It is our business to make safety and caution for our free VPN service the number one priority. We are constantly working to understand and develop new technology that keeps our users safe, without requiring costly fees or lengthy sign-up features. We want to keep you and your family safe without you having to give up any freedom. We would never limit these rights and don’t believe in setting limits. That is not our business.
Windscribe offers unlimited device connections. Yes you heard that right! The reason is that unlike the others above on this list, it doesn't offer unlimited data. So you're limited by bandwidth and data, not by devices. You get 10GB every month, and there's a free plan also but that only allows one device. There are apps for Windows, Mac and iOS but not Android, and the service also offers browser add-ons with useful features such as ad-blocking. Short range performance (to US sites) is good, but we noticed lag with transatlantic connections. However, if you’re looking to protect the data from a whole bunch of devices - an office, perhaps, or just a smart home - the support for unlimited connections is a real stand-out feature.
With the service, user data cannot be intercepted as all traffic are encrypted. A split tunneling functionality allows users to route traffic from specific applications through the software. It likewise has a kill switch, which effectively cuts off Internet connection when the VPN connection fails. This prevents the accidental revelation of IP addresses.
We also like how easy it is to connect, and how clear and accessible the settings are, on all platforms when using the IVPN app. (ChromeOS has an option to use a less-secure VPN protocol with most providers, including IVPN. But TorGuard, our budget pick, supports the more secure OpenVPN on Chromebooks and tablets.) If you do want to tweak some settings, IVPN has easy-to-understand checkboxes for most options. For example, the kill switch (labeled “firewall”) has an easy on/off toggle. Anytime it’s on and the app is open, all traffic in and out of your computer will cut off if you forget to connect to the service or the secure connection drops for some reason.
As we previously noted, we don’t recommend relying on our picks to get around geographic restrictions on copyrighted content. The practice is likely illegal, and it violates the terms of service of your ISP, VPN, and content provider. On top of that, it often doesn’t work—we couldn’t access Netflix over any of the services we tried, and of the four streams we loaded on BBC iPlayer, only two worked a few days later.
Privacy features – The privacy features you want/need really varies for each person and depends on your threat model. For a higher level of online anonymity, you could use a multi-hop VPN, or possibly chain different VPN providers together. This could be done by using one VPN on a router, and then connecting through a second VPN on your computer. This can also be accomplished using virtual machines.
Most VPNs won’t keep any logs of user activity. Not only is this of benefit to their customers (and a great selling point) it’s also of huge benefit to them (as detailed logging can quickly consume disk after disk worth of resources). Many of the largest VPN providers will tell you as much: not only do they have no interest in keeping logs, but given the sheer size of their operation they can’t even begin to set aside the disk space to do so.
There are a number of ways to use VPN. The most common scenario is when a remote user accesses a private network across the Internet using a remote access VPN connection. In another scenario, a remote office connects to the corporate network using either a persistent or an on-demand site-to-site VPN connection (also known as a router-to-router VPN connection).
VPN services, while tremendously helpful, are not foolproof. There's no magic bullet (or magic armor) when it comes to security. A determined adversary can almost always breach your defenses in one way or another. Using a VPN can't help if you unwisely download ransomware on a visit to the Dark Web, or if you foolishly give up your data to a phishing attack.