Categories
Mullvad

Mullvad VPN

Evade hackers and trackers

When you connect to the internet with Mullvad, we ensure that the traffic to and from your device is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel.

Keep your privacy

We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device’s activity and location are not linked to you.

Easy to use

Using Mullvad is straightforward and simple – just download and install the app. You won’t need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind.

Learn more: https://mullvad.net

Categories
IVPN

IVPN

We consider the effects of our choices with regarding to running our service. We follow a privacy-first mindset that goes beyond the basics.

Every decision matters: how and what we communicate to new customers, what information we collect and what tools we use to improve our service. We believe in leading by example, and commit to the following:

No personal information

We aim for zero user information collected as defined in our concise privacy policy. We don’t ask for your email address or any other personal information.

No trackers

Trackers by ad companies and social networks monitor your actions and aid in profiling you. You won’t find them on ivpn.net – we are a tracking free provider.

No third-party tools

Tools like Google Analytics collect personally identifiable information. We use software hosted only on IVPN controlled servers to ensure your privacy.

No secrets

IVPN’s ownership, company structure and team is public, so you know who is responsible for protecting your privacy.

No false promises

Some services try to convince everyone to get a VPN and become anonymous online. We don’t advertise benefits that are not attainable by using a VPN.

Openness and accountability

Our applications are open source and available for review on our GitHub page. We commission regular audits to back up our claims.

Learn more: https://www.ivpn.net

Categories
Proton ProtonVPN

ProtonVPN

Secure your internet

ProtonVPN was built with extra security features to make it better at protecting your privacy than an ordinary VPN.

When you use ProtonVPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, ProtonVPN’s advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access websites that might be blocked in your country.

  • Strict no logs policy
  • All apps are open source and audited
  • High-speed connections (up to 10 Gbps)
  • Based in Switzerland
  • 30-day money-back guarantee

Learn more: https://protonvpn.com

Categories
Whonix

Whonix

What is Whonix?

Whonix is software designed to preserve privacy and anonymity by helping users run applications anonymously. Whonix can be installed on Windows, macOS and Linux. Whonix also comes pre-installed in Qubes (Qubes-Whonix).

How does Whonix work?

To protect a user’s anonymity on the internet, all connections are forced through the Tor network and numerous security mechanisms are deployed.

What are the Advantages of Whonix?

Whonix realistically addresses common attack vectors.

An IP address is a label which is used to identify a computer on the Internet. A simple analogy is an IP address is similar to a car license plate.

Hiding IP addresses is technically difficult for software. There is always a risk of so-called IP leaks, whereby a user mistakenly thinks the IP address is hidden when it is actually not.

Whonix is the best solution to prevent IP leaks because it uses a more solid technical design. IP leak issues that previously applied to other software were not applicable to Whonix in a number of cases.

IP leaks are not the only issue that can break a user’s anonymity. Other threats include time attacks, keystroke deanonymization and data collection techniques. Whonix deploys numerous security mechanisms to mitigate such attacks.

How is Whonix different from a VPN?

Virtual Private Networks (VPNs) know your identity and online activity and can be compelled legally to share this information with authorities under various circumstances.

VPNs are usually faster than Tor, but they are not anonymity networks. VPN administrators can log both where a user is connecting from and the destination website, breaking anonymity in the process. Promises made by VPN operators are meaningless, since they cannot be verified. Tor provides anonymity by design rather than policy, making it impossible for a single point in the network to know both the origin and the destination of a connection. Anonymity by design provides much more security, since trust is removed from the equation.

Whonix isn’t a program like most of your applications. It’s a full operating system that runs inside your current one.

Learn more: https://www.whonix.org

Categories
Tor

Tor

Defend yourself against tracking and surveillance. Circumvent censorship

Everyone should be able to explore the internet with privacy. The Tor Project is a 501(c)(3) US nonprofit. They advance human rights and defend your privacy online through free software and open networks.

Block Trackers

Tor Browser isolates each website you visit so third-party trackers and ads can’t follow you. Any cookies automatically clear when you’re done browsing. So will your browsing history.

Defend Against Surveillance

Tor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you’re using Tor.

Resist Fingerprinting

Tor Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.

Multi-Layered Encryption

Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays.

Browse Freely

With Tor Browser, you are free to access sites your home network may have blocked.

Learn more: https://www.torproject.org