You should check out the VPN comparison chart by "That One Privacy Guy" here: <a href="https://thatoneprivacysite.net/" rel="nofollow">https://thatoneprivacysite.net/</a>. There are many factors to consider, such as cipher suite, jurisdiction, and logging.<p>Even then, don't get your hopes up. It should be worth noting that VPNs can give a false sense of security (such as not logging). All they're doing is moving the goalpost from one end of the playing field to another. They're useful for getting into internal networks, and they're useful for bypassing outbound firewalls in restrictive networks, like public schools and libraries, or churches, but that's about it. See <a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29" rel="nofollow">https://gist.github.com/joepie91/5a9909939e6ce7d09e29</a><p>If you want online privacy, you really should be using Tor. if you want anonymity, you should stay offline. Regardless, realize your VPN provider isn't going to go to jail for you.
Streisand (<a href="https://github.com/jlund/streisand" rel="nofollow">https://github.com/jlund/streisand</a>) and a cheap Europe-based Digital Ocean box.
I've always liked <a href="https://mullvad.net/en/" rel="nofollow">https://mullvad.net/en/</a> (Swedish company, around since a number of years), especially from a privacy point of view. You never actually enter any personal information when creating an account - no name, no email, no password, no nothing; all you get is a random unique ID. They also claim to keep no logs, point being, "When Swedish law requires us to divulge information about our customers we make sure not to have that information stored, so that we have nothing to give out."<p>Various means of payment are accepted, including btc, and cash (of any(!) currency) sent by mail. OpenVPN, possible to choose from a number of countries, no limits on speed or data.<p>If there are other commercial VPN services that don't necessarily require you to give them any personal information (for account purposes), I'd be curious to know. Would be nice to have more alternatives.
I use the following OpenVPN docker container on my homeserver: <a href="https://github.com/kylemanna/docker-openvpn" rel="nofollow">https://github.com/kylemanna/docker-openvpn</a><p>I then send all of the logs to Loggly and get notified anytime someone connects to my OpenVPN server.
The old recommendation here used to be privateinternetaccess.com<p>I cancelled my subscription months ago. They stopped circumventing georestrictions a while ago even though it used to be marketed as having that feature. Support even fixed it a few times for me.<p>Nowadays I just use one of the vpn scripts on GitHub and a small vps somewhere.
I use BlackVPN[1], but mostly because they used to have a referral program and I ended up with several years of free service. They tend to be quite quick, have OK (but not exemplary security measures), and offer a nice range of servers for whatever your needs (geofencing, piracy, etc.).<p>[1] <a href="https://www.blackvpn.com/" rel="nofollow">https://www.blackvpn.com/</a>
<a href="https://vpn.ccrypto.org/" rel="nofollow">https://vpn.ccrypto.org/</a><p>It's plain and simple OpenVPN made by nice people, and it's only 3€/month.
TorGuard because they provide nodes in countries where I want to have my endpoint and they allow torrenting. Their technical support actually knows what OpenVPN and Linux/BSD is and they were able to help me with issues I had (unlike other VPN providers).
<a href="https://www.getcloak.com" rel="nofollow">https://www.getcloak.com</a> - works on my Mac and various iOS devices. Well designed, have been with them since the beginning with no issues.
I rolled my own OpenVPN server on digital ocean. I find that having 2 instances running, one over TCP port 443 and one on UDP over an arbitrary port works great in most scenarios.
None. VPNs can't provide any meaningful privacy: <a href="https://gist.github.com/joepie91/5a9909939e6ce7d09e29" rel="nofollow">https://gist.github.com/joepie91/5a9909939e6ce7d09e29</a><p>Okay, that's not entirely true; I do access a company VPN, but not for privacy purposes which is probably what's implied. I use Tor for that.
Witopia - <a href="https://www.witopia.net" rel="nofollow">https://www.witopia.net</a><p>It has a large set of exit points, which is what I use it for (at least until geoblocks die, which it will happen at some point). Being based in Virginia, they're probably an NSA front but I have nothing to hide ;) and at least you know it will work...
For general browsing from different devices I use Freedome by F-Secure. Just because it was convenient to get, works on different platforms (Windows, iOS, Android) and it's cheap. Also their bandwidth has proven enough for my needs on different exit points. The only downside is that now Netflix identifies it as a VPN, so I can't keep watching my series while I'm abroad.<p>For connecting my servers between them (and my laptop) as some sort of secure virtual network I use my own product <a href="https://wormhole.network" rel="nofollow">https://wormhole.network</a> - The servers are all in an overlay private network completely transparent to any application, so I can move servers to different providers, locations, etc and not have to change a single configuration line (nor configure any firewalls).
AirVPN - <a href="https://airvpn.org/" rel="nofollow">https://airvpn.org/</a><p><pre><code> - claims to be "operated by activists and hacktivists"
- uses OpenVPN
- GPLv3 client for many platforms
- accepts Bitcoin (or PayPal, Credit Cards, ...)
- has an API</code></pre>
<a href="https://ipredator.se/" rel="nofollow">https://ipredator.se/</a>
name is weird by was rolled out by pirate bay and quite secure, inactive accounts get deleted with all data and potential history after about a month.
For internet browsing, TunnelBear (via the Chrome plugin - technically a proxy rather than VPN), because it's free and I don't use it often (usually just for testing sites from a different IP address).<p>For my own network, OpenVPN because it's open source.
VPNGate [1] is what I usually use for bypassing georestrictions, and it works quite well for that purpose. The client and server software is based on the open-source SoftEther VPN project [2], and the actual VPN servers are operated by volunteers around the world.<p>I'd hesitate to recommend VPNGate itself for anything that requires real privacy though. However, SoftEther VPN is an excellent choice if you want to set up your own VPN on a box somewhere.<p>[1] <a href="http://www.vpngate.net/en/" rel="nofollow">http://www.vpngate.net/en/</a><p>[2] <a href="http://www.softether.org/" rel="nofollow">http://www.softether.org/</a>
To be perfectly honest, if someone needs to vpn for reasons that could cause real backlash, aka political dissent, the best thing to have is a owned box somewhere and tunnel through it. Add one or more layers, and or a use once discard policy... But the sad fact is thats just about the only way to raise the barrier of entry for a state level (notice I didnt say nation state) actor.<p>Not necessarily condoning illegal activity, just stating things plainly.<p>I'm pretty sure tor is under attack heavily right now, (see ioerror accusations), and I have used it very sparingly. Of course only NSA level actors can comprimise it with enough upstream fiber/exit node taps...<p>You must always know your enemy.
<a href="http://www.frostvpn.com/" rel="nofollow">http://www.frostvpn.com/</a><p>When I signed up they had a 99 cent a month deal going on. I'm not really concerned about privacy. I just needed something to help with the connection to my dedicated server that runs Plex that is hosted with Hetzner.<p>Comcast here has poor peering to Hetzner and using a VPN solved the problem.<p>They have a lot of servers all over the world and they few times I have needed to open a ticket I got a reply in less than a hour.<p>I also have a Droplet on D.O. that can act as a VPN. I switch to that if I am doing anything sensitive.
PureVPN because they have lots of countries to connect to. Albeit some sites using a different geolookup library don't actually recognise them accurately.<p>Reason? My ISP modem basically dies when there's too many connections opened at once. So sometimes an innocent `npm install` would kill my internet for a minute...
As I understand VPN providers make users share single IP. Doesn't it give some extra anonymity? For example if you create your own Droplet someone still can listen for your traffic (but not coming from your PC but from the Droplet) and you are quite easily identifiable (because you are only user).
I used to use privateinternetaccess.com, but various issues with them led me to look for a new VPN provider. I eventually settled on ivpn.net as they have a good selection of exit points, their software is easy to use and I can use it across devices too. Their network speeds have been really good too.
HideIPVPN and Avast SecureLine.<p>I use HideIPVPN for their European servers. And I use Avast on my phone to automatically get on VPN when I am on certain Wifi networks (it does SSID based connections).
I run my own setup with OpenVPN. I have looked at Pritunl[0] for easier management of OpenVPN.<p>[0] <a href="https://pritunl.com/" rel="nofollow">https://pritunl.com/</a>