VPN Services
Introduction
A Virtual Private Network (VPN) creates an encrypted tunnel between your device and a VPN server, masking your IP address and protecting your online activity from ISPs, hackers, and other third parties. VPNs are essential tools for maintaining privacy and security while browsing the internet, especially when using public Wi-Fi networks.
Threat Model
When considering a VPN service, you need to protect against several threats: ISP surveillance, public Wi-Fi attacks, geo-location tracking, and network throttling. However, it's important to note that your VPN provider can see your traffic, so choosing a trustworthy provider with a strong no-logs policy is crucial. Your threat model should consider whether you need protection from casual observers, your ISP, or more sophisticated adversaries.
Legend
Trust Level
Compatibility
macOS, Windows, Linux, MobileTop 3 Recommended Providers
Other Recommended Providers
VPN Comparison Matrix
Criteria | IVPN | Mullvad | NordVPN | ProtonVPN | Surfshark |
---|---|---|---|---|---|
App Collects Customer Data | |||||
Are Reproducible Builds Used to Verify Apps Against Source Code | |||||
Are the App and Server Completely Open Source | |||||
Can You Sign Up to the App Anonymously | |||||
Company Collects Customer Data | |||||
Company Jurisdiction | |||||
Company's General Stance on Customer Privacy | |||||
Cryptographic Primitives | |||||
Does the App Allow Local Authentication When Opening It | |||||
Does the Company Log Timestamps/IP Addresses | |||||
Funding | |||||
Have There Been Recent Code Audits and Independent Security Analyses | |||||
Implicated in Providing Customer Data to Intelligence Agencies | |||||
Infrastructure Jurisdiction | |||||
Is Encryption Turned On by Default | |||||
Is the Design Well Documented | |||||
Surveillance Capability Built into the App | |||||
Transparency Report Availability | |||||
User Data and/or Metadata Sent to Parent Company and/or Third Parties |