Compare secure VPNs: anonymity & privacy with VPN!

VPN for anonymity and privacy

We have highlighted the following criteria, which are important for maximum anonymity but are rarely considered or described.

However, this comparison is not complete for reasons of clarity! We have currently compiled more than 170 VPN providers in our internal database, each according to more than 120 different criteria. Just ask us about the details of a VPN service you are missing here. Or read our VPN provider reviews.


Best VPNs for Anonymity & Privacy

AnbieterBewertungBeschreibungDatenschutzPreisLinks

Perfect Privacy VPN

Perfect Privacy ist ein schweizer VPN-Anbieter Seit mehr als 10 Jahren wird Perfect-Privacy angeboten und dabei besonderen Wert auf die Geheimhaltung und Wahrung der Identität des Benutzers gelegt. Es...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 8.96 EUR
pro Monat
unlimitiert gleichzeitige
Verbindungen möglich

OVPN

OVPN ist in der Branche ein sehr bekannter Anbieter. Mit dem Unternehmensstandort (Firma: OVPN Integrietet AB) in Schweden zeichnet sich dieser Anbieter durch technisch einwandfreie und fortschrittliche Datensicherheit aus....
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 4.99 EUR
pro Monat
4 gleichzeitige
Verbindungen möglich

hide.me VPN

Hide.me VPN ist ein Anbieter aus Malaysia, welcher einen kostenlosen, jedoch eingeschränkten, Zugang bietet. Filesharing und TV-Streaming sind in guter Qualität möglich. Die Bedienung ist einfach, die VPN Zugangssoftware...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 3.85 EUR
pro Monat
10 gleichzeitige
Verbindungen möglich

Atlas VPN

AtlasVPN Test 2022 – Billigster VPN Dienst im Markt und trotzdem sicher? Der Anbieter AtlasVPN ist ein sehr neuer Dienst am Markt. Der Service wurde im Januar 2020 gegründet...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 1.81 EUR
pro Monat
unlimitiert gleichzeitige
Verbindungen möglich

ProtonVPN

ProtonVPN ist der VPN Service des häufiger bekannten ProtonMail Services aus der Schweiz. Es ist der zweite Service des Betreibers, der bekannt wurde für ProtonMail. In unserem Test begleiten...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 4 EUR
pro Monat
10 gleichzeitige
Verbindungen möglich

PrivadoVPN

PrivadoVPN Test 2022 – Besser für Torrent, Wireguard Testphase und wenig Neues für Streaming. Als Streaming- und Filesharing-Fan habe ich mir den Schweizer Service PrivadoVPN angesehen. Der Service soll...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 2.50 USD
pro Monat
10 gleichzeitige
Verbindungen möglich

Surfshark VPN

Surfshark VPN Test: Unsere aktuellen Erfahrungen mit Surfshark Surfshark ist ein neuer Service aus den BV.Islands, welcher mit einfacher Bedienung punkten will. Der VPN-Anbieter eignet sich gut für TV-Streaming...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 2.26 EUR
pro Monat
unlimitiert gleichzeitige
Verbindungen möglich

NordVPN

NordVPN Test - Unsere Erfahrungen und alle Vor- und Nachteile. NordVPN wird betrieben von der Firma Tefinkom co S.A. die in Panama ihren Hauptsitz hat und seit 2010 im...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 2.89 EUR
pro Monat
6 gleichzeitige
Verbindungen möglich

CyberGhost VPN

CyberGhost VPN ist ein rumänischer VPN-Anbieter, welcher zu dem Unternehmen KAPE Technologies gehört. Die technische Umsetzung erfolgt dabei über die CyberGhost s.r.o in Rumänien. Der Datenschutz der Kunden ist...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 1.89 EUR
pro Monat
7 gleichzeitige
Verbindungen möglich

Shellfire VPN

Der deutsche Anbieter Shellfire VPN wurde vor allem wegen einer Crowdfunding Kampagne bekannt bei der er die Entwicklung einer einfachen kleinen WLAN Box zur Verbindung mit dem eigenen...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 3.47 EUR
pro Monat
5 gleichzeitige
Verbindungen möglich

vpn.ac

VPN.ac ist ein rumänischer VPN-Service, welcher einen wirklich akzeptablen Preis und VPN-Server in den wichtigsten Ländern verspricht. Dabei ist die Bedienung kinderleicht und die Server sind zumeist nur sehr...
  • Keine Logfiles
  • KillSwitch
  • Eigene DNS
  • Dedicated Server
  • VPN-zu-TOR
  • Eigene Hardware

ab 3.75 USD
pro Monat
6 gleichzeitige
Verbindungen möglich

Explanation of the descriptions for the VPN comparison:

The restriction to only two characteristics: “no log files” and “maximum anonymity” is not at all useful for comparison. Therefore, we have compared relevant criteria that have a direct influence on the privacy of the user.

Logfile storage & logging of servers and infrastructure

Not all log files are negative, because in the ongoing operation of servers and infrastructure it is sometimes helpful to ensure the performance and security of the infrastructure by simply logging errors. Some VPN providers, therefore, log these. Other providers, of course, go further and also store user activities. In our comparison, we do not go into how long this data is stored because of the simplicity of the presentation.

Important NOTE: Many VPN providers state on their websites that they do not create log files! However, as soon as the provider offers limited tariffs (e.g. use 1, 3 or 5 devices at the same time) it is technically not possible to implement these WITHOUT saving log files. The providers therefore simply exaggerate or lie on the websites, and promise the user things that are not technically feasible, so there is always a certain amount of mistrust to be developed.

How do authorities go about it?

When authorities enquire, they never ask: “What did the user do?” but this circumstance is usually known!

They ask: Who used a certain IP address at a certain time. If the provider has the log-in data (real IP address, log-in time, assigned IP address), then he can also provide this information.

Therefore, a “waiver of log files of the users’ activities” is not at all a criterion for non-disclosure by the provider. The authorities only need the login data and the real IP address of the user to investigate a person.


The location of the company = legal framework

The location of the VPN provider has a direct influence on the legislation to which it is subject. In the “Fourteen Eyes States” as well as in all other NATO states, local laws provide that extensive cooperation with intelligence services among themselves can result in data being mutually siphoned off and exploited. It is often overlooked that this overrides the very local regulations that protect their citizens, even if politicians do not admit this publicly.

Panama is considered a “safe haven” in terms of access to companies and their data. There are no obligations for companies to grant access to foreign services and confidentiality obligations to clients are also possible.
Switzerland is considered a good location for protecting companies’ data. In Switzerland, foreign intelligence services do not have access, criminal prosecution can only be achieved by decision of the local courts, this is done based on Swiss law. Clients are informed of this in the event of an official enquiry and have a right of appeal.
Seychelles is considered offshore and it can be assumed that, as in Panama, no third party intelligence services can have direct access to company data. There is no obligation to provide information in response to official requests from abroad and these are therefore not usually made at all.
The USA is considered completely insecure vis-à-vis companies that want to protect the privacy of users, as there are obligations of confidentiality regarding access by government authorities to user data as well as the obligation to cooperate fully in the sense of the “Patriot Act”.
The UK is considered completely insecure for the protection of data from authorities. In the UK, the laws do not go much further and not only allow surveillance of foreign persons but even people in their own country can also be monitored without restrictions. Companies based in the UK must disclose all data and also actively assist the authorities in surveillance activities.
Hong Kong has no extradition treaties with Western countries and local laws also prohibit cooperation with all foreign institutions, making it a very popular location for protecting users’ privacy and personal data.
The British Virgin Islands are a British colony with partial British influence on their legislation. Companies based there primarily have advantages in tax matters, but protection against access by intelligence services is not given under British law.
Gibraltar is a British colony that on the one hand offers tax advantages, but no real protection against access by British secret services. Access by foreign authorities are excluded, but not access by British courts and authorities. Cooperation with the USA in this area also harms the protection of user data.


Warrant Canary – The passive guarantee declaration for users

A “Warrant Canary” is a guarantee declaration that a VPN provider publishes and which also has an effect if the provider is forced by an authority to “keep quiet” towards its customers.

Usually, these declarations are published transparently on the internet and renewed regularly. If a publication is delayed, users can assume that the provider can no longer “independently” guarantee the security of users.

Examples of continuously updated “warrant canaries”:


TOR connection, an important component of anonymisation

TOR is a very secure concept and network to avoid “activity analysis” and “profiling” by companies as well as authorities. TOR has some vulnerabilities in the area of user anonymisation, which has become known in recent months.

A VPN to TOR connection, therefore, helps to effectively circumvent these and thus achieve a higher degree of security when using the so-called “darknet”. To make it really secure, one connects via VPN to a TOR gateway. However, only a few VPN services can currently offer this. The thought simplest option of connecting to a VPN server and then creating the TOR access yourself via it is fraught with considerable security problems, so only direct TOR access provided by the VPN service can achieve this.


Multi-hop VPN, the obstacle to traceability

When it comes to avoiding internationally operating organisations and services, one must also think about the effect that total monitoring of a VPN server (incoming and outgoing data) will have on traceability to the user. In this respect, the only way to protect against this is to connect one after the other (cascade) via several VPN servers.

The consequence of this is that even this theoretically possible, technical total monitoring of the servers would only provide the last connections to another VPN server. Protection against tracing back to the user’s source IP address is thus made massively more difficult or even impossible. Only a few VPN providers have the technical resources available to use their VPN servers both to connect to the user and to actively connect to further servers.

From a technical point of view, this means a multiplication of the necessary server capacities and also of the required bandwidths and is of course also reflected in the price of these services.

Special description – NeuroRouting™

Neurorouting™ von Perfect-Privacy
Neurorouting™ von Perfect-Privacy

The Perfect-Privacy VPN provider has a function that allows dynamic cascades (routes) to be created and used depending on the destination address on the Internet. This means that the data always takes a different route through the highly secured Perfect-Privacy VPN network, depending on the destination address, and thus only has to cover a short distance outside of secured connections via the Internet. The changing source servers also make tracking and other modern monitoring methods much more difficult.

With NeuroRouting™, unrivalled anonymity and security of the users are achieved, which cannot be achieved with any other measure.


Server: Logfiles & Logging by Server Hosting Providers

Servers rented from VPN providers are mostly operated in “virtual and cloud-based server clusters”. Even though this of course dramatically reduces the costs of the individual servers, and the VPN services themselves only want to do minimal logging, these “virtual servers” are logged intensively by the hosting companies. This is also regulated in the corresponding rental contracts and is primarily for technical reasons.

However, the fact that authorities can simply request this data from these server operators makes them a considerable risk to privacy protection. At the same time, the VPN providers themselves are not even informed about access to these log files. This has happened to some providers considered very secure in the past year in the Netherlands, Germany as well as France.

The VPN service can only protect itself from this by having its own hardware and using its own switches/routers at the installation site. Of course, this is much more cost-intensive (hardware purchase, the technician who puts it into operation, etc.) and therefore practically only 5-10% of all VPN services from our test reports have their own servers in operation.

Perfect-Privacy RAM Disk Server
RAM Disk Server

“RAM disk” instead of hard disks

Some providers additionally protect the data of the servers by not using hard disks or storage facilities of the servers, but run the entire operating system of the servers directly in the “temporary memory” of the servers. This means that, firstly, no-log files can be stored anywhere and, secondly, a takeover/seizure of individual servers would not lead to any evaluable result.

As an example, we would like to explain that in case of a power loss of the server, of course, all current data of the running operation are immediately and irretrievably lost. Providers who use this technology simply cannot pass on any data to third parties and any direct access by third parties is therefore impossible.


DNS servers can store your activities

DNS mit Protokollierung!
DNS with protokolling!

DNS servers are used to translate domains (www.url.com) into IP addresses. In the process, the user’s browser sends a request for the target IP address to registered DNS services every time a page is called up.

This data can be easily recorded and results in a complete activity log of the user.

For this reason, some VPN providers offer their own DNS services, which do not keep records and thus decisively limit the possible monitoring measures.

How many devices can you use with just one account? And what does that have to do with log files?

These feature restrictions in the tariffs ALWAYS mean that users must also be logged. It is not possible to recognise the login of a user with one device but not to remember this to prevent the user from connecting to more than the purchased devices at the same time.

So any provider who talks about “not storing log files” must not have any limits in their tariffs! Otherwise, they are simply lying. But some providers have no restrictions on simultaneous access. Of course, it also has an advantage if you can provide the whole family with just one VPN account. Today, a household can quickly have 5 or more devices that can use a VPN connection.


Erstellt am: 22. April 2022

Leave a Comment