VPN Recommendation: Difference between revisions

From Irregularpedia
Jump to navigation Jump to search
No edit summary
added more than trational vpn, reference in mediawiki syntax
Tag: 2017 source edit
Line 1: Line 1:
<span id="what-is-a-vpn"></span>
= What is a VPN =
= What is a VPN =


a tool that creates a private network connection across a public network connection, capable of providing privacy (obfuscation) and security (encryption) while on the public network (internet). VPN does not provide anonymity. Instead, The Onion Routing (TOR) is required to achieve anonymity.
A VPN (Virtual Private Network) is a tool that creates a private network connection across a public network, such as the Internet. It provides privacy (obfuscation) and security (encryption) while on the public network but does not guarantee anonymity. To achieve anonymity, The Onion Routing (TOR) is required.
 
Beyond traditional VPNs, there are alternative tools like '''Cloudflare Tunnels''', '''ZeroTier''', '''Tailscale''', and proprietary solutions like '''Apple Private Relay''' and '''Cloudflare WARP'''. These tools offer unique features and integrations that can complement or replace VPNs depending on the use case.
 
<span id="vpn-and-alternatives"></span>
== VPNs and Alternatives ==
 
{| class="wikitable"
|-
! Tool
! Features
! Use Cases
! Notable Integrations
|-
| '''Mullvad VPN'''
| Privacy-focused, no email association, cash payment support.
| Obfuscation, secure browsing.
| Integrates with Tailscale for private routing.<ref name="tailscale-mullvad">[https://tailscale.com/mullvad Mullvad VPN and Tailscale Integration]</ref>
|-
| '''Cloudflare Tunnels'''
| Exposes local services securely via Cloudflare's network.
| Hosting services without public IP, bypassing firewalls.
| Works with Cloudflare Access for zero-trust security.
|-
| '''ZeroTier'''
| Peer-to-peer virtual network with mesh routing.
| IoT devices, gaming, remote access.
| Supports IPv4/IPv6 networks and integrates with network controllers.
|-
| '''Tailscale'''
| Simplifies VPN configuration using WireGuard.
| Secure remote access to private resources.
| Mullvad VPN integration provides enhanced privacy by routing via Mullvad servers.<ref name="tailscale-mullvad" />
|-
| '''TOR'''
| Provides anonymity using layered encryption.
| Accessing the dark web, bypassing censorship.
| Integrates with browsers like Tor Browser.
|-
| '''Cloudflare WARP'''
| Encrypts all DNS queries and some traffic, improving security.
| Lightweight, better for speed and low-latency connections.
| Cannot route all traffic like traditional VPNs.
|-
| '''Apple Private Relay'''
| Masks user IP and DNS requests when using Safari.
| Privacy-focused for general browsing.
| Limited to Apple ecosystem and Safari browser.
|}
 
=== Benefits of Alternatives ===
* '''Cloudflare Tunnels''': Removes the need for exposing your IP by using a reverse proxy over HTTPS.
* '''ZeroTier''': Provides mesh networking, ideal for personal and small business use cases.
* '''Tailscale''': Combines WireGuard's security with ease of use, and with Mullvad integration, ensures privacy by routing traffic through Mullvad's VPN servers.<ref name="tailscale-mullvad" />
* '''Cloudflare WARP''': Lightweight and designed for DNS and basic traffic encryption; better for speed than traditional VPNs.
* '''Apple Private Relay''': Protects Safari users' IP addresses and DNS queries but does not act as a complete VPN.
 
<span id="vpn-vs-wireguard"></span>
== VPN vs WireGuard, Tailscale, and ZeroTier ==
 
{| class="wikitable"
|-
! Feature
! Traditional VPN
! WireGuard
! Tailscale
! ZeroTier
|-
| '''Setup Complexity'''
| Moderate to high; may require manual configuration.
| Easy to moderate; simple setup for many clients.
| Easy; uses your identity provider for access control.
| Moderate; requires understanding of network rules.
|-
| '''Performance'''
| Lower due to older protocols.
| High; lightweight and efficient.
| High; uses WireGuard under the hood.
| High; optimized for P2P routing.
|-
| '''Privacy'''
| Good; depends on provider policies.
| Depends on implementation (e.g., Mullvad uses WireGuard).
| Good; Mullvad integration enhances privacy.<ref name="tailscale-mullvad" />
| Decentralized, privacy depends on configuration.
|-
| '''Flexibility'''
| Routes all internet traffic.
| Routes specific traffic as configured.
| Simplifies remote access to private resources.
| Allows custom virtual networks.
|-
| '''Use Case'''
| General-purpose secure browsing.
| Optimized for speed and secure connections.
| Simplifies secure remote access and sharing.
| Custom networks for IoT, gaming, or remote access.
|}


<span id="privacy-policy-comparison"></span>
<span id="privacy-policy-comparison"></span>
=== Privacy Policy Comparison ===
== Privacy Policy Comparison ==


As of 20230319
As of 2023-03-19:


{| class="wikitable"
{| class="wikitable"
Line 16: Line 112:
! [https://protonvpn.com/privacy-policy Proton VPN]
! [https://protonvpn.com/privacy-policy Proton VPN]
! [https://my.nordaccount.com/legal/privacy-policy/ Nord Security]
! [https://my.nordaccount.com/legal/privacy-policy/ Nord Security]
!
|-
|-
| Personal Data
| '''Personal Data'''
| Payment info, support/problem report info.
| Payment info, support/problem report info.
| Account, payment, usage, crash logs, device perms.
| Account, payment, usage, crash logs, device permissions.
| Account creation, support/bug reports, etc.
| Account creation, support/bug reports.
| User-provided data, automatic data, third-party.
| User-provided data, automatic data, third-party data.
|
|-
|-
| Data Retention
| '''Data Retention'''
| 40 days - statutory period, six months for support.
| 40 days - statutory period, six months for support.
| 90 days (mostly); accounting unlinked; logs/perms as needed
| 90 days (mostly); accounting unlinked; logs as needed.
| Retained for active accounts, deleted when closed.
| Retained for active accounts; deleted when closed.
| Varies by data type.
| Varies by data type.
|
|-
|-
| Third-Parties
| '''Third-Parties'''
| E-mail service providers, payment suppliers.
| E-mail service providers, payment suppliers.
| Braintree, PayPal
| Braintree, PayPal.
| Referrer platforms, routing technology.
| Referrer platforms, routing technology.
| Payment processors, support, analytics, marketing.
| Payment processors, support, analytics, marketing.
|
|-
| Transfer to Third Country
| No, data stored in EU/EEA.
| None (EU Data Protection Directive compliant)
| No, data stored in Switzerland.
| Yes, with appropriate safeguards from Panama.
|
|-
| Individual Rights
| Correction, deletion, limitation, complaint.
| Access, rectification, erasure, revoke permissions
| Access, edit, delete, export, complaint.
| Access, rectification, erasure, etc.
|
|-
| Contact
| Route de la Galaise 32, 1228 Plan-les-Ouates, Geneva, Switzerland.
|
|-
| Policy Updates
| Yes, updates are published on the website.
| Posted on the website, emailed to customers
| Yes, notification of changes for enabled users.
| Yes, updates communicated on website.
|
|-
|-
| Cash
| '''$/Device/Month'''
| Yes
| Yes
| Yes
| No
|
|-
| $/Device/Month
| $1
| $1
| $1.42
| $1.42
| $1
| $1
| $2.4
| $2.4
|
|}
|}


<span id="recommended-vpn"></span>
<span id="vpn-security-mechanisms"></span>
== Recommended VPN ==
 
Here are our top picks for VPNs that prioritize privacy and security:
 
<ul>
<li><span id="mullvadvpn"></span>
=== [https://mullvad.net/en/ MullvadVPN] ===
 
MullvadVPN is a privacy-focused VPN service with the following features:
<ul>
<li>No email association</li>
<li>No-logging policy and encrypted traffic</li>
<li>Transparent privacy policy</li>
<li>Legally proven privacy record</li>
<li>Accepts multiple payment options, including cash or crypto</li>
<li>Works with OpenVPN config files for obfuscation and router client</li>
<li>(14 eyes Jurisdiction)</li>
<li>MOST trouble using services or getting flagged</li>
<li>[[o54hon2e2vj6c7m3aqqu6uyece65by3vgoxxhlqlsvkmacw6a7m7kiad.onion|TOR .onion]]</li></ul>
</li>
<li><span id="ivpn"></span>
=== [https://ivpn.net iVPN] ===
 
iVPN is a reliable and privacy-focused VPN service that offers the following features:
<ul>
<li>No-logging policy and encrypted traffic</li>
<li>Transparent privacy policy</li>
<li>Supports multiple protocols, including OpenVPN, WireGuard, and L2TP/IPSec</li>
<li>Wide range of servers in over 50 countries</li>
<li>Accepts multiple payment options, including cash or crypto</li>
<li>Dedicated IP address available for an additional fee</li>
<li>Offers a 7-day money-back guarantee</li>
<li>Works with OpenVPN config files for obfuscation and router client</li></ul>
</li>
<li><span id="protonvpn"></span>
=== [https://protonvpn.com ProtonVPN] ===
 
ProtonVPN is another great option with a free tier available that does not require a billing address or phone number. It has the following features:
<ul>
<li>Legally proven privacy record</li>
<li>Combined with [https://protonmail.com ProtonMail]</li>
<li>Free Tier does not always work with the ProtonVPN App, use pre-browsing checks.</li>
<li>Works with OpenVPN config files for obfuscation and router client</li></ul>
</li>
<li><span id="nordvpn"></span>
=== NordVPN ===
 
NordVPN is the most popular VPN with the following features:
<ul>
<li>Proprietary Nordlynx instead of wireguard makes this much more difficult or impossible to configure with many devices and routers</li></ul>
</li></ul><span id="vpn-security-mechanisms"></span>
== VPN Security Mechanisms ==
== VPN Security Mechanisms ==


The section discusses the VPN security mechanisms and highlights a potentially sketchy VPN provider - KAPE Technologies. KAPE Technologies, formerly Crossrider, is operated by Teddy Sagi and Koby Menachemi, associated with Unit 8200 of the Israel Defense Forces (IDF), the Israeli equivalent of the NSA or GCHQ. KAPE Technologies has made several acquisitions in the VPN industry, including: - CyberGhost VPN - Zenmate VPN - Private Internet Access (PIA) - ExpressVPN. - SurfShark
Some VPN providers, particularly those owned by KAPE Technologies, may pose risks to user privacy. KAPE Technologies owns:
* CyberGhost VPN
* Zenmate VPN
* Private Internet Access (PIA)
* ExpressVPN
* SurfShark


While VPN providers are expected to enhance online security and privacy, KAPE Technologies’ history and acquisitions raise red flags. For instance, CyberGhost VPN was purchased by KAPE Technologies for $10 million in 2017 and Private Internet Access for $127 million in 2019, raising concerns about their privacy policies and data collection practices. In 2021, KAPE Technologies purchased ExpressVPN for $936 million, which could indicate the value of customer data to the company.
KAPE Technologies has a controversial history linked to Unit 8200 of the Israel Defense Forces (IDF). Concerns include:
* Acquiring VPN services like CyberGhost and PIA.
* Potentially undermining user privacy through questionable data practices.<ref name="kape-cyberghost">[https://www.crunchbase.com/acquisition/crossrider-acquires-cyberghost-srl--6d40ffd8 Crossrider Acquires CyberGhost SRL]</ref><ref name="kape-review">[https://restoreprivacy.com/kape-technologies-owns-expressvpn-cyberghost-pia-zenmate-vpn-review-sites/ KAPE Technologies Owns ExpressVPN, CyberGhost, PIA, & Zenmate VPN Review Sites]</ref>


Users should exercise caution when selecting a VPN provider and thoroughly research the provider’s ownership, history, and privacy policies. In most situations, STAY Clear of these VPNs. Choosing a VPN with a proven track record of transparency and privacy policies is critical in safeguarding online privacy and security.
Users should carefully evaluate VPN providers' transparency and privacy policies before choosing a service.


<span id="references"></span>
<span id="references"></span>
=== References: ===
== References ==
 
<references />
'' [https://www.crunchbase.com/acquisition/crossrider-acquires-cyberghost-srl--6d40ffd8 Crossrider acquires CyberGhost SRL for $10M]
'' [https://www.cnet.com/tech/services-and-software/what-is-kape-technologies-what-you-need-to-know-about-the-parent-company-of-cyberghost-vpn/ What is Kape Technologies? What you need to know about the parent company of CyberGhost VPN]
'' [https://restoreprivacy.com/kape-technologies-owns-expressvpn-cyberghost-pia-zenmate-vpn-review-sites/ Kape Technologies Owns ExpressVPN, CyberGhost, PIA, &amp; Zenmate VPN Review Sites]
'' [https://www.bloomberg.com/news/articles/2021-09-13/kape-technologies-agrees-to-buy-expressvpn-for-936-million Kape Technologies Agrees to Buy ExpressVPN for $936 Million]
* [https://www.cnet.com/tech/services-and-software/nordvpn-and-surfshark-are-merging-continuing-vpn-consolidation-trend/ NordVPN and Surfshark are merging]

Revision as of 14:42, 22 November 2024

What is a VPN

A VPN (Virtual Private Network) is a tool that creates a private network connection across a public network, such as the Internet. It provides privacy (obfuscation) and security (encryption) while on the public network but does not guarantee anonymity. To achieve anonymity, The Onion Routing (TOR) is required.

Beyond traditional VPNs, there are alternative tools like Cloudflare Tunnels, ZeroTier, Tailscale, and proprietary solutions like Apple Private Relay and Cloudflare WARP. These tools offer unique features and integrations that can complement or replace VPNs depending on the use case.

VPNs and Alternatives

Tool Features Use Cases Notable Integrations
Mullvad VPN Privacy-focused, no email association, cash payment support. Obfuscation, secure browsing. Integrates with Tailscale for private routing.[1]
Cloudflare Tunnels Exposes local services securely via Cloudflare's network. Hosting services without public IP, bypassing firewalls. Works with Cloudflare Access for zero-trust security.
ZeroTier Peer-to-peer virtual network with mesh routing. IoT devices, gaming, remote access. Supports IPv4/IPv6 networks and integrates with network controllers.
Tailscale Simplifies VPN configuration using WireGuard. Secure remote access to private resources. Mullvad VPN integration provides enhanced privacy by routing via Mullvad servers.[1]
TOR Provides anonymity using layered encryption. Accessing the dark web, bypassing censorship. Integrates with browsers like Tor Browser.
Cloudflare WARP Encrypts all DNS queries and some traffic, improving security. Lightweight, better for speed and low-latency connections. Cannot route all traffic like traditional VPNs.
Apple Private Relay Masks user IP and DNS requests when using Safari. Privacy-focused for general browsing. Limited to Apple ecosystem and Safari browser.

Benefits of Alternatives

  • Cloudflare Tunnels: Removes the need for exposing your IP by using a reverse proxy over HTTPS.
  • ZeroTier: Provides mesh networking, ideal for personal and small business use cases.
  • Tailscale: Combines WireGuard's security with ease of use, and with Mullvad integration, ensures privacy by routing traffic through Mullvad's VPN servers.[1]
  • Cloudflare WARP: Lightweight and designed for DNS and basic traffic encryption; better for speed than traditional VPNs.
  • Apple Private Relay: Protects Safari users' IP addresses and DNS queries but does not act as a complete VPN.

VPN vs WireGuard, Tailscale, and ZeroTier

Feature Traditional VPN WireGuard Tailscale ZeroTier
Setup Complexity Moderate to high; may require manual configuration. Easy to moderate; simple setup for many clients. Easy; uses your identity provider for access control. Moderate; requires understanding of network rules.
Performance Lower due to older protocols. High; lightweight and efficient. High; uses WireGuard under the hood. High; optimized for P2P routing.
Privacy Good; depends on provider policies. Depends on implementation (e.g., Mullvad uses WireGuard). Good; Mullvad integration enhances privacy.[1] Decentralized, privacy depends on configuration.
Flexibility Routes all internet traffic. Routes specific traffic as configured. Simplifies remote access to private resources. Allows custom virtual networks.
Use Case General-purpose secure browsing. Optimized for speed and secure connections. Simplifies secure remote access and sharing. Custom networks for IoT, gaming, or remote access.

Privacy Policy Comparison

As of 2023-03-19:

Attribute from Privacy Policy Mullvad VPN IVPN Proton VPN Nord Security
Personal Data Payment info, support/problem report info. Account, payment, usage, crash logs, device permissions. Account creation, support/bug reports. User-provided data, automatic data, third-party data.
Data Retention 40 days - statutory period, six months for support. 90 days (mostly); accounting unlinked; logs as needed. Retained for active accounts; deleted when closed. Varies by data type.
Third-Parties E-mail service providers, payment suppliers. Braintree, PayPal. Referrer platforms, routing technology. Payment processors, support, analytics, marketing.
$/Device/Month $1 $1.42 $1 $2.4

VPN Security Mechanisms

Some VPN providers, particularly those owned by KAPE Technologies, may pose risks to user privacy. KAPE Technologies owns:

  • CyberGhost VPN
  • Zenmate VPN
  • Private Internet Access (PIA)
  • ExpressVPN
  • SurfShark

KAPE Technologies has a controversial history linked to Unit 8200 of the Israel Defense Forces (IDF). Concerns include:

  • Acquiring VPN services like CyberGhost and PIA.
  • Potentially undermining user privacy through questionable data practices.[2][3]

Users should carefully evaluate VPN providers' transparency and privacy policies before choosing a service.

References