

However, AES-128 should still be considered quite safe. The most secure VPN connection and encryption algorithm that we would recommend to our users would be our suite of AES-256, RSA 4096 and SHA1 or 256. We utilize a hashing system to keep track of payments and credit them properly while ensuring the strongest levels of privacy for our users.ġ0.

We utilize a variety of payment systems including, but not limited to, PayPal, Stripe, Amazon, Google, Bitcoin, Stellar, CashU, Ripple, Most Major Store Bought Gift card, PIA Gift cards (available in retail stores for “cash”), and more. We do not attempt to filter, monitor, censor or interfere in our users’ activity in any way, shape or form. We do not have a warrant canary in place at this time as the concept of a warrant canary is, in fact, flawed at this time, or in other words, is “security theater.”Ĩ. We have not, to date, been served with a valid court order that has required us to provide something we do not have.ħ. We do not log and therefore are unable to provide information about any users of our service. Because we do not log our users’ activities in order to protect and respect their privacy, we are unable to identify particular users that may be infringing the lawful copyrights of others.Ħ.
Reviews of hideme vpn for use in iceland 2017 full#
We have a proprietary system in place that allows us to comply in full with DMCA takedown notices without disrupting our users’ privacy. Our support system is in-house as we utilize Kayako.ĥ. We utilize SendGrid as an external mailing system and encourage users to create an anonymous e-mail when signing up depending on their adversarial risk level. That said, we have a proprietary system in place to help mitigate abuse.Ĥ. Additionally, our beloved clients are given access to some of the strongest consumer protection laws, and thus, are able to purchase with confidence.ģ. We choose to operate in the US in order to provide no logging service, as there is no mandatory data retention law in the US.

This includes, but is not limited to, any traffic data, DNS data or meta (session) data. VPNS THAT KEEP NO LOGS PRIVATE INTERNET ACCESSġ. We are also working on a convenient overview page as well as dedicated review pages for all providers, with the option for users to rate theirs and add a custom review. The order of the VPNs within each category holds no value. We therefore divided the responses into a category of providers who keep no logs (page 1/2) and one for who keep usage and/or session logs (page 3). Please note that several VPN companies listed here do log to some extent.

VPN providers who keep logs for longer than 7 days were excluded, and others who simply failed to respond. In some cases we asked for further clarification. Do you have physical control over your VPN servers and network or are they outsourced and hosted by a third party (if so, which ones)? Where are your servers located?īelow is the list of responses we received from various VPN providers, in their own words. Do you use your own DNS servers? (if not, which servers do you use?)ġ2. What is the most secure VPN connection and encryption algorithm you would recommend to your users? Do you provide tools such as “kill switches” if a connection drops and DNS leak protection?ġ1. Which payment systems do you use and how are these linked to individual user accounts?ġ0.
