Though Proxy.sh meets many of our basic requirements, in our tests the company’s Safejumper application had constant errors when trying to connect. Given that we were looking for a simple, reliable VPN, this was a dealbreaker. We also found a story from 2013 with bizarre statements from the company about monitoring traffic on a specific server due to concerns about unlawful behavior of a user on the network. Though the transparency is impressive, the decision to actively monitor traffic is disconcerting. In a response given to TorrentFreak at the time, the company stated, “The situation also shows that the only solution we have to help law enforcement agencies find problematic use across our network, is to clearly install a logging capacity on it. As a result, we are able to either comply or shut down the servers we have in a particular location (it happened to us in Czech Republic few months ago).”
One major limitation of traditional VPNs is that they are point-to-point, and do not tend to support or connect broadcast domains. Therefore, communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported or work exactly as they would on a real LAN. Variants on VPN, such as Virtual Private LAN Service (VPLS), and layer 2 tunneling protocols, are designed to overcome this limitation.[citation needed]
Some users will also want to research a VPN provider’s peer-to-peer (P2P) file-sharing policies. There are VPNs that block torrents. Others turn a blind eye to them, but will sell you out in a heartbeat should you be up to no good. P2P is not our main focus here, but we will note in each review whether a particular provider allows file sharing or not.
Trusting a VPN is a hard choice, but IVPN’s transparency goes a long way toward proving that its customers’ privacy is a priority. Founder and CEO Nick Pestell answered all our questions about the company’s internal security, and even described the tools the company used to limit and track access to secure servers. The top VPN services gave us a variety of answers to these questions, some of which were frustratingly vague. ExpressVPN was the only other company to outline these controls and assure us that these policies were well-documented and not half-practiced.

We summarize the protocols above, and look at them in detail in VPN Encryption: The Complete Guide. Although L2TP/IPsec is fine for most purposes, we only really recommend OpenVPN and IKEv2. OpenVPN is very secure if properly configured. Indeed, Edward Snowden’s documents showed that even the NSA can’t crack well-implemented OpenVPN. It is also supported by almost every provider.  But it is relatively slow. The newer IKEv2 is much faster and is considered secure, but has not been battle-tested in the way that OpenVPN has. It is not as well supported at present, although it is increasingly popular with providers thanks to its speed advantages over OpenVPN.
CyberGhost has been around since 2011 and has come out strongly as a supporter of "civil rights, a free society, and an uncensored Internet culture." We really liked how the company specifically showcases, on their Web site, how folks normally prevented from accessing such important services as Facebook and YouTube can bring those services into their lives via a VPN.
×