When we took at look at your five favorite VPN service providers, we noticed a few things. First, being the “best” is big business for VPN providers, and they’ll fight dirty to be one of them. Second, there are so many VPN providers that it’s difficult to choose a really good one. VPNs are not all created equally, and in this post, we’re going to look at what a VPN is, why you want one, and how to pick the best one for you. Let’s get started.
TorGuard was consistently one of the fastest services we tested. When we averaged three tests performed at different times of the week with Internet Health Test, TorGuard was the fastest service when connecting in the UK and Asia, the second fastest in the US, and the third fastest in Central Europe. OVPN was the next most consistent, but that company’s small network doesn’t have any servers in Asia, and it ranked fifth in the UK. Our top pick, IVPN, was the third most consistently fast after TorGuard and OVPN. However, we tested with each app’s default settings—since we expect most people won’t change them—and TorGuard’s default 128-bit encryption gives it an advantage in speed tests over VPNs that default to 256-bit encryption, as most services do. Still, we think 128-bit encryption is fine for most people who prioritize speed, and TorGuard’s consistency makes it a good value as our budget pick.
VPNs also cloak your computer's actual IP address, hiding it behind the IP address of the VPN server you're connected to. IP addresses are distributed based on location, so you can estimate someone's location simply by looking at their IP address. And while IP addresses may change, it's possible to track someone across the internet by watching where the same IP address appears. Using a VPN makes it harder for advertisers (or spies, or hackers) to track you online.
Norton WiFi Privacy performed very well in our latest round of speed tests. In the UK, we got FTP and HTTP download speeds of around 9.5MB/s (76Mb/s). Using endpoints in the Netherlands, that HTTP speed went up to 10.1MB/s (81Mbit/s). U.S. speeds were also very good, exceeding our non-VPN reference download at 5.8MB/s (46.4Mbit/s) for FTP and 4.8MB/s (38.4Mbit/s) for HTTP downloads.
Supported Client Software	Android, Chrome, Firefox, iOS, Linux, macOS, Windows	Android, Chrome, Firefox, iOS, Linux, macOS, Windows	Android, ChromeOS, iOS, Linux, macOS, Windows	Android, Chrome, iOS, macOS, Opera, Windows	Android, iOS, Linux, macOS, Windows	Android, iOS, Linux, macOS, Windows	Android, iOS, Linux, macOS, Windows	Android, iOS, macOS, Windows	Android, iOS, macOS, Windows	Android, iOS, macOS, Windows

Over the course of four months, we scoured articles, white papers, customer reviews, and forums to compile the pros and cons of VPN services and different VPN protocols and encryption technologies. That One Privacy Site and privacytools.io stood out as two of the most thorough and unbiased sources of information. We interviewed Electronic Frontier Foundation analyst Amul Kalia about government surveillance and VPN efficacy. We also got answers from Joseph Jerome, policy counsel for the Center for Democracy & Technology’s privacy and data project, about how accountable VPN providers are for their policies and terms of service, and how that relates to trustworthiness. Alec Muffett, a security expert and software engineer, also shared his views on the usefulness of VPNs to protect against various threats.
That means fewer options and in some cases no options at all when Australians want to stream a TV show, play a video game, or listen to music. The lack of choice can lead to increased piracy of copyrighted material. In December 2016, a federal court in Australia ordered internet service providers to block BitTorrent tracker sites including ThePirateBay, Torrentz, TorrentHound, IsoHunt and SolarMovie.

VPNs can be either remote-access (connecting a computer to a network) or site-to-site (connecting two networks). In a corporate setting, remote-access VPNs allow employees to access their company's intranet from home or while traveling outside the office, and site-to-site VPNs allow employees in geographically disparate offices to share one cohesive virtual network. A VPN can also be used to interconnect two similar networks over a dissimilar middle network; for example, two IPv6 networks over an IPv4 network.[6]


That said, many VPN providers are based outside the US, which complicates enforcement. Jerome continued: “Users can file complaints in a local jurisdiction, and local data protection laws may have more effective enforcement mechanisms. For example, privacy and confidentiality of communications are fundamental rights in the European Union. Data protection authorities in EU-member states are empowered to handle complaints brought by individuals and then provide users with information about the outcome of any investigation. But it is unclear how effective any of these remedies will be.”

In 2016, a federal court in Australia ordered ISPs to block BitTorrent tracker sites including ThePirateBay, Torrentz, TorrentHound, IsoHunt and SolarMovie. This has proven to be somewhat effective as visits from Australia to these sites have dropped by 53%. This doesn’t take into account VPN users — the sites can still be accessed with any of the VPNs we listed above.
If you’re going to bother with a VPN, you should spend money on a good one—don’t trust a free VPN. Security and privacy cost money, and if you aren’t paying for them, the provider has an incentive to make money from marketers at your privacy’s expense. Though price doesn’t always equal quality, a few dollars a month more for a better experience is worth it for something you’ll use on a regular basis.

Opera VPN works only through the Opera web browser, and it shouldn't be used for sensitive communications. Once very fast, Opera's VPN connections were painfully slow in our most recent tests. The Opera VPN mobile apps, which were full-fledged VPN services that performed decently in our 2017 tests, unfortunately closed up shop at the end of April 2018. There's one good feature, though: Opera VPN streamed Netflix successfully from all of its server locations (there are only three of them), which is more than many paid VPN services can do.
Wi-Fi attacks, on the other hand, are probably far more common than we'd like to believe. While attending the Black Hat convention, researchers saw thousands of devices connecting to a rogue access point. It had been configured to mimic networks that victim's devices had previously connected to, since many devices will automatically reconnect to a known network without checking with the user. That's why we recommend getting a VPN app for your mobile device to protect all your mobile communications. Even if you don't have it on all the time, using a mobile VPN is a smart way to protect your personal information.
This is also a good way to provide support for more than one family member on a single subscription. Generally, there's no good reason for a VPN provider to allow less than two or three connections. If your provider only allows one, find another vendor. We gave extra points in our VPN directory to those vendors who allowed three or more connections.
The service uses Advanced Encryption Standard with a 256-bit key, a common method employed by VPN services. Connections are protected using 2048-bit public key encryption. For privacy, the service offers a malware detection software. What is good about the software is that it can be downloaded and used without providing any personal information. This holds as long as you use the free version of the software and never contact customer support.
Though Proxy.sh meets many of our basic requirements, in our tests the company’s Safejumper application had constant errors when trying to connect. Given that we were looking for a simple, reliable VPN, this was a dealbreaker. We also found a story from 2013 with bizarre statements from the company about monitoring traffic on a specific server due to concerns about unlawful behavior of a user on the network. Though the transparency is impressive, the decision to actively monitor traffic is disconcerting. In a response given to TorrentFreak at the time, the company stated, “The situation also shows that the only solution we have to help law enforcement agencies find problematic use across our network, is to clearly install a logging capacity on it. As a result, we are able to either comply or shut down the servers we have in a particular location (it happened to us in Czech Republic few months ago).”
The only downsides to Private Internet Access are that you can't select your own username — you've got to stick with an assigned random ID — and that you've occasionally got to reinstall a balky driver in Windows. (There's a button to do this.) Selecting Private Internet Access as our VPN service of choice was almost a no-brainer, but because it's based in the U.S., anyone wary of the FBI may want to consider another service.
Some VPN services provide a free trial, so take advantage of it. Make sure you are happy with what you signed up for, and take advantage of money-back guarantees if you're not. This is actually why we also recommend starting out with a short-term subscription—a week or a month—to really make sure you are happy. KeepSolid VPN Unlimited offers a one-week Vacation subscription, for example. Yes, you may get a discount by signing up for a year, but that's more money at stake should you realize the service doesn't meet your performance needs.
Sign up and receive your account information. If you are purchasing a VPN service from a VPN provider, then you may need to pay for your new service. After signing up and paying (or verifying that your employer or university does provide such a service), the provider should give you information that will allow you to access your VPN such as a username, password, and IP or server name. You can use one of the methods below to connect to your VPN.
Hotspot Shield VPN works in most countries, but that doesn’t mean it’s always legal to use a VPN in a specific country. If you have any doubts about the legality of using a VPN in a certain country, always consult a qualified lawyer because laws can change quickly. If you’re still unsure, then it’s best to play it safe and abide by the most conservative guidelines of a country.

Known for its speed, ease of use and native clients, HideIPVPN supports Windows, Mac, iOS and Android platforms. Its Smart DNS service is known to be able to unblock some sites. The service supports a variety of protocols, which include SSTP, OpenVPN, SoftEther, PPTP and L2TP/IPSec. With the service, torrenting is allowed although only on German and Dutch servers, this is due to the fact that it only has seven server locations in North America and Europe.
Security is the main reason why corporations have used VPNs for years. There are increasingly simple methods to intercept data traveling to a network. WiFi spoofing and Firesheep are two easy ways to hack information. A useful analogy is that a firewall protects your data while on the computer and a VPN protects your data on the web. VPNs use advanced encryption protocols and secure tunneling techniques to encapsulate all online data transfers. Most savvy computer users wouldn't dream of connecting to the Internet without a firewall and up-to-date antivirus. Evolving security threats and ever increasing reliance on the Internet make a Virtual Private Network an essential part of well-rounded security. Integrity checks ensure that no data is lost and that the connection has not been hijacked. Since all traffic is protected, VPNs are preferred over proxies.

The first runs in the VPN client app on your computer, so if the VPN connection fails while the VPN client app is running, that VPN client app can turn off the computer or mobile device's internet connection. However, if your VPN connection has failed because the VPN client app itself crashed, then the kill switch may not work, and your IP and data may leak onto the internet.
We've knocked CyberGhost down a peg from last year's standings because the service's network performance wasn't as great this time around in our tests. Yet it has a feature-loaded, user-friendly interface, with convenient buttons in the Windows client software for streaming media, torrenting files, protecting your Wi-Fi transmissions and evading censorship. (The Mac desktop software has fewer features.)
Though Proxy.sh meets many of our basic requirements, in our tests the company’s Safejumper application had constant errors when trying to connect. Given that we were looking for a simple, reliable VPN, this was a dealbreaker. We also found a story from 2013 with bizarre statements from the company about monitoring traffic on a specific server due to concerns about unlawful behavior of a user on the network. Though the transparency is impressive, the decision to actively monitor traffic is disconcerting. In a response given to TorrentFreak at the time, the company stated, “The situation also shows that the only solution we have to help law enforcement agencies find problematic use across our network, is to clearly install a logging capacity on it. As a result, we are able to either comply or shut down the servers we have in a particular location (it happened to us in Czech Republic few months ago).”

With a StrongVPN account, customers have the ability to choose which server location they want, even down to the specific city. This type of personalized, user-friendly service is also seen with their unlimited server switching, as well as the ability to have up to six simultaneous connections on different devices. StrongVPN supports Mac, Windows, iOs, Android, and even multiple routers, which is a huge plus. 
CyberGhost has been around since 2011 and has come out strongly as a supporter of "civil rights, a free society, and an uncensored Internet culture." We really liked how the company specifically showcases, on their Web site, how folks normally prevented from accessing such important services as Facebook and YouTube can bring those services into their lives via a VPN.
×