![]() ![]() I need to trust a VPN provider to act as it claims to act. It’s Still a Trust IssueĪnd at the end of the day, it will always come down to trust. Their ownership structure makes them harder to trust. So while they have good privacy policy writers, I’m not sure I would trust CyberGhost with my data. That’s not really the reputation you’re looking for from a VPN provider that is supposed to help you enhance your privacy (rather than violate it). The issue with CyberGhost is its parent company: Kape Technologies (formerly known as Crossrider).Īs mentioned in the opening paragraphs, Kape Technologies/Crossrider has a history in the AdTech market (not usually a friend of VPNs) and that company has been caught spreading malware (via AdTech) in the past. ![]() However, things aren’t all fine and dandy here. It’s comprehensive, easy to understand and to the point. We have no idea what you do online after you connect to one of our servers, or how much bandwidth you’ve used. They have a dedicated page on their website explaining their no-logging policy: So, What About CyberGhost’s Logging Policy?ĬyberGhost’s no-logging policy is actually quite good – at least on paper. So trust is essential and for a VPN provider to be considered trustworthy, it’s essential that they do not log. While your ISP may no longer be able to explicitly see what you’re doing online (besides connecting to a VPN server), that ability has been handed over to your VPN provider. ![]() Remember that using a VPN doesn’t make you invisible. Without a strong no-logging policy and the technical infrastructure to enable no-logging a privacy feature list is meaningless… What Does No-Logging Mean?Ī robust and trustworthy no-logging policy will commit to not collect the following: The logging policy is so important because, as stated above, it’s the logging policy that enables all of the other privacy benefits provided by VPNs.Ī VPN provider can use as much security marketing lingo as they want, they can use the most secure VPN protocols and trusted ciphers, but if they log your traffic, what have you gained? So make sure you choose a VPN provider that does not log. However, while all these points are important, my point here is that logging your traffic will undermine any gains made from the above. ![]() Make sure you get answers to the above questions before you sign-up for a VPN service. Collected Information at Sign-up: How much personal information do they require for you to sign-up? Is it only an email address or is it more?.Support for Anonymous Payments: Do they accept cash or Bitcoin payments?.Jurisdiction: In which jurisdiction are they based? Are they outside a 14 Eyes jurisdiction? And is it legal to run a no-logging service in that jurisdiction?.Tor Over VPN: Do they support relaying your VPN traffic over the Tor network?.WebRTC Protection: Do they prevent WebRTC leaks?.Ads & Tracker Blocking: Do they support ad and tracker blocking?.DNS Leak Protection: Do they provide DNS leak protection by running their own in-tunnel no-logging DNS servers?.VPN Kill Switch: Do they provide a network kill switch that blocks your traffic in the event of a disconnect in their apps?.Encryption Strength: What are the ciphers and protocols that the VPN provider supports? Are they weak and obsolete? Do they contain any known vulnerabilities?.So what makes a trustworthy VPN provider? A trustworthy VPN provider should be able to answer the following questions: Security Considerations In Assessing VPNs Providers: A VPN provider that doesn’t log your traffic but that, for example, uses compromised ciphers or obsolete protocols won’t be of much help… While a VPN provider’s logging policy is critical in assessing its value, it’s not the only thing to look at. ![]()
0 Comments
Leave a Reply. |