For local VPN issues, you have a couple of options. First, consider installing VPN software on your router and not using a VPN on your local machines. Alternatively, many VPN services offer browser plug-ins that only encrypt your browser traffic. That's not ideal from a security perspective, but it's useful when all you need to secure is your browser information.
We used to advise people to do banking and other important business over their cellular connection when using a mobile device, since it is generally safer than connecting with a public Wi-Fi network. But even that isn't always a safe bet. Researchers have demonstrated how a portable cell tower, such as a femtocell, can be used for malicious ends. The attack hinges on jamming the LTE and 3G bands, which are secured with strong encryption, and forcing devices to connect with a phony tower over the less-secure 2G band. Because the attacker controls the fake tower, he can carry out a man-in-the-middle attack and see all the data passing over the cellular connection. Admittedly, this is an exotic attack, but it's far from impossible.
Some combination of the above. Odds are, even if you’re not one of these people more often than not, you’re some mix of them depending on what you’re doing. In all of these cases, a VPN service can be helpful, whether it’s just a matter of protecting yourself when you’re out and about, whether you handle sensitive data for your job and don’t want to get fired, or you’re just covering your own ass from the MPAA.
Supported Client Software Android, Chrome, Firefox, iOS, Linux, macOS, Windows Android, Chrome, Firefox, iOS, Linux, macOS, Windows Android, ChromeOS, iOS, Linux, macOS, Windows Android, Chrome, iOS, macOS, Opera, Windows Android, iOS, Linux, macOS, Windows Android, iOS, Linux, macOS, Windows Android, iOS, Linux, macOS, Windows Android, iOS, macOS, Windows Android, iOS, macOS, Windows Android, iOS, macOS, Windows
IPVanish can be run on any computer and mobile devices. It is capable of simultaneously using different types of connections. Paying with Bitcoin gives users additional security features as cryptocurrency cannot be tracked unlike government currency. This is because information required when paying with bitcoin are but an email address and a password.
In 2011, a LulzSec hacker was arrested for his involvement with an attack on the Sony Pictures website. Cody Kretsinger used HideMyAss VPN to conceal his identity, but the company complied with a court order to hand over evidence that led to his arrest. This occurred in spite of the company’s pledge not to keep any logs of user activity. HMA says it does not log the contents of its users’ internet traffic, but it does keep detailed metadata logs that include users’ real IP addresses, which was enough to charge Kretsinger with a crime.
We like that the company offers a connection kill switch feature and, for those who need it, there's an option to get a dedicated IP address. VyprVPN is a standout in their effort to provide privacy, and thwart censorship. When China began its program of deep packet VPN inspection, Golden Frog's VyperVPN service added scrambled OpenVPN packets to keep the traffic flowing.