Advertisement
BaSs_HaXoR

TOPSEC PRIVACY VPNs [+webchart]

Apr 4th, 2017
1,185
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 12.08 KB | None | 0 0
  1. #################################################################################
  2. ## https://thatoneprivacysite.net/simple-vpn-comparison-chart/ ##
  3. ################################## TOP PRIVACY ##################################
  4. ## [~VPN~] ##----## [~LOCATION~] ##-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-# ##
  5. ## BolehVPN (Seychelles) ##
  6. ## Doublehop.me (Seychelles) ##
  7. ## BlackVPN (Hong Kong) ##
  8. ################################## MED PRIVACY ##################################
  9. ## [~VPN~] ##----## [~LOCATION~] ##-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-#-# ##
  10. ## AzireVPN (Sweden) ##
  11. ## IVPN (Gibraltar) ##
  12. ## Mullvad (Sweden) ##
  13. ## oVPN.se (Sweden) ##
  14. ## SecureVPN.to (N/a?) ##
  15. #################################################################################
  16. THAT ONE PRIVACY SITE
  17.  
  18. ---------------------------------------------------------------------------------
  19. == VPN Glossary ==
  20. ---------------------------------------------------------------------------------
  21. Jurisdiction
  22. Negative scores are not necessarily reflective of the companies or their polciies, only the countries they’re based in.
  23.  
  24. ---------------------------------------------------------------------------------
  25. Fourteen Eyes Countries:
  26. More information on FEC’s here.
  27. “Owned” means a country/location isn’t a Five-eyes country itself, but is a territory or commonwealth of one.
  28. Second tier “Cooperative” countries are determined by Privacy International
  29.  
  30. ---------------------------------------------------------------------------------
  31. Enemy of the Internet:
  32. Based on Reporters without Borders’, 2014 “Enemies of the Internet” Report.
  33.  
  34. ---------------------------------------------------------------------------------
  35. Logging
  36. These metrics are collected from the official websites and other reuptable sources. This section takes each company at their word. It’s up to the user to decide who is trustworthy.
  37. The term “logging” is referring to LONG TERM storage of this information, and not REAL TIME “monitoring”.
  38. Again – just because a company may not log, this does NOT mean that you can’t be monitored in real time by the service.
  39.  
  40. ---------------------------------------------------------------------------------
  41. Bandwidth Logging
  42. Some services limit the bandwidth of the user. When a company’s privacy policy explicitly states no bandwidth usage logging, you can be more sure they’re serious and don’t have an invisible, unadvertised cap.
  43.  
  44. ---------------------------------------------------------------------------------
  45. Anonymous Payment Method
  46. Service offers at least one payment method that does not require personal information.
  47. “Email” in this field is considered better than a No, since it may or may not be tethered to an individuals identity.
  48. This does NOT count companies that claim that you can just falsify personal info and technically be anonymous. It’s to highlight companies that don’t ask for it in the first place.
  49.  
  50. ---------------------------------------------------------------------------------
  51. Gives back to Privacy Causes
  52. A given service supports (typically by way of donations) organizations and worthy causes important to privacy. Examples could be donations to the EFF, FSF, OSTIF, and other organizations, FOSS audits, etc.
  53.  
  54. ---------------------------------------------------------------------------------
  55. Meets PrivacyTools IO Criteria
  56. Does not log traffic.
  57. Operating outside the USA or other Five Eyes countries.
  58. Has OpenVPN software support.
  59. Accepts Bitcoin, cash, debit cards or cash cards as a payment method.
  60. No personal information is required to create an account. Only username, password and Email.
  61. More info at privacytools.io
  62.  
  63. ---------------------------------------------------------------------------------
  64. Blocks SMTP (Authent.)
  65. A “Some” in this field means that the companies’ support team may be willing to whitelist your E-Mail providers SMTP server upon request. Another possibility is the company supports some workaround method.
  66.  
  67. ---------------------------------------------------------------------------------
  68. Blocks P2P
  69. Services marked as blocking “Some” P2P, usually only blocks it on servers dedicated for streaming. Other possibilities are that P2P user is throttled – or worse banned. The user is responsible for researching further based on their needs.
  70.  
  71. ---------------------------------------------------------------------------------
  72. # of Connections:
  73. A 25 in this field actually indicates no advertised limit for simultaneous connections. (Done this way for conditional formatting purposes only)
  74.  
  75. ---------------------------------------------------------------------------------
  76. Obfuscation:
  77. Sometimes it’s useful to obfuscate the fact that your traffic is generated by a VPN. For example, if your ISP or Network Administrator is blocking certain VPN protocls for some reason. These fields represent different methods of obfuscating VPN traffic so that it’s not as easily detected and blocked.
  78.  
  79. ---------------------------------------------------------------------------------
  80. Speed:
  81. Speed Tests are run in the course of performing reviews (methodology and test setup can be found here). Averages are used for this figure. International speeds are averaged from all international tests run in a given review. A “0.00” in this field does NOT mean no speed, just that there isn’t data to populate the field.
  82.  
  83. ---------------------------------------------------------------------------------
  84. # of Countries:
  85. Note that some companies report physical server locations, and some use tricks to make a server endpoint appear to be in another country when it really isn’t. Note, that in many cases where the number of countries is unusually high, THIS IS THE CASE. Do your own research on a case by case basis if this is an important metric for you.
  86.  
  87. ---------------------------------------------------------------------------------
  88. # of Servers:
  89. Note that some companies report physical server count, and some report virtual server count (to inflate the numbers).
  90. Do your own research on a case by case basis if this is an important metric for you.
  91.  
  92. ---------------------------------------------------------------------------------
  93. Linux Support (Manual):
  94. This field is a “yes” if .ovpn files are available and ready to use in Linux Network Manager, not CLI. If some tweaking is needed, or if the support team of a given service has to specially make and email these, this field will be “partial”. If no files are readily available, this field will be “no”.
  95.  
  96. ---------------------------------------------------------------------------------
  97. # of Persistent Cookies:
  98. Using webcookies.org – persistent cookies
  99.  
  100. ---------------------------------------------------------------------------------
  101. # of External Trackers:
  102. Using webcookies.org – third party cookies
  103.  
  104. ---------------------------------------------------------------------------------
  105. # of Proprietary APIs:
  106. This field is derived from a urlquery scan of each service’s website.
  107. Not all services are of equal concern (or even concern at all). This is a loose indication of how committed to free software a company is.
  108.  
  109. ---------------------------------------------------------------------------------
  110. Server SSL Rating:
  111. Run using Qualys SSL Labs – SSL Server Test Tool
  112.  
  113. ---------------------------------------------------------------------------------
  114. Pricing:
  115. Pricing is based off of normal rates, and doesn’t take into consideration promotions, coupons, or sales.
  116.  
  117. ---------------------------------------------------------------------------------
  118. Refund Window:
  119. Often, payments made by cash or bitcoin CANNOT be refunded. User should research as needed. As this field only allows a numerical value, services that show -1 are indicating a free service.
  120.  
  121. ---------------------------------------------------------------------------------
  122. Contradictory Logging Policies:
  123. This field indicates a company who advertises a zero logs or absolutely no logs policy in their marketing, but upon further inspection do keep logs to some extent.
  124. This does NOT mean that the company in question has provided details about their logging policy in their terms or privacy policies, only that they have not claimed “no logging”, then immediately disproved it.
  125.  
  126. ---------------------------------------------------------------------------------
  127. Falsely Claims Service is 100% Effective:
  128. No security or privacy setup truly offers 100% protection or is a bulletproof solution.
  129. When a company uses hyperbole or otherwise claims 100% effectiveness for anonymity, privacy, security, or generally gives this impression – it misleads potential customers that don’t know better and can harm the user who expects it to be true.
  130. Some claims are more blatant than others, but any claim that could be construed as a surefire way to be anonymous is counted.
  131.  
  132. ---------------------------------------------------------------------------------
  133. Incentivizes Social Media Spam:
  134. These companies offer rewards such as extra data allowances or free service time to users posting about their service on social media. This clogs up research channels and pads the number of likes (and therefore attention) a given service or feature has that it might not otherwise.
  135. This also includes affiliates who post “deals” on behalf of the company to bring in traffic.
  136. This in turn could mislead the honest customer.
  137.  
  138. ---------------------------------------------------------------------------------
  139. Forbids Spam:
  140. Email or comment spam
  141.  
  142. ---------------------------------------------------------------------------------
  143. Ethical Copy:
  144. Companies that expect their affiliates to use ethically acceptable copy (keywords, terms, metatags, descriptions and webdesigns) in their advertising campaigns. Ethically acceptable copy is considered copy that is in no way deceptive, nor imposes upon the trademarks, copyrights or intellectual property of another product, company or entity. Purchasing advertisements on search engines with the names of the represented companies is strictly prohibited.
  145.  
  146. ---------------------------------------------------------------------------------
  147. Requires Full Disclosure:
  148. This includes, but is not limited to, Federal Trade Commission 16 CFR Part 255 (or equivalent): Guides Concerning the Use of Endorsements and Testimonials in Advertising, which requires, among other criteria, that material connections between advertisers and endorsers be disclosed. This means that directories, review/rating sites, blogs and other websites, email or collateral that purport to provide an endorsement or assessment of an advertiser must prominently disclose the fact financial or inkind compensation is provided from the advertiser.
  149.  
  150. ---------------------------------------------------------------------------------
  151. Affiliates:
  152. Affiliates are free agents bound to the terms of the companies they represent and given commissions or incentives to funnel traffic and referrals to the company’s site via affiliate links.
  153. While companies are not directly responsible for their affiliates actions, they have a responsibility to keep affiliates and resellers operating within the terms of their partnership.
  154. Ideally this means not spamming, breaking copyright, and providing full disclosure.
  155.  
  156.  
  157. //side note: (https://thatoneprivacysite.net/vpn-comparison-chart/)
  158. [purevpn]
  159. VPN SERVICE JURISDICTION
  160. Hong Kong
  161. Based In (Country) JURISDICTION Fourteen Eyes?
  162. No
  163. JURISDICTION Enemy of the Internet
  164. No
  165. LOGGING Logs Traffic
  166. No
  167. LOGGING Logs DNS Requests
  168. Yes
  169. LOGGING Logs Timestamps
  170. Yes
  171. LOGGING Logs Bandwidth
  172. No
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement