Categories
Mullvad

Mullvad VPN

Evade hackers and trackers

When you connect to the internet with Mullvad, we ensure that the traffic to and from your device is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel.

Keep your privacy

We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device’s activity and location are not linked to you.

Easy to use

Using Mullvad is straightforward and simple – just download and install the app. You won’t need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind.

Learn more: https://mullvad.net

Categories
IVPN

IVPN

We consider the effects of our choices with regarding to running our service. We follow a privacy-first mindset that goes beyond the basics.

Every decision matters: how and what we communicate to new customers, what information we collect and what tools we use to improve our service. We believe in leading by example, and commit to the following:

No personal information

We aim for zero user information collected as defined in our concise privacy policy. We don’t ask for your email address or any other personal information.

No trackers

Trackers by ad companies and social networks monitor your actions and aid in profiling you. You won’t find them on ivpn.net – we are a tracking free provider.

No third-party tools

Tools like Google Analytics collect personally identifiable information. We use software hosted only on IVPN controlled servers to ensure your privacy.

No secrets

IVPN’s ownership, company structure and team is public, so you know who is responsible for protecting your privacy.

No false promises

Some services try to convince everyone to get a VPN and become anonymous online. We don’t advertise benefits that are not attainable by using a VPN.

Openness and accountability

Our applications are open source and available for review on our GitHub page. We commission regular audits to back up our claims.

Learn more: https://www.ivpn.net

Categories
Proton ProtonVPN

ProtonVPN

Secure your internet

ProtonVPN was built with extra security features to make it better at protecting your privacy than an ordinary VPN.

When you use ProtonVPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, ProtonVPN’s advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access websites that might be blocked in your country.

  • Strict no logs policy
  • All apps are open source and audited
  • High-speed connections (up to 10 Gbps)
  • Based in Switzerland
  • 30-day money-back guarantee

Learn more: https://protonvpn.com

Categories
Proton ProtonMail

ProtonMail

End-to-End Encryption

Messages are encrypted and stored on ProtonMail servers at all times. They are also transmitted in encrypted format between our servers and user devices. Messages between ProtonMail users are also transmitted in encrypted form within our secure server network. Because data is encrypted at all steps, the risk of message interception is largely eliminated.

Zero Access to User Data

ProtonMail’s zero access architecture means that your data is encrypted in a way that makes it inaccessible to us. Data is encrypted on the client side using an encryption key that we do not have access to. This means we don’t have the technical ability to decrypt your messages, and as a result, we are unable to hand your data over to third parties. With ProtonMail, privacy isn’t just a promise, it is mathematically ensured. For this reason, we are also unable to do data recovery. If you forget your password, we cannot recover your data.

Open Source Cryptography

We use only secure implementations of AES, RSA, along with OpenPGP. Furthermore, all of the cryptographic libraries we use are open source. By using open source libraries, we can guarantee that the encryption algorithms we are using do not have clandestinely built in back doors. ProtonMail’s open source software has been thoroughly vetted by security experts from around the world to ensure the highest levels of protection.

Learn more: https://protonmail.com

Categories
Whonix

Whonix

What is Whonix?

Whonix is software designed to preserve privacy and anonymity by helping users run applications anonymously. Whonix can be installed on Windows, macOS and Linux. Whonix also comes pre-installed in Qubes (Qubes-Whonix).

How does Whonix work?

To protect a user’s anonymity on the internet, all connections are forced through the Tor network and numerous security mechanisms are deployed.

What are the Advantages of Whonix?

Whonix realistically addresses common attack vectors.

An IP address is a label which is used to identify a computer on the Internet. A simple analogy is an IP address is similar to a car license plate.

Hiding IP addresses is technically difficult for software. There is always a risk of so-called IP leaks, whereby a user mistakenly thinks the IP address is hidden when it is actually not.

Whonix is the best solution to prevent IP leaks because it uses a more solid technical design. IP leak issues that previously applied to other software were not applicable to Whonix in a number of cases.

IP leaks are not the only issue that can break a user’s anonymity. Other threats include time attacks, keystroke deanonymization and data collection techniques. Whonix deploys numerous security mechanisms to mitigate such attacks.

How is Whonix different from a VPN?

Virtual Private Networks (VPNs) know your identity and online activity and can be compelled legally to share this information with authorities under various circumstances.

VPNs are usually faster than Tor, but they are not anonymity networks. VPN administrators can log both where a user is connecting from and the destination website, breaking anonymity in the process. Promises made by VPN operators are meaningless, since they cannot be verified. Tor provides anonymity by design rather than policy, making it impossible for a single point in the network to know both the origin and the destination of a connection. Anonymity by design provides much more security, since trust is removed from the equation.

Whonix isn’t a program like most of your applications. It’s a full operating system that runs inside your current one.

Learn more: https://www.whonix.org