Browser Bundle,</strong> is preferred as it puts TOR directly into your system without you having to fulfil any prerequisites or additional installations.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">You can download the necessary files for your operating system by visiting: <a href="https://www.torproject.org/download/download.html.en" target="_blank" rel="nofollow noopener" title="https://www.torproject.org/download/download.html.en">https://www.torproject.org/download/download.html.en</a></p>
<h2 style="text-align: left;"><a name="tor-onion-routing">TOR - Onion Routing</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><a href="https://en.wikipedia.org/wiki/Tor_(anonymity_network)" target="_blank" rel="nofollow noopener" title="TOR">TOR</a> employs <strong>Onion Routing</strong>, a technology developed in the late nineties by a scientist named Syverson. It works at the <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP Layer">TCP Layer</a> of the network, using a multiple hop pathway. Whenever a user sends data across the network, TOR creates a relay of nodes (or hops) that decrypts the data, one layer at a time. This is where the <strong>TOR vs VPN</strong> battle actually takes off.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">The relay of nodes is randomly selected proxy servers from the TOR users’ network. When the data travels from a user to the first node, it decrypts the IP address of the second node. Similarly, when it reaches the second node, it decrypts the IP address of the third node and so on till it reaches the last node. At each node only information about the next node is decrypted, thus maintaining the anonymity of the user over the entire network. When the data packet reaches the exit node, the node there finally decrypts the IP address of the destination server/node.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">The following diagram provides an accurate representation of the <a href="https://en.wikipedia.org/wiki/Onion_routing" target="_blank" rel="nofollow noopener" title="ToR - Onion Routing"><strong>Onion Routing</strong></a> method described. Like the layers of an onion, each message (the core of the onion) is covered with layers of encryption. Each layer is removed as it is received by a TOR Node (Router) and then forwarded to the next TOR Node (Router):</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-1.jpg" alt="How ToR Works- Onion Routing VPN" title="How ToR Works- Onion Routing VPN" /></p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">Figure 1. TOR Onion Routing method. Each layer is removed by each node to reveal the message</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">The diagram below is another example which shows how data is exchanged within the TOR network to guarantee privacy and make it almost impossible to track where data packets originate from or the final destination:</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-2.jpg" alt="How data is exchanged in a ToR VPN Network" title="How data is exchanged in a ToR VPN Network" />&nbsp;</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">How TOR works – Data exchange between TOR nodes and normal non-TOR servers</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Note that TOR nodes/users are also able to access normal (non-TOR) websites and hosts in a similar manner.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">An example to further clarify the concept: let’s say you want to send a picture to your friend over the internet, without disclosing your location/IP address.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">So when you send the picture, what happens is that your phone, i.e. the <em>Client,</em> creates a data packet that comprises two parts: Data Payload and Header. Data Payload contains your message, in this case the picture, while the header carries all the information about the <em>Client’s</em> (your) and recipient’s IP address.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-3.jpg" alt="Data transfer process without TOR exposes the sender’s &amp; receiver’s IP address" title="Data transfer process without TOR exposes the sender’s &amp; receiver’s IP address" />&nbsp;</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">Figure 3. Data transfer process without TOR exposes the sender’s &amp; receiver’s IP address</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Now, if you are not using TOR, this data packet directly reaches out to your friend (<em>receiver</em>). And, if your friend is an IT person, it will be fairly easy for him to figure out your IP address from the header and thus the location, which you wanted kept private.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">However, with TOR, a different scene would play altogether.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">With TOR, this data packet from the <em>Client (sender)</em>, instead of reaching out directly to the <em>Server (receiver)</em>, passes through several proxy servers in between. At each layer, the data packet reveals only as much information as is required to reach the next layer. Thus at each step the data packet unfolds information only about the next node, not about the forthcoming layers. The layers unfold one at a time, to reach the destination <em>Server </em>safely without him knowing your location:</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-4.jpg" alt="Data transfer via the TOR network guarantees encryption and privacy" title="Data transfer via the TOR network guarantees encryption and privacy" />&nbsp;</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">Data transfer via the TOR network guarantees encryption and privacy</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">This way TOR doesn’t necessarily erase the footprints of the client but makes it less likely for the server to trace the client’s details. TOR’s strength lies in the number of proxies in the relay. These proxies are servers operated by volunteers connected to the TOR Project. So, the more volunteers the stronger the security network of TOR.</p>
<h2 style="text-align: left;"><a name="how-vpns-work">How VPNs Work (Virtual Private Networks)</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Our comprehensive <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Guide to VPNs">Guide to VPNs</a> covers everything you’ll need to know about VPNs however we’ll provide an overview as well to make it easier to compare VPNs with TOR.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">VPNs were created in to provide security to users sending data across a public network such as the internet.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Unlike TOR, VPN employs the Client-Server technology with a single hop relay. The intermediate node in the relay is called a VPN Server. A VPN Server acts as a proxy server to transmit data between the client and the internet as shown in the diagram below:</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/tor-vs-vpn-guide/tor-vpn-understanding-comparing-tor-with-vpn-5.jpg" alt="Securely accessing the internet via a VPN Service Provider" title="Securely accessing the internet via a VPN Service Provider" />&nbsp;</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">Securely accessing the internet via a VPN Service Provider</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">A VPN Client is usually a computer, laptop or mobile phone with VPN software installed and a VPN Server is generally located at the organization’s office, in the case of a company-private VPN, or at a large data center in the case of a VPN Service Provider.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Only a VPN Client with the right settings (credentials and VPN Server address) can connect to the VPN Server. A VPN Server combines the hardware and software technologies necessary to host and deliver VPN services over the network. The moment a VPN Client sends a message to connect to the VPN Server, the server will request the client to authenticate. If the credentials are correct, the client connects to the server creating an encrypted tunnel between the two endpoints. Data flowing between the client and VPN server is encrypted, thus preserving the client’s anonymity during the communication.</p>
<p style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="VPN Service Providers">VPN Service Providers</a> allow you, the client, to connect to their VPN Servers located around the world via VPN, thus encrypting your internet traffic to make it almost impossible to monitor and track.</p>
<p style="text-align: justify;">When the client (you) tries to access a resource on the internet, e.g. a website, instead of sending the request directly to the website, which would reveal your IP address and allow the ISP to monitor the session, the request is encrypted and sent to the VPN server. The VPN Server then reaches out to the website by forwarding the client’s request, however, the website sees that the request came from the VPN Server, not the client. This hides the end client completely making it impossible to track where the request originated.</p>
<p style="text-align: justify;">The same process applies whether you are <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="torrenting">torrenting</a>, sending-receiving emails, browsing websites or downloading content from the internet. One key-point to remember here is that when you authenticate in order to access a service, e.g. email, you are in fact disclosing your identity to the end server, however, your location is not revealed.</p>
<h2 style="text-align: left;"><a name="vpn-protocols">VPN Protocols</a></h2>
<p style="text-align: justify;">VPNs offer different layers of security depending on the encryption protocol. There is a number of VPN encryption protocols used today by VPN Providers and each has its advantages and disadvantages.</p>
<p style="text-align: justify;">Selecting the best VPN Protocol for your mobile device or computer can be a daunting task especially for new users but it can be simplified when you understand a few basic concepts.</p>
<p style="text-align: justify;">While our upcoming extensive guide to the Best VPN Protocol will cover this in great depth, let’s take a quick look at the most commonly used VPN protocols:</p>
<h3 style="text-align: left;">PPTP - Point to Point Tunnelling Protocol</h3>
<p style="text-align: justify;">PPTP stands for Point to Point Tunnelling Protocol. Developed by Microsoft decades ago, PPTP is supported by most operating systems including Windows, MAC, Mobile OS and Android. It is fast but at the cost of weak encryption. This means that a PPTP VPN can be easily cracked and shouldn’t be used when sending or transmitting sensitive information. PPTP also seems to works well on Wi-Fi hotspots.</p>
<h3 style="text-align: left;">L2TP/IPsec – Layer 2 Tunnel Protocol / IPSecurity</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Layer 2 Tunnelling Protocol and <a href="https://www.firewall.cx/networking/network-protocols/ip-security-protocol.html" target="_blank" title="IP Security Protocol">IP Security</a> offers good encryption resulting in heavy CPU processing, thereby decreasing its speed. L2TP is a much better replacement for the older PPTP but users need to be aware that the increased security/encryption comes at the cost of speed.</p>
<h3 style="text-align: left;">SSTP – Secure Sockets Tunnelling Protocol</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">The SSTP protocol is considered a very reliable and easy-to-use protocol. Its advantages include that it will pass through most firewalls, is difficult to block and is natively supported by all Windows platforms from Windows Vista SP1 onwards. Its encryption capabilities are considered moderate and the same applies to its speeds.</p>
<h3 style="text-align: left;">OpenVPN</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><a href="https://en.wikipedia.org/wiki/OpenVPN" target="_blank" rel="nofollow noopener" title="OpenVPN Protocol">OpenVPN</a> is a newer VPN protocol created and supported by the open-source community. OpenVPN offers the highest level of encryption but, at the same time, is the most flexible protocol available thanks to its ability to utilize the TCP or UDP protocol. It requires a VPN Client and is supported by Windows, Mac and Android Operating Systems. OpenVPN is the preferred VPN protocol as it combines flexibility, encryption and speed. OpenVPN is also the preferred VPN Protocol used by all VPN Providers in our extensive <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN review">Best VPN review</a>.</p>
<h2 style="text-align: left;"><a name="when-to-use-tor">When to use TOR</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">This ‘Dark Onion Science’ prevails. Over 25% of Internet users use TOR daily. That makes the comparison of <strong>TOR VPN</strong> even more interesting in many ways.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Here are a few examples where TOR can be used, in general:</p>
<h3 style="text-align: left;">By Social Workers, Activists &amp; Journalists without Borders</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">To avoid media censorships while working with sensitive information or secret projects</p>
<h3 style="text-align: left;">By Parents &amp; Households</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">To prevent digital stalking, image abuse and cyber spying.</p>
<h3 style="text-align: left;">Law Enforcement Agencies and Military on Undercover Missions</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">To stay away from the media eye and government hacking/monitoring groups</p>
<h3 style="text-align: left;">By Bloggers, Job Professionals or Normal People</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">To increase their privacy over internet or to simply avoid cyber theft.</p>
<h3 style="text-align: left;">Hidden Internet Services</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">This is a very interesting application of TOR. <strong>Hidden Services</strong> mean that a client hosts its website or service without disclosing its identity. Here, TOR provides anonymity to websites and other servers. These kinds of websites don’t even have a regular URL address, e.g. www.firewall.cx, instead TOR shows a randomly generated 16-digit code as its domain name. So, if there’s a TOR user trying to access a hidden services website, his browser will identify the domain via public keys and introduction points stored in a distributed hash table in the TOR Network. However, if the user doesn’t have TOR installed, there is no way of accessing these hidden internet services.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Apart from the above mentioned applications, the most common applications that use anonymous internet via TOR are Internet Relay Chat (IRC), Instant Messaging (IM) and World Wide Web (www) browsing.</p>
<h2 style="text-align: left;"><a name="when-to-use-vpn">When to use VPN (VPN Service Provider)</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">It is without doubt that VPNs are far more popular than TOR, however, let’s take a quick look at the common reasons people prefer to use VPNs:</p>
<h3 style="text-align: left;">To Access Restricted Websites – Bypassing Geo-Location Restrictions</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Netflix or Hulu are the most common examples here. Users who want to access their Netflix or similar account cannot do so when travelling overseas. With a VPN service you can connect to one of your provider’s VPN servers and access the online content as if you were located in that country – effectively bypassing any geo-location restriction. Another example is trying to access a domain or website that is blocked from your country, e.g. accessing facebook from China.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service Provider">Best VPN Service Provider</a> comparison also includes VPN Providers that provide access to Netflix and Hulu.</p>
<h3 style="text-align: left;">For Downloading via Torrents &amp; Avoiding Bandwidth Throttling</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Torrent downloading implies downloading illegal or pirated software, however, this is not 100% true. Many vendors offer legal downloading of their software via Torrents. ISPs unfortunately tend to “unofficially” throttle user bandwidth when they detect Torrent traffic. Using a VPN, all traffic is encrypted therefore there is <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="no bandwidth throttling">no bandwidth throttling</a> by the ISP.</p>
<h3 style="text-align: left;">Secure Mobile Device Internet Data</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Users tend to use their mobile devices today to access all sorts of content while commuting to work, casually surfing the internet or checking their bank accounts. No matter what the activity, with a VPN Service Provider that supports mobile clients users are sure that all their data and activities are encrypted and protected.</p>
<h3 style="text-align: left;">Authenticating to Websites or Private Resources (Email, Internet Banking etc)</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">When you are signing in with your credentials to an online resource, it’s always better to protect yourself from crawler bots and cyber fraud artists. A VPN will ensure your traffic is encrypted so anyone monitoring your traffic (e.g. at a public hotspot) won’t be able to see the data that is being transferred.</p>
<h3 style="text-align: left;">On Travel or Business</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">On the road, or at a hotel, VPNs are <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="How to stay safe while travelling - Public Hotspots, WiFi etc">just the right thing if you travel</a>. VPNs help bypass any firewall restrictions providing full internet access no matter where you might be.</p>
<h2 style="text-align: left;"><a name="tor-advantages-disadvantages">TOR vs VPN: TOR Advantages and Disadvantages</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><strong>Advantages Include:</strong></p>
<h3 style="text-align: left;">High Level of Anonymity</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">TOR gives you such a high level of anonymity it is almost impossible for a website to track you. The Onion Routing technology leaves no way through which your pathway can be tracked.</p>
<h3 style="text-align: left;">Free To Use</h3>
<p style="text-align: justify;">TOR is completely free!</p>
<h3 style="text-align: left;">Reliable</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Unlike VPNs where your privacy depends on how trustworthy your VPN Service Provider is, TOR is absolutely reliable. Owing to the randomly selected network of nodes, no one knows about the other and thus there is no concern about reliability here.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><strong>Disadvantages include:</strong></p>
<h3 style="text-align: left;">Non Traceable Exit Nodes</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Since the data packets at exit nodes are decrypted, whoever is running the exit node can misuse, leak or manipulate the information sent by you.</p>
<h3 style="text-align: left;">Blocked Relays</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Some relays are cleverly tracked and blocked by the ISPs. This can cause real difficulties in connection between users.</p>
<h3 style="text-align: left;">Slow Processing</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Since the data packets route through a number of proxy servers, the connection can be slow. This can cause irritation while watching or downloading large files like videos.</p>
<h3 style="text-align: left;">Unsuitable for Data-metered Plans</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">If your internet plan includes a specific amount of data, e.g. 10GB/month, TOR can become a big problem as your bandwidth will be used by other TOR nodes to transfer their data. This will result in quickly depleting your monthly data allowance.</p>
<h2 style="text-align: left;"><a name="vpn-advantages-disadvantages">TOR vs VPN: VPN Advantages and Disadvantages</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><strong>Advantages include:</strong></p>
<h3 style="text-align: left;">Variety of Security Encryption Levels Depending on your Online Activities</h3>
<p style="text-align: justify;">Whether you need to access your email, download torrents, stream videos, perform internet banking transactions or anything else, you can easily select the encryption level and help speed up the connection, or heavily secure it.</p>
<h3 style="text-align: left;">Compatible with Almost Any Device</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">VPNs are compatible with almost any iPhone and android device, Windows operating system or MAC OS. Tablets including iPad are also capable of running VPN client software. This makes it very easy for novice users to install a VPN client and securely connect to the internet.</p>
<h3 style="text-align: left;">Fast Speed</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">From multiple to just one proxy/node&nbsp; automatically increases the speed of data transmission in VPNs compared to that of TOR. This makes it highly suitable for torrenting or downloading large files. VPNs also allow you to select the server to which you connect - an option that considerably speeds up the overall download speeds one can acheive via a VPN connection.</p>
<h3 style="text-align: left;">Easy Availability, Installation and Support</h3>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">Unlike TOR, VPNs are easily allowed and operated by commercial companies that ensure fast and good quality services for their clients. If you have any problem there is almost always someone at the support desk that can help you via email or live chat.</p>
<h3 style="text-align: left;">Ability to bypass Firewall Restrictions</h3>
<p style="text-align: justify;">With the use of a VPN you can pretty much bypass any protocol or URL restriction in place, effectively opening the internet to your device.</p>
<p><strong>Disadvantages:</strong></p>
<p style="margin: 0cm 0cm 0.0001pt; line-height: normal; text-align: justify;">Despite the many advantages of VPNs, there still remains a fly in the ointment. Since information just passes in and out of the tunnel, companies operating the VPNs have access this information. The best way to protect yourself from your VPN Provider is to ensure they have a <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Beginners Guide to VPNs - no-log policy">no-log policy</a> which means they do not log any data or user activity on their VPN Servers. Our <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Beginners Guide to VPNs">Beginners Guide to VPNs</a> article provides all the necessary information new or existing VPN users need, including security concerns and VPN features that help enhance your protection.</p>
<h2 style="text-align: left;"><a name="tor-vs-vpn-summary">TOR vs VPN: Summary</a></h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">So, the comparison comes out like this: use TOR, or use VPN, each one of them has its own pros and cons. Both are good as long as you understand your needs, the level of anonymity you want over the Internet and at what price. It can cost your time and money. If you want to secure your Internet privacy, TOR is a great option if you have a fast and unmetered (unlimited bandwidth) connection. If you need fast downloading speeds, to bypass any firewall restrictions or just greater flexibility and better control of how you consume your monthly data plan, then a <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Firewall.cx - Best VPN Service Review"><strong>VPN is your solution</strong></a>.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;">In the comparison of <strong>TOR vs VPN</strong>, the user is the winner. And to the hackers and government agencies all we can say is, no snooping around!</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Mon, 20 Mar 2017 11:03:20 +1100</pubDate>
		</item>
		<item>
			<title>Complete Guide to SOCKS Proxy - How to Securely Bypass Blocks, Safe Torrenting, Free Proxy List, Anonymous Proxies, Access Restricted Content</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/socks-proxy.jpg" alt="Socks Proxy" style="margin: 7px; float: left;" title="Socks Proxy" />The internet is in a strange place right now. It’s no longer the open, free place it used to be. Increasingly, users are being subject to website blocks, attacks, and surveillance. For true safety or anonymity, precautions must be taken. Thankfully, there many ways for you to protect yourself, one of them being <strong>Socket Secure</strong> (<strong>SOCKS</strong>) proxies.</p>
<p style="text-align: justify;">While many have heard about SOCKS Proxies not many truly understand their purpose, how they work and the security-privacy levels they can offer. SOCKS proxies are often mistakenly considered an alternative or equivalent to <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Beginners Guide to VPNs - Everything you need to know about VPNs">VPNs</a> causing major confusion amongst users and providing false sense of security.</p>
<p style="text-align: justify;">In this article we'll be covering a wealth of topics relating to SOCKS Proxies, SSL, Configuration advise, Torrenting via SOCK, compare them with VPNs and much more so let's take a quick look at what we have in store before diving deeper:</p>
<ul class="check">
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#introduction-to-socks-proxies" title="Introduction to SOCKS5 Proxy">Introduction to SOCKS Proxies</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#how-ssl-works" title="How SSL Works">Understanding how HTTPS Encryption - SSL &amp; HTTPS Proxies work</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#how-socks5-works" title="How SOCKS5 Proxy works">How SOCKS5 Proxy Works</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#why-use-socks5-proxy" title="Why would I use a SOCKS5 Proxy">Why Would I Use a SOCKS5 Proxy?</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#when-to-use-socks5-or-vpn" title="When to use SOCKS5 or VPN">When to Use SOCKS5 Proxies, VPN or Both</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#combining-socks5-and-vpn" title="Combining  SOCKS5 Proxy and VPN">Combine a SOCKS5 Proxy and a VPN</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#socks5-vs-vpn-for-torrenting" title="SOCKS5 Proxy vs VPN for Torrenting">SOCKS5 Proxy vs VPN for Torrenting and P2P</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#configuring-socks5-for-torrenting-qbittorent-utorrent" title="Configuring SOCKS5 Proxy for Torrenting (qBittorrent, uTorrent)">Configuring SOCKS5 Proxy for Torrenting (qBittorrent, uTorrent)</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#configuring-firefox-chrome-for-socks5" title="Configuring FireFox, Chrome to use SOCKS5 Proxy">Configuring Firefox and Chrome to Use SOCKS5 Proxy</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#free-proxy-vs-paid" title="Free Proxy vs Paid Proxy">Free Proxy vs Paid</a></li>
<li style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html#socks5-proxy-us-netflix" title="Using SOCKS5 Proxy for US Netflix">Using SOCKS5 Proxy for US Netflix</a></li>
</ul>
<h2 style="text-align: justify;"><a name="introduction-to-socks-proxies"></a>Introduction To SOCKS Proxies</h2>
<p style="text-align: justify;">Like HTTP, SOCKS is an internet protocol, but it offers a further degree of anonymity. Connecting to a SOCKS proxy routes your traffic through a third-party server via TCP, assigning you a new IP address in the process. Because the IP address is different, web hosts can’t determine the physical location.</p>
<p style="text-align: justify;">This has the add-on effect of bypassing regional filtering. However, unlike <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Guide to VPNs - VPNs for Beginners">a VPN</a>, SOCKS doesn’t provide encryption. This means users don’t have true privacy and aren’t safe from attacks on <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="Public WiFi Security">Public WiFi</a> and government surveillance. In addition, SOCKS doesn’t run through every application, meaning regular browsing is not always safe.</p>
<p style="text-align: justify;">However, this lack of encryption does provide some benefits. The main one is speed. A SOCKS proxy doesn’t need resources to encrypt traffic and has far less overhead, so it’s usually faster than a VPN. Though proxies don’t provide protection from monitoring, they are a nice middle ground between HTTP and VPNs.</p>
<p style="text-align: justify;">The security of a SOCKS proxy also depends on the version it utilizes. Most modern proxies use either SOCKS4 or SOCKS5 to protect users, and there are some fundamental differences. As you would expect from a lesser version, SOCKS4 has fewer features.</p>
<p style="text-align: justify;">One example is the lack of support for <strong><a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="UDP Protocol Analysis">UDP</a> protocol-based applications</strong>. This cuts out programs that need faster, more efficient transfers, like games. <strong>SOCKS5</strong> also supports <a href="https://www.firewall.cx/networking/network-protocols/ipv6-intro.html" target="_blank" title="Understanding the IPv6 Protocol">IPv6</a> and <a href="https://www.firewall.cx/networking/network-protocols/dns-protocol.html" target="_blank" title="Domain Name Resolution">Domain Name Resolution</a>. This means the client can specify a URL rather than an IP address. This feature is also supported by SOCKS4a.</p>
<p style="text-align: justify;">As well as SOCKS, users can utilize the HTTP/HTTPS proxy method. HTTP proxies work similarly to SOCKS5, but utilize the HTTP protocol instead. This is the same method that transfers data to your computer when you type <strong>https://www.firewall.cx</strong>. These proxies fetch and receive primarily in HTTP and are generally used for web browsers. Some applications support HTTP proxy, others SOCKS proxy, and many both. HTTP is more intelligent than SOCKS5, but also less secure.</p>
<p style="text-align: justify;">Due to lack of UDP support and limited <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP Protocol Analysis">TCP</a> support, HTTP proxies don’t fully support <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN Torrenting">torrenting</a>. Often, they will filter out this type of data or block it. This blocking is especially prevalent in public HTTP proxies. In addition, HTTP tries to re-write the headers of the data in transit. The result is extremely slow or non-existent torrenting.</p>
<h2><a name="how-ssl-works"></a>Understanding How HTTPS Encryption - SSL &amp; HTTPS Proxies Work</h2>
<p style="text-align: justify;"><strong>HTTPS proxies</strong> utilize something called the <strong>Secure Socket Layer</strong>. In your browser, you’ll notice this as a green padlock next to the URL bar:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/ssl-url-green-padlock.png" alt="https enabled website - green lock" title="https enabled website - green lock" /></p>
<p style="text-align: justify;">In short, <strong>SSL creates a secure connection</strong> between the <strong>web server</strong> and the <strong>user’s browser</strong>. When you request a URL, the server sends your browser a copy of its <strong>SSL certificate</strong>. The browser <strong>verifies</strong> that it’s <strong>authentic</strong>, and the server then sends back a <strong>signed acknowledgment</strong>. Upon arrival, both start an <strong>SSL encrypted session</strong> and can share data safely.</p>
<p style="text-align: justify;">This encryption uses a method called <strong>public key cryptography</strong>. A server using SSL has both a <strong>public key</strong> and a <strong>private key</strong>. When a server first negotiates an SSL session with a client, it sends a copy of its <strong>public key</strong>. The client’s browser verifies the certificate and then uses the <strong>public key</strong> to create a <strong>symmetric key </strong>which is then sent to the server. The <strong>private key</strong> is <strong>never sent</strong> and always kept secret.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/how-ssl-works.png" alt="How HTTPS &amp; SSL works" title="How HTTPS &amp; SSL works" /></p>
<p style="text-align: justify;">The <strong>symmetric key</strong> is unique to the SSL session and used to encrypt/decrypt data exchanged between the client and server.</p>
<p style="text-align: justify;"><strong>HTTPS proxy</strong> works slightly differently. Using the <a href="https://en.wikipedia.org/wiki/HTTP_tunnel#HTTP_CONNECT_tunneling" target="_blank" rel="nofollow noopener" title="HTTP Connect Method">CONNECT method</a>, requests are converted to a transparent <a href="https://www.firewall.cx/networking/network-protocols/ipsec-modes.html" target="_blank" title="Tunneling protocols">tunnel</a>. However, this feature isn’t available in a lot of proxies and, when it is, users can still be vulnerable.</p>
<p style="text-align: justify;">Some versions of SSL are still open to attack through the <a href="https://en.wikipedia.org/wiki/Heartbleed" target="_blank" rel="nofollow noopener" title="Heartbleed bug"><strong>Heartbleed bug</strong></a>. This serious vulnerability was discovered in 2014 and allows attackers to <strong>steal private keys</strong> from servers, eavesdropping on communications and gaining access to passwords, emails and instant messages. <strong>Vulnerabilities in SSL</strong> and its predecessor <strong>TLS</strong> have been found <a href="https://en.wikipedia.org/wiki/Transport_Layer_Security#Attacks_against_TLS.2FSSL" target="_blank" rel="nofollow noopener" title="Vulnerabilities in SSL">several times</a> since then, including man-in-the-middle attacks that downgrade the user to a less secure version.</p>
<h2 style="text-align: justify;"><a name="how-socks5-works"></a>How SOCKS5 Proxy Works</h2>
<p style="text-align: justify;">While an HTTP proxy is designed to work in the web browser, a <strong>SOCKS5 proxy</strong> is more wide-reaching. SOCKS sits on the higher levels of the <a href="https://www.firewall.cx/networking/osi-model.html" target="_blank" title="OSI model">OSI model</a>, below SSL, which sits on the seventh application layer, and above <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP Protocol"><strong>TCP</strong></a> and <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="UDP Protocol"><strong>UDP</strong></a> on the <strong>transport layer </strong>(Layer 4). This offers several advantages. TCP works by forming a physical connection between the client and the server, trying to guarantee that every packet arrives at the destination in the same order it was sent. To do this, it puts all the content into a fixed format.</p>
<p style="text-align: justify;">Another use of <strong>UDP</strong> is in the <strong>Domain Name System</strong> (<strong>DNS</strong>), which allows for translation of URLs into IP addresses. The combination of both TCP and UDP creates a more flexible and reliable experience.</p>
<p style="text-align: justify;">The low level of <strong>SOCKS5</strong> also means it can handle several different request types: <strong>HTTP</strong>, <strong>HTTPS</strong>, <strong>POP3,</strong> <strong>SMTP</strong> and <strong>FTP</strong>. As a result, <strong>SOCKS5</strong> can be used for email, web browsing, peer-to-peer and more. More importantly, users can do this in a somewhat anonymous fashion.</p>
<p style="text-align: justify;">When you connect to a website, the traffic usually runs through a firewall on the router or by the ISP. A <strong>SOCKS5 proxy</strong> routes your data through its proxy server, creating a path through the network’s firewall. In doing so the user is assigned an IP address, which makes it look like they’re browsing from a different location and protects their identity.</p>
<p style="text-align: justify;">As mentioned before <strong>proxies don’t encrypt data like <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="VPN Guide for Begineers">a VPN</a></strong>, which means you can access these services with very little slowdown. This is because there is no need to re-write header data. This, in turn, leads to less chance of errors, and fewer errors means more speed.</p>
<p style="text-align: justify;">Although it doesn’t handle encryption, <strong>SOCKS5</strong> does provide <strong>methods of authentication</strong>, as mentioned earlier. In general, a <strong>SOCKS5</strong> handshake looks like this:</p>
<ol>
<li>The client sends a connection request, stating the list of authentication methods it supports.</li>
<li>The server looks at these methods and chooses one. In the case that none are acceptable, it sends a failure response.</li>
<li>Once accepted, information can pass between the client and server. The client can send a connection request and the server can respond.</li>
</ol>
<p style="text-align: justify;">This authentication removes many of the security concerns that plagued <strong>SOCKS4</strong>. The proxy isn't open to anybody with the details, resulting in less chance of malicious attacks. Usually, authentication comes in the form of a simple username and password combination. However, <strong>SOCKS5</strong> also supports <a href="https://en.wikipedia.org/wiki/Generic_Security_Services_Application_Program_Interface" target="_blank" rel="nofollow noopener" title="Generic Security Services Application Program Interface">GSSAPI</a> (Generic Security Services Application Program Interface) and IANA methods.</p>
<h2><a name="why-use-socks5-proxy"></a>Why Would I Use a SOCKS5 Proxy?</h2>
<p style="text-align: justify;">Now that you know the features of <strong>SOCKS5 proxies</strong>, you may be wondering why you even need one. One of the main uses is to <a href="https://www.firewall.cx/security/vpn-services-guides/how-to-bypass-isp-blocking-of-thepiratebay-and-other-torrent-sites-from-australia.html" target="_blank" title="circumvent internet censorship">circumvent internet censorship</a>. If your ISP blocks access to movie streaming websites, The Pirate Bay or other questionable content, a proxy will circumvent it. This can be useful on restricted networks. Work and school connections are often monitored and block access to social media, games, and anything else that isn’t relevant. Broad sweeping policies can often cause issues if you need to access one of those sites for research or you just want to slack.</p>
<p style="text-align: justify;">You’ll also be able to access services that are limited to certain countries. <strong>BBC iPlayer</strong>, for example, is only available from a <strong>UK</strong><strong> IP address</strong>. A proxy located in the UK would allow you to watch British TV without a TV license. This also applies to services like <strong>Netflix</strong>, which has significantly more content in the US region than others. Utilizing a <strong>SOCKS5</strong><strong> proxy</strong> from several different locations can significantly expand your viewing catalogue.</p>
<p style="text-align: justify;">On home networks, users must be careful about their privacy, especially when <strong>torrenting</strong>. Using a <strong>SOCKS5</strong><strong> proxy</strong> can provide fast download speeds while adding a layer of protection against copyright holders. Many BitTorrent clients support a weak form of encryption when using <strong>SOCKS5</strong>, which prevents further obstacles.</p>
<p style="text-align: justify;"><strong>SOCKS5 torrenting</strong> doesn’t offer the same protection as a VPN, but it’s better than nothing at all. In addition, it can give an obscured connection from only one application on your PC. As a result, you can perform <strong>fast P2P downloads</strong> while still using location services such as Google Maps. You’ll retain your normal download rate for any other browsing or streaming.</p>
<h2><a name="when-to-use-socks5-or-vpn"></a>When to use SOCKS5 Proxies, VPNs or Both</h2>
<p style="text-align: justify;">For the privacy and security conscious, VPNs are a great option. They are superior to a <strong>SOCKS5</strong><strong> proxy</strong> in almost every way. The <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Providers"><strong>Best VPN Service Providers</strong></a> give unparalleled protection from government agencies, copyright holders and hackers. Many of them even provide <strong>proxy services</strong> as a <strong>free add-on</strong>. Other than speed, <strong>VPNs do everything SOCKS5 does and more</strong>. However, VPN subscriptions can be more expensive and require extra setup to run. In some situations, a proxy is the most economical option.</p>
<p style="text-align: justify;">When it comes to accessing content with <strong>region restrictions</strong>, for example, a <strong>SOCKS5</strong><strong> proxy</strong> is great. You can easily spoof a different location, and don’t have to worry too much about security – repercussions are rare. You can find a proxy from almost every country on the planet, often free of charge. A VPN will provide the same benefit, but comes from a trusted provider who has put considerable thought into the safety and privacy of its users.</p>
<p style="text-align: justify;"><strong>SOCKS5 proxies</strong> can hide your identity from web servers. Low stakes tasks like voting on polls multiple times from the same computer are fine. Most don’t make use of cookies or JavaScript to track the same browser across multiple IPs.</p>
<p style="text-align: justify;">However, if you’re accessing blocked content, things are a little different. While a proxy is good for low stakes, it doesn’t remove identifying information other than the IP address. It’s open to snooping from anyone with access to your data stream, such as your ISP and government. Accessing censored file-sharing websites and other questionable content is best done through a VPN.</p>
<p style="text-align: justify;">This lack of protection from those with network access can pose considerable risk in public. No encryption means little protection from prying eyes. On a <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="Wifi Hotspot security and threats"><strong>WiFi hotspot</strong></a>, attackers can still see and interpret your data. Browsing websites <strong>without SSL encryption</strong> could result in password and information compromises. Furthermore, the previously mentioned security issues in SSL mean that hackers could get hold of it even then. For <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="public WiFi safety"><strong>public WiFi safety</strong></a>, a VPN is the only true option.</p>
<h2><a name="combining-socks5-and-vpn"></a>Combine a SOCKS5 Proxy and a VPN</h2>
<p style="text-align: justify;">It’s clear that there are some merits to using a proxy over a VPN. The extra speed makes them suitable for a wide range of low-risk tasks. It’s advantageous to be able to utilize both a VPN and a <strong>SOCKS5</strong><strong> proxy</strong>. Thankfully, any of the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN service providers"><strong>Best VPN service providers</strong></a> supply this at no extra cost. <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN VPN Provider"><strong>Strong VPN</strong></a> is a great example of this. Switching the two methods in and out is a no-brainer, but what about using both at once?</p>
<p style="text-align: justify;">Using both in tandem usually results in increased privacy, if it’s supported by your VPN provider. Be that as it may, the benefits are limited. If a VPN is connected already, you probably won’t see speed increases. Instead, the advantage comes as a safety net. If your VPN cuts out and the <strong>Kill-Switch fails</strong>, you still have some protection from <strong>SOCKS5 VPN proxy</strong>, and vice versa. This is relevant if a provider hands over your details – the copyright holder will only see the IP address of the other service. Using both creates an extra barrier to entry.</p>
<p style="text-align: justify;">For most users, this extra barrier is far from essential. A properly configured VPN should pose little problem. However, if you’re doing something particularly sensitive the combination is a good option. For the best security, you should email your provider and make sure your <strong>SOCKS5 VPN proxy</strong> has <strong>no logs</strong>.</p>
<h2 style="text-align: justify;"><a name="socks5-vs-vpn-for-torrenting"></a>SOCKS5 Proxy vs VPN For Torrenting &amp; P2P</h2>
<p style="text-align: justify;">Speaking of <strong>torrenting</strong>, it’s important to be aware of the benefits and limitations of using a <strong>VPN SOCKS5 proxy</strong> for it. <strong>SOCKS5 torrenting</strong> will show only the IP address of the proxy server if a media company is looking through a certain swarm and provides a small amount of encryption. This gives the small degree of protection mentioned earlier.</p>
<p style="text-align: justify;">However, there are still many avenues of attacks for copyright holders. The encryption method torrent clients use is shaky and <strong>not reliable</strong>. It can be cracked quickly, revealing the information beneath. Although this wouldn’t reveal the user’s IP address, it could give information such as the version of the client, the operating system, settings and download speed. Copyright holders could use this to narrow down to an individual user and their ISP. They can then send a legal request to that ISP for information. The lack of proper encryption means the ISP can clearly see what a user is doing on its network.</p>
<p style="text-align: justify;"><strong>SOCKS5 torrenting</strong> does provide an increase in speed, but it comes at a price. A determined copyright troll or government entity may still get leverage over the user. In the end, it’s up to the individual to decide if the speed increase is worth the risk. This will probably depend on how significant the difference is.</p>
<p style="text-align: justify;"><strong>SOCKS5 VPN proxies</strong> come with an additional caveat. A fully-fledged VPN won’t just protect you from copyright holders, it will also <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="bypass ISP throttling"><strong>bypass ISP throttling</strong></a>. It’s becoming increasingly common for service providers to set speed <strong>limits on peer-to-peer downloads</strong>, resulting in speeds that are as much as one fifth of normal speed. Service providers can only do this if they can interpret and categorize the data, so VPN encryption provides a natural wall.</p>
<p style="text-align: justify;"><strong>Proxies do not generally provide encryption</strong>, and you may experience significant throttling. This can easily offset the speed gains of <strong>SOCKS5</strong>, so proxies are only the best option if your ISP does not throttle. You can test for throttling though web services like Glasnost. Even with the encryption built into torrent clients, most service providers can tell if you’re using P2P. If you’re unsure, you can always test with a free proxy.</p>
<h2><a name="configuring-socks5-for-torrenting-qbittorent-utorrent"></a>Configuring SOCKS5 Proxy for Torrenting</h2>
<p style="text-align: justify;">Thankfully, setting up a <strong>SOCKS5</strong><strong> proxy for torrenting</strong> is very simple. It requires fewer steps than a VPN, and all you’ll need is a torrent client. In our examples, we’ll be showing <strong>uTorrent</strong> and <strong>qBittorrent</strong>, using a VPN SOCKS5 proxy from <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN VPN Provider"><strong>Strong VPN</strong></a>. Both providers give the functionality free of charge and provide a premium service and no logs policy.</p>
<h3>Set up a SOCKS5 Proxy with IPVANISH and qBittorrent</h3>
<p>To emphasise the divide between the two services, IP Vanish’s SOCKS5 details can’t be found in the regular VPN client. Instead, you’ll have to go to the <strong>My Account</strong> section of its website and click on the <strong>SOCKS5 Proxy</strong> tab.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/ipvanish-proxy-settings.png" alt="ipvanish proxy settings" title="ipvanish proxy settings" /></p>
<p style="text-align: justify;">You’ll want to note down these credentials for use later. The username and password are specific to you, and provide the <strong>SOCKS5 authentication</strong> mentioned earlier. The hostname, <strong>ams.socks.ipvanish.com,</strong> is thanks to <strong>SOCKS5</strong> and its Domain Name Resolution feature. If you’re using a different proxy, just take note of those details instead.</p>
<p class="box-info" style="text-align: justify;">For an <strong>extensive review</strong> on Strong VPN, including security tests, DNS Leak tests, Torrent Protection, Kill-Switch test, Netflix support and much more, read our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-strong-vpn-review.html" target="_blank" title="Best VPN Review: Strong VPN">Best VPN Review: Strong VPN</a></p>
<p style="text-align: justify;">Now, in <strong>qBittorrent</strong>, head to <strong>Tools &gt; Options</strong>. On the left-hand side, you’ll see the <strong>Connection </strong>tab. <strong>Click it</strong>. You should be presented with the following menu:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/qbittorrent-settings-1.png" alt="qbittorrent settings" title="qbittorrent settings" /></p>
<p style="text-align: justify;">Under the <strong>Listening Port </strong>heading, disable <strong>Use UPnP/NAT-PMP port forwarding from my router</strong>. Then input the following details under <strong>Proxy Server</strong>:</p>
<ul>
<li><strong>Type: </strong>Socks5</li>
<li><strong>Host: </strong> ams.socks.ipvanish.com</li>
<li><strong>Port: </strong>1080</li>
<li><strong>Use proxy for peer connections: </strong>Yes</li>
<li><strong>Disable connections not supported by proxies: </strong>Yes</li>
<li><strong>Use proxy only for torrents: </strong>Yes</li>
<li><strong>Authentication: </strong>Yes
<ul>
<li><strong>Username: </strong>IP Vanish SOCKS5 generated username</li>
<li><strong>Password</strong>: IP Vanish SOCKS5 generated password</li>
</ul>
</li>
</ul>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/qbittorrent-settings-2.png" alt="qbittorrent SOCKS5 Proxy settings for Torrenting" title="qbittorrent SOCKS5 Proxy settings for Torrenting" /></p>
<p style="text-align: justify;">For extra privacy, head to <strong>BitTorrent</strong> and change <strong>Encryption mode </strong>to <strong>Require encryption</strong>. This will force the in-application encryption discussed earlier. Also tick <strong>Enable anonymous mode</strong>. This will remove the peer ID from the client’s fingerprint and force all incoming connections through <strong>SOCKS5</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/qbittorrent-settings-3.png" alt="qbittorrent SOCKS5 Proxy settings for Torrenting" title="qbittorrent SOCKS5 Proxy settings for Torrenting" /></p>
<p style="text-align: justify;">Finally, hit <strong>Apply </strong>and <strong>Okay</strong>. Restart <strong>qBittorrent</strong> just to be safe.</p>
<h3>Set Up a SOCKS5 Proxy With Private Internet Access &amp; uTorrent</h3>
<p>Finding your <strong>SOCKS5 VPN proxy settings</strong> for <strong>Private Internet Access</strong> is equally simple. Go to the client sign in page and login with your username and password. Scroll down until you see a heading with the label <strong>PPTP/L2TP/SOCKS Username and Password</strong>. <strong>Click Generate Username and Password</strong> and note down the details:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/pia-socks5-setup.png" alt="pia vpn socks5 setup" title="pia vpn socks5 setup" /></p>
<p style="text-align: justify;">The hostname isn’t listed here, but a support article reveals that it’s <strong><strong>proxy-nl.privateinternetaccess.com</strong></strong>.<strong><span style="font-weight: normal;">Write that down too, or the details of your free proxy. Launch uTorrent and go to </span></strong><strong>Options &gt; Preferences </strong><strong><span style="font-weight: normal;">(Ctrl + P). </span></strong></p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/utorrent-settings-1.png" alt="utorrent pia vpn socks5 settings" title="utorrent pia vpn socks5 settings" /></p>
<p style="text-align: justify;">Under the <strong>Connection </strong>subheading, disable <strong>Enable UPnP port mapping </strong>and <strong>Enable NAT-PMP port mapping.</strong> Then enter the following settings under <strong>Proxy Server</strong>:</p>
<ul>
<li><strong>Type</strong>: SOCKS5</li>
<li><strong>·</strong><strong>Proxy</strong>:</li>
<li><strong>Port</strong>: 1080</li>
<li><strong>Authentication</strong>: Yes
<ul>
<li>Username: PIA SOCKS5 user</li>
<li>Password: PIA SOCKS5 password</li>
</ul>
</li>
<li><strong>Use proxy for hostname lookups</strong>: Yes</li>
<li><strong>Use proxy for peer-to-peer connections</strong>: Yes</li>
<li><strong>Disable all local DNS lookups</strong>: Yes</li>
<li><strong>Disable all features that leak identifying information</strong>: Yes</li>
<li><strong>Disable connects unsupported by the proxy</strong>: Yes</li>
</ul>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/utorrent-settings-2.png" alt="utorrent pia vpn socks5 settings" title="utorrent pia vpn socks5 settings" /></p>
<p style="text-align: justify;">To enable encryption, go to the <strong>BitTorrent</strong> subheading and look under the <strong>Protocol Encryption </strong>menu. Change <strong>Outgoing </strong>to <strong>Forced</strong>. Be aware that this could impair your ability to connect to peers. Click <strong>Apply </strong>and <strong>OK</strong>. <strong>SOCKS5 torrenting</strong> is now enabled.</p>
<h2><a name="configuring-firefox-chrome-for-socks5"></a>Configuring Firefox and Chrome to Use SOCKS5 Proxy</h2>
<p style="text-align: justify;">Configuring your browser to use SOCKS can be a little more difficult. At this moment in time, neither Chrome nor Firefox support SOCKS5 with authentication by default. Instead, you can use the Maxthon browser. After install go to <strong>Settings &gt; Advanced &gt; Proxy Settings</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/maxathon-socks5-settings-1.png" alt="maxathon web browser socks5 settings" style="border: 1px solid #000000;" /></p>
<p style="text-align: justify;">Now tick <strong>Use custom proxy setting</strong> and hit <strong>Manage Proxy</strong>. Click <strong>Add</strong>. Fill in the fields as follows:</p>
<ul>
<li><strong>Name</strong>: IPVanish SOCKS5</li>
<li><strong>Type</strong>: SOCKS5</li>
<li><strong>Address</strong>: ams.socks.ipvanish.com</li>
<li><strong>Port</strong>: 1080</li>
<li><strong>Username</strong>: IP Vanish SOCKS5 generated username</li>
<li><strong>Password: </strong>IP Vanish SOCKS5 generated password</li>
</ul>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/maxathon-socks5-settings-2.png" alt="maxathon web browser IPVanish socks5 settings" style="border: 1px solid #000000;" title="maxathon web browser IPVanish socks5 settings" /></p>
<p style="text-align: justify;">Hit <strong>OK</strong>. Below the config, you’ll see a <strong>Bypass proxy server for </strong>heading. Here you can set exceptions for websites for which you need to keep your local IP, such as Google Maps. You can also switch this to <strong>Use proxy server for </strong>and only use the <strong>VPN SOCKS5 proxy</strong> on certain websites.</p>
<h2><a name="free-proxy-vs-paid"></a>Free Proxy vs Paid</h2>
<p style="text-align: justify;">Though premium paid SOCKS5 proxies like the one above are often best, it’s possible to get one free of charge. Many websites even compile free proxy lists that are open for anyone to use. Here are just a few examples:</p>
<ul>
<li><a href="https://www.socks-proxy.net/" target="_blank" rel="nofollow noopener" title="https://www.socks-proxy.net/">https://www.socks-proxy.net/</a></li>
<li><a href="https://incloak.com/proxy-list/" target="_blank" rel="nofollow noopener" title="https://incloak.com/proxy-list/">https://incloak.com/proxy-list/</a></li>
<li><a href="https://www.gatherproxy.com/sockslist" target="_blank" rel="nofollow noopener" title="https://www.gatherproxy.com/sockslist">https://www.gatherproxy.com/sockslist</a></li>
<li><a href="https://fastproxyservers.org/socks5-servers.htm" target="_blank" rel="nofollow noopener" title="https://fastproxyservers.org/socks5-servers.htm">https://fastproxyservers.org/socks5-servers.htm</a></li>
</ul>
<p>If you already have a VPN, you may have access to a <strong>free SOCKS5 proxy</strong> without even knowing it. It’s becoming increasingly common for the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN">Best VPN service providers</a> to offer this service. Some of the major ones include:</p>
<ul>
<li><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN VPN">STRONGVPN</a></li>
<li><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="PIA VPN Internet Access">Private Internet Access</a></li>
<li><a href="https://clixtrac.com/goto/?308392" target="_blank" rel="nofollow noopener" title="NordVPN">NordVPN</a></li>
</ul>
<p style="text-align: justify;">It may be tempting to just grab the first free SOCKS proxy you see, but there are a few things to consider. A free anonymous proxy isn’t going to be fast. It’s more common for download speeds to sit in the kilobytes rather than megabytes. You’ll also notice far less reliability, so you’ll probably have to switch between different servers for long downloads. This unreliability extends to response time.</p>
<p style="text-align: justify;">In addition, a <strong>free anonymous proxy</strong> often lacks security. In many cases, they have no security at all, leaving users open to hackers. In many cases free providers keep logs, which may cause issues for P2P downloads and other illegal activities.</p>
<p style="text-align: justify;">In all, you’ll be hard pressed to find a good, reliable free proxy. If you want to protect your identity, paying is almost essential. In some cases, you can pick up a full VPN service for the same price or less than premium <strong>SOCKS5 services</strong>, making it a no-brainer. You’ll have access to strong encryption when you need it, and a proxy when you’re just looking for speed.</p>
<h2><a name="socks5-proxy-us-netflix"></a>Using SOCKS5 Proxy For US Netflix</h2>
<p style="text-align: justify;">One of the best uses of a <strong>SOCKS5</strong><strong> proxy</strong> is for <strong>Netflix</strong>. The catalogue of the service has been limited of late, and people outside the US seem to be particularly affected. Thankfully, you can trick Netflix into giving you shows from regions across the world. Here’s my Netflix UK homepage before using a proxy:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/netflix-homepage-uk.png" alt="Netflix UK homepage without SOCK5 proxy" title="Netflix UK homepage without SOCK5 proxy" /></p>
<p style="text-align: justify;">In this example, we’ll be using Firefox. Go to the flyout menu on the top right, then select <strong>Options</strong>. Go to <strong>Advanced </strong>and click the <strong>Network </strong>tab. Under <strong>Connection</strong> <strong>&gt; Configure how Firefox connects to the Internet</strong>, click <strong>Settings…</strong></p>
<p style="text-align: center;"><strong><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/firefox-settings-netflix-1.png" alt="firefox socks5 settings for netflix" title="firefox socks5 settings for netflix" /></strong></p>
<p style="text-align: justify;">First, change <strong>Configure Proxies to Access the Internet </strong>to <strong>Manual proxy configuration</strong>. Under <strong>SOCKS Host </strong>enter the URL or IP address of your proxy server. Under <strong>Port</strong>, enter the number your Netflix SOCKS5 proxy has provided. Tick <strong>SOCKS v5</strong> and <strong>Proxy DNS when using SOCKS v5</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/netflix-homepage-us.png" alt="netflix us homepage after socks5 configuration" title="netflix us homepage after socks5 configuration" /></p>
<p style="text-align: justify;">You can now click <strong>OK </strong>and head to <a href="https://netflix.com/" target="_blank" rel="nofollow noopener" title="Netflix">https://netflix.com</a>. You should immediately notice a change in your browsing catalogue.</p>
<p style="text-align: justify;">Unfortunately, those with a <strong>free SOCKS proxy</strong> may get stuck here. Netflix monitors proxy lists and blocks them to stop users accessing content they aren’t supposed to. You’ll know if you receive the following error when trying to play a show:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/socks5-proxy-guide/netflix-error-screen.png" alt="Trying to access Netflix US via Free SOCKS Proxy fails" title="Trying to access Netflix US via Free SOCKS Proxy fails" /></p>
<p style="text-align: center;" align="center">Trying to access Netflix US via Free SOCKS Proxy fails</p>
<p style="text-align: justify;">You may be able to find a free proxy that Netflix hasn’t gotten around to yet, but it’s quite unlikely. A paid, private <strong>SOCKS5 proxy</strong> is less likely to be blocked, as the provider changes things often. You should notice much faster buffering times, so it’s worth paying the small monthly fee.</p>
<p style="text-align: justify;">Most <strong>VPN SOCKS5 proxies</strong> use <strong>authentication</strong>, which <strong>isn’t supported</strong> by Firefox or Google Chrome. Instead, you’ll want to use the previously mentioned <strong>Maxthon</strong> browser method. This should give you fast, unblocked access to different films.</p>
<h2>Summary</h2>
<p style="text-align: justify;">While <strong>SOCKS5 proxies</strong> offer better protection than HTML or nothing at all, they don’t shield the user from spying by ISPs or government. <strong>Free anonymous proxies</strong> offer even less protection, and can be open to hackers, cut out, or have slow download speeds. However, <strong>subscription-based proxies</strong> remain a great way to bypass regional blocks and carry out other, low-risk tasks.</p>
<p style="text-align: justify;">Unfortunately, the price of a standalone <strong>SOCKS5 proxy</strong> is high compared to other services. In many cases, users can get a <strong>VPN subscription</strong> from <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN"><strong>STRONGVPN</strong></a><strong>, </strong><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="PIA VPN"><strong>Private Internet Access</strong></a> or <a href="https://clixtrac.com/goto/?308392" target="_blank" rel="nofollow noopener" title="NordVPN">NordVPN</a> and a <strong>VPN SOCKS5 proxy</strong> for the same monthly fee. This gives users access to the full, hardened security of a VPN, while also providing a fast, less secure proxy if they need it.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Tue, 28 Feb 2017 23:48:27 +1100</pubDate>
		</item>
		<item>
			<title>Anonymous Browsing – Internet Privacy. Securing Your Online Privacy The Right Way</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/anonymous-browsing-secure-your-online-identity.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/anonymous-browsing-secure-your-online-identity.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/anonymous-browsing-secure-your-online-identity-with-a-vpn-1a.jpg" alt="anonymous browsing secure your online identity" style="margin: 7px; float: left;" title="anonymous browsing secure your online identity" />Despite what some think, the internet is not private. <strong>Anonymous browsing</strong> and <strong>Internet Privacy</strong> are almost non-existent in today's online world. Websites collect personal information on every visit without your knowledge. Despite the free label, services come at a cost, and in many cases, it’s a lack of <strong>privacy</strong>.</p>
<p style="text-align: justify;">The primary driver is the <strong>advertising industry</strong>. Most websites get paid if an ad is clicked or the product is purchased, not just for exposure. As a result, they want promotions that are relevant to the user. They get paid, and the user gets to see the products they’re interested in. It seems advantageous to both parties.</p>
<p style="text-align: justify;">However, to target these ads, agencies need information about a website’s users. Companies like Facebook embed trackers across the web to build a detailed profile of individuals. This includes things like your gender, age, location, and websites you frequent. Information from multiple ad agencies can then be combined to build a detailed picture of your interests and personality.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/firefox-lightbeam.jpg" alt="firefox lightbeam plugin" title="firefox lightbeam plugin" /></p>
<p style="text-align: center;">Firefox's Lightbeam Plugin provides a visual map of sites visited during our session</p>
<p style="text-align: justify;">Here’s the result of two hours of browsing activity with the Lightbeam plugin. The circle articles are sites we visited, while the triangles are third parties. Together, they can create an interconnected web of information. Visiting just <strong>32 sites fed 371 third parties data</strong>!</p>
<p style="text-align: justify;">They can do this across the web through identifying information like your IP address. When you connect to a network, your device is given a unique string of numbers by the ISP or mobile service provider. These can be cross-referenced across the internet to find your browsing habits.</p>
<p style="text-align: justify;">If that’s not enough, there are also government agencies to worry about. IP addresses usually give websites a rough idea of your location by pointing to your service provider. That’s not a barrier for government. They can ask the ISP who the IP was assigned to and find your name and address. You would think that such power would be used sparingly, but unfortunately, it’s not.</p>
<p style="text-align: justify;">Former NSA contractor Edward Snowden revealed that major powers are <a href="https://en.wikipedia.org/wiki/XKeyscore" target="_blank" rel="nofollow noopener" title="NSA spying on citizens">spying on citizens</a> across the world on an unprecedented level. Authorities request all that tracking data we mentioned earlier and combine it with information from the internet service provider (ISP). From 2011-2012, Australian agencies requested ISP logs over 300,000 times. This can include every website the user has visited over a period of years.</p>
<p style="text-align: justify;">And that’s someone who has the country’s best interests at heart. This kind of information is also accessible to a number of people who work for the ISP. Earlier this year, an ex-technician for Verizon <a href="https://www.cnet.com/news/ex-verizon-worker-pleads-guilty-to-selling-private-data/" target="_blank" rel="nofollow noopener" title="Verizon employee sells customers provide data">pleaded guilty</a> to selling phone call and location information to a private investigator. Web browsing information could equally be sold off to the highest bidder.</p>
<p style="text-align: justify;">And that’s assuming they even have to buy it in the first place. In 2012, internet activist group anonymous hacked into the servers of telecommunications company AAPT. They <a href="https://www.news.com.au/technology/hacked-anonymous-steals-user-data-from-aussie-isp/news-story/ad1448ba387b9e007a0d9ce09ac05780" target="_blank" rel="nofollow noopener" title="Hackers steal AAPT's customer logs">stole over 40GB of information</a> relating to business customers to show that the logs are not always safe. A redacted copy of the data was later published online.</p>
<h2 style="text-align: justify;">What is the Threat?</h2>
<p style="text-align: justify;">With so many parties interested in such data, anonymous browsing is becoming difficult. The sad fact is that without protection from the&nbsp;<a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="best VPN providers">Best VPN providers</a>, you aren’t truly safe.</p>
<p style="text-align: justify;">Firstly, there’s the threat of this information falling into the hands of hackers. Imagine a person with malicious intent having a record of your name, address, interests, habits, and every website you’ve been to. It could easily be used to blackmail someone or make threats to their friends and family.</p>
<p style="text-align: justify;">It can also be used to identify potential weak points in your security. For example, if you regularly visit an insecure site, it could be hacked with an end goal of getting to you. Tools such as a key logger could then be used to collect usernames, passwords, and credit card data.</p>
<p style="text-align: justify;">Furthermore, such access can be used for types of <strong>identity theft</strong>. Combined with an email account, an attacker has access to basically everything. Password resets for various accounts, name, age, date of birth. Bank details can be used to place illegal purchases on your behalf or commit fraud. Most of our lives are stored online, and the attack could gain access to all of it.</p>
<p style="text-align: justify;">The same methods can be used by authorities in oppressive regimes. Even if the current government protects its citizens from such things, a power shift could change that. Because tracking information and ISP logs are kept for a long time, the data will still be around years into the future.</p>
<p style="text-align: justify;">Then there’s the issue of illegal activities. Previously, nobody would know if you were breaking the law in the privacy of your own home. However, with the increase in logs, <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="Torrenting with or without a VPN">activities like torrenting</a> can result in warnings, loss of service, or huge fines.</p>
<p style="text-align: justify;">Without a VPN, <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="Torrents">torrents can be traced straight back to the user</a>. Copyright holders hire companies to search through swarms of people torrenting their property. With an IP address, they can request a user’s details from the ISP and pursue legal action. The ISP is often compelled to do this or face legal repercussions themselves.</p>
<p style="text-align: justify;">Though torrenting is a morally grey area, this can also affect customers who have done nothing wrong. WiFi networks can be hacked or information can be incorrect. In 2010, 53-year-old Cathi Paradiso <a href="https://www.cnet.com/culture/grandma-endures-wrongful-isp-piracy-suspension/" target="_blank" rel="nofollow noopener" title="accused of downloading 18 films and TV shows illegally">ran into this problem</a> when she was accused of downloading 18 films and TV shows illegally. In reality, her IP address was identified incorrectly, and her internet access cut off unjustly. It’s clear that even if you’re a regular internet user, anonymous browsing has its benefits.</p>
<h2 style="text-align: justify;">What Is Anonymous Browsing &amp; How Does it Help?</h2>
<p style="text-align: justify;"><strong>Anonymous browsing</strong> is usually achieved by routing a normal internet connection through a virtual private network. We won’t go into too much detail here, as it’s been already covered in our&nbsp;<a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Beginner’s guide to VPNs">Beginner’s Guide to VPNs</a>.</p>
<p style="text-align: justify;">However, it’s important to have a basic idea of how a VPN can provide anonymous browsing. A VPN uses a method called tunnelling to wrap the data packets you send to your ISP in encryption. Various methods such OpenVPN, L2TP, PPTP and STTP are used to achieve this. Through a VPN, your information goes from clear and readable to a string of random letters and numbers.</p>
<p style="text-align: justify;">As a result, those trying to grab the data in transit get a useless pile of text. They don’t have the cypher, so they can’t unlock it. This is particularly useful on public WiFi, where hackers can often see what you are doing and perform attacks.</p>
<p style="text-align: justify;">It also has the knock-on effect of hiding your IP address. The connection goes through the servers of the VPN provider, where’s its assigned an anonymous IP from the server. Unlike ISPs, the best VPNs don’t keep logs. The original IP address can’t be compelled by third-parties, and the user can surf anonymously.</p>
<p style="text-align: justify;">However, this <strong>anonymous browsing</strong> doesn’t always extend to web trackers. Various methods can allow them to grab identifying information like IP addresses despite a VPN connection. Thankfully, many of the providers have built-in protection for this. <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leaking">Domain Name Server</a> requests are routed through their servers and resolved by a special process that protects the user. As a result, malicious domains can’t find the user’s true identity.</p>
<h2 style="text-align: justify;">How to Get VPN Services</h2>
<p style="text-align: justify;">Fortunately, it’s quite easy to browse anonymously via a VPN. There are thousands of different providers out there, each with different merits and price points. Some can even be used free of charge, but they can be subject to bandwidth caps and have been sold user data. For a premium and safe service, it’s <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN">always best to go with a paid provider</a>.</p>
<p class="box-info">We strongly recommend you examine <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN">StrongVPN</a> - one of the most stable and fast VPN service providers globally.</p>
<p style="text-align: justify;">Luckily, we have a round up all the best VPNs so that you don’t have to search through hundreds yourself. Our experts have rounded up all the major features of each, ranking them based on quality.</p>
<p style="text-align: justify;">Once you have found one that meets your requirements, you’ll have to sign up. You usually need an email address, password, and a payment method. The privacy conscious can often use bitcoins or trade gift cards to protect their identity while paying.</p>
<p style="text-align: justify;">That payment can be anywhere between $3-$8 per month, depending on provider. You usually get a better service the more you pay, but there are some exceptions. Either way, it’s a small price for anonymous browsing, whether you’re using a VPN to torrent, or just conscious about types of identity theft and government surveillance.</p>
<p style="text-align: justify;">On sign up, you usually get an email with a <strong>username</strong> and <strong>password</strong>, as well as a link to the login page. Some providers will take care of this for you through a download link that incorporates sign-in details.</p>
<p style="text-align: justify;">You then install the program, enter your details, and <strong>click connect</strong>. They have clients for all the major platforms, including Mac OSX, Windows, iOS, and Android. The <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Βest VPN providers">Βest VPN providers</a> have thousands of servers all over the world and can provide fast, anonymous browsing in a few minutes.</p>
<p style="text-align: justify;">Some VPNs provide details for an additional <a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html" target="_blank" title="Guide to Socks Proxies">SOCKS5 proxy</a>, which you can read about <a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html" target="_blank" title="Guide to Socks Proxies">here</a>. This can provide anonymous browsing against web hosts, but not the ISP or government.</p>
<h2 style="text-align: justify;">Best Practices For Enhanced Protection</h2>
<p style="text-align: justify;">Though VPNs are great for browsing anonymously, they aren’t infallible. There are many methods to get information, and the providers can’t protect against them all. For complete anonymity on the internet, you may want to take some additional steps.</p>
<h3 style="text-align: justify;">Cookies &amp; Browser History</h3>
<p style="text-align: justify;">One thing a VPN cannot control is the data that’s stored locally on your computer. As you browse the web, your computer keeps a record of the history so you can go back to it later. It also retains cookies, which will save your settings on various websites, and images, so that you don’t have to download them every time.</p>
<p style="text-align: justify;">The implications of this are fairly straightforward. If somebody gets access to your computer, physically or remotely, they have tons of information about you. To avoid this, you’ll want to use the “<strong>Private Browsing</strong>” feature in your browser.</p>
<p style="text-align: justify;">In <strong>Firefox</strong>, you can get there by hitting the fly out menu on the top right and pressing <strong>New Private Window</strong>. Alternatively, you can press <strong>Ctrl+Shift+P</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/firefox-new-private-browsing.png" alt="Anonymous browsing Firefox new private window" title="Anonymous browsing Firefox new private window" /></p>
<p style="text-align: center;">Anonymous browsing in Firefox- Enabling a new private window</p>
<p>The things you do in this session will not be recorded. That covers the pages you visit, cookies, searches, and temporary files. There’s also the option for tracking protection, which will block many of those third parties we talked about earlier. However, Firefox does keep downloads and bookmarks for later use.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/firefox-new-private-browsing-tracking-protection.png" alt="firefox private browsing tracking protection" title="firefox private browsing tracking protection" /></p>
<p style="text-align: justify;">Mozilla also stresses that <strong>Private Browsing</strong> doesn’t necessarily mean anonymous browsing. By itself, this is no protection against the information ISPs and government agencies collect. You’ll still need a VPN for that.</p>
<p style="text-align: justify;"><strong>Google Chrome</strong> users can make use of a similar feature, though it has a different name. <strong>Incognito mode</strong> provides much of the same functionality but doesn’t have tracking protection like Firefox. Its shortcut is also different, using <strong>Ctrl+Shift+N</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/chrome-incognito-mode.png" alt="Anonymous browsing chrome incognito mode" title="Anonymous browsing chrome incognito mode" /></p>
<p style="text-align: center;">Anonymous browsing chrome - Enabling a incognito mode window</p>
<p style="text-align: justify;">Like Mozilla, Google stresses that Incognito mode <strong>does not provide anonymous browsing at work, home or any other location</strong>. Once more, files and bookmarks are still stored, so you have to be careful to delete those afterwards.</p>
<p style="text-align: justify;">Other browsers have this functionality built in. In <strong>Internet Explorer</strong> and <strong>Edge</strong>, it’s called <strong>In Private Browsing/Window</strong>, with the same <strong>Ctrl+Shift+P</strong> shortcut as <strong>Firefox</strong>. <strong>Mac OSX</strong> users can use <strong>Private Browsing</strong> in <strong>Safari</strong> for the same effect.</p>
<p style="text-align: justify;">Though they took a little while to catch up, most mobile browsers support it too. In <strong>Firefox</strong>, it’s called “<strong>New Private Tab</strong>” while in <strong>Chrome</strong> it's “<strong>New incognito tab</strong>”. Most Android stock browsers also support private browsing, though there are a few exceptions.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/firefox-chrome-android-private-browsing.png" alt="Enabling safe private browsing in Firefox, Chrome and Android O/S" title="Enabling safe private browsing in Firefox, Chrome and Android O/S" /></p>
<p style="text-align: center;">Enabling safe private browsing in Firefox, Chrome and Android O/S</p>
<p style="text-align: justify;">The <strong>Safari browser</strong> on <strong>iOS</strong> also supports <strong>anonymous browsing</strong>. It can be found by hitting the icon, tapping <strong>Private</strong>, and then <strong>Done</strong>. This applies to <strong>iPads</strong>, <strong>iPods</strong>, <strong>iPhones</strong>, and most other Apple devices.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/safari-browser-private-browsing.png" alt="Safari Web Browser - Private Mode" title="Safari Web Browser - Private Mode" /></p>
<p style="text-align: center;" align="center">Safari Web Browser - Private Mode</p>
<h3 style="text-align: justify;">Web Trackers &amp; Encryption</h3>
<p style="text-align: justify;">Unfortunately, Firefox is the only one of these browsers that fights tracking. We highly recommend using Firefox if you are privacy conscious, but sometimes that’s not possible. For <strong>enhanced anonymous browsing</strong>, you should consider using <strong>browser plugins</strong> on <strong>Chrome</strong>, <strong>Firefox</strong>, or <strong>Edge</strong>.</p>
<h3 style="text-align: justify;">Privacy Badger</h3>
<p style="text-align: justify;"><a href="https://privacybadger.org/" target="_blank" rel="nofollow noopener" title="Privacy Badger">Privacy Badger</a> is an extension created and managed by the <strong>Electronic Frontier Foundation</strong> (<strong>EFF</strong>). It stops third-party trackers from following you across the web. Based on smart algorithms and policies, it brings protection to windows that aren’t private browsing. It’s also a little more advanced than Firefox’s methods.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/anonymous-browsing-privacy-badger.png" alt="Privacy Badger Help Enforce Anonymous Browsing" title="Privacy Badger Help Enforce Anonymous Browsing" /></p>
<p style="text-align: center;">Privacy Badger Help Enforce Anonymous Browsing</p>
<p style="text-align: justify;">However, <strong>Privacy Badger</strong> can prevent some functions like sharing articles to Facebook. Thankfully, <strong>EFF</strong> has built a simple slider system that lets you turn trackers on and off at will. <strong>Green</strong> means the tracker is third-party but isn’t following you across the web, so it’s allowed. <strong>Red</strong> means it has been completely <strong>blocked</strong>. <strong>Yellow</strong> means the tracker is necessary for <strong>web browsing</strong>, but it’s cookies have been blocked.</p>
<p style="text-align: justify;">There is one caveat. <strong>Privacy Badger blocks third-party trackers</strong>, but it doesn’t stop tracking from the first party websites.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/firefox-lightbeam.jpg" alt="firefox-lightbeam" /></p>
<p style="text-align: justify;">Referring to our diagram, it blocks all the <strong>little triangles</strong>, but not the large circles. If you frequently visit a website, they may still collect information. You should still be using a VPN if you want to surf anonymously.</p>
<h3 style="text-align: justify;">uBlock Origin</h3>
<p>As well as Privacy Badger, you may want to consider an <a href="https://github.com/gorhill/uBlock" target="_blank" rel="nofollow noopener" title="Ad Blocker">Ad-Blocker</a>. uBlock Origin has a dual purpose, blocking trackers and malware as well as advertisements. It’s compatible with <strong>Privacy Badger</strong>, so you can use both at the same time.</p>
<p style="text-align: justify;">What’s more, <strong>uBlock</strong> protects against <strong>WebRTC leaks</strong>. <strong>WebRTC</strong> is a communications protocol that lets you share files and video in real-time without the need for plugins. Unfortunately, it can also reveal a user’s true IP address, <strong>even if they’re using a VPN</strong>.</p>
<p style="text-align: justify;">You can enable protection in <strong>uBlock Origin</strong> by hitting the <strong>settings tab</strong>. Under the <strong>Settings tab</strong>, you’ll see an option named <strong>Prevent WebRTC from leaking local IP addresses</strong>. Hit the checkbox and you’re done:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/anonymous-browsing/anonymous-browsing-ublock-origin.png" alt="uBlock Origin - Protection Against Malware, Trackers &amp; WebRTC" title="uBlock Origin - Protection Against Malware, Trackers &amp; WebRTC" /></p>
<p style="text-align: center;">uBlock Origin - Protection Against Malware, Trackers &amp; WebRTC</p>
<p style="text-align: justify;">It’s worth noting that this feature won’t provide anonymous browsing if you aren’t using a VPN. It only hides your local IP address, so the IP of non-VPN users will be visible.</p>
<h3 style="text-align: justify;">HTTPS Encryption</h3>
<p style="text-align: justify;">You should also be forcing a HTTPS connection wherever possible. HTTPS provides SSL encryption, which makes it harder for attackers to intercept your communications. This is particularly important if you’re using public WiFi. Visiting a HTTP website lets attackers packet sniff and spy on what you are doing. This can lead to the capture of passwords, bank details, or personal information.</p>
<p style="text-align: justify;">Though using a VPN will protect you from this, it never hurts to have an extra layer of protection. Before the initial connection of a VPN there’s a small window where you are connected to WiFi, but not to the VPN. It can also be a problem if your VPN cuts out and you don’t a backup.</p>
<p style="text-align: justify;">Though HTTPS is rapidly spreading, the implementation is still limited on many websites. Visiting the site from a link with “http://” in front often takes users to the unencrypted version. This can be a major problem if the site links back to itself this way.</p>
<p style="text-align: justify;">Thankfully, EFF has a solution once more. <strong>HTTPS Everywhere</strong> forces SSL encryption no matter what link you click. It uses “clever technology” to rewrite requests into a HTTPS format and prevent interception.</p>
<p style="text-align: justify;">Though <strong>HTTPS Everywhere</strong> can’t help when sites don’t support SSL at all, it does create a more consistent experience on those that do. It will also warn you when portions of a website can’t be encrypted, such as images. When you’re on <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="Staying Safe on Public WiFi">Public WiFi</a>, you can additionally choose to block all HTTP sites.</p>
<p style="text-align: justify;">By itself, HTTPS Everywhere does not provide anonymous browsing. An interested party will still be able to see what web pages you are accessing. However, on sites that support SSL, it will stop people on the same network seeing specifics.</p>
<h3 style="text-align: justify;">The Tor Browser</h3>
<p style="text-align: justify;">Finally, the extra conscious can use Tor to protect their identity. The Tor Browser bundles several add-ons into its core, including <strong>NoScript</strong>, an extension that blocks JavaScript, Flash and Java tracking. It also incorporates <strong>HTTPS Everywhere</strong> for added protection.</p>
<p style="text-align: justify;">However, Tor’s main privacy feature is its underlying protocols. Communication in Tor is layered in encryption. Data sent through the browser goes through another user’s computer, each decrypting a small chunk. Each link in the chain only knows the IP address of the computer before it, so the user can surf anonymously.</p>
<p style="text-align: justify;">Though Tor has some security issues, it can be used on top of a VPN to provide an extra barrier for attackers or law enforcement to get through. It’s not a substitute for a paid VPN, but it does provide considerable protection over regular browsing.</p>
<h3 style="text-align: justify;">Mobile Devices</h3>
<p style="text-align: justify;">On mobile devices, anonymous browsing can be harder to achieve. If you don’t want to be tracked across the web, you may have to change your browser.</p>
<p style="text-align: justify;">Unlike Firefox, Chrome does not support extensions on mobile. This means the aforementioned addons can’t be installed. To surf anonymously, you should be using Firefox or a dedicated privacy browser.</p>
<p style="text-align: justify;">Users of Mozilla’s browser can go to addons.mozilla.org/android and pick up HTTPS Everywhere, <a href="https://addons.mozilla.org/en-US/android/addon/ublock-origin/?src=search" target="_blank" rel="nofollow noopener" title="uBlock">uBlock</a>, and <a href="https://addons.mozilla.org/en-US/android/addon/privacy-badger17/?src=search" target="_blank" rel="nofollow noopener" title="Privacy Badger">Privacy Badger</a> just like on desktop. They require no additional permissions and work just as well.</p>
<p style="text-align: justify;">If you don’t like Firefox, there’s still a few options:</p>
<ul style="text-align: justify;">
<li><strong>Ghostery Browser</strong> (Android, iOS)– inbuilt tracking protection and other privacy features.</li>
<li><strong>Brave Browser</strong> (Android, iOS) – inbuilt Adblock, tracker protection, HTTPS Everywhere, Script blocking, and tracker blocking.</li>
<li><strong>Orfox </strong>(Android) – Official Tor-based browser with NoScript and HTTPS Everywhere, automatic history and cookie deletion. Removes permission requests for Contacts, Camera, Microsoft, Location and NFC. Removes WebRTC.</li>
<li><strong>Onion Browser</strong> (iOS) – Unofficial, open source Tor browser. NoScript-like mode and user-agent spoofing.</li>
</ul>
<p style="text-align: justify;">Despite these methods, it’s important to realise that mobile devices are not a substitute for desktop when it comes to anonymous browsing. By default, phones have far more in-built tracking, from location services, cell towers, and more. If you’re doing something questionable, it's best to stick to a PC.</p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">The bottom line is that though you can add protection free of charge, it wont give fully <strong>anonymous browsing</strong> like a VPN. Though <strong>uBlock</strong> and <strong>Privacy Badger</strong> protect against web tracking, they do nothing to stop <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="spying by ISPs or government agencies">spying by ISPs or government agencies</a>.</p>
<p style="text-align: justify;">A VPN can protect users against web tracking, ISP tracking, government spying, and <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="man-in-the-middle attacks">man-in-the-middle attacks</a>. They are low-cost, easy to implement, and allow a fast browsing experience, unlike Tor. Though they aren’t perfect, extra precautions make them as close to it as possible. VPNs are therefore the natural solution for anonymous surfing at work, on <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="man-in-the-middle attacks">public WiFi</a>, or at home.</p>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:RelyOnVML/>
  <o:AllowPNG/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-GB</w:LidThemeOther>
  <w:LidThemeAsian>X-NONE</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="371">
  <w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/>
  <w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/>
  <w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/>
  <w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/>
  <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/>
  <w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/>
  <w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
  <w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
  <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
  <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
  <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
  <w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
  <w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
  <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
  <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
  <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/>
  <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
  <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
  <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/>
 </w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>

<![endif]-->]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Wed, 01 Feb 2017 14:37:35 +1100</pubDate>
		</item>
		<item>
			<title>What is a VPN?  VPNs for Beginners - Everything You Need to Know About VPNs, Anonymous Browsing, Torrenting &amp; VPN Security Features</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html</guid>
			<description><![CDATA[<h2 style="text-align: left;">What is a VPN?</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-1.jpg" alt="VPN Guide for beginners - What is a VPN?" style="margin: 7px; float: left;" title="VPN Guide for beginners - What is a VPN?" /><strong>VPN</strong> (<strong>Virtual Private Network</strong>) is a well-known acronym amongst regular internet users. Initially used within businesses to securely connect to the corporate network, nowadays it’s being used by almost any type of user for <strong>anonymous browsing</strong>, protecting their privacy and stopping ISPs and government agencies tracking their <strong>online activities</strong> and transactions who are looking to capture users performing <strong>illegal file sharing of movies</strong>, <strong>music albums</strong>, <strong>torrenting</strong> or even trying to <strong>access geo-restricted content</strong> such as <strong>Netflix</strong>, <strong>Hulu</strong> and other streaming services.</p>
<p style="text-align: justify;">With the exponential rise of internet security threats it doesn’t really matter what type of device you’re using - whether it’s a PC, MAC, tablet, iPhone, Android device or smartphone - the risk is the same. Every single one of these devices can be tracked and their precise location known without any effort.</p>
<p style="text-align: justify;">For example, the screenshot below was taken from a mobile phone. It shows a website visited that is able to track the mobile device’s IP address (49.185.251.16) and retrieve a significant amount of information regarding its location. It’s detected the country (Australia), the state (VIC), City (Melbourne), ISP/Mobile carrier (Optus) plus location and geographic coordinates (latitude and longitude)!</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-1.png" alt="Information captured on a non-VPN protected internet user" title="Information captured on a non-VPN protected internet user" /></p>
<p style="text-align: center;" align="center">Information captured from a non-VPN internet user</p>
<p style="text-align: justify;">As you can appreciate, the amount of information websites can capture is alarming. In a similar way ISPs, hackers and government agencies can intercept and capture traffic to and from a user’s mobile device or PC at home.</p>
<p style="text-align: justify;">Now that we appreciate how exposed we really are, let’s take a look at how VPNs help protect our identity and personal information.</p>
<p class="box-info">We highly recommend <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN service provider">StrongVPN service provider</a> - one of the worlds largest and most secure VPN providers.</p>
<h2 style="text-align: left;">Who Needs a VPN?</h2>
<p style="text-align: justify;">A VPN can offer a number of substantial advantages and, depending on your internet activities, can prove to be mandatory.</p>
<p style="text-align: justify;">A VPN service will allow you to “hide” your physical location by masking the IP address assigned by your internet service provider (ISP). In addition, a VPN provides a basic level of security and confidentiality as all information to and from your computer or mobile device is encrypted. This prevents hackers or ISPs from monitoring your online activities.</p>
<p style="text-align: justify;">Users typically require a VPN service for any of the following activities:</p>
<ul class="check">
<li><strong>Hide your internet activities from your ISP and government</strong>. ISPs around the world unofficially monitor user traffic in order to intercept sensitive or top secret information. More than 41 countries are now members of the “<a href="https://en.wikipedia.org/wiki/Five_Eyes" target="_blank" rel="nofollow noopener" title="global intelligence alliance monitoring electronic information">Five Eyes</a>” – a <strong>global intelligence&nbsp;alliance monitoring electronic information</strong> (email, faxes, web traffic etc) and <strong>private communication channels</strong> (VPNs). The <strong>National Security Agency</strong> (NSA) was uncovered <a href="https://arstechnica.com/information-technology/2016/08/cisco-firewall-exploit-shows-how-nsa-decrypted-vpn-traffic/" target="_blank" rel="nofollow noopener" title="National Security Agency (NSA) Spying on Cisco PIX Firewall VPNs">spying on hundreds and thousands of VPN connections</a> based on Cisco’s PIX Firewalls for over a decade thanks to a VPN exploit they discovered and was never shared with the public.</li>
</ul>
<ul class="check">
<li><strong>Accessing geo-restricted content</strong>. A prime explain is accessing US-based Netflix or Hulu when travelling overseas or accessing sites providing local online video/streaming, TV shows etc from anywhere around the world.</li>
</ul>
<ul class="check">
<li><strong>Bypassing web filters and accessing restricted websites</strong> or internet services such as online gaming, Skype, Dropbox, OneDrive etc. Recent bans by governments blocking popular Torrent sites such as ThePiratebay.org, TorrentHound, Torrentz, IsoHunt and others have pushed users to VPN services in order to <a href="https://www.firewall.cx/security/vpn-services-guides/how-to-bypass-isp-blocking-of-thepiratebay-and-other-torrent-sites-from-australia.html" target="_blank" title="Bypassing web filters and accessing restricted websites from anywhere in the world">access these sites and services without restriction</a>.</li>
</ul>
<ul class="check">
<li><strong>Peer-to-Peer (P2P) file sharing</strong>. Usually blocked by firewalls or ISPs people are moving to VPN and ToR based networks in order to freely share data with each other without having to worry about being tracked or blocked.</li>
</ul>
<ul class="check">
<li><strong>Torrenting</strong>. A big topic indeed. While there are many torrents that are legally distributed e.g Linux ISO images, open-source applications and games, Torrent seeders and leechers are monitored by agencies acting on behalf of their clients <strong>MPAA</strong>&nbsp;(Motion Picture Association of America) &amp; <strong>RIAA</strong> (Recording Industry Association of America) to protect their copyright materials. While these agencies monitor and stop illegal video/music downloading they have been found on many occasions to <a href="https://www.cnet.com/culture/grandma-endures-wrongful-isp-piracy-suspension/" target="_blank" rel="nofollow noopener" title="MPAA (Motion Picture Association of America) incorrectly accuses people of illegal downloading">incorrectly accuse citizens</a> of illegally downloading copyright content.</li>
</ul>
<ul class="check">
<li><strong>Avoid Bandwidth Throttling</strong>. ISPs are primarily responsible for this one. In order to save bandwidth they unofficially throttle torrent or other similar traffic, slowing download speeds considerably and sometimes to the point where users quit downloading. When it comes to <strong><a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN for Torrenting, P2P and File sharing">VPN for Torrenting, P2P and File sharing</a></strong> users can <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="avoid bandwidth throttling">avoid bandwidth throttling</a> and in many cases increase their download speeds up to 3 times!</li>
</ul>
<ul class="check">
<li><strong>Accessing the internet from public WiFi hotspots</strong>. Using <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="Public WiFi and Guest WiFi hotspots">Public WiFi and Guest WiFi hotspots</a> poses serious security threats. These are overcome with the usage of VPN services.</li>
</ul>
<p class="box-info" style="text-align: left;">The TOR network is an alternative VPN solution used also by the Dark-Web. Readers interested on how TOR VPN works and compares against VPN can also check our <a href="https://www.firewall.cx/security/vpn-services-guides/tor-vpn-guide-security-speeds-advantages-disadvantages.html" target="_blank" title="TOR vs VPN article">TOR vs VPN article</a>.</p>
<h3 style="text-align: left;">Accessing The Internet Without a VPN</h3>
<p style="text-align: justify;">Below is a diagram showing a typical user accessing the internet without a VPN. The user’s IP address is assigned by the ISP and is visible to the internet. Any online resource accessed by the user is completely visible to the ISP and anyone monitoring the user’s IP address:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-2.png" alt="Unencrypted internet traffic is visible and easily monitored" title="Unencrypted internet traffic is visible and easily monitored" />&nbsp;</p>
<p style="text-align: center;" align="center">Unencrypted internet traffic is visible and easily monitored</p>
<p style="text-align: justify;">Of course resources such as Internet Banking usually encrypt the data transferred between the client and the server but the traffic source (user IP) and destination (server IP) are still fully visible. Similarly other activities such as Torrent Downloads are fully traceable back to the user.</p>
<p style="text-align: justify;">It should also be noted that ISPs always keep log files of their users’ IP addresses. This means that the ISP is fully aware of the IP address assigned to each of its users. By law, these logs are stored for years and can be used as evidence in the event of a law suit or investigation. This applies to home and mobile users.</p>
<h3 style="text-align: left;">Using a VPN Service Provider Changes The Game</h3>
<p style="text-align: justify;">To use a VPN service provider you must first register with a <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Review">VPN Service Provider of your choice</a>. VPN subscriptions start from a low $3US - $8US per month making them affordable for any user. Once you’ve purchased a VPN subscription you are able to download and install the provided VPN Client on to your devices.</p>
<p style="text-align: justify;">With the VPN Client you are able to connect to one of your VPN Provider’s servers, which are located in various countries. Once connected, a “tunnel” is created between your device and the VPN server and all traffic is redirected to the VPN server and from there to the internet.</p>
<p style="text-align: justify;">Any traffic traversing the tunnel is protected via special encryption mechanisms. Traffic entering the tunnel is encrypted while traffic exiting the tunnel is decrypted.</p>
<p style="text-align: justify;">This means that anyone monitoring your internet connection e.g ISP, Hacker or Government agency, is unable to see your internet activities. All they can see is your encrypted traffic to the VPN server you’re connected to.</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-3.png" alt="" title="A VPN helps protect and encrypt all traffic to and from the internet avoiding any monitoring" data-alt="A VPN helps protect and encrypt all traffic to and from the internet avoiding any monitoring" /></p>
<p style="text-align: center;" align="center">A VPN helps protect and encrypt all traffic to and from the internet avoiding any monitoring</p>
<p style="text-align: justify;">When casually accessing websites or other online services it is unlikely they’ll be able to track your identity unless they require you to authenticate. For example if you need to access your Gmail account then you’ll need to provide your username and password. As that point your identity is known to Google even though you’re connecting via VPN, however, Google won’t be able to track your real location thanks to the VPN.</p>
<p style="text-align: justify;">On the other hand if you are downloading a torrent file you don’t need to provide any credentials and therefore your identity remains hidden as long as you’re connected to the VPN.</p>
<p style="text-align: justify;">To understand how well a VPN Service can disguise your activities, let’s go back to the initial example with the mobile phone and see how well a VPN Provider manages to hide a real IP address after connecting to a VPN server located in Canada:</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-4.png" alt="Changing locations. From Melbourne Australia to Canada thanks our VPN service" title="Changing locations. From Melbourne Australia to Canada thanks our VPN service" /></p>
<p style="text-align: center;" align="center">Changing locations. From Melbourne Australia to Canada thanks our VPN service</p>
<p style="text-align: justify;">Notice how I’m now located in Canada and assigned a Canadian-based IP address. This is because our mobile’s internet traffic is tunnelled through the VPN all the way to the Canadian-based VPN server and exits from that point to the internet.</p>
<h2 style="text-align: left;">VPN Service Provider Shared IP vs Dedicated IP</h2>
<p style="text-align: justify;">When connecting to a VPN Service Provider you’ll usually be assigned a <strong>Shared IP address</strong>, that is, an IP address that is used by many users simultaneously. While using a <strong>Shared IP address</strong> might not sound ideal, it does in fact provide increased anonymity as opposed to using a <strong>Dedicated IP address</strong> that is solely assigned to your VPN account.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-5.png" alt="VPN Service Provider with Shared IP address" title="VPN Service Provider with Shared IP address" />&nbsp;</p>
<p style="text-align: center;" align="center">VPN Service Provider with Shared IP address</p>
<p style="text-align: justify;">Dedicated IP addresses are usually required when accessing IP restricted servers or websites. Running a website or FTP server off your VPN Service Provider would also be a reason to make use of a Dedicated IP address.</p>
<p style="text-align: justify;">For the majority of VPN users who perform casual web browsing, downloading, file sharing and require anonymous browsing capabilities the <strong>Shared IP address</strong> is considered a secure option.</p>
<h2 style="text-align: left;">Smart-DNS Proxy Server</h2>
<p style="text-align: justify;"><a href="https://en.wikipedia.org/wiki/Smart_DNS_proxy_server" target="_blank" rel="nofollow noopener" title="Smart-DNS Proxy Server"><strong>Smart-DNS </strong></a>is a newer service provided by VPN Service Providers. Some offer it as an add-on service while others include it with the VPN subscription.</p>
<p style="text-align: justify;">We’ve already explained that with a VPN service all internet traffic is channelled through an encrypted connection to a VPN server and exits to the internet from there.</p>
<p style="text-align: justify;">With <strong>Smart-DNS</strong> a connection is established between the <strong>Smart-DNS</strong> server and client, however, communications are not encrypted and only selected traffic is channelled and sent to the <strong>Smart-DNS</strong> server, which works like a <strong>Proxy Server</strong> to help unlock access to geo-restricted services such as TV shows, NetFlix and other.</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/what-is-a-vpn/vpn-beginners-guide-to-anonymous-browsing-and-online-privacy-6.png" alt="A Smart-DNS Proxy channels specific requests and data to unlock geo-restrictions" title="A Smart-DNS Proxy channels specific requests and data to unlock geo-restrictions" /></p>
<p style="text-align: center;" align="center">A Smart-DNS Proxy channels specific requests and data to unlock geo-restrictions</p>
<p style="text-align: justify;">This is achieved by overriding selected DNS entries, e.g www.netflix.com, so that DNS queries resolve to the address of the Smart-DNS server rather than the real server. The Smart-DNS server accepts clients requests and acts as a proxy so that selected services are channelled through it, allowing access to any region-restricted or blocked content from anywhere in the world.</p>
<p style="text-align: justify;">It’s important to keep in mind that <strong>Smart-DNS service</strong> is <strong>not</strong> a <strong>VPN Service replacement</strong>. All traffic sent and received via the Smart-DNS service is <strong>unencrypted </strong>and speeds are usually faster compared to a VPN thanks to the absence of encryption, making it an ideal solution for accessing region-restricted streaming services or services where data encryption is not important.</p>
<h2 style="text-align: left;">Impact Of a VPN On Your Mobile Device’s Speed, Battery Or Computer</h2>
<p style="text-align: justify;">Running a VPN connection will have an impact on your mobile device or computer. The level of impact will vary between different devices and their CPU processing capacity.</p>
<p style="text-align: justify;">Following are key factors that will determine the impact on your device/system:</p>
<ul>
<li>CPU or processing power of your device (Single Core, Quad Core etc).</li>
<li>Quality of the VPN Client software (poorly or well written software).</li>
<li>VPN Encryption algorithm used to encrypt/decrypt data.</li>
</ul>
<p style="text-align: justify;">Let’s take a look at each point.</p>
<h3 style="text-align: left;">CPU – Processing Power Of Your Device</h3>
<p style="text-align: justify;">The faster the CPU the smaller the impact will be. Computers with iCore3, iCore5 or iCore7 processors offer more than enough power to perform all the necessary processing and a VPN will not significantly affect the user experience.</p>
<p style="text-align: justify;">Mobile phones with dual or quad CPU should also be able to handle a lightweight VPN Client without any difficulty, however, you must keep in mind that heavy internet usage also means more work for the CPU – this translates to a battery that is drained at a much faster rate. Mobile users should generally use the internet in the same way as before installing the VPN client to see the real impact it will have on their device. Newer mobile devices shouldn’t experience any noticeable difference.</p>
<h3 style="text-align: left;">Quality Of The VPN Client Software</h3>
<p style="text-align: justify;">Just like any piece of software a well-designed VPN application will function without problems and will limit its usage of system resources. There are VPN Providers that offer very cheap subscriptions, however, their VPN Client software might be buggy causing either frequent crashes or taking a long time to respond to user actions.</p>
<p style="text-align: justify;">It’s recommended to make use of high-quality VPN providers such as <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN">StrongVPN</a> and <a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="ExpressVPN VPN Service">ExpressVPN</a> who develop and thoroughly test their software. Our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Review">Best VPN review</a> offers a comparison between 5 Top VPN Services for you to choose from.</p>
<h3 style="text-align: left;">VPN Encryption Algorithm</h3>
<p style="text-align: justify;">There are quite a few VPN encryption options available through your VPN Client and each one of these will provide you with a different level of security. Stronger encryption, e.g. L2/IPSec, means better security, however, this will have a slightly larger toll on your device’s CPU as it will be required to work harder to encrypt and decrypt your traffic due to the high complexity of the strong encryption protocols.</p>
<p style="text-align: justify;">On the other hand, selecting a weaker encryption protocol such as <strong>PPTP</strong> means that demands on the CPU will be lower but so will the security offered.</p>
<p style="text-align: justify;"><span style="font-size: 11pt; line-height: 107%; font-family: 'Calibri','sans-serif';">Newer protocols, such as <strong>OpenVPN,</strong> combine the best of both worlds and deliver a fast &amp; secure VPN service at minimal cost to your CPU. <strong>OpenVPN</strong> is generally the recommended VPN protocol. </span></p>
<h2 style="text-align: left;">VPN Protocols</h2>
<p style="text-align: justify;">As mentioned earlier a VPN makes use of different encryption protocols to secure the connection between the end-user and the VPN server. Selecting the best VPN protocol is important so let’s discover the most commonly supported encryption protocols used by VPN providers:</p>
<ul class="check">
<li><a href="https://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol" target="_blank" rel="nofollow noopener" title="Point to Point Tunnel Protocol">PPTP</a> - <strong>Point to Point Tunnel Protocol</strong>. Old lightweight VPN protocol which is still very popular but doesn’t offer much security. Ideal for streaming and basic VPN needs but not for torrenting.</li>
<li><a href="https://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol" target="_blank" rel="nofollow noopener" title="L2TP / IPSec VPN Protocol">L2TP / IPSec</a> - <strong>Layer 2 Tunnel Protocol &amp; IP Security</strong>. The evolution of PPTP offering much better security and encryption at the slight expense of speed.</li>
<li><a href="https://en.wikipedia.org/wiki/Secure_Socket_Tunneling_Protocol" target="_blank" rel="nofollow noopener" title="Secure Socket Tunneling Protocol">SSTP</a> - <strong>Secure Socket Tunneling Protocol</strong>. A flexible SSL-based encryption by Microsoft. Good alternative to L2TP/IPSec but not as good as OpenVPN.</li>
<li><a href="https://en.wikipedia.org/wiki/OpenVPN" target="_blank" rel="nofollow noopener" title="OpenVPN Protocol - the best VPN Protocol">OpenVPN</a> – a newer <strong>open-source VPN protocol</strong> that offers great security, flexibility and compatibility. Supported by router firmware such as DD-WRT, Tomato and others.</li>
<li>More servers means better VPN user distribution. This translates to faster servers and fewer users per VPN server.</li>
<li>Higher service availability. If one or many servers go down you’ll have plenty of others to connect to therefore limiting the impact on your VPN service.</li>
<li>Ability to access geo-restricted content for every country that has a VPN server available for you to connect to.</li>
<li>Ability to connect to a VPN server that is located closer to the source you are trying to access, therefore providing better download/upload speeds.</li>
</ul>
<p style="text-align: justify;">Users should be aware that not all encryption protocols offer the same security and performance level. For example, <strong>PPTP</strong> is an older VPN protocol that doesn’t really encrypt the information but simply encapsulates user’s data. Think of it as placing a letter (data) inside a standard envelope. The envelope is light so you can carry more of them within a specific period (high performance / throughput). Despite the lower security offered by PPTP, it is still widely used today because not many understand the level of security it provides but also because it’s managed to penetrate the market the past 15 years and is still supported by newer VPN devices and servers.</p>
<p style="text-align: justify;">On the other hand <strong>L2TP/ IPSec</strong> is the evolution of PPTP and was introduced as an alternative more-secure VPN protocol. It offers significantly higher security but is a slower protocol meaning it has more overhead.</p>
<p style="text-align: justify;"><strong>SSTP </strong>is a Microsoft proprietary protocol found on all Windows operating systems after Windows Vista Service Pack 1. <strong>SSTP</strong> is preferred over <strong>PPTP</strong> and <strong>L2TP</strong> as it is able to pass through most firewalls without a problem (requires <strong>TCP Port 443</strong>) whereas <strong>PPTP</strong> and <strong>L2TP/IPSec</strong> might not be able to pass through a firewall as they use uncommon TCP/UDP ports which are usually blocked by corporate or guest networks.</p>
<p style="text-align: justify;">Finally, <strong>OpenVPN </strong>is by far the preferred VPN protocol. It’s an <strong>open-source</strong> (freely distributed) newer technology supported almost every device and VPN service provider. It’s flexible, offers great security, has moderate CPU demands and will run in almost any environment capable of passing through firewalls without a problem. In addition, router software such as DD-WRT, Tomato and Mikrotik support OpenVPN allowing users to connect to their VPN provider at the router level, removing the need for any VPN client software on devices connecting to the home or business network.</p>
<p style="text-align: justify;">Using the right VPN encryption protocol is important as it will significantly affect the security provided as well as your upload/download speeds.</p>
<h2 style="text-align: left;">VPN Servers – The More – The Merrier</h2>
<p style="text-align: justify;">VPN Service Providers generally deploy VPN servers around the globe to accommodate their customers. Using a VPN Provider that has hundreds or thousands of servers deployed is always a great option and there are plenty of reasons for this:</p>
<ul>
<li>More servers means better VPN user distribution. This translates to faster servers and fewer users per VPN server.</li>
<li>Higher service availability. If one or many servers go down you’ll have plenty of others to connect to therefore limiting the impact on your VPN service.</li>
<li>Ability to access geo-restricted content for every country that has a VPN server available for you to connect to.</li>
<li>Ability to connect to a VPN server that is located closer to the source you are trying to access, therefore providing better download/upload speeds.</li>
</ul>
<p style="text-align: justify;">If the VPN Provider does not reveal the number of VPN servers it maintains, then check the list of countries and cities where VPN servers are available – this information is usually provided and is a good indication that there are plenty of servers to select from.</p>
<h2 style="text-align: left;">VPN Kill-Switch Feature – Avoid Accidently Exposing Your Identity</h2>
<p style="text-align: justify;">The <strong>VPN Kill-Switch</strong> is a feature built into the VPN Client so that when enabled it will continuously monitor your VPN ensuring all traffic is passing through the VPN.</p>
<p style="text-align: justify;">When the <strong>Kill-Switch</strong> detects that your VPN has disconnected it will automatically stop all internet traffic from and to your PC or mobile device to avoid it from exposing its real identity - IP address.</p>
<p style="text-align: justify;">A VPN with the <strong>Kill-Switch</strong> enabled is the <strong>best practice for torrenting</strong> as it helps users from accidently exposing themselves to the public, especially when torrenting over night or the PC is left switched on to complete its download(s).</p>
<h2 style="text-align: left;">DNS Leak Protection</h2>
<p style="text-align: justify;">When connecting to a VPN the PC or mobile device is forced to use secure DNS servers for all DNS queries. These DNS servers are usually the VPN provider’s DNS servers. This ensures the ISP and government is unable to track any DNS queries which might reveal the user’s online activities.</p>
<p style="text-align: justify;">A <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="Understanding and Protecting against DNS Leak">DNS Leak</a> occurs when the operating system begins sending DNS queries to the ISP’s DNS or other insecure DNS servers. The reason for a DNS leak might be intentionally modified device settings (e.g DNS server settings) or even the way the operating system behaves – which is the case with the Windows operating system.</p>
<p style="text-align: justify;">One of Windows 10 new features allows it to direct DNS requests to the local network router or ISP, bypassing the VPN tunnel. This setting was designed to enhance and speed-up the DNS query process however it has created a major security issue as users can easily be exposed without knowning.</p>
<p style="text-align: justify;">Our <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Testing &amp; Protection">DNS Leak Testing &amp; Protection</a> article explains the problem in-depth and provides ways to protect against it. A <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="High quality VPN service">high-quality VPN service</a> will include DNS leak protection embedded within the VPN client to help protect its users from being unknowingly exposed to this serious security threat.</p>
<h2 style="text-align: left;">‘No-Log’ VPN Service Provider Policy</h2>
<p style="text-align: justify;">Not all VPN Service Providers are completely anonymous. Some VPN Service Providers keep extensive logs of their users’ IP addresses and VPN login sessions.</p>
<p style="text-align: justify;">A ‘<strong>no-log</strong>’ VPN Service does not keep any logs of its users or their online activities therefore making it extremely difficult to trace any of their online activities.</p>
<p style="text-align: justify;">VPN Providers that keep some type of logs seriously risk exposing their users. In the event of a security breach, or government demand to access these logs, users are left vulnerable as it will make it easier to trace previous online activities.</p>
<p style="text-align: justify;">VPN Service Providers who offer a “<strong>no log</strong>” policy usually state something along the following lines in their privacy policy:</p>
<p style="text-align: justify;"><em>“We never keep traffic logs, and we also don’t keep any logs that might enable someone to match an IP and timestamp back to a user.”</em></p>
<p style="text-align: justify;">It’s important to keep in mind that depending on the country where the VPN Provider resides, they might be required by law to store their logs no matter what impression they give on their site. For example, countries such as Romania, Netherlands, Sweden and Luxembourg are <strong>not currently required to keep logs</strong> while other countries in the European Union are required to do so.</p>
<p style="text-align: justify;">Make sure the VPN provider’s “<strong>no log</strong>” policy is absolutely clear to you before signing up.</p>
<h2>Paying your VPN Service Provider without Exposing Your Identity</h2>
<p style="text-align: justify;">VPN Service providers accept a number of different methods including credit cards, VISA, MasterCard, PayPal, BitCoin and more.</p>
<p style="text-align: justify;">While users can use any of the above methods for payment those concerned sharing personal information and seeking complete privacy can use <strong>BitCoin</strong>.</p>
<p style="text-align: justify;"><strong>BitCoin</strong> is a virtual form of digital currency that allows users and companies to transact online without going through a bank. Payments are anonymous so there is no trace of your identity and since banks are not involved in the transaction there are fewer fees both for the sending and receiving party.</p>
<h2>Money-Back Guarantee – Making the Most Out of Your Trial</h2>
<p style="text-align: justify;">The <strong>money-back guarantee</strong> option is usually offered by the popular and reputable VPN Service Providers. Some offer a <strong>3</strong>, <strong>5</strong>, <strong>7</strong> or <strong>30 day refund policy</strong> while others provide a free usage period after which you are required to purchase a subscription if you wish continue using the service.</p>
<p style="text-align: justify;">Whichever the case, a “try before you buy” policy is always preferred since it provides you with the opportunity to try the service and ensure it works well for you. It is always recommended when trying a new VPN service to connect to multiple VPN servers throughout the trial period to help get a good idea on how well the VPN provider is performing. Try downloading via Torrent, accessing Netflix or similar services, visit frequently used websites and see how the service performs before commit to a long-term plan.</p>
<p style="text-align: justify;">Finally ensure you are fully aware of the <strong>money-back guarantee conditions</strong>. Some VPN providers will happily provide a refund within the trial-period however they might refuse to issue the refund in case of excessive downloads.</p>
<h2>Number of Simultaneous VPN Connections</h2>
<p style="text-align: justify;">All VPN Service Providers support simultaneous connections using a single VPN account allowing users with multiple devices e.g laptop, mobile phone, tablet etc, connect through any of their devices.</p>
<p style="text-align: justify;">Users who wish to take advantage of a VPN Service will surely appreciate this capability and it’s quickly becoming very popular. Many users take advantage of this feature and share the VPN account with friend to split the VPN cost.</p>
<p style="text-align: justify;">A minimum of at least 2 simultaneous VPN connections should be supported by your provider, one for the laptop/workstation and one for your mobile phone or tablet. Support for more than 2 devices is always nice to have as you can easily share it with a friend.</p>
<h2>Customer Support</h2>
<p style="text-align: justify;">VPNs have evolved enough today so that a user at any technical level should be able to download and install the VPN Client without difficulties. Nevertheless, if you’re new to VPNs the amount of information can often be overwhelming and confusing.</p>
<p style="text-align: justify;">For this reason <strong>24/7 Customer Support</strong> is important and it should be easily accessible via the provider’s website, email or even phone.</p>
<p style="text-align: justify;">The most common method today is <strong>24/7 online chat support</strong> followed by email support while some providers might even offer phone support.</p>
<p style="text-align: justify;">With chat and email support you should be able to precisely describe any problem you are having so that the person on the other side can understand. This will help resolve your problem much faster and save time and unnecessary frustration.</p>
<h2>Choosing the Right VPN Provider</h2>
<p style="text-align: justify;">With over 200 VPN Service Providers, making the right choice can be a very complicated and time-consuming task. While the price tag always plays a significant role it should not be the major decision-making factor.</p>
<p style="text-align: justify;">Protecting your online privacy correctly is very important even if that means spending a few additional dollars.</p>
<p style="text-align: justify;">Firewall.cx is the only network security site with industry security experts who have performed in-depth reviews of VPN providers to produce the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service"><strong>Best VPN Service </strong></a>guide based on the following criteria:</p>
<ul>
<li>VPN Speeds and Latency Test</li>
<li>VPN Server locations (countries) amount of servers world-wide</li>
<li>Netflix VPN, <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN Torrenting - Why use a VPN to Torrent and how to safely download from the internet">Torrenting</a> and Blocked sites, Geo-blocking Bypass</li>
<li>Security features (<a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Protection">DNS Leak Protection</a>, Kill Switch etc)</li>
<li>Multiple device login (Laptop, Phone, Tablet etc)</li>
<li>Encryption protocols (PPTP/L2TP IPSec/OpenVPN etc) &amp; Support for Dedicated VPN Routers</li>
<li>No-Log Policy &amp; Bitcoin payment support</li>
<li>User-Friendly VPN client interface</li>
<li>Pricing – based on a 12 month subscription</li>
</ul>
<h2>Summary</h2>
<p style="text-align: justify;"><strong>Understanding what a VPN service is </strong>and how it can <strong>help you protect your online privacy</strong> is very important today. Enabling <strong>anonymous browsing</strong> and protecting your online identity against attack is as equally important as running an antivirus on your computer. VPN Services help provide a significant level of <strong>identity protection</strong> while at the same time unlocking geo-restricted content with the click of a button. Protect your online transactions and activities with a highly <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" title="Best VPN Reviews">recommended VPN Service</a> today.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Sun, 29 Jan 2017 11:28:40 +1100</pubDate>
		</item>
		<item>
			<title>VPN Hotspot - How to Stay Safe on Public &amp; Guest WiFi Networks</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html</guid>
			<description><![CDATA[<h2>Is Guest WiFi Safe?</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-1b.png" alt="Public and Guest Wifi security threats" style="margin: 7px; float: left;" title="Public and Guest Wifi security threats" />It’s hard to go to a pub, café, or hotel these days without running into <strong>public</strong> or<strong> guest WiFi</strong>. In many cases, an internet connection can feel like a necessity – keeping up with work or personal emails, arranging plans with friends, checking social media. Connecting is usually as easy as entering an email address, filling out a survey, or entering a code on a receipt.</p>
<p style="text-align: justify;">It's an easy trap to fall into. Cellular data is expensive. In the US, 500 MB of pre-paid data costs an average of $85 US. If your contract doesn’t have a large data allowance, <strong>free WiFi</strong> is a godsend. However, that convenience comes with considerable risk to your privacy and security. If you’re not using a <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Review"><strong>VPN</strong></a> at a <strong>public hotspot</strong>, you’re opening yourself up to all kind of malicious attacks and data interceptions such as <strong>sslstrip man-in-the-middle attack</strong> (analysed below), online activity monitoring, computer hijacking, restricted online browsing and many more serious security threats.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Free VPN Service Download">Download a Free 7 day fully functional StrongVPN service. Unlimited download, strong encryption, supports all your devices!</a></p>
<h2 class="h2" style="text-align: left;"><span style="color: windowtext; font-style: normal;">Public - Guest WiFi Security Risks</span></h2>
<p style="text-align: justify;">The biggest misconception about open WiFi is that it offers the same protection as your home network. That couldn’t be further from the truth. The annoying password on your home network does much more than keep people from connecting. It encrypts your data so that those on the outside have trouble looking in.</p>
<p style="text-align: justify;">By nature, <strong>guest WiFi</strong> has no password. In most cases, that means <strong>no encryption</strong>. With a simple tool, anyone on the network can see which websites you’re visiting. In some cases, they can even intercept the emails you send, the files on your computer, and passwords. It doesn’t matter if you’re at a high-security airport or the coffee shop down the road.</p>
<p style="text-align: justify;">Even when an attacker isn’t around, you’re putting trust in the security of everyone else on the network. You may have the latest version of Windows 10, but the person next to you could have no security knowledge. Some forms of malware attempt to spread themselves to other people on the network, and the user probably doesn’t even know about it.</p>
<h2 style="text-align: left;">Common WiFi Attacks used at Internet Hotspots</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-https.png" alt="vpn hotspot - SSL Connections are encrypted connections" style="margin: 7px; border: 1px solid #000000; float: left;" title="vpn hotspot - SSL Connections are encrypted connections" />Thankfully, wifi snooping is on the decrease thanks to SSL encryption. This web standard is spreading across all the most popular sites, and you’ll notice it by the <strong>HTTPS icon</strong> in your browser (as seen in the image on the left). It means that while someone can see the url you’re on, they can’t see your emails or the password you just typed in. Unfortunately, this won’t stop someone resourceful. In fact, SSL can be bypassed with a single method.</p>
<p style="text-align: justify;">In 2009, security expert Moxie Marlinspike introduced <strong>sslstrip</strong>. By routing a victim’s connection through their own machine, an attacker can redirect them to the HTTP version of the page. The browser won’t even detect this and the victim has no idea what’s going on.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-1.png" alt="how sslstrip wifi attack works" title="how sslstrip wifi attack works" /></p>
<p style="text-align: center;">Representation of how an <strong>sslstrip wifi attack</strong> works</p>
<p style="text-align: justify;">The vulnerability comes from the fact that most users don’t type in “<strong>https://</strong>” at the beginning of every url. This means that when they first connect to the site, it’s <strong>HTTP</strong>. Most websites will then redirect users to an HTTPS version, but <strong>ssltrip</strong> steps in and sends back HTTP instead. The hacker can then view all the user’s requests in plaintext, collecting whatever information he likes.</p>
<p style="text-align: justify;">Though attackers often need specialist software and some technical knowledge, packages such as <strong>WiFi Pineapple</strong> can make so-called “man-in-the-middle” attacks relatively simple. In a few clicks, users can pretend to be a public network, routing traffic through them rather than to the router. From there, the attacker can force the user to visit websites with malware, install key loggers, and plenty of other shady things. It’s not too difficult, and with the aid of YouTube, <span style="color: windowtext;">a seven-year-old </span>did it <a href="https://www.itv.com/news/london/2015-01-21/7-year-old-girl-takes-just-10-minutes-to-hack-into-public-wifi-network-access-strangers-laptop" target="_blank" rel="nofollow noopener" title="Wifi Hacking in eleven minutes">in eleven minutes</a>.</p>
<p style="text-align: justify;">In some cases, attackers don’t even need any experience to view your information. Oftentimes, users connecting to hotel WiFi forget to change Windows sharing settings. This makes it easy for anybody to view your shared files with no hacking required. Sometimes this isn’t even password protected, making it child’s play.</p>
<p style="text-align: justify;">However, there are also tools to make more complex processes simple. In 2010, a simple browser extension called <a href="https://en.wikipedia.org/wiki/Firesheep" target="_blank" rel="nofollow noopener" title="FireSheep">FireSheep</a> was released. The tool lets users catch browsing cookies from any website that doesn’t use HTTPS. Though many major websites such as Facebook and Gmail are protected, smaller sites often use HTTP, and many users have the same password for multiple sites.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-2.png" alt="Firesheep Firefox extension in action" title="Firesheep Firefox extension in action" />&nbsp;</p>
<p style="text-align: center;">Firesheep Firefox extension in action</p>
<p style="text-align: justify;">Other tools let you do the same from an Android phone or other devices. And that’s assuming you’re connecting to the right network at all. A common method of attack is to set up a fake network, or <a href="https://en.wikipedia.org/wiki/Honeypot_(computing)" target="_blank" rel="nofollow noopener" title="Honeypot"><strong>honeypot</strong></a>. To the untrained eye, it won’t look out of place. Often, they will make sense in the context, named <strong>Starbucks WiFi</strong>, for example. In fact, an attacker owns it, and is logging everything you do. Our article <a href="https://www.firewall.cx/operating-systems/microsoft/windows-workstations/windows-8-secure-access-point.html" target="_blank" title="configuring Windows 8 / 8.1 as an access point">configuring Windows 8 / 8.1 as an access point</a> is a good example that shows just how easy it is to configure your workstation into a honeypot.</p>
<h2 style="text-align: left;">Hotel Hotspots - 277 Hotels Wordwide with Major Security Flaw<span style="font-size: 11pt; line-height: 107%; color: black;"><br /></span></h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-3a.png" alt="How to stay safe on Hotel and Restaurant Guest WiFi" style="margin: 7px; float: left;" title="How to stay safe on Hotel and Restaurant Guest WiFi" />Hotels are one of the most vulnerable places for such attacks. They often have hundreds of people connected to the network at a time and hackers can stay in their rooms, undetected by anyone. Most hotels don’t have good security, and standardization means that many have the same, vulnerable hardware.</p>
<p style="text-align: justify;">In 2015, for example, <a href="https://www.huffpost.com/entry/new-wifi-threat-for-hotel_b_6954652" target="_blank" rel="nofollow noopener" title="Hotel Wifi security threat">277 hotels worldwide</a> were found to be using ANTlab’s InnGate device. It’s used by much of the hotel industry to set up guest WiFi, including most of the top 10 chains. Unfortunately, it has a major security flaw, enabling hackers to gain access to users’ data, and sometimes even credit card data held by the hotel.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-3.png" alt="ANTlab’s InnGate WiFi client login page" title="ANTlab’s InnGate WiFi client login page" /></p>
<p style="text-align: center;">ANTlab’s InnGate WiFi client login page</p>
<p style="text-align: justify;">Thankfully, ANTlab has since produced a software update to solve the issue, but it must be installed manually, and there's no way to tell if the hotel has applied the fix. This leaves a situation where you can never truly trust hotel networks.</p>
<p style="text-align: justify;">Business executives should be particularly cautious. Russian security firm Kaspersky Lab discovered in 2014 that hackers were running a malware campaign code-named <strong>DarkHotel</strong> which was&nbsp;<span style="color: #1155cc;"> </span>targeting business leaders at hotels in Asia. <strong>DarkHotel</strong> is a targeted <span class="mw-redirect">spear-phishing</span> spyware and malware-spreading campaign that appears to be selectively attacking business hotel visitors through the hotel's in-house <span class="mw-redirect">WiFi</span> network. When logging into the WiFi, a page asked them to download the latest version of Flash Player, Messenger or other software. The software was legitimate but malware piggybacked on the install, stealing valuable data.</p>
<h2 style="text-align: left;">Business Guest WiFi Security</h2>
<p style="text-align: justify;">Businesses’ own networks can also be a significant target. Though many private corporate networks invest in security, guest internet is often open and unsecure. This puts clients or visitors at risk, and can also endanger employees using the wrong network. Unfortunately, a number of solutions fail to offer proper network encryption.</p>
<p style="text-align: justify;">This opens users up to the dangers mentioned before, such as man-in-the-middle attacks. Browsing is open to snooping and could result in lost passwords, malware and more. Many routers try to circumvent the risk slightly by implementing a portal page, but this can lead to further problems.</p>
<p style="text-align: justify;">In the case of some Linksys and Belkin routers, the page uses HTTP rather than HTTPS. That means that anyone sniffing WiFi traffic nearby can discover a password in plaintext when its typed in. Naturally, that gives them access to the network anyway, and possibly other logins if the password is re-used.</p>
<p style="text-align: justify;">In addition, some guest networks still use <strong>Wired Equivalent Privacy</strong> (<strong>WEP</strong>) for protection. WEP is outdated and easily circumvented, now succeeded by WPA and WPA2. WEP can now be easily circumvented, and in 2011 three Seattle-based hackers stole <a href="https://www.seattlepi.com/local/article/Feds-Wi-Fi-hacking-burglars-targeted-dozens-of-2178421.php" target="_blank" rel="nofollow noopener" title="Hackers steal over $750,000 by hacking WiFi">over $750,000</a> from local businesses using this method.</p>
<p style="text-align: justify;">The three drove around with networking tools, looking for unsecure or accessible wireless networks and stealing data. Employee social security numbers, email addresses, company credit card numbers and other information was then sold on to third parties.</p>
<h2 style="text-align: left;">Staying Safe on Public Wi-Fi Networks &amp; Internet Hotspots</h2>
<p style="text-align: justify;">Fortunately, there are several ways you can stay safe on public WiFi and protect both your information and clients. Firstly, check that you’re connecting to the right network. It’s stupidly easy for someone to create their own hotspot called “Hotel WiFi” and log all your connections. It always pays to ask an employee which WiFi you should connect to.</p>
<p style="text-align: justify;">Before you connect, check your <strong>sharing settings</strong>. This will stop the average joe from seeing all your shared documents with a click. You can view them easily in Windows via <strong>Network and Internet&gt; Change advanced sharing settings</strong>.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-4.png" alt="Disabling Network Discovery and File Printer Sharing when connected to Public wifi" style="border: 1px solid #000000;" title="Disabling Network Discovery and File Printer Sharing when connected to Public wifi" /></p>
<p style="text-align: center;">Disabling Network Discovery and File Printer Sharing when connected to Public wifi</p>
<p style="text-align: justify;">You’ll want to disable both <strong>Network Discovery </strong>and<strong> File and printer sharing</strong>. This will make it harder for people to access all your documents. In <strong>OSX</strong> you’ll want to go to <strong>System Preferences&gt; Sharing </strong>and <strong>untick</strong> all the boxes there.</p>
<p style="text-align: justify;">While you’re at it, you may as well make sure your <strong>Firewall</strong> is <strong>enabled</strong>. Often, users can disable the setting due to annoying software asking for permissions. However, having the Firewall enabled is essential on guest internet. Though it’s not infallible, it will make it harder for attackers to poke around in your PC.</p>
<p style="text-align: justify;">In Windows, you can simply type in <strong>firewall</strong>, and then click <strong>turn Windows Firewall on </strong>or<strong> off</strong> on the left side of the control panel. <strong>OSX</strong> is equally simple, and both let you set exceptions for <strong>public</strong> and <strong>private networks</strong>.</p>
<p style="text-align: justify;">Users should also be keeping both their operating system and applications up to date. This is especially important for browsers and plugins like <strong>Flash</strong> and <strong>Java</strong>. Not only will this reduce the vulnerabilities on your computer, you won’t be fooled by the bogus update messages mentioned earlier.</p>
<p style="text-align: justify;">Speaking of browsers, try to make sure you’re using HTTPS where possible. A simple way is to visit popular websites in HTTPS on a secure network and then bookmark them. When you’re in public, only use that bookmark to access your logon. Alternatively, extensions such as <a href="https://www.eff.org/https-everywhere" target="_blank" rel="nofollow noopener" title="HTTPS Everywhere">HTTPS Everywhere</a> will <strong>force</strong> <strong>Chrome</strong>, <strong>Opera</strong>, or <strong>Firefox</strong> to use <strong>SSL encryption</strong> on all webpages that support it. This will protect you against <strong>sslstrip</strong> and is much more user-friendly.</p>
<p style="text-align: justify;">If someone still manages to sniff your password, <strong>two-factor authentication</strong> can be a lifesaver. Most major email providers such as Gmail and Hotmail provide this service, as does Facebook. Essentially, it makes you enter a time-sensitive passphrase when connecting from a new device. This can be delivered via text, a mobile app, or email. The extra step can be enough to turn away most hackers. &nbsp;</p>
<p style="text-align: justify;">However, the only way you can be 100% sure is to not visit sensitive websites at all. Generally, it’s a bad idea to go on PayPal, online banking, or other such websites on guest WiFi. You can never be confident you’re truly safe, and that applies to mobile banking too. When you’re done browsing, you should consider disconnecting from WiFi or turning off your computer. The longer your PC is open and on the network, the longer an attacker has to find vulnerabilities.</p>
<p style="text-align: justify;">All of these steps will help a lot with creating a secure public WiFi experience. However, the unfortunate truth is that a determined attacker can still bypass these measures. To <strong>significantly increase your safety</strong>, you’ll want to invest in a <strong>VPN Service Provider</strong>. While selecting a VPN Provider can be a time-consuming process our <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service Providers">Best VPN services</a></strong> comparison will help considerably in the process of selection.</p>
<h2 style="text-align: left;">Secure WiFi Access and Identity Protection with VPN Service Providers</h2>
<p style="text-align: justify;">A <strong>Virtual Private Network</strong> is exactly what it sounds like. Simply, a VPN allows you to make a secure connection to a server over the internet. All your traffic goes through that server, with very strong encryption that makes it almost impossible to snoop. When you connect to an unprotected WiFi network, attackers will just see a load of random characters. Trying to circumvent that is simply not worth their time.</p>
<p style="text-align: justify;">With a <strong>VPN Provider</strong> your PC creates a tunnel to send your data over the internet. Every piece of data sent over the internet is in chunks called packets. Each packet has part of the data, as well as other information like the protocol (HTTP/HTTPS) and the user’s IP address. When you connect to a VPN, that packet is sent <em>inside</em> another packet. As you would expect, the outer packet provides security and keeps the information from prying eyes.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-hotspot-guest-wifi-threats/vpn-hotspot-how-to-stay-safe-on-public-guest-wifi-networks-5.png" alt="With a VPN Provider all internet traffic is encrypted and secure" title="With a VPN Provider all internet traffic is encrypted and secure" /></p>
<p style="text-align: center;">With a VPN Provider all internet traffic is encrypted and secure</p>
<p style="text-align: justify;">However, as mentioned before, data is also encrypted. How exactly this is achieved depends on the security protocol of the VPN client. Using the <strong>Best VPN Protocol</strong> is important to ensure your VPN connection has the most suitable encryption depending on your online usage. Following is a quick rundown of the various encryption methods VPN providers use:</p>
<ul>
<li style="text-align: justify;"><strong>Point-to-Point Tunnel Protocol</strong>.&nbsp;Supported by most VPN providers, this is an obsolete and insecure protocol. While it doesn’t support encryption, it creates a <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-gre-ipsec.html" target="_blank" title="Generic Routing Encapsulation (GRE) Tunnel Configuration">Generic Routing Encapsulation (GRE) Tunnel</a> between the two endpoints (client – server) and encapsulates all traffic inside the tunnel. Because of the encapsulation process PPTP can suffer from slow performance issues if there is not enough bandwidth available.</li>
<li style="text-align: justify;"><strong>L2TP / IPSec</strong>: Layer 2 Tunnel Protocol is considered the evolution of PPTP coupled with IPSec for encryption. It’s a highly secure protocol used by all VPN Service providers and manages to offer a high-level of confidentiality.</li>
<li style="text-align: justify;"><strong>SSTP – Secure Socket Tunnel Protocol</strong>: A fairly newer encryption protocol that relies on SSLv3/TLS for encryption which means SSTP is able to pass through most Firewalls and Proxy Servers using TCP port 443 (HTTPS). SSTP is supported by Microsoft Windows Vista SP1 and later plus RouterOS. As with most IP-tunnelled protocols, SSTP performance can be affected if there is not enough bandwidth available.</li>
<li style="text-align: justify;"><strong>OpenVPN</strong>: One of the latest VPN clients offering great security and flexibility. OpenVPN is maintained by the open-source community and relies on OpenSSL to provide encryption. OpenVPN can utilize both UDP and TCP protocols making it a highly desirable alternative to IPSec when it’s blocked.&nbsp;&nbsp; OpenVPN can support up to 256bit encryption and many vendors have implemented into their products e.g VPN Service Providers.</li>
</ul>
<h2 style="text-align: left;">Additional Benefits of Using a VPN at Hotspots &amp; Public Wifi Networks</h2>
<p style="text-align: justify;">As well as data protection, VPNs provide other benefits on <strong>public WiFi - Hotspots</strong>. Due to the nature of tunnelling, VPNs can be used to <strong>bypass content restrictions</strong>. This can be particularly useful on guest internet, which often has filtering policies in place.</p>
<p style="text-align: justify;">They also give you some <strong>anonymity</strong> when connecting to the web. The website you’re connecting to sees your connection is coming from wherever the VPN Server is located, not your physical (real) location. Moreover, as all of your information is encrypted, the broadband service provider can’t spy on you either. This has the bonus of protection from surveillance by the government or other parties. For a journalist or lawyer, that can be essential.</p>
<p style="text-align: justify;">However, not all VPNs are created equal. The protection your VPN hotspot provides depends largely on which of the above protocols they use and how the data is stored. Some VPN services keep a log of every site you visit and from which IP address. Naturally, that removes some degree of anonymity.</p>
<p style="text-align: justify;">This is particularly relevant if they’re located in one of the so-called ‘<strong>five-eyes</strong>.’ The US, UK, Canada, Australia, and New Zealand all <a href="https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett" target="_blank" rel="nofollow noopener">share the data</a> from their intelligence agencies. In many cases, VPN providers must legally hand over user data to the government on request. The only way <strong>VPN hotspots</strong> can circumvent this is by not keeping logs at all. For someone just wanting to stay safe on <strong>public WiFi</strong>, that’s not much of a concern. If you’re looking for the full package, though, it’s worth looking up their policies.</p>
<p style="text-align: justify;">Of course, some providers offer <strong>VPN functionality free of charge</strong>. Unfortunately, these are often subject to data caps, advertisements, or other money making methods. In some cases, free providers have <a href="https://www.techradar.com/news/networking/-hola-if-your-vpn-was-busted-selling-your-bandwidth-for-botnets-1295421" target="_blank" rel="nofollow noopener" title="VPN Service selling user bandwidth without their knowledge">sold user bandwidth</a> or connection data. Though they’ll do in a pinch, free VPNs are no substitute for a paid service. If you go free, it’s best to do some research beforehand.</p>
<p style="text-align: justify;">There’s also availability to consider. Most <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="paid VPN Services">paid VPN Services</a></strong> support all the major devices and operating systems, such as Windows, OSX, Linux, iOS, Android and routers. That means you can be protected on all your devices, but not necessarily all at once. <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN">The limit of devices you can connect varies depending on provider, anywhere between 2 and 6</a>. The majority support 4 or 5 devices, but this can change depending on your plan.</p>
<p style="text-align: justify;">Despite this, it’s easy to get a VPN set up on any device. Though some don’t support less popular platforms like Windows 10 Mobile, it’s usually possible to set them up manually via a built-in settings menu.</p>
<p style="text-align: justify;">For more obscure devices like a DS or PS Vita, or just to avoid setup, you can share your VPN connection from a PC. This essentially acts as a separate, <strong>VPN Hotspot</strong>, meaning you’ll have your own <strong>password-protected WiFi network</strong> that’s secure and encrypted. You can set one up on a Windows PC with the following steps or read our <a href="https://www.firewall.cx/operating-systems/microsoft/windows-workstations/windows-8-secure-access-point.html" target="_blank" title="Setup a Windows WiFi Hotspot">Windows WiFi Hotspot article</a>:</p>
<ol>
<li style="text-align: justify;">Connect your PC over Ethernet or WiFi</li>
<li style="text-align: justify;">Hit <strong>Start</strong> and type <strong>cmd</strong> and select <strong>Open command prompt as an administrator</strong></li>
<li style="text-align: justify;">Type <strong>netsh wlan show driver</strong></li>
<li style="text-align: justify;">Look for the network you’re connected to and check for the field <strong>Hosted network supported: Yes</strong></li>
<li style="text-align: justify;">Type <strong>netsh wlan set hostednetwork mode=allow ssid=VPN hotspot key=MyP@$$!</strong></li>
<li style="text-align: justify;">Type <strong>netsh wlan start hostednetwork</strong></li>
<li style="text-align: justify;">Go to <strong>Control Panel&gt;Network and Sharing Center</strong> and <strong>click Change adapter settings</strong></li>
<li style="text-align: justify;">Find the relevant VPN adapter and <strong>click</strong> on <strong>Properties</strong></li>
<li style="text-align: justify;">Go to the <strong>Sharing tab</strong> and tick <strong>Allow other network users to connect through this computer’s internet connection</strong></li>
<li style="text-align: justify;">Start up your VPN and connect to the new <strong>VPN hotspot</strong> from any device</li>
</ol>
<p style="text-align: justify;">This is a good solution if you have multiple people in a hotel suite or café, and saves downloading an app on every device. For easier setup, you can download a tool like <strong>Virtual Router Manager</strong>. You’ll still need a compatible WiFi card, but you can set up the <strong>VPN hotspot</strong> in just a few seconds.</p>
<p style="text-align: justify;">Another great solution for home or office environments is to configure your router to connect with your VPN Provider. A solution like this will allow you to cleverly share your VPN connection with all devices in your network without requiring to separately configure each one with a VPN client.</p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">You can never be truly safe on <strong>Public or Guest WiFi</strong>. Whether you’re in a hotel, café or on a business guest network, a determined attacker may be able to find a way. Regardless of how safe you think you are, it’s always worth <strong>avoiding sensitive logins</strong> while on an <strong>unsecure connection</strong>.</p>
<p style="text-align: justify;">If you have to, a VPN will significantly reduce the risk. For most attackers, it will be more hassle than it’s worth. Setting up a <strong>VPN hotspot</strong> can extend this protection to any device, so friends and family have little reason to be unsafe.</p>
<p style="text-align: justify;">Naturally, VPNs aren’t infallible. Users still need to watch out for <strong>fake WiFi portals</strong>, which may launch in the time between connecting to a network and launching the VPN. This short window may also give the attacker information about your system or other clues to help them.</p>
<p style="text-align: justify;">However, in combination with other measures, a VPN is possibly the best protection you’ll find. Without a <strong>VPN</strong>, hotspots just aren’t secure and, considering what’s on the line, <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Best VPN Review">$3 to $8 US a month for a fast &amp; secure VPN service is a complete bargain</a>.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Fri, 13 Jan 2017 15:35:11 +1100</pubDate>
		</item>
		<item>
			<title>VPN For Torrenting, P2P and File Sharing. Test Anonymous Torrenting, Avoid Bandwidth Throttling, Protect Your Identity</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html</guid>
			<description><![CDATA[<p style="text-align: justify; line-height: normal;"><span style="color: black;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/vpn_for_torrenting_introduction.jpg" alt="VPN for Torrenting Guide" style="margin: 7px; float: left;" title="VPN for Torrenting Guide" /></span>The word <strong>torrenting</strong> is often viewed as synonymous with <strong>pirating</strong>. It’s seen as a shady and illegal practice, used to con hard working artists out of their money. As a result, internet service providers often blanket ban torrent websites or severely throttle downloads. If you aren’t <strong>using a VPN for torrenting</strong>, there’s a good chance you’re affected by this. However, ISPs over-arching policies can hurt users that use <strong>Peer-to-Peer</strong> (<strong>P2P</strong>) <strong>file sharing</strong> for innocent purposes.</p>
<h2 style="text-align: left;">How Torrenting &amp; Peer-to-Peer (P2P) Works</h2>
<p style="text-align: justify;">Instead of using dedicated servers, P2P utilizes the connections of other users to distribute files. As they download a torrent, the individual also uploads a small portion for others to download. This creates an interconnected network where files are provided by many different people.</p>
<p style="text-align: justify;">One huge example of <strong>legal P2P usage is gaming</strong>. <strong>Online games</strong> such as <strong>World of Warcraft</strong>, <strong>League of Legends</strong>, and <strong>downloads</strong> from <strong>UPlay</strong> all have a <strong>P2P option</strong>. This saves on server costs for the developers and can <strong>increase torrent speed</strong>. This can foster development for smaller, indie companies, who might not have the infrastructure for lots of servers.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Download Torrents Safely &amp; Bypass any geo-location restrictions using StrongVPN Client">Download Torrents Safely &amp; Bypass any geo-location restrictions using StrongVPN Client</a></p>
<p style="text-align: justify;">In fact, Windows 10 even <a href="https://learn.microsoft.com/en-us/archive/blogs/mniehaus/using-wsus-with-windows-10-1607" target="_blank" rel="nofollow noopener" title="Windows 10 P2P Services">takes advantage</a> of this method to save on bandwidth issues. The OS delivers updates in multiple parts, pulling bits from both PCs on the same network, over the internet, and Microsoft’s own data centers. This feature is turned on by default since the <strong>Windows 10 Anniversary Update</strong> in the summer of 2016.</p>
<p style="text-align: justify; line-height: normal;">However, more important is the role of <strong>torrenting in distributing public data</strong>. The Internet Archive caches huge amounts of websites and offers a huge variety of public domain books, TV shows, and audio recordings. The non-profit recommends the use of <strong>torrents to download its content</strong>, as it saves on bandwidth and allows it to continue its vital work.</p>
<p style="text-align: justify; line-height: normal;">This role extends even to government. NASA has used torrents several times in the past to distribute its findings, including this high-resolution picture of earth. The UK government has done similarly, releasing large datasets on public spending <a href="https://www.data.gov.uk/dataset/3266d22c-9d0f-4ebe-b0bc-ea622f858e15/combined-online-information-system" target="_blank" rel="nofollow noopener" title="BitTorrent">via BitTorrent</a>.</p>
<p style="text-align: justify; line-height: normal;">As well as supporting government, BitTorrent is also used to oppose it. Transparency sites such as <strong>Julian Assange’s Wikileaks</strong> often release so-called ‘insurance files’ through torrents. Shortly before the leak of Hilary Clinton’s emails, the site published an <strong>88GB, 256-AES encrypted file</strong>. This keeps the organization from being shut down – if <strong>WikiLeaks goes dark</strong>, an <strong>automated message sends out an unlock password for all the data</strong>. In previous cases, files have reached upwards of 400GB.</p>
<p style="text-align: justify; line-height: normal;">Despite the genuine uses of P2P, users still get attacked by copyright claimants, sometimes inaccurately. In 2015, the creators of B-movie Elf Man filed a lawsuit against hundreds of users who claimed to have never even heard of the movie. Ryan Lamberson was one of these defendants and was eventually reimbursed for <strong>$100,000 in legal fees</strong>. Closer examination of evidence revealed that the tools used by the copyright holder did not account for several shortcomings, and only tracked uploads rather than downloads.</p>
<p style="text-align: justify; line-height: normal;">The defense also pointed out that the primary evidence was little more than an IP address. This information came from a third-party software that connected to the BitTorrent swarm in which the files were shared. However, some torrent software allows for the spoofing of IP addresses, and the investigator failed to account for several other false positives. Because of the win, several other Elf Man cases were dropped or settled for a lower value.</p>
<p style="text-align: justify; line-height: normal;">Other thrown cases include the Adam Sandler movie The Cobbler, and a 53-year-old artist painter was wrongly accused of <a href="https://www.cnet.com/au/news/grandma-endures-wrongful-isp-piracy-suspension/" target="_blank" rel="nofollow noopener" title="illegally downloading and sharing 18 films and TV shows">illegally downloading and sharing 18 films and TV shows</a>. Thankfully, there is a simple way to avoid such risks.</p>
<h2 style="text-align: left;">Anonymous Torrenting with a VPN Service</h2>
<p style="text-align: justify;">Using a <strong>VPN for torrenting</strong> will ensure <strong>your identity remains private</strong>, not just from ISPs, but copyright claimants and government. When you connect to a VPN, all your traffic goes through a “tunnel”. The individual packets that make up your data contain information such as IP Address, protocol, and other identifying information.</p>
<p style="text-align: justify;">Tunneling wraps those packets in others that provide extra security against prying eyes. In addition, the data is encrypted in transit, meaning ISPs, service providers and other middlemen see nothing but gibberish. Different providers use different encryption methods, the most common being <a href="https://www.firewall.cx/networking/network-protocols/ip-security-protocol.html" target="_blank" title="IPSecurity Protocol">IPSec</a>, <a href="https://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol" target="_blank" rel="nofollow noopener" title="L2TP Protocol">L2TP</a>, and <a href="https://en.wikipedia.org/wiki/OpenVPN" target="_blank" rel="nofollow noopener" title="OpenVPN Protocol">OpenVPN</a>.&nbsp;</p>
<p style="text-align: justify;">The benefit of this tunneling is clear. An ISP or copyright holder can only see the IP address of the VPN servers, not your own. This makes for <strong>anonymous torrenting</strong>, and they can’t see what website’s you’ve visited either. Though this might not protect you against entirely baseless accusations, it should stop you from coming under genuine suspicion.</p>
<p style="text-align: justify;">A <strong>VPN for torrenting</strong> will also provide you with protection in other ways. To <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="How to stay safe on Public WiFi"><strong>stay safe on public WiFi</strong></a>, they are almost essential. Without one, attackers can snoop on your online traffic, possibly recovering passwords and credit card details. You could also be vulnerable to malware on your machine and tracking from third parties.</p>
<p style="text-align: justify;">However, not all VPNs are created equal. Though some provide <strong>anonymous torrenting</strong> and <a href="https://www.firewall.cx/security/vpn-services-guides/vpn-hotspot-threats-how-to-stay-safe-on-public-guest-wifi-networks.html" target="_blank" title="Public WiFi Protection"><strong>public WiFi protection</strong></a>, others are questionable at best. Researching hundreds of different providers can be a pain, so instead we’ve done that for you. Our network security team has produced a <strong>VPN service review</strong> of all the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN">Best VPN Service Providers</a>, alongside detailed feature lists.</p>
<p style="text-align: justify;">Finally, our <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Begineers Guide to VPNs">Begineers Guide to VPNs</a> article aims to educate users with all the necessary information so they can fully understand how a VPN works, security features offered by the best VPN service providers, what to look for in a VPN and what to stay away from.</p>
<h2 style="text-align: left;"><a name="Avoid_Throttling"></a>Avoid ISP Bandwidth Throttling</h2>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/mbps_speed.jpg" alt="Avoiding ISP Bandwidth Throttling" style="margin: 7px; float: left;" title="Avoiding ISP Bandwidth Throttling" />Encrypted communication has the add-on effect of <strong>avoiding bandwidth throttling</strong> from ISPs. As mentioned earlier, service providers inspect packets to classify different data. This lets them put a speed cap on specific mediums. This is usually done unofficially and some service providers will deny the practice despite significant data <a href="https://www.eff.org/deeplinks/2008/08/fcc-rules-against-comcast-bit-torrent-blocking" target="_blank" rel="nofollow noopener" title="Comcast accused of BitTorrent blocking">to the contrary</a>.</p>
<p style="text-align: justify; line-height: normal;">Despite this, it’s becoming more and more routine for ISPs to <strong>throttle or block torrent downloads</strong>. Everything you receive goes through their servers, allowing them to analyse it with Deep Packet Inspection. This method lets the service provider look at different data packets and classify it into different categories, such as video, music, and torrents.</p>
<p style="text-align: justify;"><strong>Bandwidth throttling</strong> can be achieved in several ways. One method is blocking router ports often used for BitTorrent. Typically, P2P downloads go through TCP ports from 6881-6889. By limiting the speed on these, an ISP can cut out a big chunk of bandwidth.</p>
<p style="text-align: justify;">However, this method is becoming less and less popular. Increasingly, torrent clients randomize TCP ports or tell users if there are any issues. As a result, internet service providers use methods that are harder to dodge.</p>
<p style="text-align: justify;">One such technique is called <strong>traffic shaping</strong>. The flow of certain packets is delayed in favour of others, affecting download and upload speed. This can be done as a blanket, or through intelligent burst shaping. <strong>Burst shaping increases torrent speeds</strong> for a short period, before gradually returning to a lesser speed. Thus, extended downloads such as movies, games, and streaming are slower, while web pages still load quickly.</p>
<p style="text-align: justify;">The need for shaping comes from the limited bandwidth resources of an ISP. It lets the service provider guarantee performance to other users by reducing the effect of heavy users. Often, P2P is main target for this, and it’s easy to see why. <strong>Torrent downloads</strong> use large amounts of bandwidth and therefore cost a lot of money to sustain. In addition, companies are under a lot of <strong>legal pressure from copyright holders</strong>. By throttling, they can assure the parties that they’re doing their bit to limit the impact of pirates.</p>
<p style="text-align: justify; line-height: normal;">Unfortunately, it’s <strong>difficult to differentiate</strong> between <strong>legal P2P downloads and illegal ones</strong>. This means that <strong>regular users can be throttled</strong> due to blanket policies. You can check if your torrents are being throttled by running the <a href="https://broadband.mpi-sws.org/transparency/glasnost.php" target="_blank" rel="nofollow noopener" title="Glasnost test">Glasnost test (no longer developed)</a>. The eight-minute download will <strong>detect bandwidth throttling</strong> in the upload and download streams separately.</p>
<p style="text-align: justify; line-height: normal;">We tried the Glasnost test which failed to confirm our suspicions of <strong>BitTorrent bandwidth throttling</strong>:</p>
<p style="text-align: center; line-height: normal;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/glasnost-test-bittorrent-bandwidth-throttling.png" alt="Glasnost failed to detect any BitTorrent Bandwidth Throttling for our connection" style="border: 1px solid #000000;" title="Glasnost failed to detect any BitTorrent Bandwidth Throttling for our connection" />&nbsp;</p>
<p style="text-align: center; line-height: normal;" align="center">Glasnost failed to detect any BitTorrent Bandwidth Throttling for our connection</p>
<p style="text-align: justify; line-height: normal;">There are many cases where the Glasnost test will not accurately detect <strong>BitTorrent bandwidth throttling</strong> which is where personal experience confirms these suspicions.</p>
<p style="text-align: center; line-height: normal;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/torrenting-without-VPN.png" alt="BitTorrent without a VPN provided a Max Download Speed of 1.2Mbps" title="BitTorrent without a VPN provided a Max Download Speed of 1.2Mbps" />&nbsp;</p>
<p style="text-align: center; line-height: normal;" align="center">BitTorrent without a VPN provided a Max Download Speed of 1.2Mbps</p>
<p style="text-align: justify;">If you find an issue with your broadband provider, there are still steps you can take <strong>avoid throttling</strong>. Using a <strong>VPN for torrenting</strong> will ensure your ISP can’t categorize that data. If they don’t know it’s happening, they probably won’t throttle it, which will result in faster speeds.</p>
<h2 style="text-align: left;">How a VPN Can Increase Torrent Speeds – Real Example Avoiding BitTorrent Bandwidth Throttling</h2>
<p style="text-align: justify;"><strong>VPN speed increases</strong> are often quite significant. The exact difference depends on your ISP, but it can <strong>increase torrent speeds by double or triple</strong>. This is despite latency caused by encryption methods and cross-continent connections.</p>
<p style="text-align: justify;">In our tests, we found an <strong>increase in BitTorrent download speed</strong> from a pitty <strong>1.3 Mbps max</strong> to a whopping <strong>3.1 Mbps max</strong> using our <strong>StrongVPN</strong> connection. This test was carried out on a completely <strong>legal download</strong> of CentOS, showing that ISPs don’t make exceptions. This reduced the ETA of the download significantly, bringing it to an acceptable time.</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/torrenting-with-VPN.png" alt="VPN for Torrenting increases download speed" title="VPN for Torrenting increases download speed" /></p>
<p style="text-align: center;" align="center">BitTorrent traffic over VPN with <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="VPN For Torrenting - Best VPN Service">StrongVPN</a> increased out download speeds by almost 3 times</p>
<p style="text-align: justify;">It’s worth noting that using a <strong>VPN for torrenting</strong> doesn’t necessarily mean you’ll get the full speed of your internet connection. The speed upon which you can download is dependent on many factors including the plan you have with your ISP, how busy your local ISPs exchange is, VPN provider &amp; VPN server you’ve connected to, their (VPN servers) max upload bandwidth, type of encryption selected for the VPN and many more.</p>
<p style="text-align: justify;">For example, torrenting on stronger, <strong>256-AES encryption</strong>, results in a slower connection than <strong>128-AES encryption</strong>. The latter also provides less protection (weaker encryption), so the best fit depends on your usage scenario. The type of data authentication also makes a difference. Data protection prevents so-called active attacks, where the attacker gets between you and the VPN server and inject or modify data. <strong>SHA1</strong> is the fastest method, but <strong>SHA256</strong> is also common. It’s worth checking what options there are before you buy a <strong>VPN for torrenting</strong>.</p>
<h2 style="text-align: left;">Ensuring Your VPN for Torrenting is Protecting You</h2>
<p style="text-align: justify;">Despite these protection methods, you still may not be <strong>safe torrenting</strong> on certain VPNs. Some providers have strict policies on P2P downloads, often due to their legal situation of location. Many do not officially support illegal activity and if your provider keeps logs, they may be forced to hand them over to authorities or copyright holders.</p>
<p style="text-align: justify;">A <strong>free VPN for torrenting</strong> is especially risky. Fighting copyright holders takes a lot of time and resources, and most companies will <strong>only protect paying customers</strong>. They can also come with data caps or sell your details, so it’s usually worth paying a small monthly fee for <strong>true anonymous torrenting</strong>.</p>
<p style="text-align: justify;">Paid services have a vested interest in <strong>keeping consumers safe</strong> from <strong>copyright holders</strong>. As a business, their reputation depends on delivering what is advertised and keeping users safe. It’s always worth checking the provider’s policies before signing up.</p>
<p style="text-align: justify;">However, there are also issues that can stem from the individual user, rather than the VPN provider. Your IP address may be revealed through a <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak"><strong>DNS Leak</strong></a> or other means. This is easy to check and can be done straight from your browser.</p>
<p style="text-align: justify;">One of the most popular online tools <strong>ipMagnet</strong>. First, you will want to visit the site with your VPN. Loading the web page <strong>should display the IP address</strong> assigned by your <strong>VPN provider</strong>, not the IP address assigned by your ISP. Once this has been verified, you’ll want to hit the blue <strong>Magnet link</strong> text shown below:</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/ipmagnet_1.jpg" alt="ipmagnet" title="ipmagnet" /></p>
<p style="text-align: center;" align="center">ipMagnet allows BitTorrent users verify they are not exposing their real IP address</p>
<p style="text-align: justify;" align="center">You will then be prompted to add the file to the BitTorrent application of your choice. The link points to a fake file, and the embedded tracker is controlled by <strong>qMagnet</strong> who archives the information and returns it to you. The download is completely legal and the files shouldn’t take up any space on your hard drive. Moreover, the source code of ipMagnet is freely available online. It’s best to let this run for a while until multiple lines show in the table:</p>
<p style="text-align: center;" align="center">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/ipmagnet_2.jpg" alt="ipMagnet in Action reveals our VPN Service Provider is not exposing our real IP address" title="ipMagnet in Action reveals our VPN Service Provider is not exposing our real IP address" /></p>
<p style="text-align: center;" align="center">ipMagnet in Action reveals our VPN Service Provider is not exposing our real IP address</p>
<p style="text-align: justify;">You can also use see the IP address under the <strong>trackers</strong> section of your BitTorrent client. The message field should only display the IP address shows in your VPN client and will be updated if anything changes. If any of them display your <strong>real IP address</strong> (assigned by your ISP) you have a problem. This means that your real IP address is leaking and is viewable to your peers and snoopers.</p>
<p style="text-align: justify;">The best way to avoid such leaks is through a <strong>Kill Switch</strong>. This feature is often found within <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="reliable VPN service providers">reliable VPN service providers</a> or BitTorrent clients and shuts off your connection if the <strong>VPN for torrenting</strong> drops out. With reliable providers, this doesn’t happen often, but a few seconds is all it takes to expose your identity.</p>
<h2 style="text-align: left;">Set Up a VPN Kill Switch in qBittorrent</h2>
<p style="text-align: justify;">Some torrent clients have <strong>Kill Switch</strong> functionality built-in. This is true for popular providers such as <strong>qBitorrent</strong>, <strong>Vuze</strong>, and <strong>uTorrent </strong>and can help<strong> enforce anonymous torrenting</strong>. You can follow this guide to enable it for <strong>qBittorrent in Windows 10</strong>:</p>
<ol>
<li>Hit the Windows key and type <strong>Network and Sharing Center</strong>. Press <strong>Enter</strong>.</li>
<li>Click <strong>Change adapter settings </strong>in the left side panel.</li>
<li>In the <strong>Network Connections </strong>window, identify the adapter your VPN uses. For us, it was an Ethernet TAP-Windows Adapter you can see as <strong>Firewall VPN:<br /><br /><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/qBittorrentsetup_network.jpg" alt="qBittorrent setup network" style="border: 1px solid #000000;" title="qBittorrent setup network" /></strong></li>
<li>Open <strong>qBittorrent </strong>on your system.</li>
<li>Select <strong>Tools &gt; Options</strong>. Click the <strong>Advanced </strong>tab.</li>
<li>In the <strong>Setting </strong>column, look for <strong>Network Interface</strong>.</li>
<li>Set the drop down menu tothe previously identified adapter (Firewall VPN).</li>
<li>Click <strong>OK</strong>.</li>
<li>Restart qBittorrent.</li>
</ol>
<p style="text-align: justify;">Note that you need to fully quit qBittorent for this to work. That means <strong>right-clicking</strong> on the icon in the system tray and <strong>clicking exit</strong>. On start, you should notice that your download speed won’t budge from zero unless you enable your VPN. As soon as you start it up again, you’ll see an increased torrent speed.</p>
<h2 style="text-align: left;">Set Up a VPN Killswitch With Comodo Firewall</h2>
<p style="text-align: justify;">If neither your VPN or torrent client works with a <strong>Kill Switch</strong>, you’ll have to look elsewhere. <strong>Comodo Firewall</strong> is a good, tried and tested alternative. The setup is more complex, but ensures stable privacy and less fiddling later. First, you need to find the VPNs physical address. To start, type <strong>cmd</strong> in the start menu and run it as an administrator.</p>
<p style="text-align: justify;">Then type <strong>ipconfig /all </strong>and look for the adapter that says <strong>TAP -Windows Adapter </strong>next to the description field. Note down <strong>the Physical Address</strong>, and start <strong>Comodo Firewall</strong>:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/comodo_firewall.jpg" alt="comodo firewall MAC address" title="comodo firewall MAC address" /></p>
<p style="text-align: justify;">You’ll then want to set up a new network zone. Go to <strong>Settings &gt; Firewall &gt; Network Zones</strong> and select <strong>Add &gt; New Network Zone</strong>. Name it <strong>VPN for Torrenting</strong> and press okay.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/comodo_firewall_2.jpg" alt="Comodo Network Zone Setup for Torrenting" style="display: block; margin-left: auto; margin-right: auto;" title="Comodo Network Zone Setup for Torrenting" /></p>
<p style="text-align: justify;">Your new zone should now show up in Comodo. Select it and click <strong>Add &gt; New Address</strong>. Change the type to <strong>Mac Address </strong>and input the physical address from earlier:</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/comodo_firewall_3.jpg" alt="comodo firewall 3" style="display: block; margin-left: auto; margin-right: auto;" /></p>
<p style="text-align: justify;">Now you’ll want to create some rulesets. Go to <strong>Firewall &gt; Rulesets</strong> and hit <strong>Add</strong>. Name it <strong>Kill Switch Ruleset</strong>. You can then add three separate rulesets with the following settings:</p>
<ul>
<li>Action: <strong>Block</strong></li>
<li>Protocol: <strong>IP</strong></li>
<li>Direction: <strong>In or Out</strong></li>
<li>Source Address: <strong>Any Address</strong></li>
<li>Destination Address: <strong>Any Address</strong></li>
</ul>
<ul>
<li>Action: <strong>Allow</strong></li>
<li>Protocol: <strong>IP</strong></li>
<li>Direction: <strong>Out</strong></li>
<li>Source Address: <strong>Network Zone/VPN for Torrenting</strong></li>
<li>Destination Address: <strong>Any Address</strong></li>
</ul>
<ul>
<li>Action: <strong>Allow</strong></li>
<li>Protocol: <strong>IP</strong></li>
<li>Direction: <strong>In</strong></li>
<li>Source Address: <strong>Any Address</strong></li>
<li>Destination Address: <strong>Network Zone/VPN for Torrenting</strong></li>
</ul>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/comodo_firewall_4.jpg" alt="Comodo Firewall Ruleset for Torrent Kill Switch" title="Comodo Firewall Ruleset for Torrent Kill Switch" /></p>
<p style="text-align: justify;">Hit <strong>OK </strong>and you’re almost done. In the <strong>Application Rules</strong> section of <strong>Advanced Settings</strong>, you can add any application you want the <strong>Kill Switch Ruleset</strong> to apply to. In this case, we want to add our torrent client. Browse to the location of the program and add it to the rule. Finally, check <strong>Use Ruleset </strong>and select <strong>Kill Switch Ruleset</strong>.</p>
<p style="text-align: justify;">By using one or all the methods, you will ensure your VPN doesn’t leak your identity when it goes down. To be certain, run another test on ipMagnet with your VPN enabled and disabled. No IPs should appear when you aren’t connected.</p>
<h2 style="text-align: left;">VPN Port Forwarding &amp; NAT Firewalls</h2>
<p style="text-align: justify;">Unfortunately, some users will still have problems downloading torrents with a VPN enabled. This is usually due to the use of <strong>VPN NAT firewalls</strong>. VPN usage degrades the protection of the NAT firewall built into your router. The functionality blocks incoming traffic unless it’s in response to a request you made. However, the encrypted nature of VPN tunneling means you lose that protection.</p>
<p style="text-align: justify;">As a result, most VPN providers set up their own NAT firewalls that sit between their servers and the internet. This feature is usually presented as an optional toggle and offers much of the same protection. It can also result in issues when you’re using a <strong>VPN for torrenting</strong>.</p>
<p style="text-align: justify;">NAT firewalls can make your connection slower, offsetting much of the anti-throttling advantages. To avoid this, you’ll have to set up a port in the firewall that lets P2P traffic through. This is generally called <strong>VPN port forwarding</strong>.</p>
<p style="text-align: justify;">Some <strong>VPN port forwarding</strong> can be reached from the settings menu. A simple toggle is usually enough to solve any issues, but naturally, this can reduce security slightly.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/vpn/vpn-for-torrenting-p2p-file-sharing/pia_request_port_forwarding.jpg" alt="VPN Port Forwarding in Private Internet Access VPN Client for Fast Torrent Downloads" title="VPN Port Forwarding in Private Internet Access VPN Client for Fast Torrent Downloads" /></p>
<p style="text-align: center;">VPN Port Forwarding in Private Internet Access</p>
<p style="text-align: justify;">To get maximum efficiency, you will want port forward via the torrent client too. qBittorrent and other clients <strong>enable NAT-PNP</strong> and <strong>UPnP</strong> by default, which automates the process. In other scenarios, you may have to manually input the port in your torrent client. The five-digit port number usually displays on connection or inside the VPN window.</p>
<p style="text-align: justify;">If your provider doesn’t provide you with a VPN port forwarding number or settings toggle, it’s worth contacting directly via email. Sometimes the ports will be provided on request rather than to everyone. In other cases the provider port forwards by default, but doesn’t inform the user.</p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;">All the aforementioned methods will help keep your identity and wallet protected. In the case of <strong>Torrent throttling</strong>, you will be one step closer to getting the connection speeds you pay for. Moreover, careful application will make it impossible for anyone to verify your identity and hand out hefty fines.</p>
<p style="text-align: justify;">Despite this, using a <strong>VPN for torrenting</strong> doesn’t mean you’re completely immune. Some ISPs will throttle all encrypted traffic, or target individual users who use a lot of bandwidth. The failure of <strong>Kill Switches</strong> can also give you away, though they happen very rarely. <strong>Port forwarding</strong> can cause issues on occasion, making you more vulnerable to other kinds of attacks.</p>
<p style="text-align: justify;">Finally, the precautions are next to useless if you don’t choose a trusted and <strong>logless VPN provider</strong> in the first place. As the market grows it's becoming increasingly important to find the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN"><strong>Best VPN Service Provider for you</strong></a> through <strong>reliable VPN service reviews</strong>. If you use <strong>P2P file sharing</strong>, that’s a company who supports those methods and won’t hand over your IP to third parties.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Mon, 09 Jan 2017 09:57:14 +1100</pubDate>
		</item>
		<item>
			<title>How Australians Are Bypassing ISP Blocking of ThePirateBay, Torrentz, TorrentHound, IsoHunt and Streaming Service Sites</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/how-to-bypass-isp-blocking-of-thepiratebay-and-other-torrent-sites-from-australia.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/how-to-bypass-isp-blocking-of-thepiratebay-and-other-torrent-sites-from-australia.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/how-to-bypass-isp-blocking-in-australia.jpg" alt="How to bypass ISP blocking in Australia - Access Torrent sites" style="margin: 7px; float: left;" title="How to bypass ISP blocking in Australia - Access Torrent sites" />It was just a matter of time until the new global wave of <strong>government site blocking</strong> at the ISP level arrived in Australia. In mid-December 2016, the <a href="https://www.abc.net.au/news/2016-12-15/federal-court-orders-pirate-bay-blocked-in-australia/8116912" target="_blank" rel="nofollow noopener" title="Federal Court ruled Australian ISPs to block access to Torrent sites, ThePiratebay and other.">Federal Court ruled</a> that Internet companies would need to <strong>block sites</strong> such as <strong><a href="https://en.wikipedia.org/wiki/The_Pirate_Bay" target="_blank" rel="nofollow noopener" title="ThePirateBay">ThePirateBay</a></strong>, <strong><a href="https://en.wikipedia.org/wiki/Torrentz" target="_blank" rel="nofollow noopener" title="Torrentz">Torrentz</a></strong>, <strong>TorrentHound</strong>, <strong><a href="https://en.wikipedia.org/wiki/IsoHunt" target="_blank" rel="nofollow noopener" title="IsoHunt">IsoHunt</a> </strong>and <strong>streaming service SolarMovie</strong>. Australian ISPs were given 15 days to comply with the new decision and implement different blocking mechanisms to make it more difficult for users to gain access to these sites, however, it seems like blockages were bypassed by Australian users in just a few seconds.</p>
<p style="text-align: justify;">The deadlines for the ISPs to implement the blocking was the 31<sup>st</sup> of December so from the 1<sup>st</sup> of January 2017, access to the above mentioned sites would be denied.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Download Torrents and access restricted content safely from anywhere in the world!">Download Torrents and access restricted content safely from anywhere in the world!</a></p>
<h2 style="text-align: left;">Accessing ThePirateBay and other Blocked Sites from Australia</h2>
<p style="text-align: justify;">Currently, when an Australian online user tries to access any of the 5 sites they are presented with the following website:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/thepiratebay-isp-block-message.png" alt="ThePiratebay blocked by a large Australian ISP" title="ThePiratebay blocked by a large Australian ISP" /></p>
<p style="text-align: center;" align="center">The Piratebay blocked by a large Australian ISP</p>
<p style="text-align: justify;"><strong>Australia’s mobile network providers</strong> are also blocking access to the above sites presenting their users with a similar website.</p>
<p>No matter which ISP or mobile network users are coming from, they now all receive a message stating access to the selected sites is disabled.</p>
<h2 style="text-align: left;">How ISPs are Blocking ThePirateBay, Torrentz, TorrentHound, IsoHunt &amp; SolarMovie</h2>
<p style="text-align: justify;">There is a number of different ways an ISP can choose to block access to the above sites in order to comply with the Federal Court ruling. This includes <strong>blocking IP addresses</strong>, <strong>DNS blocking</strong>, <strong>URL blocking</strong> or any other method agreed mutually by the ISPs and rights holders.</p>
<p style="text-align: justify;">At the moment <strong>Telstra</strong>, <strong>Optus</strong> and <strong>DoDo,</strong> which are amongst Australia’s largest ISPs for home, businesses and mobile users, are <strong>implementing DNS blocking</strong>. When users on their networks send a DNS request to their DNS servers they are redirected to one of the sites specifically setup for the block.</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/australian-mobile-phone-accessing-thepiratebay-without-vpn.png" alt="The ISP block is affecting all of Australia’s mobile users" style="display: block; margin-left: auto; margin-right: auto;" title="The ISP block is affecting all of Australia’s mobile users" /></p>
<p style="text-align: center;" align="center">Optus DNS Blocking redirects users to a different website when trying to access ThePiratebay.org</p>
<p style="text-align: justify;">This is also clearly evident when performing a simple <strong>nslookup</strong> query. In the example below, we queried <strong>Optus’s DNS server</strong> for www.thepiratebay.org and saw it pointed us to IP addresses <strong>13.54.13.201</strong> &amp; <strong>54.79.39.115</strong> which <strong>do not belong</strong> to <strong>ThePirateBay</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/dns-blocking.png" alt="Nslookup shows how easy it is to bypass DNS blocking and access any DNS-blocked site" title="Nslookup shows how easy it is to bypass DNS blocking and access any DNS-blocked site" /></p>
<p style="text-align: center;" align="center">Nslookup shows how easy it is to bypass DNS blocking and access any DNS-blocked site</p>
<p style="text-align: justify;">After switching to <strong>Google’s public DNS servers</strong> located in the US, you’ll notice that <strong>we received different IP addresses</strong> for <strong>www.thepiratebay.org</strong> and were able to <strong>successfully access the website</strong> along with all other blocked websites.</p>
<h2 style="text-align: left;">Bypass DNS Blocking in Australia with a VPN Service</h2>
<p style="text-align: justify;">Using a <strong>VPN Service Provider</strong> is the best, safest and fastest way to access any restricted site not only from Australia but also across the globe. When connecting to a VPN service your internet traffic is routed through the VPN server, bypassing any local geographical restrictions, blocking or checkpoints from your ISP or government.</p>
<p style="text-align: justify;">The <strong>advantages</strong> inherent in a <strong>VPN service</strong> are many but here are some of the most important:</p>
<ul class="check">
<li><strong><a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="Protection against DNS Leaking">Protection against DNS Leaking</a></strong></li>
<li><strong>Accessing blocked sites without exposing your internet activity</strong></li>
<li><a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN Torrenting without restrictions"><strong>Torrenting without any restrictions</strong></a></li>
<li><strong><a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="Avoid Bandwidth Throttling">Stopping Bandwidth throttling from your ISP</a> – take full advantage of your internet connection</strong></li>
<li><strong>Accessing region-restricted websites</strong></li>
<li><strong>Protecting your online privacy and identity</strong></li>
<li><strong>The ability to run the VPN client on your workstation/laptop or any mobile device</strong></li>
<li><strong>Unlimited access to US Netflix and other streaming services</strong></li>
<li><strong>Military-grade encryption to ensure your traffic is secure from hackers and monitoring services</strong></li>
<li><strong>The ability to share the VPN with multiple devices, including SmartTV, Netflix, family members and more</strong></li>
</ul>
<p style="text-align: justify;">Perhaps the most challenging part when it comes to a VPN service is finding the <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service">Best VPN Service</a></strong> that is capable of delivering <strong>fast download or upload speeds</strong>, <strong>security</strong>, <strong>portability</strong>, <strong>Unblock Netflix</strong> and <strong>strong encryption</strong>. Our <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service review">Best VPN Service review</a></strong> is a comprehensive review that provides a unique, truthful, in-depth look at <strong>6 Top VPN service providers</strong> to help you make the best choice.</p>
<div style="text-align: center;">&nbsp;<a href="https://clixtrac.com/goto/?308319" target="_self" rel="nofollow" title="StrongVPN - Best VPN Offer"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-service-comparison.webp" alt="best vpn service comparison" /></a></div>
<div style="text-align: center;" align="center">The Best VPN Service Providers</div>
<p><strong>Mobile users</strong> can greatly benefit from a <strong>VPN service</strong> as they can <strong>safely access torrent</strong> or <strong>streaming sites</strong> while travelling, commuting on the train/tram/bus without worrying about being <strong>blocked</strong> or <strong>tracked by their ISP</strong>.</p>
<p>Providers such as <strong><a href="https://clixtrac.com/goto/?308319" target="_self" rel="nofollow" title="StrongVPN">StrongVPN</a> </strong>have a single-button function to <strong>activate the VPN service</strong> and <strong>unlock everything</strong> while keeping you safe. For example, when we tried accessing thepiratebay.org from our mobile phone we received the following:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/australian-mobile-phone-accessing-thepiratebay-without-vpn.png" alt=" Accessing thepiratebay.org from a mobile within Australia without a VPN service" style="display: block; margin-left: auto; margin-right: auto;" title=" Accessing thepiratebay.org from a mobile within Australia without a VPN service" /></p>
<p style="text-align: center;" align="center">Accessing thepiratebay.org from a mobile within Australia without a VPN service</p>
<p style="text-align: justify;" align="center">We then turned to our <a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="ExpressVPN client"><strong>ExpressVPN client</strong></a> (covered in our review) and with the click of a <strong>single button</strong> (power button in the middle) we were able to automatically connect to a nearby <strong>VPN server in Melbourne</strong>, which means great speeds, stability, and access to thepiratebay.org without a problem through our heavily encrypted VPN session:</p>
<p style="text-align: center;" align="center"><a href="https://www.expressvpn.com/internet-security/private-vpn?a_aid=fcxvpn" target="_blank" rel="nofollow noopener" title="ExpressVPN How to Download Torrents safely"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/australian-mobile-phone-accessing-thepiratebay-with-vpn.png" alt="Accessing thepiratebay.org from a mobile within Australia with a VPN Service" style="display: block; margin-left: auto; margin-right: auto;" title="Accessing thepiratebay.org from a mobile within Australia with a VPN Service" /></a>Accessing thepiratebay.org from a mobile within Australia after connecting to <a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="ExpressVPN Service">ExpressVPN Service</a> (click to enlarge)</p>
<p style="text-align: justify;">Another great feature with <strong>VPN service providers</strong> is that all have servers present in Australia which translates to <strong>superfast access without any delays</strong>. VPN servers do not use any local Australian ISP DNS servers which means they are <strong>immune to DNS blocking</strong> implemented by ISPs.</p>
<p style="text-align: justify;">It’s never been easier or faster to safely access and surf the internet! Our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service review">Best VPN Service review</a> provides all necessary information to help you select the right VPN provider and never worry again about ISP blocking.</p>
<p style="text-align: justify;">Readers can also refer to our <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="VPN Guide for Beginners">VPN Guide for Beginners</a> which explains how VPNs work and analyzes the security services a VPN provider must support.</p>
<h2 style="text-align: left;">Bypass DNS Blocking in Australia by Changing Your Computer’s DNS Server</h2>
<p style="text-align: justify;"><strong>DNS Blocking</strong> is perhaps the easiest to circumvent and, luckily, this seems to also be the preferred method used by all major ISPs in Australia to enforce the recent Federal Court decision.</p>
<p style="text-align: justify;"><strong>Note</strong>: While changing the DNS server is relatively easy to get access to blocked sites, you should be aware that your ISP is still capable of monitoring your activities when visiting these sites and downloading or streaming content. <strong>Only a VPN service is capable of protecting your identity and hiding your online activity from your ISP and government agencies</strong>.</p>
<p style="text-align: justify;">To <strong>bypass your ISP’s DNS Blocking</strong> simply change your DNS servers so that you are using DNS servers located outside of Australia or DNS servers not owned by any of the Australian ISPs.</p>
<p style="text-align: justify;">Changing your DNS server setting might be easy for desktop PCs and laptops however it can prove to be more challenging for mobile users who are accessing the internet via their mobile network provider. For mobile users, we highly recommend a VPN service instead as it provides peace of mind - and you can activate or deactivate the VPN at the click of a button!</p>
<h3 style="text-align: left;">Bypass DNS Blocking on Windows Systems</h3>
<p style="text-align: justify;">To <strong>bypass DNS blocking</strong> on Windows systems all that’s required is to change the DNS servers used by the operating system.</p>
<p style="text-align: justify;">Note: Windows 10 users should read our <strong><a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Testing and Prevention article">DNS Leak Testing and Prevention article</a></strong> to ensure they properly configure their system to <strong>avoid leaking DNS requests</strong>. VPN users won’t need to worry about this as most VPN clients have <strong>DNS Leak Protection</strong> built-into their client. All VPN providers reviewed provide DNS Leak Protection.</p>
<p style="text-align: justify;">To change your DNS server settings, simply navigate to <strong>Control Panel&gt;Network and Sharing Centre</strong> and <strong>left-click</strong> on your <strong>network adapter connection</strong> (usually wireless). In our example this is a WiFi connection with SSID <strong>Firewall</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/windows-10-accessing-network-adapter-properties.jpg" alt="Accessing your wireless or wired network adapter network settings" title="Accessing your wireless or wired network adapter network settings" /></p>
<p style="text-align: center;" align="center">Accessing your wireless or wired network adapter network settings</p>
<p style="text-align: justify;">In the window that opens <strong>click</strong> on <strong>Properties</strong> (Step 1). This will open the adapter’s network properties. Now <strong>double-click</strong> on <strong>Internet Protocol Version 4</strong> (Step 2) to open the <strong>IPv4 Properties</strong> window:</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/changing-dns-server-settings-bypass-dns-blocking-l.png" target="_blank" class="jcepopup" title="Configuring custom DNS servers to bypass DNS blocking" data-mediabox="title[Configuring custom DNS servers to bypass DNS blocking]"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/changing-dns-server-settings-bypass-dns-blocking.png" alt="Configuring custom DNS servers to bypass DNS blocking" title="Configuring custom DNS servers to bypass DNS blocking" /></a></p>
<p style="text-align: center;" align="center">Configuring custom DNS servers to <strong>bypass DNS blocking </strong>(click to enlarge)</p>
<p style="text-align: justify;">Select <strong>Use the following DNS server addresses</strong> (Step 3) and insert two DNS servers of your choice e.g <strong>8.8.8.8</strong> for the <strong>Preferred DNS server</strong> and <strong>8.8.4.4</strong> for the <strong>Alternative DNS server</strong>. Finally <strong>click</strong> on <strong>OK/Close</strong> (Steps 4-6) to close all windows and save the new settings.</p>
<p style="text-align: justify;">You might also need to flush your DNS cache in case you’ve already attempted to access any of the blocked sites. This can easily be done by opening a <strong>command prompt</strong> and typing <strong>ipconfig /flushdns</strong>. Alternatively simply restart your computer.</p>
<h3 style="text-align: left;">Bypass DNS Blocking On MAC OS &amp; Ubuntu Linux</h3>
<p style="text-align: justify;">MacOS and Linux users can also make changes to their systems to avoid the DNS Blocking. Below is a quick guide for each operating system. Steps might be slightly different depending on the O/S version:</p>
<p style="text-align: justify;"><strong>MacOS</strong></p>
<ul>
<li>Go to <strong>System Preferences</strong></li>
<li><strong>Click</strong> <strong>Network</strong></li>
<li>Select your <strong>WiFi</strong> or <strong>ethernet</strong> connection</li>
<li>Hit <strong>Advanced…</strong></li>
<li><strong>Click</strong></li>
<li>Enter your DNS details and press <strong>Okay</strong></li>
</ul>
<p style="text-align: justify;"><strong>Ubuntu</strong></p>
<ul>
<li>Navigate to <strong>System Settings</strong>, then to <strong>Network</strong></li>
<li>Select your connection</li>
<li>Hit <strong>Options…</strong></li>
<li>Go to the <strong>IPv4 Settings</strong> tab</li>
<li>Enter your DNS Servers</li>
<li><strong>Click Save</strong></li>
</ul>
<h2 style="text-align: left;">Bypass DNS Blocking In Australia via Router DHCP Change</h2>
<p style="text-align: justify;">Home users usually obtain their network settings automatically when connecting to their home network. By default, the router is configured with a DHCP server that is responsible for handing out IP addresses to all network clients so they can access the internet.</p>
<p style="text-align: justify;">One of the parameters handed out by the DHCP server is the DNS server settings which are usually set to the IP address of the router or the ISP’s DNS servers. All that’s required here is to configure these values to match either Google’s DNS servers (8.8.8.8 &amp; 8.8.4.4) or any other public DNS servers.</p>
<p style="text-align: justify;">Below is an example of a Linksys router showing the DNS parameters under the DHCP server settings:</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/linksys-router-dhcp-server-settings-l.png" target="_blank" class="jcepopup" title="Bypass the Australian DNS Block by changing your router’s DHCP server DNS parameters" data-mediabox="1" data-mediabox-title="Bypass the Australian DNS Block by changing your router’s DHCP server DNS parameters"><img src="https://www.firewall.cx/images/stories/vpn/bypass-isp-block-australia/linksys-router-dhcp-server-settings.png" alt="Bypass the Australian DNS Block by changing your router’s DHCP server DNS parameters" title="Bypass the Australian DNS Block by changing your router’s DHCP server DNS parameters" /></a></p>
<p style="text-align: center;" align="center">Bypass the Australian DNS Block by changing your router’s DHCP server DNS parameters (click to enlarge)</p>
<p style="text-align: justify;">Changing the DNS parameters should be fairly easy assuming you can access them.</p>
<p style="text-align: justify;">Some routers such as the <strong>Netgear CG3000</strong>, used mainly by <strong>Optus Australia</strong>, offers DHCP services to automatically configure clients connecting to the local network, however, it <strong>does not allow users to change the DNS parameters</strong> of the DHCP server. Users with this router or other routers with similar restrictions will have to manually change the DNS server settings on their computers.</p>
<h2 style="text-align: left;">Summary</h2>
<p style="text-align: justify;">Australia might have been hit by its first <strong>DNS Block</strong> from <strong>ThePirateBay</strong>, <strong>Torrentz</strong>, <strong>TorrentHound</strong>, <strong>IsoHunt</strong> and <strong>streaming service SolarMovie site</strong>, however, circumventing the block has proven a very easy case thanks to <strong>VPN Service Providers</strong> and other technical tricks. One thing is certain – this is just the beginning of a very long battle against privacy and censorship and it’s certainly going to get more difficult and messy as time passes and copyright holders continue to demand stricter measures and possibly penalties for <strong>Australian internet users</strong>.</p>
<p style="text-align: justify;">Recent events show that this is the right time to start thinking about your online privacy and ensure no one is able to monitor your online activities. Do yourself a favour and visit our <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service Providers">Best VPN Service Providers</a></strong> list to see how<strong> a VPN can unlock the internet</strong>, <strong>bypassing every restriction</strong>, while at the same time <strong>protect your privacy</strong> no matter where you are in the world and what device you’re connecting from.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Fri, 06 Jan 2017 08:18:51 +1100</pubDate>
		</item>
		<item>
			<title>DNS Leak Testing &amp; Protection – How to Avoid Exposing Your Identity &amp; Online Activity</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/isp-snooping-on-online-users.png" alt="DNS Leak - ISPs &amp; Government spying on users online activities" style="margin: 7px; float: left;" title="DNS Leak - ISPs &amp; Government spying on users online activities" />Despite innovations in security and technology, it’s difficult to remain <strong>anonymous online</strong>. Identifying information is seemingly everywhere – from malicious JavaScript tracking to the location services in web browsers. Even secure <a href="https://www.firewall.cx//operating-systems/linux-unix.html" target="_blank" title="Linux Operating System Tutorials">Linux operating systems</a> like Tails have struggled to protect user’s privacy.</p>
<p style="text-align: justify;">Windows 10 is no safe haven, either. By default, Microsoft collects information from users on an unprecedented level. Data that can be turned over to authorities or a third party. Increasingly, users must take extra steps to ensure privacy and be more knowledgeable about the services they’re using.</p>
<p style="text-align: justify;">This applies even to users with <strong>anonymizing software</strong>. <strong>Virtual Private Networks</strong> (<strong>VPNs</strong>) are sometimes seen as blanket tools that <strong>guarantee identity protection</strong>. In truth, they have their own vulnerabilities and chief among them is the <strong>DNS Leak</strong> which only the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="best VPN service providers">best VPN service providers</a> are able to resolve.</p>
<p class="box-info" style="text-align: justify;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN">StrongVPN</a> is our recommended VPN solution offering superior protection using a fast network of servers across the globe!</p>
<h2 style="text-align: left;">Understanding VPN DNS Leaks &amp; How They Work</h2>
<p style="text-align: justify;">When you type a website URL into your browser, you’re essentially using a nickname. Typing in “firewall.cx” is more like asking a question. You send a request to a <a href="https://www.firewall.cx/networking/network-protocols/dns-protocol/protocols-dns.html" target="_blank" title="Domain Name System">Domain Name System</a> server, which then points you to the IP address of the site (208.86.155.203). This saves us typing long strings of numbers each time, and is better for pretty much everyone.</p>
<p style="text-align: justify;">However, it also comes with its own problem. DNS servers are given by your internet service provider (ISP), which offers them a list of every website you visit. Naturally, this compromises anonymity, but VPNs are supposed to fix that. Instead of requesting from your ISP, your traffic is routed through the VPN, protecting you.</p>
<p style="text-align: justify;">Unfortunately, it doesn’t always work. In some cases, the operating system uses its default DNS servers instead of switching things up. This is most common in Windows, but can also happen on OSX, Linux, and mobile devices. It’s aptly named a <strong>DNS leak</strong>.</p>
<p style="text-align: justify;">In some cases, a VPN is worse than not using one at all. Why? When using <strong>anonymising software</strong>, users have a sense of security. They may perform activities they wouldn’t otherwise, such as torrenting software or visiting controversial websites. It’s not immediately clear that a leak has occurred, and the user goes on thinking they’re safe for months at a time. In reality, their IP address is open and visible.</p>
<p style="text-align: justify;"><strong>DNS leaks</strong> aren’t just utilized by service providers either. Websites can discover your true IP address using <a href="https://en.wikipedia.org/wiki/WebRTC" target="_blank" rel="nofollow noopener" title="WebRTC">WebRTC</a>, a collection of communications protocols present in most browsers. <strong>WebRTC</strong> allows for a request to a service provider’s <a href="https://en.wikipedia.org/wiki/STUN" target="_blank" rel="nofollow noopener" title="Session Traversal Utilities for NAT (STUN) servers">Session Traversal Utilities for NAT (STUN) servers</a>, listing both the local (internal) and public IP address (router WAN IP) of the user via JavaScript.</p>
<p style="text-align: justify;">This can give a general location of the user and be used to track them across the site or other sites by the same owner. In addition, law enforcement or hackers may be able to gain access to this data, leading to serious repercussions.</p>
<h2 style="text-align: left;">DNS Leaks Used By Govenrments and ISPs</h2>
<p style="text-align: justify; page-break-after: avoid;">For example, <strong>DNS leaks</strong> were utilized by the <a href="https://www.pcworld.com/article/2876832/canadian-agency-reported-to-be-monitoring-millions-of-downloads.html" target="_blank" rel="nofollow noopener" title="DNS Leaks Used By Govenrments">Canadian Government in 2015</a>, helping to track users on popular file sharing websites. Revealed by Edward Snowden, the technique combines several tactics to find out the identity of downloaders. In this case, targeted files were primarily terrorism related, but this could easily be extended to other media.</p>
<p style="page-break-after: avoid;"><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/snowden-digital-surveillance-archive.jpg" alt="Snowden Digital Surveillance Archive: Screenshot from Canada's Levitation Program" style="margin: 0px auto; display: block;" title="Snowden Digital Surveillance Archive: Screenshot from Canada's Levitation Program" /></p>
<p style="text-align: center;">Snowden Digital Surveillance Archive: Screenshot from Canada's Levitation Program</p>
<p style="text-align: justify;">In fact, the UK government recently passed a law that does just that. The <a href="https://www.forbes.com/sites/emmawoollacott/2016/11/16/uk-joins-russia-and-china-in-legalizing-bulk-surveillance" target="_blank" rel="nofollow noopener" title="UK Investigatory Powers Bill">Investigatory Powers Bill</a> forces ISPs to store and hand over DNS records in bulk for almost every user. This is used to create a list of websites each person has visited, regardless of any wrongdoing. As a result, UK users should be especially cautious about <strong>VPN DNS leaks</strong>, and can be certain any slip ups will be recorded.</p>
<p style="text-align: justify;">Another danger is your ISP sending a copyright warning from downloaded files. This is particularly relevant on student connections, where internet activity is more closely monitored. In some cases, it can result in a ban from the service. Your details can also be passed on to the copyright holder, who can then choose to <a href="https://www.gizmodo.com.au/2015/06/heres-the-letter-aussie-dallas-buyers-club-pirates-are-getting-in-the-mail/" target="_blank" rel="nofollow noopener" title="ISP Legal action against users">pursue legal action</a>.</p>
<p style="text-align: justify;">In the student case, the user can have all of the correct settings enabled but still get a notice. It’s likely that the VPN cut out momentarily and began sending DNS requests to the wrong place. This allows the <strong>DNS to leak</strong> even if the <strong>anti-DNS leak</strong> setting is enabled.</p>
<p style="text-align: justify;"><strong>VPN DNS leaks</strong> also occur regardless of location. Whether you’re using a VPN to protect yourself on <strong>WiFi hotspots</strong>, at work, or in your own home, the risk is still there. In fact, public networks may prove a bigger risk. It always pays to be extra cautious outside your home.</p>
<h2>VPN DNS Leak Test – Best Sites for Testing Your DNS</h2>
<p style="text-align: justify;">Thankfully, there are very simple ways to tell if you have a <strong>VPN DNS leak</strong>. The most popular tool is an online service: <a href="https://dnsleaktest.com/" target="_blank" rel="nofollow noopener" title="DNS Leak Test">DNS leak test</a>.</p>
<p style="text-align: justify;">First, you run your VPN client and connect from a different country. Clicking <strong>Extended Test</strong> will then return a list of IP addresses, their service provider, and country of origin. If any of these match your true location, you have a problem.</p>
<p style="text-align: justify;">The <strong>DNS leak test</strong> sends your client several different domain names, simulating a connection to each one. It then tracks the requests sent to its own DNS servers and other servers that the request bounces around before being resolved. The results are returned in your browser.</p>
<p style="text-align: justify;">The standard test is good enough for most people, completing one round of six queries. However, to be completely sure, you should use the extended test. A total of 36 queries should be enough to discover all DNS servers. However, an extended test can take up to thirty seconds longer, so standard is good enough if you aren’t doing anything too sensitive.</p>
<p style="text-align: justify;">VPN DNS leak testing is essential when you move to any new VPN client, but it’s good to test on occasion regardless. Changes in your operating system, browser settings, or an update to the VPN can all revert to incorrect servers.</p>
<p style="text-align: justify;"><strong>VPN DNS Leak Protection</strong> is one of the many <a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Essentials VPN Security Features - VPN for Beginners">essential security features a VPN must have</a>. We should note that all VPN clients tested in our <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service">Best VPN Service</a></strong> article provide <strong>DNS Leak Protection</strong> and passed all <strong>DNS Leak tests</strong>.</p>
<h2>VPN DNS Leak Protection</h2>
<p style="text-align: justify;">Thankfully, if you do find a leak it's not the end of the world. There are plenty of ways to <strong>protect yourself from DNS leaks</strong>, and most of them are simple. One of the best methods is force your operating system to use <strong>VPN DNS servers</strong> instead of your ISP’s. Most services will be happy to provide these, but otherwise you can use a public DNS like Google, OpenDNS or Comodo Secure.</p>
<p style="text-align: justify;">However, those looking for privacy will want to avoid companies looking to profit. Google has been known to use the data to target advertising. DNS providers like OpenNIC give a non-profit, open and uncensored service free of charge. Once you’ve found your preferred host, it’s not difficult to configure on any OS.</p>
<h3>Windows 10 DNS Leak Protection &amp; Prevention</h3>
<p style="text-align: justify;">In Windows 10, simply navigate to <strong>Control Panel&gt;Network and Sharing Centre</strong> and <strong>left-click</strong> on your network adapter connection (usually wireless). In our example this is a WiFi connection with SSID <strong>Firewall</strong>:</p>
<p>&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/dns-leak/windows-10-configuring-dns-leak-protection.jpg" alt="Accessing your Windows 10 wireless or wired network adapter settings" style="display: block; margin-left: auto; margin-right: auto;" title="Accessing your Windows 10 wireless or wired network adapter settings" /></p>
<p style="text-align: center;" align="center">Accessing your Windows 10 wireless or wired network adapter settings</p>
<p style="text-align: justify;">On the next window <strong>click</strong> on <strong>Properties</strong> (1). This will open the adapter’s network properties. Now <strong>double-click</strong> on <strong>Internet Protocol Version 4</strong> (2) to open the <strong>IPv4 Properties</strong> window:</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/vpn/dns-leak/windows-10-dns-configuration-dns-leak-protection-l.png" target="_blank" class="jcepopup" title="Configuring Winwows 10 custom open DNS servers to protect against DNS Leaks" data-mediabox="1" data-mediabox-title="Configuring Windows 10 custom open DNS servers to protect against DNS Leaks"><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/windows-10-dns-configuration-dns-leak-protection.png" alt="Configuring custom open DNS servers to protect against DNS Leaks" style="display: block; margin-left: auto; margin-right: auto;" title="Configuring custom open DNS servers to protect against DNS Leaks" /></a>Configuring Windows 10 custom open DNS servers to <strong>protect against DNS Leaks</strong> (click to enlarge)<strong><br /></strong></p>
<p style="text-align: justify;">Select <strong>Use the following DNS server addresses</strong> and insert two DNS servers of your choice from OpenNic (3). Finally <strong>click</strong> on <strong>OK/Close</strong> (4-6) to close all windows and save the new settings.</p>
<p style="text-align: justify;">If that’s too many steps, you can use a tool like <a href="https://www.sordum.org/7952/dns-jumper-v2-2/#2" target="_blank" rel="nofollow noopener" title="DNS Jumper">DNS Jumper</a>. You can quickly jump between different DNS servers or set your own custom ones. Furthermore, it requires no install and will test a long list of providers to find the fastest connection. This is particularly useful if you play online games, as it will avoid high ping.</p>
<h3>MAC OS &amp; Ubuntu Linux DNS Leak Protection</h3>
<p style="text-align: justify;">Though Mac and Linux tend to suffer from fewer issues, you may still want to set things up to be on the safe side. It’s almost the same, so we won’t go into too much detail. Here’s a quick guide:</p>
<p><strong>MAC OS<br /></strong></p>
<ul>
<li>Go to <strong>System Preferences</strong></li>
<li><strong>Click</strong><strong>Network</strong></li>
<li>Select your <strong>WiFi</strong> or <strong>ethernet</strong> connection</li>
<li>Hit <strong>Advanced…</strong></li>
<li><strong>Click</strong></li>
<li>Enter your DNS details and press <strong>Okay</strong></li>
</ul>
<p><strong>Ubuntu Linux</strong></p>
<ul>
<li>Navigate to <strong>System Settings</strong>, then to <strong>Network</strong></li>
<li>Select your connection</li>
<li>Hit <strong>Options…</strong></li>
<li>Go to the <strong>IPv4 Settings</strong> tab</li>
<li>Enter your DNS Servers</li>
<li><strong>Click Save</strong></li>
</ul>
<p style="text-align: justify;">You can also configure settings on iOS, Android and even the router itself. This makes it easier to avoid the dangers of WiFi hotspots and can make all your devices safe. However, there are plenty of other ways to <strong>prevent VPN DNS leaks</strong>. These can often be used in combination with each other for maximum security.</p>
<h2>Windows Teredo Can Lead to DNS Leaks</h2>
<p style="text-align: justify;">In Windows, a technology called <strong>Teredo</strong> that allows tunnelling IPv6 traffic through IPv4 packets using the <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="UDP Protocol">UDP Protocol</a>, can often lead to DNS leaks. Essentially it allows communication between the two major IP protocols, IPv4 and IPv6. Teredo is <strong>on</strong> by default in Windows 10, but you can <strong>turn it off</strong> with a single cmd command.</p>
<p style="text-align: justify;">First you’ll need to open a Command Prompt window with administrator privileges. In the Search Windows box (next to the start button) type <strong>cmd</strong>, <strong>right click</strong> on <strong>Command Prompt</strong> and select <strong>Run as Administrator</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/windows-10-cmd-run-as-administrator.png" alt="Opening a Windows Command Prompt with Administrator Privileges" title="Opening a Windows Command Prompt with Administrator Privileges" /></p>
<p style="text-align: center;" align="center">Opening a Windows Command Prompt with Administrator Privileges</p>
<p style="text-align: justify;">At the command prompt, type the following command: <strong>netsh interface teredo set state disabled</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/disabling-teredo-on-windows-10-dns-leak-protection.png" alt="Disabling Windows Teredo to help prevent DNS Leak" title="Disabling Windows Teredo to help prevent DNS Leak" /></p>
<p style="text-align: center;" align="center">The system will return <strong>Ok</strong> indicating that teredo has been successfully disabled</p>
<p style="text-align: justify;">In some cases you may need <strong>Teredo</strong>, but thankfully it’s just as easy to enable it again. This time, type: <strong>netsh interface teredo set state type=default</strong>.</p>
<h2>How to Disable WebRTC in FireFox and Chrome</h2>
<p style="text-align: justify;">Unfortunately, the disabling Teredo doesn’t address issue of <strong>WebRTC</strong> in the browser. The procedure to disable it is different for each browser, and usually involves heading to the <strong>config page</strong>.</p>
<p style="text-align: justify;">In Mozilla’s Firefox, you can type <strong>about:config</strong> in the URL bar. The line <strong>media.peerconnection.enabled</strong> will be shown lower down, and you can then <strong>double-click</strong> to toggle it <strong>off</strong>:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/disabling-webRTC-in-mozilla-firefox.png" alt="Disabling WebRTC in Mozilla FireFox" title="Disabling WebRTC in Mozilla FireFox" /></p>
<p style="text-align: center;" align="center">Disabling WebRTC in Mozilla FireFox</p>
<p style="text-align: justify;">Bear in mind that <strong>disabling WebRTC</strong> may result in a small loss of functionality. The communications protocols allow for video conferencing, file transfer and more without the need for other plugins. However, there is a fall-back method for most tasks, meaning it's far from essential.</p>
<p style="text-align: justify;">Unfortunately, there’s no way to <strong>disable WebRTC in Chrome</strong> by default. This is to be expected, as Google pioneered the method and wants people to use it. Thankfully, Google addressed concerns early this year by<a href="https://chrome.google.com/webstore/detail/webrtc-network-limiter/npeicpdbkakmehahjeeohfdhnlpdklia?hl=en-US" target="_blank" rel="nofollow noopener" title="Disable WebRTC in Chrome"> releasing a plugin</a> (make sure you open the link with Chrome).</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/dns-leak/disabling-webRTC-in-chrome.png" alt="disabling webRTC in chrome" style="display: block; margin-left: auto; margin-right: auto;" title="disabling webRTC in chrome" /></p>
<p style="text-align: justify;">With <strong>WebRTC Network Limiter</strong>, you can display your <strong>Public IP address</strong> or you <strong>can route it through your proxy server </strong>(last option). The latter is recommended for maximum safety, but can cause issues with performance.</p>
<h2>Use a VPN with DNS Leak Protection</h2>
<p style="text-align: justify;">Fortunately, it's not just users who are aware of the <strong>DNS leak issue</strong>. Most clients have <strong>VPN DNS leak prevention</strong> built in and don’t require any input from the customer. Our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Best VPN Service Provider">Best VPN Service Provider</a> article includes the <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="Top 6 VPN Providers">TOP 5 VPN Service Providers</a> with VPN Clients that automatically provide <strong>VPN DNS Leak Protection</strong>.</p>
<p style="text-align: justify;">In most cases, <strong>VPN providers</strong> will have their own private DNS servers. <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="StrongVPN">StrongVPN</a> has a “<strong>Network Lock</strong>” option, where all traffic is forced through the VPN tunnel, including domain name requests. When you disconnect from a VPN temporarily, internet is cut out entirely, making sure no traffic leaves the tunnel. This is also known as a <strong>Kill Switch</strong>.</p>
<p style="text-align: justify;">With <a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="PIA"><strong>PIA</strong></a>, <strong>DNS leak prevention</strong> is <strong>on by default</strong>. The client redirects requests to its own name servers (198.18.0.1) much like changing it manually through Windows. This makes it very unlikely that a leak will occur, and combines with a <strong>Kill Switch option</strong> similar to <strong>StrongVPN</strong>. <strong>PIA </strong>also lets you bring up a third-party DNS, so you can <strong>OpenNIC</strong> and other servers if you prefer. Both methods take a lot of work away from the user, and make it simple to <strong>prevent DNS leaks</strong>.</p>
<h2>Summary</h2>
<p style="text-align: justify;">In all, built-in protection provides the most intuitive solution to <strong>DNS leaks</strong>. Finding a VPN that has a solution to this issue is becoming increasingly important, and without any measures there are serious risks to the privacy. It’s well worth shopping around to find a <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html" target="_blank" title="VPN Service that supports VPN DNS Leak Protection">VPN Service that supports VPN DNS Leak Protection</a></strong> in an intelligent way.</p>
<p style="text-align: justify;">Furthermore, VPNs that take <strong>DNS leaks</strong> seriously are more likely to take other privacy matters into consideration. A host that won’t take care of the most prevalent issue is less likely to address the smaller ones, or forgo logs.</p>
<p style="text-align: justify;">That said, you shouldn’t blindly trust the provider’s word, either. Operating systems are complex, and it's not always possible for them to patch every hole. Sometimes problems can happen even with the protections in place. As such, <strong>DNS leak testing</strong> is essential. Taking your own measures will only increase privacy, and combining both will make this vulnerability almost non-existent.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Thu, 05 Jan 2017 00:20:17 +1100</pubDate>
		</item>
		<item>
			<title>Best VPN Service - Top VPN Service Reviews and VPN Comparisons</title>
			<link>https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/security/vpn-services-guides/best-vpn-service.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-service-intro.jpg" alt="Best Fastest VPN Service Provider" style="margin: 7px; float: left;" title="Best Fastest VPN Service Provider" />VPN Services </strong>have become a necessity for users concerned about their <strong>online privacy and security</strong>. With literally hundreds of thousands of attacks daily, exploits and security vulnerabilities being discovered plus government agencies and ISPs monitoring user activity, the internet is no longer considered a safe place.</p>
<p style="text-align: justify;">With the help of a <strong>VPN Service,</strong> users are able to <strong>hide their real IP address</strong> and online activities by connecting to a VPN server and passing all traffic through that server. This way, the internet only sees the IP address of the VPN server.</p>
<p style="text-align: justify;">Today, extended VPN Services provide us with many different and useful capabilities. For example they can provide users with the ability to <strong>bypass geo-restrictions</strong> for <strong>streaming services</strong> such as <strong>Hulu</strong> and <strong>Netflix</strong>. They also offer <strong>increased security</strong> and <strong>identity protection</strong> for mobile devices such as iPhones, iPads, Laptops, Android smartphones, tablet devices etc. This makes finding and selecting the <strong>best VPN Service</strong> a difficult task as there are many parameters to take into consideration. Our dedicated <a href="https://www.firewall.cx/tools-tips-reviews/firewallcx-news/meet-the-team.html" target="_blank" title="Firewall.cx VPN network security team">network security team</a> here at Firewall.cx has done just that for every VPN Provider and then put them to the test to produce the <strong>best VPN Service review</strong> ever.</p>
<h2 style="text-align: left;">Benefits of a VPN Service</h2>
<p style="text-align: justify;"><a href="https://www.firewall.cx/security/vpn-services-guides/what-is-a-vpn-beginners-guide-to-anonymous-browsing-and-online-privacy.html" target="_blank" title="Understanding the importance and benefits of a VPN">Understanding the importance and benefits of a VPN</a> is crucial to help you decide if you need a VPN and what features you should look for. Despite the different offerings from VPN providers there are some standard benefits that you’ll always get:</p>
<ul style="text-align: justify;">
<li><strong>Increased Privacy</strong>. A VPN will hide your activities from your ISP and government. Traffic entering and exiting your VPN-enabled device is encrypted, making it almost impossible to intercept and decrypt.</li>
<li><strong>Hiding your IP address</strong>. A VPN will hide your <a href="https://www.firewall.cx/networking/network-protocols/ip-protocol.html" target="_blank" title="IP address">IP address</a> as all traffic is tunnelled through the VPN provider. Addition security features such as <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Protection and Prevention">DNS Leak Protection</a> will ensure your IP addresses and online activity is not exposed.</li>
<li><strong>Unblocking Geo-blocking services</strong> such as <strong>Netflix</strong>, <strong>Hulu</strong> and others. By connecting to a VPN server located in the country you wish to access content from, you’re able to by-pass any geo-blocking.</li>
<li><strong><a href="https://www.firewall.cx/security/vpn-services-guides/vpn-for-torrenting-anonymous-torrenting-test-avoid-bandwidth-throttling.html" target="_blank" title="VPN for Torrenting, P2P and file Sharing - Increase Download Speed">Increased Torrent Download Speed</a>.</strong> <strong>Bandwidth throttling</strong> is big problem for home users as ISPs unofficially lower the priority of torrent data streams, resulting in slow download speeds. A VPN encrypts all traffic so the ISP is unable to determine what you’re downloading.</li>
<li><strong>Bypass Firewall Restrictions.</strong> When connecting to a VPN server all application traffic, regardless of the ports used, is channelled through the VPN. This bypasses all restrictions enforced by a firewall or proxy server allowing you to use any application (torrent, chat, streaming, gaming, SMTP etc).</li>
</ul>
<h2 style="text-align: left;">Best VPN Service Review: Quick Summary</h2>
<div style="text-align: center;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="BestVPN Service"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-service-comparison.webp" alt="best vpn service comparison" title="Comparing Best VPN Prices and Features" /></a></div>
<div style="text-align: center;" align="center">The Best VPN Service Providers. Scroll below for each provider's direct link.</div>
<h2 style="text-align: left;">How Our Best VPN Service Tests Were Performed</h2>
<p style="text-align: justify;">Evaluating the <strong>best VPN service</strong> can be a tricky task, especially when you take into consideration that not everyone is looking for the same features in a VPN. To give each provider a fair chance to live up to its reputation we decided to evaluate them based on the following criteria listed in order of importance:</p>
<ul class="checkbox">
<li style="text-align: justify;">SpeedTest.net Download/Upload including Latency test</li>
<li style="text-align: justify;">Netflix VPN, Torrents and Blocked sites, Geo-blocking Bypass.</li>
<li style="text-align: justify;">Security features (<a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Protection">DNS Leak Protection</a>, Kill Switch etc)</li>
<li style="text-align: justify;">Encryption protocols (PPTP/L2TP IPSec/OpenVPN etc) &amp; Support for Dedicated VPN Routers</li>
<li style="text-align: justify;">No-Log Policy &amp; <a href="https://en.wikipedia.org/wiki/Bitcoin" target="_blank" rel="nofollow noopener" title="Bitcoin payment">Bitcoin payment</a> support</li>
<li style="text-align: justify;">User-Friendly VPN client interface</li>
<li style="text-align: justify;">Price – based on a 12 month subscription</li>
</ul>
<h2 style="text-align: left;">Testing US Netflix Best VPN Providers</h2>
<p style="text-align: justify;">Accessing &amp; streaming US <a href="https://en.wikipedia.org/wiki/Netflix" target="_blank" rel="nofollow noopener" title="Netflix">Netflix</a> content is a hot topic for most of our readers which is why we’ve included it in our tests. While other reviews might indicate whether or not US Netflix is supported, we took that extra step to test and verify the service.</p>
<p style="text-align: justify;">All Netflix stream testing was performed from a <strong>20Mbps home broadband</strong> connection using a US Netflix account configured to stream at the <strong>highest possible setting</strong> (<strong>High</strong>) which generates <strong>3GB/hour</strong> for <strong>HD</strong> or <strong>7GB/hour</strong> for <strong>Ultra HD</strong>. These settings would test each VPN Provider’s ability to perform continuous, uninterrupted streaming to a home or mobile VPN user.</p>
<h2 style="text-align: left;">Best VPN Provider Download/Upload Speed Tests</h2>
<p style="text-align: justify;">Speedtest.net was selected as a testing platform to evaluate download and upload speeds. Our tests were performed from Melbourne Australia using a <strong>premium 200Mbps link</strong> to the internet while <a href="https://en.wikipedia.org/wiki/OpenVPN" target="_blank" rel="nofollow noopener" title="OpenVPN"><strong>OpenVPN</strong></a> <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="UDP Protocol"><strong>UDP</strong></a> or <strong>OpenVPN </strong><a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="TCP Protocol"><strong>TCP</strong></a> (when UDP failed) was the VPN protocol used to connect to each provider. The Speedtest.net server located at <strong>San Jose</strong><strong>, CA</strong><strong> Server (No.4)</strong> shown below was used for download/upload test. This server was strategically selected as it’s hosted by Speedtest.net and showed stable transfer rates capable of exceeding <strong>185Mbps</strong>.</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-service-setup-l.jpg" target="_blank" class="jcepopup" data-mediabox="title[Best VPN Service Test Site]"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-service-setup-s.jpg" alt="Best VPN Service - Speed Test" title="Best VPN Service - Speed Test" /></a>&nbsp;</p>
<p style="text-align: center;" align="center">Our selected Speedtest.net server and non-VPN speed tests results (click to enlarge)</p>
<p style="text-align: justify;">Our Speedtest.net test to <strong>San Jose, CA Server (No.4)</strong> <strong><span style="text-decoration: underline;">without a VPN</span></strong> yielded an impressive <strong>185Mbps</strong> download speed and <strong>123Mbps</strong> upload speed confirming the path between us and the Speedtest.net server was not congested.</p>
<p style="text-align: justify;">While test values still fluctuated, the tests we’ve selected to publish are the average results from each VPN Provider.</p>
<h2 style="text-align: left;">Best VPN Service Providers</h2>
<p style="text-align: justify;">Without further delay, let’s take an in-depth look at our <strong>Best VPN Service Providers</strong>:</p>
<h2 style="text-align: left;"><a name="StrongVPN"></a>No.1: <a href="https://strongvpn.com/?tr_aid=5acbec53da73f" target="_blank" rel="nofollow noopener" title="Best VPN Service - StrongVPN">StrongVPN</a></h2>
<p><a href="https://strongvpn.com/?tr_aid=5acbec53da73f" target="_blank" rel="nofollow noopener" title="Best VPN Service - StrongVPN"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-services-for-2017-strongvpn.jpg" alt="StrongVPN - Best VPN Service" style="display: block; margin-left: auto; margin-right: auto;" title="StrongVPN - Best VPN Service" /></a></p>
<p style="text-align: justify;">StrongVPN takes the <strong>1<sup>st</sup> position</strong> thanks to its performance and solid VPN client that provides a plethora of fine-tuning options. With more than <strong>650 servers</strong> located in <strong>22 countries</strong>, the number might seem small compared to other providers, but it’s rare you’ll need to frequently jump between servers to get a stable and fast connection.</p>
<h3 style="text-align: left;">StrongVPN No-Log Policy</h3>
<p style="text-align: justify;">StrongVPN provides a true <strong>No-Log Policy</strong> service which means no logs are stored about your connection or account. This makes StrongVPN ideal for users who take their privacy seriously and don’t want any type of logging from their VPN Provider.</p>
<h3 style="text-align: left;">StrongVPN Performance</h3>
<p style="text-align: justify;">While our test results fluctuated we were not concerned at all simply because the average results were significantly faster than all other VPN providers. It should also be noted that testing was performed using <strong>OpenVPN TCP</strong> as <strong>OpenVPN UDP</strong> didn’t seem to work with the US-based servers we connected to. Taking into consideration that OpenVPN TCP is slightly slower than OpenVPN UDP we are very surprised with the speeds we managed to get.</p>
<p style="text-align: justify;">Download speeds <strong>averaged</strong> <strong>67Mbps</strong> but managed to peak at a whopping <strong>136Mbps,</strong> which was a fantastic result:</p>
<p align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/strongvpn-speed-test.png" alt="StrongVPN Speed Test - Download / Upload Tests" style="display: block; margin-left: auto; margin-right: auto;" title="StrongVPN Speed Test - Download / Upload Tests" /></p>
<p style="text-align: center;" align="center">StrongVPN provides super-fast download speeds and exceptional upload speeds</p>
<p style="text-align: justify;">Upload speeds were strong, <strong>averaging 96Mbps</strong> and peaking at an impressive <strong>150Mbps</strong>. A similar surprise was the latency test, which averaged a very low <strong>170ms</strong> making it amongst the fastest and lowest in latency connections. Running delay-sensitive applications or services such as VoIP or video won’t be a problem.</p>
<p style="text-align: justify;">Finally StrongVPN offers unlimited downloading, uploading and streaming.</p>
<h3 style="text-align: left;">StrongVPN Client &amp; Security Features</h3>
<p style="text-align: justify;">The desktop VPN client interface certainly brings back memories of an older GUI interface but we’ve been advised that it will soon be upgraded to a newer sleeker GUI on par with other providers.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/strongvpn-gui-interface.jpg" alt="The StrongVPN VPN Client GUI interface" style="display: block; margin-left: auto; margin-right: auto;" title="The StrongVPN VPN Client GUI interface" /></p>
<p style="text-align: center;" align="center">The StrongVPN GUI interface</p>
<p style="text-align: justify;">What the desktop GUI lacks in appearance it certainly makes up for in features but, most importantly, speed. The options available allow the end user to tweak the VPN connection to even adjust the <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol/tcp-options.html" target="_blank" title="MSS - MTU size">MSS - MTU size</a>, compression, encryption level and a whole bunch of other useful features Torrent users and Gamers will appreciate.</p>
<p style="text-align: justify;"><strong>Kill Switch</strong>, <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Protection"><strong>DNS Leak Protection</strong></a> are built into the client and users can select the encryption protocol of their choice which includes <strong>OpenVPN</strong> (TCP or UDP), <strong>L2TP-IPSec</strong>, <strong>PPTP</strong> or <strong>SSTP</strong>. Changing between countries or cities is an easy process, simply select the desired country/city from the middle drop-down list and <strong>click</strong> on <strong>connect</strong>. This will change your account preferences and force the client to connect to the new location.</p>
<p style="text-align: justify;">In contrast to the desktop VPN client, the mobile StrongVPN client will leave you wondering if we are talking about the same provider. It’s an impressive stylish application that resonates with the message “We mean serious business here”:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/strongvpn-mobile-client.jpg" alt="StrongVPN mobile VPN client – a stunning application" style="display: block; margin-left: auto; margin-right: auto;" title="StrongVPN mobile VPN client – a stunning application" /></p>
<p style="text-align: center;" align="center">StrongVPN mobile client – a stunning application</p>
<p style="text-align: justify;">The StrongVPN client is available for Windows, MAC, mobile iOS and Android devices. Users can change country/city as required and simply hit the power button in the middle of the screen – once connected the button will turn green as shown above.</p>
<p style="text-align: justify;">StrongVPN does not offer its own Linux-based VPN client, however, Linux users can download and use the open-source OpenVPN client which is fully compatible.</p>
<h3 style="text-align: left;">StrongVPN Supports Netflix VPN Streaming</h3>
<p style="text-align: justify;">We were very pleased to see US Netflix work with StrongVPN. StrongVPN had the most US-based VPN servers from which Netfix would work without a problem. This is definitely a major advantage over its competition.</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/strongvpn-netflix-l.jpg" target="_blank" class="jcepopup" title="US Netflix HD streaming with StrongVPN" data-mediabox="1" data-mediabox-title="US Netflix HD streaming with StrongVPN"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/strongvpn-netflix-s.jpg" alt="StrongVPN Unblocking US Netflix" style="display: block; margin-left: auto; margin-right: auto;" title="StrongVPN Unblocking US Netflix" /> </a>US Netflix HD streaming with StrongVPN (click to enlarge)</p>
<p style="text-align: justify;">Streaming High Definition video didn’t seem like a real challenge for StrongVPN as it was able to stream continuously without any glitches even when downloading torrents and performing casual web browsing. Again, speed and bandwidth availability is the key ingredient here.</p>
<h3 style="text-align: left;">StrongVPN Router Software &amp; Support</h3>
<p style="text-align: justify;">StrongVPN does not develop its own router firmware, however, it does provide detailed instructions on how to setup <a href="https://www.dd-wrt.com" target="_blank" rel="nofollow noopener" title="dd-wrt"><strong>DD-WRT</strong></a>, <a href="https://tomato.groov.pl/" target="_blank" rel="nofollow noopener" title="Tomato by Shibby"><strong>Tomato by Shibby</strong></a> (no longer developed), <strong>Sabai Router OS</strong>, <a href="https://www.mikrotik.com/" target="_blank" rel="nofollow noopener" title="Mikrotik Router OS"><strong>Mikrotik RouterOS</strong></a> and other o/s to connect to its VPN network. StrongVPN support contains perhaps the largest database of router devices and operating systems amongst all VPN Providers reviewed.</p>
<p style="text-align: justify;">Encryption protocols supported for Router VPNs are OpenVPN (TCP or UDP) and PPTP, however, in order to take full advantage of the speeds the VPN Provider is capable of delivering, you’ll need to ensure your router has enough CPU horsepower under the hood!</p>
<h3 style="text-align: left;">StrongVPN Pricing &amp; Plans</h3>
<p style="text-align: justify;">The <a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="Discounted VPN Service"><strong>$3.97US/month</strong></a> price tag (based on a yearly subscription) is a fantastic deal considering the features the services provided. The limit of <strong>2 simultaneous VPN logins</strong> is slightly restrictive but everything else was simply great. The <strong>5 day money-back guarantee</strong> was also acceptable as it allows users enough time to properly evaluate the service.</p>
<p style="text-align: justify;">Closing, StrongVPN accepts Bitcoin payments along with Paypal, and Visa, providing users with more than enough payment options.</p>
<p class="box-info"><strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-strong-vpn-review.html" target="_blank" title="In-depth StrongVPN review">Click here to read our recent in-depth review of StrongVPN</a></strong></p>
<h2 style="text-align: center;">&nbsp;<a href="https://strongvpn.com/?tr_aid=5acbec53da73f" target="_blank" rel="nofollow noopener" title="Visit best VPN Service - StrongVPN"><img src="https://www.firewall.cx/images/stories/vpn/button-blue-visit-strongvpn.png" alt="visit best VPN service - StrongVPN" title="visit best VPN service - StrongVPN" /></a></h2>
<h2 style="text-align: justify;">&nbsp;</h2>
<h2 style="text-align: left;"><a name="ExpressVPN"></a>No.2: <a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="Best VPN Service - ExpressVPN">ExpressVPN</a></h2>
<p><a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="Best VPN Service - ExpressVPN"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-services-for-2017-expressvpn.jpg" alt="ExpresVPN - Best VPN Service" style="display: block; margin-left: auto; margin-right: auto;" title="ExpresVPN - Best VPN Service" /></a></p>
<p style="text-align: justify;">ExpressVPN is another great choice. A reputable VPN Service provider, ExpressVPN offers superior VPN connectivity and very fast download speeds across its <strong>+1000 servers</strong> spread among <strong>87 countries</strong>.</p>
<h3 style="text-align: left;">ExpressVPN No-Log Policy</h3>
<p style="text-align: justify;">ExpressVPN’s <strong>No-Log Policy</strong> states that it doesn’t track its users’ activities but it does maintain information such as the dates (not times) connected to the VPN service, VPN Server connected to and amount of data transferred. While Torrent users might not like the idea that some information is logged, ExpressVPN <a href="https://www.linkev.com/?a_aid=fcxvpn" target="_blank" rel="nofollow noopener" title="ExpressVPN Log Policy &amp; Data Collected">clearly states on its website</a> that the information collected cannot be used to identify its users.</p>
<h3 style="text-align: left;">ExpressVPN Performance</h3>
<p style="text-align: justify;">ExpressVPN performed extremely well and was able to provide sustained transfers for both speed tests and torrent downloads. Download speeds averaged a bit more than <strong>30Mbps</strong> which is adequate for torrenting, gaming, video streaming and casual web browsing.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/expressvpn-speed-test.png" alt="ExpressVPN offers great download and upload speeds" title="ExpressVPN offers great download and upload speeds" /></p>
<p style="text-align: center;" align="center">ExpressVPN offers great download and upload speeds</p>
<p style="text-align: justify;">Upload speeds were also a pleasant surprise <strong>averaging 65Mbps</strong> and peaking at <strong>81.69Mbps</strong>! Our tests were performed using the <strong>OpenVPN UDP</strong> protocol.</p>
<p style="text-align: justify;">Latency was a low and stable <strong>193ms</strong> marking the provider suitable for all types of traffic including delay-sensitive VoIP. ExpressVPN offers unlimited downloading, uploading and streaming.</p>
<h3 style="text-align: left;">ExpressVPN Client &amp; Security Features</h3>
<p style="text-align: justify;">Don’t be fooled by the ExpressVPN client’s simple interface as behind the three buttons and menu (top left) users will find a lot of features and settings that can be enabled as required. Security conscious users will enjoy the <strong>Kill Switch</strong>, <a href="https://www.firewall.cx/security/vpn-services-guides/dns-leak-protection-testing-prevention.html" target="_blank" title="DNS Leak Protection"><strong>DNS Leak Protection</strong></a> and ability to easily select the encryption protocol of their choice which includes <strong>OpenVPN</strong> (TCP or UDP), <strong>L2TP – IPSec</strong>, <strong>PPTP</strong>, <strong>SSTP</strong> or simply leave it to the VPN client to select the most suitable.</p>
<p style="text-align: center;" align="center"><a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="Express VPN"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/expressvpn-windows-client.jpg" alt="The ExpressVPN VPN client: A combination of simplicity and great functionality" style="display: block; margin-left: auto; margin-right: auto;" title="The ExpressVPN VPN client: A combination of simplicity and great functionality" /></a>The <a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="ExpressVPN VPN client">ExpressVPN VPN client</a>: A combination of simplicity and great functionality</p>
<p style="text-align: justify;">The <strong>Smart Location</strong> feature is extremely handy for users frequently travelling. It automatically selects the nearest VPN Server based on your current location, in an effort to provide you with the fastest possible VPN experience.</p>
<p style="text-align: justify;">The ExpressVPN client is available for Windows, MAC, mobile iOS and Android devices but also Linux 32/64bit Ubuntu, Debian, Fedora, and CentOS. It should be noted that ExpressVPN is the only provider to have developed its own VPN client for such a wide range of Linux distributions. Nice!</p>
<h3 style="text-align: left;">ExpressVPN Supports Netflix VPN Streaming</h3>
<p style="text-align: justify;">After connecting to a number of US-based servers we were able to find a few that happily supported Netflix. Streaming High Definition video was smooth without delays, which was very pleasing. While Netflix buffers the video using short high-bandwidth bursts that reached up to 9Mbps, ExpressVPN was able to deliver without a problem.</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/expressvpn-netflix-l.jpg" target="_blank" class="jcepopup" title="ExpressVPN unblock US Netflix" data-mediabox="title[ExpressVPN unblock US Netflix]"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/expressvpn-netflix-s.jpg" alt="US Netflix HD streaming with ExpressVPN" style="display: block; margin-left: auto; margin-right: auto;" title="US Netflix HD streaming with ExpressVPN" /></a>US Netflix HD streaming with ExpressVPN (click to enlarge)</p>
<h3 style="text-align: left;">ExpressVPN Router Software &amp; Support</h3>
<p style="text-align: justify;">ExpressVPN has developed its own firmware that supports specific retail routers enabling customers to tunnel all their internet traffic through ExpressVPN’s servers. Customers have the choice to purchase a router preloaded with firmware or download and install it on an existing compatible router. ExpressVPN also provides support for its firmware, ensuring customers are not left in the dark should problems arise.</p>
<h3 style="text-align: left;">ExpressVPN Pricing &amp; Plans</h3>
<p style="text-align: justify;" align="center">At <strong>$8.32US/month</strong> (based on a yearly subscription) ExpressVPN’s pricing is higher than its competitors, however, it does support up to <strong>3 simultaneous VPN logins</strong> and users will certainly get their money’s worth thanks to great speeds, support for Netflix (via specific US-based servers) and a <strong>30 day money-back guarantee</strong>. Users who prefer can also make payments via Bitcoin, ensuring complete anonymity.</p>
<h2 style="text-align: center;"><a href="https://clixtrac.com/goto/?308400" target="_blank" rel="nofollow noopener" title="Visit best VPN Service - ExpressVPN"><img src="https://www.firewall.cx/images/stories/vpn/button-blue-visit-expressvpn.png" alt="visit best VPN service - ExpressVPN" title="visit best VPN service - ExpressVPN" /></a></h2>
<h2 style="text-align: justify;">&nbsp;</h2>
<h2 style="text-align: left;"><a name="IPVANISH"></a>No.3: <a href="https://clixtrac.com/goto/?308425" target="_blank" rel="nofollow noopener" title="Best VPN Service - IPVANISH">IPVANISH</a></h2>
<p><a href="https://clixtrac.com/goto/?308425" target="_blank" rel="nofollow noopener" title="Best VPN Service - IPVANISH"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-services-for-2017-ipvanish.jpg" alt="IPVANISH Best VPN Service" class="IPVANISH Best VPN Service" style="display: block; margin-left: auto; margin-right: auto;" /></a></p>
<p style="text-align: justify;">IPVANISH is one of the most popular VPN Service Providers available. Its robust VPN services are spread across more than <strong>700 servers</strong> located in <strong>60 countries</strong>. IPVANISH offers a number of great features including a <a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html" target="_blank" title="Socks 5 Proxy">Socks5 Proxy</a> for its customers who want to quickly bypass regional restrictions and are not concern about encryption.</p>
<h3 style="text-align: left;">IPVANISH No-Log Policy</h3>
<p style="text-align: justify;">IPVANISH advertises a <strong>No-Log Policy</strong> which means users can connect to the global IPVANISH VPN network knowing their activities are not tracked or monitored by the provider. IPVANISH does not indicate that it keeps any type of logs that might be able to be used against its customers.</p>
<p style="text-align: justify;">Logging might be enabled in case of a technical support case with the purpose of helping troubleshoot a customer problem.</p>
<h3 style="text-align: left;">IPVANISH Performance</h3>
<p style="text-align: justify;">Bandwidth and VPN performance won’t be a problem thanks to fast servers which didn’t appear to be congested and were able to provide a sustainable download speed for our Torrent download test and video streaming. Our tests were performed using the <strong>OpenVPN UDP</strong> protocol and showed average download speeds of around <strong>39Mbps</strong> while upload speeds were averaging an impressive <strong>90Mbps</strong> peaking at <strong>121.69Mbps</strong>!</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/ipvanish-speed-test.png" alt="IPVANISH Great Download and Upload Speed Tests" title="IPVANISH Great Download and Upload Speed Tests" /></p>
<p style="text-align: center;" align="center">IPVANISH speed tests provided excellent results and acceptable latency</p>
<p style="text-align: justify;">Latency was a low at <strong>215ms</strong> considering our packets were travelling from Melbourne Australia to San Jose US via the VPN Provider. The round-trip delay for voice packets (VoIP) shouldn’t exceed 300ms, or 150ms latency in each direction, so the 215ms we got was suitable for pretty much any application or service a user would want to run over the VPN. IPVANISH offers unlimited downloading, uploading and streaming.</p>
<h3 style="text-align: left;">IPVANISH VPN Client &amp; Security Features</h3>
<p style="text-align: justify;">IPVANISH offers a great VPN client that supports Windows, MAC, iOS and Android (phones + mobiles) plus Ubuntu Linux, making it one of only two providers offering native application support for the great Linux operating system.</p>
<p style="text-align: justify;">The VPN client is packed with some great security features, including <strong>Kill Switch</strong>, <strong>DNS Leak Protection</strong>, <strong>IPv6 Leak Protection</strong> and the ability to obfuscate OpenVPN traffic to avoid it being detected by intelligent Firewalls. It even has an awesome <strong>Simple Mode</strong> feature that replaces the fairly large GUI interface with a small neat window as shown below:</p>
<p><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/ipvanish-client-size.jpg" alt="IPVANISH Best VPN Client Advanced and Simple Mode" style="display: block; margin-left: auto; margin-right: auto;" title="IPVANISH Best VPN Client Advanced and Simple Mode" /></p>
<p style="text-align: center;" align="center">The IPVANISH VPN client switching between Advanced and Simple mode</p>
<p style="text-align: justify;">Support for all the popular VPN protocols, such as PPTP, L2TP and OpenVPN (TCP/UDP) is there to accommodate different encryption requirements even though users would rarely want to use anything other than OpenVPN.</p>
<p style="text-align: justify;">Finally, a neat feature we really liked was the ability to automatically locate the <strong>best VPN Server</strong> based on the country we wanted to connect to – this made it really easy to ensure we were automatically directed to a non-congested VPN server.</p>
<h3 style="text-align: left;">IPVANISH Supports Netflix VPN Streaming</h3>
<p style="text-align: justify;">Netflix users will be happy to learn that we were successfully able to watch our favourite movies using the highest possible video streaming setting (HD – High Definition) for our test bed (HD Laptop). The VPN provider was able to provide a sustainable 5Mbps download speed delivering an enjoyable experience without any glitches:</p>
<p style="text-align: center;">&nbsp;<a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/ipvanish-netflix-l.jpg" target="_blank" class="jcepopup" title="US Netflix HD streaming with IP Vanish VPN" data-mediabox="title[US Netflix HD streaming with IP Vanish VPN]"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/ipvanish-netflix-s.jpg" alt="US Netflix HD streaming with IP Vanish VPN" title="US Netflix HD streaming with IP Vanish VPN" /></a></p>
<p style="text-align: center;" align="center">US Netflix HD streaming with IP Vanish VPN (click to enlarge)</p>
<p style="text-align: justify;">While Netflix users might need to try different US-based VPN Servers to find a server that is not blocked, we were able to stream from the first VPN server we connected to! Further testing did reveal some of the provider’s servers are blocked from Netflix, however that to be expected with most VPN providers.</p>
<h3 style="text-align: left;">IPVANISH VPN Router Software &amp; Support</h3>
<p style="text-align: justify;">While IPVANISH doesn’t create its own Router App it does support the well-known <strong>DD-WRT</strong> and <strong>Tomato by Shibby</strong> software platform. IPVANISH provides detailed step-by-step instructions on its site on how to setup OpenVPN (UDP and TCP) on these platforms to connect with its network.</p>
<h3 style="text-align: left;">IP VANISH Pricing &amp; Plans</h3>
<p style="text-align: justify;">With up to <strong>5 simultaneous VPN logins</strong> allowed (one for every family member!), a monthly price of just <strong>$6.49US</strong> (based on a yearly subscription) and a <strong>7 day money-back guarantee</strong>, you definitely can’t go wrong. It should also be noted that IPVANISH fully supports Bitcoin payments.</p>
<h2 style="text-align: center;"><a href="https://clixtrac.com/goto/?308425" target="_blank" rel="nofollow noopener" title="Visit best VPN Service - IPVanish"><img src="https://www.firewall.cx/images/stories/vpn/button-blue-visit-ipvanish.png" alt="visit best VPN service - IPVanish" title="visit best VPN service - IPVanish" /></a></h2>
<h2 style="text-align: center;">&nbsp;</h2>
<h2 style="text-align: left;"><a name="NordVPN"></a>No.4: <a href="https://clixtrac.com/goto/?308392" target="_blank" rel="nofollow noopener" title="Best VPN Service - NordVPN">NordVPN</a></h2>
<p><a href="https://clixtrac.com/goto/?308392" target="_blank" rel="nofollow noopener" title="Best VPN Service - NordVPN"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-services-for-2017-nordvpn.jpg" alt="NordVPN Best VPN Service" style="display: block; margin-left: auto; margin-right: auto;" title="NordVPN Best VPN Service" /></a></p>
<p style="text-align: justify;">NordVPN is amongst the <strong>Top VPN Providers</strong>. NordVPN certainly has significant features that will appeal to many of our readers. With more than <strong>720 servers</strong> world-wide across <strong>56 countries</strong> it’s hard to neglect this provider.</p>
<h3 style="text-align: left;">NordVPN No-Log Policy</h3>
<p style="text-align: justify;">NordVPN advertises a <strong>No-Log Policy</strong> which will certainly attract attention. According to NordVPN, the company doesn’t track any information and this is thanks to its headquarters being based in Panama, which doesn’t require data to be stored or any reporting.</p>
<h3 style="text-align: left;">NordVPN Performance</h3>
<p style="text-align: justify;">While NordVPN didn’t break any records for its download speeds, its upload speeds were exceptional and consistent.</p>
<p style="text-align: justify;">At an average <strong>26Mbps download speed</strong> home users can easily download torrents or stream videos without concern.</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-speed-test.png" alt="NordVPN download, upload and latency tests were great" title="NordVPN download, upload and latency tests were great" /></p>
<p style="text-align: center;" align="center">NordVPN download, upload and latency tests were great</p>
<p style="text-align: justify;"><strong>Upload speeds</strong> shone at average of almost <strong>88.5Mbps</strong> and, as previously mentioned, they were steady across all tests performed which is a sign of a stable VPN provider. <strong>Upload peaks</strong> of <strong>89.52Mbps</strong> were nice to see but we would have preferred seeing them in the download test instead.</p>
<p style="text-align: justify;">Latency was a bit of a concern at <strong>221ms </strong>which means that online games that don’t tolerate lag very well might give users a hard time, however, connecting to VPN servers within the country of residency would surely make a difference.</p>
<p style="text-align: justify;"><strong>OpenVPN UDP</strong> was the encryption protocol under which the tests were performed. NordVPN offers unlimited downloading, uploading and streaming.</p>
<h3 style="text-align: left;">NordVPN Client &amp; Security Features</h3>
<p style="text-align: justify;">The NordVPN client is a really nice one, packed with a number of great features that helped it earn its No.4 position in our <strong>Best VPN Service</strong> comparison. When launched it provides a map of the world allowing you to quickly connect to a server of your choice. Intermediate users can visit the <strong>servers tab</strong> to obtain a full list of servers or quick shortcuts to categorized servers depending on the application of interest e.g P2P servers, Ultra-fast TV servers, Double VPN servers etc. Security features include <strong>Kill Switch</strong>, <strong>Auto Connect</strong>, <strong>DNS Leak Protection</strong>, <strong>Selection of TCP/UDP</strong> for VPN connectivity, <strong>custom DNS servers</strong> and more.</p>
<p style="text-align: justify;">The <strong>Kill Switch</strong> provides the additional functionality of killing a specific application when the VPN fails – a very handy feature.</p>
<p style="text-align: center;" align="center">&nbsp;<a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-client-l.jpg" target="_blank" class="jcepopup" data-mediabox="title[NordVPN Client – a VPN client packed with features]"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-client-s.jpg" alt="NordVPN VPN Client" title="NordVPN VPN Client" /></a></p>
<p style="text-align: center;" align="center">NordVPN Client – a VPN client packed with features (click to enlarge)</p>
<p style="text-align: justify;">NordVPN offers support for the Windows platform, MAC, Mobile iOS and of course Android. This means it is capable of covering the majority of devices in the market today. Similar to other VPN Providers, Linux users will have to use the open-source OpenVPN client which is fully compatible with the provider.</p>
<h3 style="text-align: left;">NordVPN Supports Netflix VPN Streaming</h3>
<p style="text-align: justify;">During our tests we were able to confirm that NordVPN provides support for US-based Netflix. The NordVPN client provides a feature named <strong>Smart Play</strong> which allows its users to stream Netflix and similar services from anywhere in the world no matter which VPN server they connect to.</p>
<p style="text-align: justify;">We tried this fantastic feature but were disappointed as it didn’t seem to work as advertised. We initially connected to an Australian VPN server and logged in to our US Netflix account, however, when we attempted to stream a movie we were greeted with a familiar error in our browser:</p>
<p style="text-align: center;" align="center">&nbsp;<a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-netflix-smartplay-error-l.jpg" target="_blank" class="jcepopup" title="NordVPN SmartPlay Netflix Error" data-mediabox="1" data-mediabox-title="NordVPN SmartPlay Netflix Error"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-netflix-smartplay-error-s.jpg" alt="NordVPN SmartPlay Netflix Error" title="NordVPN SmartPlay Netflix Error" /></a></p>
<p style="text-align: center;" align="center">NordVPN Smart Play feature for Netflix didn’t work for us (click to enlarge)</p>
<p style="text-align: justify;">We then decided to connect to a US-based VPN Server and try to stream Netflix from there – that seemed to work fine, however, we did notice it was taking slightly longer for the video stream to start:</p>
<p style="text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-netflix-l.jpg" target="_blank" class="jcepopup" title="NordVPN Netflix Streaming" data-mediabox="1" data-mediabox-title="NordVPN Netflix Streaming"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/nordvpn-netflix-s.jpg" alt="NordVPN Netflix Streaming" title="NordVPN Netflix Streaming" /></a>&nbsp;</p>
<p style="text-align: center;" align="center">US Netflix HD streaming with NordVPN connected to US VPN Server (click to enlarge)</p>
<h3 style="text-align: left;">NordVPN Pricing &amp; Plans</h3>
<p style="text-align: justify;">As with all VPN Providers, purchasing a 12 month subscription provides considerable savings. NordVPN pricing at <strong>$5.75US/month</strong> (based on a yearly subscription) is a great deal and ideal for users with multiple devices since it allows up to an impressive <strong>6 simultaneous VPN logins</strong>. The equally impressive <strong>30 day money-back guarantee</strong> gives users plenty of time to properly evaluate NordVPN’s service.</p>
<p style="text-align: justify;">Sceptical users can even try <strong>NordVPN Free of charge for 3 days</strong> without entering any financial details (Visa, Paypal etc) which is a great feature and one you should try if you have the time.</p>
<p style="text-align: justify;">Users who decide to continue using the service can also opt to pay via Bitcoin to further secure their details.</p>
<h2 style="text-align: center;"><a href="https://clixtrac.com/goto/?308392" target="_blank" rel="nofollow noopener" title="Visit best VPN Service - NordVPN"><img src="https://www.firewall.cx/images/stories/vpn/button-blue-visit-nordvpn.png" alt="visit best VPN service - NordVPN" title="visit best VPN service - NordVPN" /></a></h2>
<h2 style="text-align: center;">&nbsp;</h2>
<h2 style="text-align: left;"><a name="PrivateInternetAccess"></a>No.5: <a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="Best VPN Service - Private Internet Access">Private Internet Access (PIA)</a></h2>
<p><a href="https://clixtrac.com/goto/?308318" target="_blank" rel="nofollow noopener" title="Best VPN Service - Private Internet Access"><strong><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-services-for-2017-pia.jpg" alt="Private Internet Access Best VPN Service" style="display: block; margin-left: auto; margin-right: auto;" title="Private Internet Access Best VPN Service" /></strong></a></p>
<p style="text-align: justify;"><strong>Private Internet Access</strong> is a well-known VPN service provider that’s rightly earned its position amongst our <strong>best VPN Service</strong> Providers. Its huge VPN network, consisting of more than <strong>3270 servers</strong> located in <strong>24 countries,</strong> means it will be difficult to find a congested server at any time of the day or night. <strong>Private Internet Access</strong> is the second provider who offer a free <strong><a href="https://www.firewall.cx/security/vpn-services-guides/best-socks5-proxy-guide-torrenting-free-proxy-list.html" target="_blank" title="Free Socks5 Proxy Server">SOCKS5 proxy server</a></strong> to their users.</p>
<p class="box-info" style="text-align: justify;">For an <strong>extensive review</strong> on PIA, including security tests, DNS Leak tests, Torrent Protection, Kill-Switch test, Netflix support and much more, read our <a href="https://www.firewall.cx/security/vpn-services-guides/best-vpn-private-internet-access.html" target="_blank" title="Best VPN Review: Private Internet Access (PIA) Features, Pricing, User Experience, Benchmarking &amp; Torrenting">Best VPN Review: Private Internet Access (PIA)</a></p>
<h3 style="text-align: left;">Private Internet Access No-Log Policy</h3>
<p style="text-align: justify;">Private Internet Access is another VPN Provider that offers a <strong>No-Log Policy</strong> which means anonymous browsing and user privacy is a top priority here. Users requiring complete anonymity can even use Bitcoin to pay for their subscription in which case the provider won’t store any financial information on your account.</p>
<h3 style="text-align: left;">Private Internet Access Performance</h3>
<p style="text-align: justify;">Similar to our other tests, we connected to a US-based VPN server via our premium internet connection.</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/private-internet-access-speed-test.png" alt="Private Internet Access Download / Upload Speed &amp; Latency Tests" class="Private Internet Access Download / Upload Speed &amp; Latency Tests" /></p>
<p style="text-align: center;" align="center">Private Internet Access Download / Upload Speed &amp; Latency Tests</p>
<p style="text-align: justify;">Speed tests showed an average, but acceptable, <strong>23.94Mbps</strong> download and an impressive <strong>108.41Mbps</strong> upload. Testing different servers yielded similar results, however, these speeds are more than capable of delivering an enjoyable browsing and downloading experience without any interruptions.</p>
<p style="text-align: justify;">The latency test was a big surprise, <strong>168ms</strong> – only 2ms faster than StrongVPN. Given most VPN Providers averaged around 200msec, it was nice to see Private Internet Access provide such a fast connection to the other side of the world. Finally Private Internet Access offers unlimited downloading, uploading and streaming.</p>
<h3 style="text-align: left;">Private Internet Access Client &amp; Security Features</h3>
<p style="text-align: justify;">Unlike other VPN clients, the Private Internet Access client stays continuously minimized in the task tray. To open the client’s control settings users must <strong>right click</strong> on the Private Internet Access icon in the task tray and select <strong>settings</strong> as shown below:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/private-internet-access-tasktray-icon.png" alt="Accessing Private Internet Access VPN client settings" title="Accessing Private Internet Access VPN client settings" />&nbsp;</p>
<p style="text-align: center;" align="center">Accessing Private Internet Access VPN client settings</p>
<p style="text-align: justify;">The VPN client offers a <strong>Simple </strong>and <strong>Advanced mode</strong>. Switching between the two is as simple as clicking on the <strong>Simple</strong>/<strong>Advanced</strong> toggle button on the bottom left side:</p>
<p style="text-align: center;" align="center">&nbsp;<a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/private-internet-access-client-l.png" target="_blank" class="jcepopup" title="Private Internet Access VPN client Advanced Mode settings" data-mediabox="title[Private Internet Access VPN client Advanced Mode settings]"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/private-internet-access-client-s.png" alt="Private Internet Access VPN client Advanced Mode settings" title="Private Internet Access VPN client Advanced Mode settings" /></a></p>
<p style="text-align: center;" align="center">Private Internet Access VPN client Advanced Mode settings (click to enlarge)</p>
<p style="text-align: justify;">The Private Internet Access client provides a healthy amount of security options and settings. <strong>Kill Switch</strong>, <strong>DNS Leak Protection</strong>, <strong>IPv6 Leak Protection</strong> are all included within the client plus <strong>PIA’s MACE service </strong>which blocks ads, trackers and malware while connected to the VPN service. The <strong>Region</strong> settings on the left allows the user to connect to different VPN Servers, an option also available when right-clicking on the PIA icon in the task tray.</p>
<p style="text-align: justify;">The VPN client also integrates a firewall to help stop incoming connections reaching your PC or mobile device and adding an additional layer of security.</p>
<p style="text-align: justify;">The Private Internet Access VPN client is built on <strong>OpenVPN</strong> and provides strong data encryption and authentication but it does not support <strong>PPTP</strong> or <strong>L2TP/IPSec</strong> encryption protocols. To connect via <strong>PPTP</strong> or <strong>L2TP/IPSec</strong> to a Private Internet Access VPN Server, users must use their device’s (workstation, mobile phone etc) built-in native VPN client which can prove a bit of a tedious task – especially if you’ve never done it before.</p>
<p style="text-align: justify;">Thankfully Private Internet Access provides a well-documented support section to help get users connected with these alternatively supported encryption protocols.</p>
<p style="text-align: justify;">The Private Internet Access VPN client is offered for the Windows, MAC OS, Apple iOS, Android and Linux (Ubuntu) platforms. Users with other Linux-based distributions will have to install and use the native open-source OpenVPN client from openvpn.net.</p>
<p style="text-align: justify;">Private Internet Access also provides support documentation for configuring <strong>DD-WRT</strong>, <strong>Tomato by Shibby</strong> and other platforms.</p>
<h3 style="text-align: left;">Private Internet Access Supports Netflix VPN Streaming</h3>
<p style="text-align: justify;">Surprisingly enough we were able to access our US Netflix account using most of Private Internet Access’s US-based VPN Servers - a pleasant surprise considering they won’t admit US Netflix works from their VPN network!</p>
<p style="text-align: center;" align="center">&nbsp;<a href="https://www.firewall.cx/images/stories/vpn/best-vpn-service/private-internet-access-vpn-netflix-l.jpg" target="_blank" class="jcepopup" title="US Netflix streaming with Private Internet Access" data-mediabox="1" data-mediabox-title="US Netflix streaming with Private Internet Access"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/private-internet-access-vpn-netflix-s.jpg" alt="US Netflix streaming with Private Internet Access" title="US Netflix streaming with Private Internet Access" /></a></p>
<p style="text-align: center;" align="center">US Netflix streaming with Private Internet Access (click to enlarge)</p>
<p style="text-align: justify;">Streaming in High Definition (HD) was excellent without any problems. Videos loaded without noticeable delay providing a great experience that would easily satisfy demanding users. We also tried placing some load on our broadband connection by downloading files, however, Private Internet Access’s VPN Server was able to keep pumping traffic to us without an issue.</p>
<p style="text-align: justify;">We should remind our readers that the US Netflix streaming for all VPN Providers was performed from a <strong>20Mbps</strong> home broadband connection to help simulate the majority of user environments.</p>
<h3 style="text-align: left;">Private Internet Access VPN Router Software &amp; Support</h3>
<p style="text-align: justify;">Private Internet Access doesn’t provide any custom Router app, however, it does support and provide detailed step-by-step instructions on how to setup <strong>DD-WRT</strong>, <strong>Tomato </strong>routers and <strong>PfSense</strong> with its network using OpenVPN.</p>
<h3 style="text-align: left;">Private Internet Access Pricing &amp; Plans</h3>
<p style="text-align: justify;">Private Internet Access provides a generous up to <strong>5 simultaneous VPN logins</strong> which is enough to support a laptop computer, desktop workstation and 2-3 mobile devices making it a very attractive and flexible solution.</p>
<p style="text-align: justify;">With a pricing of just <strong>$3.33US/month</strong>, it is the cheapest VPN Provider solution in our review and shouldn’t be overlooked. There is a <strong>7 day money-back guarantee</strong> which is enough to test the service and it accepts Bitcoin payment for complete anonymity.</p>
<p style="text-align: justify;" align="center">Private Internet Access could easily be in the Top 3 <strong>Best VPN Service</strong> Providers if download speeds were faster.<strong> <br /></strong></p>
<p style="text-align: center;" align="center">&nbsp;</p>
<div style="text-align: center;"><a href="https://clixtrac.com/goto/?308319" target="_blank" rel="nofollow noopener" title="BestVPN Service"><img src="https://www.firewall.cx/images/stories/vpn/best-vpn-service/best-vpn-service-comparison.webp" alt="best vpn service comparison" title="Comparing Best VPN Prices and Features" /></a></div>
<div style="text-align: center;" align="center">The Best VPN Service Providers. Scroll above for each provider's direct link.</div>
<h2 style="text-align: left;">&nbsp;Summary: Best VPN Service Providers</h2>
<p style="text-align: justify;">We hope this extensive comparison of six of the <strong>Best VPN Service</strong> Providers has provided enough information to help you decide which <strong>VPN provider</strong> is best for you. As VPN providers upgrade and introduce new features we’ll ensure this <strong>VPN Service comparison guide</strong> is kept up to date.</p>
<p style="text-align: justify;">The ultimate choice lies with the end customer – you.</p>]]></description>
			<category>VPN Services &amp; Guides</category>
			<pubDate>Sun, 01 Jan 2017 12:49:56 +1100</pubDate>
		</item>
	</channel>
</rss>
