Author: markus

  • Is Vietnam a good country for VPNs?

    Is Vietnam a good country for VPNs?

    Vietnam’s PPI rating is considered “Below Average,” which indicates that it might not be the most suitable location for a VPN server. The country has a history of internet censorship and has taken measures to control and monitor online content, particularly content related to politics, national security, and social order. Moreover, Vietnam has been known to enforce strict copyright and intellectual property laws, which can negatively impact P2P file sharing and streaming services. Data privacy is also a concern, as the government has the authority to request and access user information from ISPs and other online service providers, which could compromise the privacy of VPN users.

    Given Vietnam’s “Below Average” PPI rating and the concerns outlined above, it is not an ideal location for a VPN server. As an alternative, nearby Singapore is a better option, as it holds an “Above Average” PPI rating. Although Singapore does have data retention laws, they are not as strict as those in Vietnam. Furthermore, Singapore’s copyright laws are more lenient when it comes to P2P file sharing and streaming services. In addition to its more favorable privacy environment, Singapore boasts a well-developed IT infrastructure, which translates to lower latency and a more stable connection for VPN users. In conclusion, Singapore is a more balanced choice for hosting a VPN server when compared to Vietnam.

    VPN servers in Vietnam:

    Related Posts

  • Is Mongolia a good country for VPNs?

    Is Mongolia a good country for VPNs?

    1. Freedom of Expression and Censorship

    2. P2P and Torrenting Policies

    3. Government Surveillance and Data Retention Laws

    4. Privacy Protections

    Mongolia’s PPI rating falls into the “Average” category, making it an acceptable but not an outstanding choice for a VPN server location. The country does not have mandatory data retention laws, which can be seen as a positive aspect in terms of user privacy. However, Mongolia’s copyright and intellectual property laws are not as lenient as some other countries, which may affect P2P file sharing and streaming services to a certain extent. Additionally, Mongolia has made some efforts to control internet content, especially content that is considered politically sensitive or offensive, which may be of concern to VPN users who prioritize unrestricted access.

    Freedom of Expression and Censorship

    Freedom of expression, despite being constitutionally protected in Mongolia, has seen various challenges. Defamation laws that carry civil and criminal penalties potentially hinder criticism of government officials, and reports of government surveillance raise privacy concerns. Internet access is generally unrestricted, with a wide majority of households connected. However, measures like the 2014 ban on certain words and phrases on local websites, the vaguely defined restrictions on ‘obscene’ and ‘inappropriate’ content, and compulsory IP address visibility on high-traffic sites highlight the complexities of online censorship. The press also faces hurdles, with content restrictions, licensing issues, and journalist harassment reported. Furthermore, recently amended laws concerning the spread of ‘evidently false information’ have provoked apprehensions due to their broad definitions. As such, Mongolia’s journey towards fully realizing freedom of expression and privacy, both online and offline, continues to be a complex endeavor.

    P2P, Torrenting, Streaming

    In the realm of Peer-to-Peer (P2P) networking and torrenting, Mongolia presents an intriguing case study, albeit one that is currently under-documented. Akin to numerous nations worldwide, it can be extrapolated that a portion of Mongolian internet users have adopted these technologies. Yet, Mongolia’s legislative landscape concerning digital copyright infringement, primarily dictated by the Law on Copyright and Related Rights (2006), fails to explicitly tackle the intricacies of digital piracy through P2P and torrenting platforms. This legislative silence has led to a lacuna, obstructing a full understanding of the legal implications and enforcement surrounding these practices in Mongolia.

    Privacy Protections

    The state of government surveillance and data retention in Mongolia has undergone significant transformations, particularly after the passage of the Law on Personal Data Protection (PDPL) by the Parliament of Mongolia on December 17, 2021. Taking effect from May 1, 2022, the PDPL replaced the previous Law on Personal Secrecy (1995) and instituted a far more robust and extensive regulatory framework for personal data in the country. Working in tandem with the Cybersecurity Law (2021), Public Information Transparency Law (2021), and Electronic Signature Law (2021), also enacted on May 1, 2022, the PDPL has created a comprehensive legal framework governing cybersecurity and data privacy protection. It is crucial to note that the PDPL has a broad scope, applying to individuals, legal entities, and even organizations without legal status that are involved in collecting, processing, utilizing, and safeguarding personal data in Mongolia. This marked shift in data regulation and its implications for businesses highlight Mongolia’s efforts to align with contemporary standards of data protection and cyber-security.

    VPN servers in Mongolia:

    Given Mongolia’s “Average” PPI rating and the concerns mentioned above, it may not be the best location for a VPN server. A nearby alternative with a better privacy environment is Singapore, which has an “Above Average” PPI rating. Although Singapore does have data retention laws in place, they are not as strict as those in some other countries. Singapore’s copyright laws are also more relaxed when it comes to P2P file sharing and streaming services. Furthermore, Singapore has a well-developed IT infrastructure, which can provide lower latency and a more stable connection for VPN users. In conclusion, Singapore would be a better choice in the region compared to Mongolia, offering a more balanced environment for hosting a VPN server.

    Related Posts

  • Is Kenya a good country for VPNs?

    Is Kenya a good country for VPNs?

    1. Freedom of Expression and Censorship

    2. P2P and Torrenting Policies

    3. Government Surveillance and Data Retention Laws

    4. Privacy Protections

    Kenya might not be the ideal location for a VPN server due to various factors, including its data privacy laws and the overall outlook on digital rights. The country’s data protection laws are relatively new, with the Data Protection Act enacted in 2019. While the act aims to protect personal data and establish guidelines for data handling, its enforcement has been inconsistent. Additionally, the Kenyan government has been known to engage in online surveillance and censorship, which raises concerns about the privacy and security of data hosted within the country.

    Pros:

    • Constitutional guarantee of freedom of expression
    • No mandatory data retention laws targeting VPN providers
    • Data Protection Act provides rights over personal data
    • Active online community advocating digital rights
    • Government-initiated efforts to improve digital literacy

    Recommended alternative: South Africa

    Cons:

    • Concerns over potential misuse of surveillance for national security
    • Inconsistent enforcement of data privacy regulations
    • Contentious provisions within the Computer Misuse and Cybercrimes Act
    • Periodic internet shutdowns during politically sensitive times
    • Limited public awareness about digital rights and data privacy

    Freedom of Expression and Censorship

    In Kenya, freedom of expression and censorship exist in a delicate balance, particularly in the digital sphere. On one hand, the Kenyan Constitution, in its Bill of Rights, guarantees freedom of expression, including the freedom to seek, receive, or impart information. On the other hand, there have been instances of internet censorship and increased surveillance. For example, the Kenyan government has periodically enacted internet shutdowns during elections and has passed controversial laws like the Computer Misuse and Cybercrimes Act 2018, which critics argue can be used to curb digital rights and freedom of speech. While the country has made strides towards becoming a digital society, ongoing issues regarding freedom of expression, censorship, and surveillance persist. It’s important for Kenyan internet users to stay informed about their digital rights and any potential changes to legislation.

    P2P, Streaming, and Torrenting

    In Kenya, peer-to-peer (P2P) file sharing, streaming, and torrenting are commonly used means of accessing digital content. The legal framework governing these activities is defined by Kenya’s copyright laws, in compliance with international treaties like the World Intellectual Property Organization (WIPO) Copyright Treaty and the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). Engaging in the sharing or downloading of copyrighted material without authorization can lead to legal consequences.

    Major streaming platforms like Netflix and Showmax are available in Kenya, providing legal alternatives to pirated content. However, due to high subscription costs relative to average incomes and inconsistent internet connectivity, pirated content remains widespread.

    Kenya has been proactively combating piracy, implementing measures such as blocking websites that facilitate unauthorized sharing of copyrighted material. The Kenya Copyright Board (KECOBO) is actively involved in monitoring and issuing takedown notices for infringing content. However, enforcement has been inconsistent and piracy remains a significant challenge in the digital landscape. Kenyan users should be aware of the potential legal risks associated with unauthorized P2P sharing and torrenting.

    Government Surveillance and Data Retention Laws

    Balancing individual privacy and national security concerns, Kenya’s government surveillance and data retention laws present a complex picture. Under the Security Laws (Amendment) Act 2014, the Kenyan government can engage in targeted surveillance for national security reasons, but concerns have been raised about the potential for misuse.

    Furthermore, the 2019 Data Protection Act, modeled after the EU’s GDPR, marked a significant step toward enhancing privacy protections. The Act requires organizations to handle personal data responsibly and provides individuals with rights over their personal information.

    However, data retention remains a contentious issue. Internet service providers (ISPs) are obliged to retain certain user data, accessible under specific circumstances like criminal investigations. The duration and extent of this data retention are, however, not explicitly defined, leading to concerns about potential privacy infringements.

    Privacy Protections

    The Kenyan government has been proactive in reinforcing digital privacy, with the introduction of the 2019 Data Protection Act being a significant stride. The Act, inspired by the EU’s GDPR, establishes clear rules for the collection and processing of personal data. It also creates the office of the Data Protection Commissioner to oversee the implementation of these laws.

    In the realm of cybercrime, the government enacted the Computer Misuse and Cybercrimes Act 2018. This law aims to prevent and punish cybercrime, protecting users from threats like hacking and identity theft.

    However, the effectiveness of these protections can sometimes be a matter of debate. While the Data Protection Act is comprehensive on paper, its enforcement has faced challenges. Issues such as lack of public awareness, resource constraints, and the need for clear procedures have been identified as hindrances to full implementation.

    Moreover, certain provisions in the Computer Misuse and Cybercrimes Act have been contested, with critics asserting that they could be used to infringe upon digital rights. So, while steps have been taken to enhance digital privacy in Kenya, the effectiveness of these measures is still under scrutiny and improvement. It’s crucial for users to remain vigilant and well-informed about their rights and changes in the digital laws.

    Conclusion

    For individuals in Kenya who require utmost digital security and privacy, using a VPN (Virtual Private Network) can provide an additional layer of protection. A VPN encrypts your internet connection and masks your online identity, making it much more difficult for third parties to track your activities or access your data. Choosing a VPN server located in a nearby country with strong data protection laws, such as South Africa or even within the European Union, can provide additional reassurances of privacy.

    Further, maintaining an informed understanding of ongoing changes in digital laws, regular usage of updated and reliable security software, practicing good cybersecurity hygiene like strong, unique passwords, and cautious sharing of personal information online can also enhance your digital security.

    Remember, your digital rights and security are as important as your rights in the physical world. Stay informed, stay protected, and ensure your voice is heard in the conversations shaping Kenya’s digital future.

    VPN servers in Kenya:

    Related Posts

  • Is Italy a good country for VPNs?

    Is Italy a good country for VPNs?

    1. Freedom of Expression and Censorship

    2. P2P and Torrenting Policies

    3. Government Surveillance and Data Retention Laws

    4. Privacy Protections

    Italy, despite having merits as a server location, and adhering to the EU’s General Data Protection Regulation (GDPR), still warrants caution due to its “Below Average” rating on the Privacy Protection Index (PPI). The country’s data retention laws under the Legislative Decree No. 109 of 2014 require telecom providers to keep user data for a set period, and its role in the 14 Eyes intelligence alliance implies potential surveillance and data sharing. Recent instances of internet censorship and unregulated website blocking further question Italy’s commitment to privacy and internet freedom. Thus, while Italy offers certain privacy protections, these must be balanced against potential risks before selecting it as a VPN server location.

    Freedom of Expression and Censorship

    Italy’s confrontation with freedom of expression and digital censorship is influenced in part by both regional laws such as the General Data Protection Regulation (GDPR) and national ones like the Italian Data Protection Code. The application of these regulations to tech platforms has stirred debate over potential infringements on free speech. GDPR, although designed to protect personal data, has been cited in cases of content removal or data ‘de-listing’ from platforms, effectively altering the content available for public viewing. Critics argue this type of selective filtering may be exploited, making it an indirect form of censorship.

    An incident involving the social media giant, Facebook, in 2019 is worth noting. The company blocked access to the page of CasaPound, a controversial far-right political group, citing violations of its policy against spreading hate speech. Critics claimed this move to be an instance of corporate overreach, suppressing political discourse. Supporters, however, viewed it as a necessary action to prevent the spreading of harmful ideologies online. The issue sparked a nationwide debate over the power tech companies have over online expression and the potential need for more explicit regulations regarding online speech.

    The Italian legislative system has shown an active interest in regulating the digital sphere. The proposed ‘DDL Intercettazioni’ bill has been another focal point of discussion. The bill, designed to limit the diffusion of false information online, included a clause that would have required online platforms to correct any perceived incorrect news within 48 hours. Critics decried this proposal as an unacceptable infringement on freedom of speech, fearing that such a law could be misused to stifle political dissent. Supporters argued it would protect against the damage caused by misinformation. The bill has been shelved for the time being, but the debates it spurred reveal the critical tensions between freedom of expression and censorship in Italy’s internet and tech culture.

    P2P, Torrenting, Streaming

    Italy has made clear legislative moves that may dissuade individuals from engaging in peer-to-peer (P2P) sharing and torrenting activities. In particular, the Italian Communications Regulatory Authority (AGCOM) implemented Regulation 680/13, which came into effect in March 2014. This regulation granted AGCOM the authority to order internet service providers (ISPs) to block access to websites that are engaged in copyright infringement, without needing a preliminary judicial review.

    Moreover, the infamous case of the Italian ISP Telecom Italia (now TIM) sets a noteworthy precedent. In 2008, the Court of Rome ordered Telecom Italia to block its customers’ access to The Pirate Bay, a popular torrenting site. While it’s true that these measures do aim to protect copyrighted materials, one could argue they infringe on the principles of free internet access, restricting what content users can access. This could potentially open the door to broader censorship, undermining the spirit of online autonomy. In this light, torrenting in Italy can be seen as a risky endeavor due to these legislative and judicial precedents.

    Government Surveillance

    The history of government surveillance in Italy’s media, journalism, and tech industries over the past three decades has been marked by significant events that raised questions about freedom of press, privacy, and the balance between national security and civil liberties. A pivotal case in point is the 2006 Telecom Italia scandal. Telecom Italia’s security department was discovered to have been conducting an unauthorized and widespread wiretapping operation that breached the privacy of thousands of individuals, including journalists, politicians, and businesspeople. The revelations ignited a national outcry about privacy protections and government accountability, casting a long shadow over the Italian telecommunication and technology sectors.

    The ‘Operation Eye of the Sky’ scandal in 2010 further underscored the deep-seated concerns about government surveillance in Italy. During this operation, the Italian Postal and Communications Police allegedly intercepted the electronic communications of Italian journalists who were critical of the government. The interceptions were initially justified as measures for national security and combating organized crime, but the broad scope and targeting of journalists raised concerns about potential misuse of surveillance powers to suppress dissent and control the narrative in the media.

    In recent years, there has been rising concern over the use of sophisticated surveillance tools in Italy. In 2019, the NGO Amnesty International revealed that an Italian company, Hacking Team, had sold surveillance software known as ‘Galileo’ to governments around the world. This software has been used by governments to allegedly spy on journalists, human rights defenders, and opposition politicians, raising severe concerns about the lack of control and legislation over the export of such powerful surveillance tools by Italian tech firms. These incidents highlight the ongoing struggle to balance national security with the protection of civil liberties and the free press in the technology era.

    Privacy Protections

    In response to concerns about digital privacy and to adhere to the European Union’s framework, Italy has implemented stringent laws to protect the digital rights of its citizens. The General Data Protection Regulation (GDPR), which was enforced across the European Union in May 2018, has been an integral part of this legislative shift. Italy’s national legislative decree no. 101/2018 harmonized the existing national Privacy Code with the provisions of the GDPR, thus enhancing the digital privacy rights of individuals. The law puts stricter controls on the handling of personal data by corporations and governments, and imposes heavy fines for non-compliance. This legislation bolstered digital privacy, offering Italian citizens more control over their personal data.

    Moreover, in an effort to protect its citizens from unregulated government surveillance, Italy has reinforced the oversight of intelligence agencies. The “Democratic Oversight of the Security Services Act” (Law No. 124/2007) regulates the activities of intelligence agencies and introduces more robust parliamentary oversight. In the digital sphere, this law necessitates that agencies obtain authorization for any operation that might interfere with individual privacy rights, such as surveillance or data gathering operations. In 2017, Italy also updated its wiretapping laws with a focus on protecting journalistic sources, in response to the earlier criticisms about the misuse of surveillance for political ends. These steps highlight the Italian government’s commitment to strengthening digital privacy and safeguarding citizens’ rights in an increasingly digital world.

    VPN servers in Italy:

    Related Posts

  • Is Argentina a good country for VPNs?

    Is Argentina a good country for VPNs?

    Is a VPN needed in Argentina?

    1. Freedom of Expression and Censorship

    2. P2P and Torrenting Policies

    3. Government Surveillance and Data Retention Laws

    4. Privacy Protections

    Based on our Privacy Protection Index (PPI), Argentina could be rated as “Average.” The country has some privacy protections in place, such as the Personal Data Protection Act (PDPA), which governs the collection, processing, and storage of personal data. Additionally, Argentina does not have mandatory data retention laws for VPN providers, contributing to enhanced privacy for VPN users. However, the country has experienced instances of internet censorship and surveillance in the past, which raises concerns about the overall privacy and security of data within Argentina. These factors position Argentina as a middle-ground choice for VPN server locations, providing a mix of privacy protections and potential risks.

    Freedom of Expression and Censorship

    Argentina’s constitutional protections for freedom of speech are robust, but certain laws, such as those prosecuting insults to public officials or symbols, do exist. However, these are seldom enforced and often face legal challenges.

    The 2010 media law disrupted monopolies and diversified the media scene but faced accusations of being a tool to control dissenting voices. The 2015 cybercrime law raised concerns due to its vague definitions, though it primarily targets serious online threats.

    Isolated incidents of prosecuting individuals for online comments have occurred, but these are exceptions, not norms. Despite potential hurdles, Argentina’s media landscape is dynamic and diverse, demonstrating a generally supportive environment for a variety of perspectives.

    P2P, Streaming, and Torrenting

    Argentina has no specific laws prohibiting or restricting the use of peer-to-peer (P2P) file sharing networks, streaming sites, or torrent platforms. Copyright infringement remains illegal, but downloading copyrighted material for personal use is not subject to criminal penalties. A 2014 Supreme Court ruling affirmed the legality of P2P networks themselves. However, copyright holders have pressured ISPs to block access to major torrent sites like The Pirate Bay, and certain ISPs have complied. Still, proxy sites and VPNs allow users to circumvent most blocking. Streaming unauthorized content is widespread, though a new Audiovisual Communication Services law seeks to regulate streaming platforms in relation to copyright. Overall, while Argentina’s legal framework permits P2P, streaming, and torrenting for personal use, copyright holder pressure has led to partial blocks of some platforms, with users still finding ways around these limitations. The impact of the new streaming law remains to be seen.

    Government Surveillance and Data Retention

    Argentina has comprehensive laws governing surveillance, beginning with Law 25.520 passed in 2001 which established judicial oversight for wiretaps and data access. However, later policies enabled expanded monitoring, including Decree 1563/2004 which authorized wiretapping without judicial review. A 2006 decree mandated that ISPs and telecoms retain user data for 10 years, reduced to 5 years in 2016 (Decree 1108/2016). According to the NGO Access Now, over 300,000 telephone lines are under legal intercept orders annually. A 2020 University of Palermo study ranked Argentina 4th globally in surveillance reach, with over 60 state agencies holding powers.

    Critics argue the surveillance framework violates privacy rights. The Agency for Access to Public Information can monitor communications based on broad national security grounds. In 2021, a $25 million contract with ZTE sparked an outcry over planned facial recognition capabilities. The government continues expanding surveillance, spending over $500 million in 2022 on cyber and satellite capabilities according to media reports. While judicial review is still formally required, oversight bodies face challenges curtailing the numerous agencies now empowered to monitor citizens.

    VPN servers in Argentina:

    Related Posts

  • CyberGhost VPN

    CyberGhost VPN

    CyberGhost VPN was founded in 2011 in Bucharest, Romania, and initially began as a free VPN service. By the following year, it had gathered around 1.7 million users​. In 2017, a notable change occurred when Kape Technologies (then known as Crossrider) acquired CyberGhost VPN. This acquisition brought about concerns among observers due to Crossrider’s background as an ad-tech firm known for concealing spyware within its apps, which seemed to present a conflict of interest given CyberGhost’s focus on privacy. However, these concerns were largely allayed as Crossrider rebranded to Kape Technologies and positioned itself as a “privacy-first digital security software provider.” Following this, Kape Technologies went on to acquire other well-known VPN brands such as ExpressVPN and Private Internet Access, though these continue to operate independently. As of 2023, CyberGhost VPN has grown significantly with around 38 million users, making it one of the more popular VPNs available​.

    The company faced a minor hiccup in 2020 when a breach involving Typeform affected around 120 of its users. However, no evidence has emerged to suggest improper use of subscriber data by Kape, its subsidiaries, or any third parties. Despite past skepticism due to its history, CyberGhost VPN has maintained a strong reputation for privacy, continuing to provide valued services to its global user base​.

    Can I torrent with CyberGhost?

    One of the most popular reasons why people use VPNs is to encrypt their traffic and mask their IP while using P2P or BitTorrent services. CyberGhost even offers P2P servers to enhance your experience. However, right in section 8 of their Terms of Service is this alarming statement:

    We reserve the right to take appropriate measures when CyberGhost Products are being used contrary to these Terms and applicable laws, including cooperating with public or private authorities as provided by law.

    The “terms and applicable laws” are so broad that it essentially means anything illegal based on your local laws, wherever you may be. For DMCA violations generally they will just terminate your account and offer no refund. That being said, intellectual property companies rarely bother to file DMCA complaints for IPs associated with VPNs, especially when that company is registered outside of the United States.

    What services are accessible when connected to CyberGhost?

    ServiceBlocked / Restricted
    Amazon PrimeAccessible for browsing; streaming blocked
    NetflixAccessible for browsing; streaming blocked
    SpotifyAccessible; CAPTCHA during registration
    PandoraAccessible
    YouTube MusicAccessible
    HuluAccessible
    Disney+Accessible; no restrictions
    Google SearchCaptcha
    ChatGPTSome IPs blocked
    YouTubeAccessible

    Data collection

    Like almost every VPN, CyberGhost does collect some maintenance-related data, but it claims to not log your server location choices, your total amount of data transferred nor your connection timestamps. As with any VPN, it’s nearly impossible to independently verify the company’s no-logs claim. Even so, CyberGhost does log certain user hardware data in what is likely a bid to enforce the company’s limit of seven simultaneous connections per account. 

    According to the spokesperson CNET spoke to in August of 2019, CyberGhost does have the ability to help law enforcement by activating a limited user-tracking feature.  

    “The only way to do it is if that user is still in the system and if the law enforcement knows the IP and could provide also a warrant to track that IP,” the spokesperson said. “We can activate a special feature like a logging feature for that IP, but we have that ability to prevent malicious actions when using our service. But only if that user is still active and we have proof of what exactly is wrong, what IP he is using, and so on. So we’ve got to bring that in order to activate that, to be sure we don’t activate it on a regular user. Otherwise, we can not help any law enforcement company.” 

    In 2016, however, CyberGhost was called to the carpet by ProPrivacy when the company was discovered to be quietly requesting potentially dangerous, root-level access to customers’ computers — a function the software hasn’t included for about three years now. The service was also caught logging the unique identifiers of each of its user’s computers. Similarly, other reviewers have also expressed wariness after CyberGhost appeared to remove some threads from its forum which may have detailed a critical 2016 malfunction and potentially revealed log-keeping practices within its free proxy service.

    Speaking of revelations, in March 2019, CyberGhost took a small hit when the customer-survey company it contracted, Typeform, was breached. The company said 120 email addresses and 14 CyberGhost usernames — but no passwords — were included in the two forms involved in the compromised data. 

    The bigger concern for me is that CyberGhost still uses a method of ad-blocking that’s considered at best ineffective and at worst insecure. Most VPNs block ads by filtering out requests from websites identified as suspicious. Not CyberGhost. The company instead uses a method which inspects and modifies — rather than filters out — those requests. The method is twice as risky and only half effective since it only works on sites with an HTTP URL and not those with HTTPS. 

    CNET asked Beyel in June this year about this method of ad-blocking and the criticism it’s received. 

    “We know this is not very effective. That’s why we’re already working on a better solution which is working on the process,” he said. “We need to completely move this kind of technology on the client side because in the browser you can, of course, do that.” 

    In its suite of features, however, CyberGhost does offer an option (enabled by default in its MacOS client) which forces your browser to redirect away from sites not secured by HTTPS. 

    Beyel also said that CyberGhost will be releasing a new suite of privacy modules in the coming weeks which go beyond its VPN to include tools for optimizing your computer and preventing vulnerable apps from affecting your privacy.[2]

    See also:

  • Mozilla VPN

    Mozilla VPN

    When you are using Mozilla VPN, whose servers are you really using? According to my research, Mozilla leases hardware from a few different well known providers such as Datacamp Limited, Tzulo, 31173 Services, and xTom.

    Some people are drawn towards Mozilla VPN because they are already familiar with Mozilla’s Firefox browser and so the name is familiar. Mozilla has a proven track record of advocating for individual privacy and taking great measures to enhance their users’ privacy online. Some, however, do not like to keep all their eggs in one basket as the saying goes so they choose to keep their browser and VPN company separate.

    Mozilla VPN’s server coverage consists of over 400 servers placed in around 40 locations, which isn’t as big as some other competitors but it should be enough for most users. More experienced users will be glad to know that Mozilla VPN uses the same servers as Mullvad, which is another well-known and trusted brand. Mozilla VPN only uses WireGuard protocol, the absolute best for performance and security.

    Network Overview

    P2P is supported and you can even use a multi-hop VPN that allows you to enter from one location and exit from another, which keeps your location even more secure.

    Features include a kill switch that can be set to deploy in the event that the VPN drops out. However, if this advanced-level security isn’t required for all your tasks, split tunneling ensures you can carry on browsing using a standard connection too.

    Be aware that although Mozilla VPN works with up to five devices, they all need to be registered. So, if you’re already at the maximum capacity, you’ll need to deregister one of the devices before you can add another. Some providers, like KeepSolid VPN Unlimited, have similar rules, but most, like ExpressVPN, don’t force you to register a device before you can use it, which makes the process far simpler.

    Pricing is a pretty standard $9.99 for a monthly account which drops to $7.99 for a six month plan, or go for a full year and it’s the equivalent of $4.99 per month. All rather average then. However, you will benefit from a 30-day money-back guarantee with no hidden catches, so you can test the service to see if it fits.