Internet Protocol Security (IPsec) was initially developed by the Internet Engineering Task Force (IETF) for IPv6, which was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation. This standards-based security protocol is also widely used with IPv4 and the Layer 2 Tunneling Protocol. Its design meets most security goals: authentication, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination.
The heart of the security a VPN provides is its encryption keys—the unique secret that all your VPN devices share. If the keys are too short, VPN data is susceptible to brute-force cracking. You can often choose the key length to use in your VPN implementation. The longer you make keys, the harder they are to break, but the trade-off is that longer keys also require more processor power for encryption and might slow packet throughput. The minimum recommended key length now is 64 bits (128 bits, if possible) for the symmetric ciphers that encrypt the data and 2048 bits for public key cryptography such as RSA. Modern desktop computers can often crack 40-bit and shorter keys, such as those that DES uses.
— Windscribe now supports static residential U.S.-based IP addresses and port forwarding. The service has a new ad and tracking blocker called "R.O.B.E.R.T." There's also a new "build-a-plan" pricing scheme that charges you $1 per month per country you want to connect to, with 10GB of data per country included. Unlimited data for all the countries you choose costs another $1 per month.
Based in Gibraltar, Buffered is a relative new name in the marketplace that has quickly started gaining huge fame. Thanks to its remarkable security features, huge list of servers, and responsive customer service. The only area the VPN lacks in is its logging policy, which states that there is some session/connection logging. However, since the provider is based in Holland, there is no possibility of receiving a warrant for providing data records.
CyberGhost is transparent about its company structure, posting photos and bios on its website of everyone from the CEO to the cleaning lady, and privacy fanatics will like that the company is based in Romania rather than the U.S. But CyberGhost's full-service subscription price is among the most expensive month by month — it's far better to just pay for a year at a time.
Fortunately, there are some brave companies that are still trying to stay one step ahead of Netflix’s VPN catchers. Currently, Windscribe Pro is our top choice. The service delivers good speeds on its U.S. servers, and has a very simple approach to Netflix: Just select the “Windflix” connection from the desktop app or browser extension and you’re good to go. Windflix is still technically in beta, but it works well and there’s even a Windflix U.K. option if you’d like to experience Netflix from the other side of the pond.
Thankfully, there's a workaround for this problem. Instead of using the VPN app from the company from which you've purchased a subscription, you can download the standalone OpenVPN app. Open it, and you can enter your subscription information from the VPN company you've decided to work with. The OpenVPN app will then connect to the VPN company's servers using our preferred protocol.
Connecting to a VPN is fairly simple. In Windows, press the Windows key, type VPN, and click the Set up a virtual private network (VPN) connection option. (If you use Windows 8, you’ll have to click the Settings category after searching.) Use the wizard to enter the address and login credentials of the VPN service you want to use. You can then connect to and disconnect from VPNs using the network icon in the system tray – the same one where you manage the Wi-Fi networks you’re connected to.
Computer and software providers work hard to make sure that the devices you buy are safe right out of the box. But they don't provide everything you'll need. Antivirus software, for example, consistently outperforms the built-in protections. In the same vein, VPN software lets you use the web and Wi-Fi with confidence that your information will remain secure. It's critically important and often overlooked.
Server switching is a feature -- offered by most VPN service providers -- that allows you to change what region or country you're going to connect to. Most providers allow you to switch as often as you'd like (although you usually have to disconnect, then change your configuration, and reconnect). This may be useful if you're trying to hide your location, or if you're running into some communications glitches on the server you're currently using.
VPNs also only do so much to anonymize your online activities. If you really want to browse the web anonymously, and access the dark web to boot, you'll want to use Tor. Unlike a VPN, Tor bounces your traffic through several server nodes, making it much harder to trace. It's also managed by a non-profit organization and distributed for free. Some VPN services will even connect to Tor via VPN, for additional security.
With endpoints in 18 countries, Kaspersky Secure Connection can be set up so that it connects automatically, connects to an endpoint in a certain country by default, or seeks to establish a connection whenever you connect to an insecure Wi-Fi hotspot. You don’t, however get an automatic killswitch, so if your VPN connection goes south, you won’t be automatically disconnected.
Another major concern with VPNs is speed. In general, using a VPN is going to increase your latency (or your "ping"), and decrease the speed at which you upload or download data. It's very difficult to say definitively which VPN will have the least impact on your browsing, but extensive testing can give you some idea which service is the fastest VPN.
We like that the company offers a connection kill switch feature and, for those who need it, there's an option to get a dedicated IP address. VyprVPN is a standout in their effort to provide privacy, and thwart censorship. When China began its program of deep packet VPN inspection, Golden Frog's VyperVPN service added scrambled OpenVPN packets to keep the traffic flowing.