Tag: vultr

  • TurboVPN

    TurboVPN

    TurboVPN is a virtual private network (VPN) service that allows users to browse the internet securely and anonymously. However, before investing in this service, it’s important to consider the ownership of TurboVPN.

    TurboVPN is owned and operated by Innovative Connecting Pte. Limited, a Singapore-based company. While the company has been in business since 2016 and offers a variety of VPN services, I approached their brand with a hint of skepticism, given the company’s history in the VPN space.

    While Innovative Connecting Pte. Limited’s mission is to provide secure and private internet access to users worldwide, there have been concerns raised in the past about their privacy policies and data practices. As with many VPN providers, there is no guarantee that your personal data will be kept confidential, and it’s important to do your research and choose a service that takes your privacy seriously.

    At the time of this review, their servers are 41% M247, 17% Digital Ocean, 10% Take2, 7% Choopa, 7% Ghost, and the remaining servers are a mix of Lineode, Hetzner, Oracle, and Datacamp Limited. All in all this is a fairly common spread of providers which almost half being M247, but I was surprised to see a good distrubution of providers for the other 60%.

    Designed to track you

    Any time you decide to use a service or VPN owned and operated by a company from Asia, I would be very cautious. In my testing, after using the app for several minutes I found the following in my DNS logs:

    pangolin16.sgsnssdk.com
    www.wshifen.com
    sdk.iad-01.braze.com
    data.flurry.com
    baidu.com

    app-measurement.com
    cdn.snigelweb.com
    api16-access-sg.pangle.io
    pitaya-task-sg.byteintlapi.com
    alisg-normal-lb.byteoversea.net

    TurboVPN’s free version is indeed ad-supported and comes with some usage limitations, such as a limited number of servers and slower connection speeds. However, its premium version is available for a reasonable price and includes many advanced features, such as dedicated IP addresses and unlimited bandwidth.

    Overall, while TurboVPN may seem like an appealing option for those looking to protect their online privacy, it’s important to always approach VPN providers with a hint of skepticism. Although owned by Innovative Connecting Pte. Limited, TurboVPN claims to prioritize user privacy and data security, but it’s ultimately up to each individual user to decide whether they trust the company’s practices or not.

    Related Posts

  • McAfee VPN

    McAfee VPN

    It’s highly likely that you’re familiar with McAfee if you’re acquainted with any company in the realm of digital security and virus protection. Founded in the United States in 1987, McAfee has gained notoriety primarily for its antivirus software. However, upon discovering that they also offer a VPN service, we felt compelled to put it to the test. Here are our findings.

    We found that McAfee has an extremely poor logging policy. Their VPN service logs information that can be used to personally identify you, including your IP address and the websites you visit. By using McAfee Safe Connect, you’re essentially forfeiting your privacy to McAfee instead of safeguarding it. While it’s true that VPN providers retain logs, they are typically only the minimum necessary to ensure their services run smoothly.

    Infested with tracking scripts

    One thing I always do when testing out app-based VPNs is pay attention to my DNS logs for anything suspicious. One or two pings to home servers is nothing unusual, you do have to connect to your provider’s servers to log in, change account settings, etc. But when I start to see a bunch of advertising domains come up, it makes the company lose any credibility whatsoever. While using their VPN app, I saw the following connections in my DNS logs:

    polargrizzly.com
    lazerpenguin.com
    usbla.net
    usabilla.com
    appsflyer.com
    moengage.com

    Slower speeds

    It’s common knowledge that using a VPN service can often result in a slower internet connection – but I found McAfee’s speeds to be horrendously slow. One of the reasons for this is that VPN providers may have a limited infrastructure that they use to route their customers’ internet traffic through. To save money and reduce infrastructure costs, VPN providers may opt to use a smaller number of servers, which can become overloaded and slow down the overall connection speed. While some VPN providers do invest in larger server networks and higher quality infrastructure, the cost associated with this can make their services more expensive than other options on the market. Clearly McAfee is not one of them.

    Recommended VPNS:

  • Aloha Browser VPN

    Aloha Browser VPN

    The Aloha Browser is one of the up-and-coming new browser apps for mobiles which targets one of the most important aspects of modern browsing — privacy. The Aloha Browser is the only browser (to our knowledge) that comes with a built-in VPN and encrypts user data at all levels. 

    When you are using Aloha VPN Browser, just who’s servers are you really using? According to our research their servers are 38% M247, 16% IPXO, 16% Ghost, 10% CDN77, 7% Server Stadium, 7% Creanova, and 7% ZenLayer.

    Privacy Policy

    Upon reviewing the provided privacy policy for Aloha VPN, several areas of concern or potential anti-privacy practices can be identified. The points highlighted below may have implications on user privacy and security based on the information provided in the policy:

    1. Collection of Non-Personal Information:
      • The policy mentions the collection of standard information typically made available by web browsers. While this is framed as non-personal information, combined data could potentially be used to identify individuals, especially when correlated with other data.
    2. Manual Entry of Personal Information:
      • Manually entered information for accessing certain services, getting in touch with Aloha VPN, or participating in surveys may expose users to privacy risks, especially if the collected information is sensitive in nature.
    3. Information Protection:
      • The policy acknowledges that no method of transmission over the internet or electronic storage is 100% secure. This honest disclosure reflects a potential risk to user data, despite the measures in place to protect personal information.
    4. Use of Collected Information:
      • Personal information is used for a variety of purposes including improving services, marketing, and promotional purposes. This broad usage could be concerning depending on the exact nature and sensitivity of the collected information.
      • Mention of providing personal information to third parties if obligated by law implies a potential privacy risk in legal or governmental scenarios.
    5. Sharing with Service Providers:
      • Sharing personal information with third-party service providers may pose a privacy risk, especially if these third parties have differing privacy practices or less stringent security measures.
    6. Disclosure in Legal and Other Situations:
      • The policy outlines several scenarios where user information might be disclosed, including in response to legal processes, investigative demands, or during significant business transactions like mergers or asset sales. These disclosures could potentially expose users to privacy risks, especially in adversarial legal scenarios or if the acquiring entity has different privacy standards.
    7. Opt-Out Options:
      • While there is mention of opt-out options regarding updates, promotions, or surveys, the extent and ease of these opt-out mechanisms are not detailed, which could potentially affect user control over their data.
    8. Public Sharing of Aggregated Data:
      • The policy mentions sharing aggregated but non-personally identifiable information publicly. However, the effectiveness of the anonymization process and whether the aggregated data could be de-anonymized is not addressed.
    9. Notification of Legal Process:
      • The policy mentions the possibility of notifying users about legal processes compelling disclosure of their information but doesn’t guarantee such notifications. This can potentially leave users unaware of legal actions involving their data.

    The points above highlight some potential areas of concern regarding privacy and security within Aloha VPN’s privacy policy, and users should consider these factors when deciding whether to use this service, especially if they are concerned about maintaining a high level of privacy and security.

    See also:

  • TunnelBear

    TunnelBear

    TunnelBear is a virtual private network (VPN) service that is known for its user-friendly interface and its commitment to privacy and security. The company was founded in 2011 and is headquartered in Toronto, Canada.

    TunnelBear offers a range of VPN services that are designed to protect users’ online privacy and security by encrypting their internet connection and hiding their IP address. The company’s VPN services are available for a variety of devices, including computers, smartphones, and tablets, and are suitable for both personal and business use.

    TunnelBear is known for its easy-to-use VPN software, which is available for a variety of platforms, including Windows, Mac, iOS, and Android. The software is designed to be user-friendly, with a simple interface and clear instructions for connecting to the VPN.

    In addition to its VPN services, TunnelBear is also known for its commitment to privacy and security. The company has a strict no-logs policy, which means that it does not keep any records of users’ online activities. TunnelBear is also independently audited to ensure that it is in compliance with its privacy and security policies.

    Overall, TunnelBear is a well-respected and trusted VPN service that is known for its user-friendly interface and its commitment to privacy and security.