Loading AI tools
Commercial virtual private network (proxy server) services, including comparison tables. From Wikipedia, the free encyclopedia
A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks.
A wide variety of entities provide VPN services for several purposes. But depending on the provider and the application, they do not always create a true private network. Instead, many providers simply provide an Internet proxy that uses VPN technologies such as OpenVPN or WireGuard. Commercial VPN services are often used by those wishing to disguise or obfuscate their physical location or IP address, typically as a means to evade Internet censorship or geo-blocking.
Providers often market VPN services as privacy-enhancing, citing security features, such as encryption, from the underlying VPN technology. However, users must consider that when the transmitted content is not encrypted before entering the proxy, that content is visible at the receiving endpoint (usually the VPN service provider's site) regardless of whether the VPN tunnel itself is encrypted for the inter-node transport. The only secure VPN is where the participants have oversight at both ends of the entire data path or when the content is encrypted before it enters the tunnel.
On the client side, configurations intended to use VPN services as proxies are not conventional VPN configurations. However, they do typically utilize the operating system's VPN interfaces to capture the user's data to send to the proxy. This includes virtual network adapters on computer OSes and specialized "VPN" interfaces on mobile operating systems. A less common alternative is to provide a SOCKS proxy interface.
In computer magazines, VPN services are typically judged on connection speeds, privacy protection including privacy at signup and grade of encryption, server count and locations, interface usability, and cost.[1][2][3][4] In order to determine the degree of privacy and anonymity, various computer magazines, such as PC World and PC Magazine, also take the provider's own guarantees and its reputation among news items into consideration.[1][2] Recommendation websites for VPNs tend to be affeliated or even owned by VPN service providers.[5]
Users are commonly exposed to misinformation on the VPN services market, which makes it difficult for them to discern fact from false claims in advertisements.[11] According to Consumer Reports, VPN service providers have poor privacy and security practices and also make hyperbolic claims.[12] The New York Times has advised users to reconsider whether a VPN service is worth their money.[13] VPN services are not sufficient for protection against browser fingerprinting.[14]
In March 2018, the use of unapproved VPN services was banned in China, as they can be used to circumvent the Great Firewall.[18] Operators received prison sentences and were penalized with fines.[19][20][21][22] Russia banned various VPN service providers in 2021.[23]
PC Magazine recommends that users consider choosing a provider based in a country with no data retention laws because that makes it easier for the service to keep a promise of no logging.[24] PC Magazine and TechRadar also suggest that users read the provider's logging policy before signing up for the service,[24][3] because some providers collect information about their customers' VPN usage.[25][26] PC World recommends that users avoid free services as a rule of thumb and said free services either sell their users' browsing data in aggregated form to researchers and marketers, or only offer a minimal amount of data transfer per month.[25]
Notes
Service | Leak Protection | Protocols | Obfuscation / Censorship Avoidance | Network Neutrality | Server | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
First-party DNS servers | IPv6 supported / blocked | Offers kill switch | Offers OpenVPN | Offers WireGuard | Supports multihop | Supports TCP port 443 | Supports Obfsproxy | Offers SOCKS | Linux support | Supports SSL tunnel | Supports SSH tunnel | Blocks SMTP (authent.) | Blocks P2P | Dedicated or virtual | Diskless | |
Atlas VPN | Yes | Yes | Yes | No | Yes | Yes | No | No | No | Yes | Some | No | Dedicated | No | ||
Avast SecureLine | Yes | Yes | Yes | Yes | No | No | No | No | Some[76] | Dedicated[77] | No | |||||
Avira Phantom VPN | Yes | Yes | Yes | Yes | No | No | Yes | No | No | No | No[78] | Dedicated | No | |||
ExpressVPN | Yes[30] | Yes | Yes | Yes[30] | No | No | Yes[30] | Yes[79] | No[31] | Both[80][81] | Yes | |||||
Hotspot Shield | No | No | Yes | No | No | No | No | ? | ||||||||
IPVanish | Yes[82] | Yes[83] | Yes | Yes[42] | Yes[84] | No | Yes[85] | Yes[86] | Yes[42] | Yes[87] | No | No | No[42] | No[42] | Dedicated | No |
IVPN | Yes[88] | No[89] | Yes | Yes | Beta[90] | Yes; OpenVPN | Yes | Yes | Yes[91] | Yes[92] | No[93] | No[94] | Dedicated[95] | |||
Mullvad | Yes[96] | Yes[96] | Yes | Yes[96] | Yes[97] | Yes; WireGuard[98] and SOCKS5 | Yes[96] | No[99] | Yes[100][96] | Yes[101] | Yes | Yes[96] | No[96] | No[96] | Dedicated[102] | Yes[103] |
NordVPN | Yes[104] | No[105] | Yes | Yes[106] | Yes; NordLynx based on WireGuard[107] | Yes; OpenVPN[108] and SOCKS5 | Yes[109] | Yes[110] | Yes[111] | Yes | No[112] | Dedicated | Yes | |||
PrivadoVPN | Yes | Yes | Yes | Yes | Yes[113] | Yes | Yes | No | ||||||||
Private Internet Access | Yes[114] | Yes[115] | Yes | Yes[116] | Yes[117] | Yes[118] | Yes[119] | No | Yes[120] | Yes[121] | Some[a] | No[123] | Dedicated[124] | Yes[125] | ||
ProtonVPN | Yes | No | Yes | Yes | Yes[126] | Yes | Yes | No | No | Yes[127] | Yes | Yes | Some[b] | Dedicated | ||
PureVPN | Yes | Yes | Yes | Yes[129] | No | No | Only through SSTP[130] | No | No | Yes[131] | No | Some[132] | Both[133][81] | No | ||
Surfshark | Yes | No | Yes | Yes | Yes | Yes (WG, OVPN, IKEv2) | Yes | No | No | Yes | Some | No | Both | Yes | ||
TunnelBear | Yes[72] | Yes | Yes | Yes[134][69] | No | No | No | Yes[135][70] | Yes | Yes | No[136] | Some[137] | ||||
Windscribe | Yes | Yes | Yes | Yes | Yes[138] | Yes | Yes | No | No[139] | Yes
(via Stealth protocol) |
No | No | No | Dedicated[c] | Yes[141] | Yes |
Notes
Notes
The following definitions clarify the meaning of some of the column headers in the comparison tables above.
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.