Analysis of information sources in references of the Wikipedia article "VPN service" in English language version.
When you use Hotspot Shield to access the internet, we collect only anonymous, aggregate data about which websites you visit and which apps you use.
Your IP address may be collected when you visit our websites.
We collect your IP address [...]. We may also use your IP address to derive your approximate location [...]. Your true IP address is stored only for the duration of your VPN session and is cleared after your session is closed.
PrivateInternetAccess.com does not collect or log any traffic or use of its Virtual Private Network ("VPN") or Proxy.
We do not impose any restrictions or limitations on usage and/or bandwidth consumption.
No, but we are planning to add the support of IPv6 in 2018.
Yes, we do support Socks5 proxies as well as HTTP proxies (1 HTTP and Socks5 proxy at each of our VPN server destinations).
We use our own private DNS servers for your DNS queries while on the VPN.
IPv6 leak protection disables IPv6 traffic while on the VPN. This includes 6to4 and Teredo tunneled IPv6 traffic.
This is used in conjunction with the OpenVPN protocol [...]
Although quite different from a VPN, we provide a SOCKS5 Proxy with all accounts in the event users require this feature.
Any VPN provider that does not retain logs must block outgoing SMTP traffic due to rampant spam associated with usage of VPN services. With that said, we can whitelist (allow) any outgoing email server that a) require authentication, and b) is correctly setup so as not to be an open relay.
In addition, any blocked software by your ISP including P2P and other various software applications will be unblocked and unrestricted on our systems.
Turning Hotspot Shield on encrypts all of the traffic between your device and our servers using TLS 1.2 with perfect forward secrecy (ECDHE), 128-bit AES data encryption.
We encrypt all of the traffic between your device and our servers using TLS 1.2 with perfect forward secrecy (ECDHE), 128-bit AES data encryption, and HMAC message authentication.
We support peer-2-peer (P2P) networking in some of our server locations.
All of our VPN gateways run on dedicated hardware servers.
Information about your use of our website the Cookie generates is usually transferred to a Google server in the USA and saved there. However, before this happens, Google shortens and anonymizes your IP address [...] if located within a member state of the European Union or in other contracting member states to the Agreement on the European Economic Area. The entire IP address is transferred to a Google server in the USA and saved there only in exceptional cases. [...] Information about your use of our website (including your IP address) that Cookies generate is transferred to a CrazyEgg server in the USA and stored there.
We do not collect logs of your activity, including no logging of browsing history, traffic destination, data content, or DNS queries. We also never store connection logs, meaning no logs of your IP address, your outgoing VPN IP address, connection timestamp, or session duration.
We collect information about whether you have successfully established a VPN connection on a particular day (but not a specific time of the day).
We may know, for example, that our customer John had connected to our New York VPN location on Tuesday and had transferred an aggregate of 823 MB of data across a 24-hour period.
Continue below to buy VPN with Bitcoin.
Our network is SSL-secured
When you use Hotspot Shield to access the internet, we collect only anonymous, aggregate data about which websites you visit and which apps you use.
Your IP address may be collected when you visit our websites.
We collect your IP address [...]. We may also use your IP address to derive your approximate location [...]. Your true IP address is stored only for the duration of your VPN session and is cleared after your session is closed.
Turning Hotspot Shield on encrypts all of the traffic between your device and our servers using TLS 1.2 with perfect forward secrecy (ECDHE), 128-bit AES data encryption.
We encrypt all of the traffic between your device and our servers using TLS 1.2 with perfect forward secrecy (ECDHE), 128-bit AES data encryption, and HMAC message authentication.
We do not store any connection logs whatsoever. In addition we do not log bandwidth usage, session data or requests to our DNS servers.
We accept all major credit cards, Paypal, Bitcoin and cash. However paying with cash is only available when purchasing an annual subscription.
We log nothing whatsoever that can be connected to a numbered account's activity: no logging of traffic; DNS requests; connections, including when one is made, when it disconnects, for how long, or any kind of timestamp; IP addresses; user bandwidth [or] account activity except total simultaneous connections [...] and the payment information detailed in this post.
Mullvad accepts Bitcoin, cash, bank wire, credit card, PayPal, and Swish.
You do have the option of sending an encrypted email to us using PGP. Mullvad's PGP key is found on our website.
No, but we are planning to add the support of IPv6 in 2018.
Yes, we do support Socks5 proxies as well as HTTP proxies (1 HTTP and Socks5 proxy at each of our VPN server destinations).
For OpenVPN TCP connections - port 443.
It's important to keep a few things in mind when evaluating which VPN service is right for you: reputation, performance, type of encryption used, transparency, ease of use, support, and extra features.
Similar to PureVPN, ExpressVPN says it uses virtual servers in certain locations due to infrastructure issues.
PrivateInternetAccess.com does not collect or log any traffic or use of its Virtual Private Network ("VPN") or Proxy.
We use our own private DNS servers for your DNS queries while on the VPN.
IPv6 leak protection disables IPv6 traffic while on the VPN. This includes 6to4 and Teredo tunneled IPv6 traffic.
This is used in conjunction with the OpenVPN protocol [...]
Although quite different from a VPN, we provide a SOCKS5 Proxy with all accounts in the event users require this feature.
In addition, any blocked software by your ISP including P2P and other various software applications will be unblocked and unrestricted on our systems.
We do not impose any restrictions or limitations on usage and/or bandwidth consumption.
Any VPN provider that does not retain logs must block outgoing SMTP traffic due to rampant spam associated with usage of VPN services. With that said, we can whitelist (allow) any outgoing email server that a) require authentication, and b) is correctly setup so as not to be an open relay.
None of the following records are stored by PureVPN' ... Browsing activity ... Browsing history ... Sites visited ... Content or data accessed
None of the following records are stored by PureVPN' ... DNS queries generated by the user
None of the following records are stored by PureVPN' ... Connection timestamps
We keep track of the total bandwidth consumed by a user to make sure everybody is getting the highest speeds and the best possible experience from our product.
From here on forward, we do not keep any records of anything that could associate any specific activity to a specific user.
Since we are huge believers in anonymity, we have included Bitcoin and Gift Cards – 100% anonymous payment methods – in the payment methods accepted by us.
10 Multi-Logins per Household
Furthermore, we have blocked P2P on some of our servers as per changing Global Web Policy. We don't allow p2p/filesharing where it's illegal by law named United Kingdom (UK), United States (US), Canada, Australia etc.
PureVPN has never denied using virtual servers. To make matters simpler, an update on our Server Location page will state which servers are virtual and which are physical.
{{cite web}}
: CS1 maint: numeric names: authors list (link)We were looking for features, value, and clear and honest pricing. Free ways to learn more about a service - free plans, trial periods, refund periods - were important, and we also looked for companies which maintained your privacy when you signed up (no email address required, trials available without credit cards, Bitcoin available as a payment option).
Every time you connect to TunnelBear, your DNS requests are directed to TunnelBear DNS servers, so your ISP can no longer see what websites you're visiting. And because we don't keep any records of your DNS, you're the only one that knows your browsing history.
Understanding how much data people are using is a critical metric for TunnelBear. [...] We felt that overall usage would respect individual user privacy (i.e. no login timestamps [...]) [...].
When you turn GhostBear on, it changes your VPN traffic signature to look like a different kind of traffic. To do this, GhostBear uses a technology called Obfsproxy.
TunnelBear does not block SMTP on our network.
It's important to keep a few things in mind when evaluating which VPN service is right for you: reputation, performance, type of encryption used, transparency, ease of use, support, and extra features.
We were looking for features, value, and clear and honest pricing. Free ways to learn more about a service - free plans, trial periods, refund periods - were important, and we also looked for companies which maintained your privacy when you signed up (no email address required, trials available without credit cards, Bitcoin available as a payment option).
Information about your use of our website the Cookie generates is usually transferred to a Google server in the USA and saved there. However, before this happens, Google shortens and anonymizes your IP address [...] if located within a member state of the European Union or in other contracting member states to the Agreement on the European Economic Area. The entire IP address is transferred to a Google server in the USA and saved there only in exceptional cases. [...] Information about your use of our website (including your IP address) that Cookies generate is transferred to a CrazyEgg server in the USA and stored there.
We do not collect logs of your activity, including no logging of browsing history, traffic destination, data content, or DNS queries. We also never store connection logs, meaning no logs of your IP address, your outgoing VPN IP address, connection timestamp, or session duration.
We collect information about whether you have successfully established a VPN connection on a particular day (but not a specific time of the day).
We may know, for example, that our customer John had connected to our New York VPN location on Tuesday and had transferred an aggregate of 823 MB of data across a 24-hour period.
Continue below to buy VPN with Bitcoin.
We do not store any connection logs whatsoever. In addition we do not log bandwidth usage, session data or requests to our DNS servers.
We accept all major credit cards, Paypal, Bitcoin and cash. However paying with cash is only available when purchasing an annual subscription.
We log nothing whatsoever that can be connected to a numbered account's activity: no logging of traffic; DNS requests; connections, including when one is made, when it disconnects, for how long, or any kind of timestamp; IP addresses; user bandwidth [or] account activity except total simultaneous connections [...] and the payment information detailed in this post.
Mullvad accepts Bitcoin, cash, bank wire, credit card, PayPal, and Swish.
You do have the option of sending an encrypted email to us using PGP. Mullvad's PGP key is found on our website.
From here on forward, we do not keep any records of anything that could associate any specific activity to a specific user.
Since we are huge believers in anonymity, we have included Bitcoin and Gift Cards – 100% anonymous payment methods – in the payment methods accepted by us.
Every time you connect to TunnelBear, your DNS requests are directed to TunnelBear DNS servers, so your ISP can no longer see what websites you're visiting. And because we don't keep any records of your DNS, you're the only one that knows your browsing history.
Understanding how much data people are using is a critical metric for TunnelBear. [...] We felt that overall usage would respect individual user privacy (i.e. no login timestamps [...]) [...].
We support peer-2-peer (P2P) networking in some of our server locations.
All of our VPN gateways run on dedicated hardware servers.
Our network is SSL-secured
Similar to PureVPN, ExpressVPN says it uses virtual servers in certain locations due to infrastructure issues.
10 Multi-Logins per Household
Furthermore, we have blocked P2P on some of our servers as per changing Global Web Policy. We don't allow p2p/filesharing where it's illegal by law named United Kingdom (UK), United States (US), Canada, Australia etc.
PureVPN has never denied using virtual servers. To make matters simpler, an update on our Server Location page will state which servers are virtual and which are physical.
When you turn GhostBear on, it changes your VPN traffic signature to look like a different kind of traffic. To do this, GhostBear uses a technology called Obfsproxy.
TunnelBear does not block SMTP on our network.