Simon is a recognized world expert in VPNs. He's tested hundreds of VPN services and his research has featured on the BBC, The New York Times, CNet and more. Read full bio
A VPN, or virtual private network, is a simple service that creates a secure connection between your device and the internet. A good VPN will encrypt your web traffic, hide your IP address, and protect your privacy and security online.
With data theft and internet censorship on the rise globally, more and more people are using a VPN to protect themselves. A VPN allows you to hide from online surveillance, stay safe on public WiFi networks, and access region-restricted websites.
Unfortunately, not every VPN is trustworthy or effective. You need to ensure the service you use does not leak your IP address, log your data, or put you at risk in any way. Using a bad VPN is often worse than using no VPN at all.
Short for virtual private network, a VPN is a privacy tool that secures your internet connection in order to protect your privacy, anonymity, and freedom online.
The technology was initially invented by Microsoft engineer Gurdeep Singh-Pall in 1996 when he created the first VPN protocol, Point-to-Point Tunneling (PPTP). Singh-Pall’s original idea was to create a service that “allowed people to work effectively and securely from home”.
“PPTP was designed so that wherever you were, whatever program you were using on your computer, you would be able to use it just as if you were sitting on your computer at work.” – Gurdeep Singh-Pall, 2010
VPNs are now used for much more than just remote working. Almost a third of internet users worldwide now use a VPN to secure a whole host of online activities, such as streaming, torrenting, and internet shopping. But what is a VPN and what does it do?
Simply put, a VPN performs two main functions:
Encrypts the data that travels to and from your device
VPN services use encryption to generate a secure tunnel between your device (e.g. smartphone or laptop) and a remote VPN server. Your data travels through this tunnel and is then forwarded onto your requested website or application.
The encrypted tunnel prevents internet service providers (ISPs), governments, and attackers from spying on your online activity. Any third party trying to monitor your connection will see nothing more than a sequence of unintelligible letters and numbers.
Hides your IP address and masks it with the IP address of a VPN server
An IP (Internet Protocol) address is the unique identifying number given to every individual internet connection. Your physical location and everything you do online is linked to it.
With a VPN, you can hide your IP address from the websites you visit. Instead of seeing your true IP address, websites see the IP address of the VPN server that your connection is being routed through.
By masking your IP address, you can keep your physical location hidden as you browse the web. This helps to prevent advertisers from tracking and targeting you, and governments from surveilling you.
Using a VPN also lets you spoof your location. VPN providers offer servers located all around the world. The server location you connect to determines where websites and applications perceive your physical location to be.
Screenshot of CyberGhost server locations in the Windows app.
You can trick websites into thinking you’re browsing, streaming, or torrenting from a particular city or country by selecting a server based in that location. This can be useful when it comes to bypassing internet censorship or unblocking geo-restricted content, such as another country’s Netflix library.
A VPN improves your privacy, security, and anonymity by encrypting your internet traffic, routing it through a secure tunnel, and masking your true IP address.
The next section will briefly summarize our results from years of testing and reviewing VPN products. Alternatively, you can skip to our section on why you need a VPN or learn about how they actually work.
The Best VPN Providers of 2020
Our expert reviewers regularly test over 70 VPN services on criteria such as speed, security, privacy, streaming ability, torrenting performance, customer support, and bypassing censorship.
The three best-performing VPNs in August 2020 are:
ExpressVPN is currently the best VPN money can buy. It’s very fast, uses highly-secure AES-256 encryption and OpenVPN protocol, and is excellent for streaming, torrenting and bypassing censorship.
ExpressVPN is one of the more expensive VPNs we’ve tested, but it has a verified no-logging policy and is based in a privacy haven (British Virgin islands) so you know you can trust it with your data. The service offers 3,000+ servers in 94 countries around the world, and its apps are user-friendly and compatible with all major devices and platforms.
Very close behind ExpressVPN is NordVPN. NordVPN delivers industry-leading safety, privacy and speed for budget-friendly price. The VPN lets users watch US Netflix from anywhere in the world and permits P2P traffic on much of its huge 5,500+ server network.
NordVPN isn’t the best VPN to use in China and it recently suffered a security breach that shook many people’s trust in the service. However, we firmly believe that NordVPN has reacted strongly and is now one of the most secure VPNs on the market.
It now offers a suite of excellent security features, including Double VPN, split tunneling and DNS leak protection. The VPN even comes with an ad blocker and anti-malware protection as part of its CyberSec security tool.
CyberGhost is a very good all-round VPN. For the cheap price of $2.75 per month, CyberGhost lets you unblock US Netflix, BBC iPlayer, Disney+ and most other streaming platforms. It delivers fast connection speeds and protects your data using the strongest encryption protocols.
Like NordVPN, you won’t be able to use CyberGhost in China. But the service supports safe torrenting, has very easy-to-use apps, and even offers a generous 45-day money-back guarantee so you can try the service out for yourself completely free of charge.
Best VPN by Category
Each user differs in terms of what exactly they’re looking for from a VPN. There may be a particular VPN service that is optimal for you based on the devices you own, the amount you’re willing to spend, and what you plan on using it for.
Here is a quick overview of our VPN recommendations in a range of categories:
A VPN allows you to protect your privacy, browse safely on public WiFi, access blocked content, and hide your online activity from onlookers. This graph lists the most common reasons people give for using a VPN:
Here are the five most important reasons why you need a VPN.
1. Avoid Global Mass Surveillance
Without a VPN, your Internet Service Provider (ISP) can see all of the websites you visit and will almost certainly be recording that information.
In some countries, authorities pressure ISPs to collect and store user data for long periods of time. Governments can then access that information whenever they like. This is the case in the US, UK, Australia, and much of Europe.
Often, these countries are also members of secret, international intelligence-sharing alliances, known as Five Eyes, Nine Eyes, and Fourteen Eyes. The Snowden revelations showed that the countries in these alliances work together to collect mass surveillance data and share it among themselves.
With a VPN, your internet traffic is encrypted as it travels from your device to the private server. This makes it much harder for governments, intelligence agencies, and ISPs to spy on your online activity. Unless they know how to decrypt it, the data they collect on you will be very difficult to interpret.
National authorities around the world censor online activity by preventing citizens from accessing certain websites. A 2019 Freedom House report found that global internet freedom had declined for the ninth consecutive year.
Using a VPN can help citizens (and tourists) evade censorship in order to access global media and communicate freely. For journalists, activists, and whistleblowers, VPNs are a vital resource for safely speaking out against governments that limit freedom of speech and freedom of the press.
By encrypting your traffic and masking your IP address, a good VPN will hide your true identity and true location from censorship systems like the Great Firewall of China. You can then bypass website blocks and access content that is censored in your region.
For more information on government censorship, the Committee to Protect Journalists (CPJ) has a safety kit for journalists that provides guidance on issues like risk assessment and digital security.
Exploiting public WiFi networks to gather data is simple and incredibly cheap. Criminals can take advantage of open and unencrypted networks to steal important data like your bank details, credit cards, photos, and other personal information.
When you use the public WiFi connection in a café, hotel, or airport you are putting your sensitive data at risk.
Hackers are increasingly targeting hotels and shopping malls in pursuit of high-value targets. A recent Bloomberg report explains how some criminals check in to hotels with the explicit goal of stealing valuable data.
This is made easier with tools like the popular ‘WiFi Pineapple‘ which gives almost anyone the ability to take advantage of public networks for under $99.
To protect yourself, you should be using a VPN. It will encrypt your internet traffic and make it much, much harder for hackers to intercept and steal your data.
Similarly, unprotected WiFi networks at home are also a risk. With much of the world in lockdown due to COVID-19, and many people working from home, criminals may turn their attention toward vulnerable home networks — a practice known as wardriving.
This can be annoying if you’re traveling or want to stream something that is only available overseas.
That’s where a VPN comes in.
Streaming services use your IP address to determine your physical location. With a VPN, your true IP address is masked by a VPN server in a location of your choosing. If you select a server in India, the streaming site will think you are located in India.
Using a VPN is therefore the only reliable way to bypass geographical restrictions and unlock ‘hidden’ content from overseas. Unfortunately, not all VPNs work effectively for streaming. To find one that is suitable, skip to our streaming section below.
5. Stop ISP Throttling and Torrent Securely
Your ISP almost certainly monitors your online activity. If you live in a country without strong net neutrality laws, your ISP can even deliberately slow down your connection. This is called bandwidth throttling.
Typically, ISPs will throttle your connection when you perform bandwidth-heavy activities like downloading a large file or torrenting. But ISPs have also been accused of throttling connection speeds to further their own business interests, as in one instance involving the Santa Clara County Fire Department.
VPN encryption can stop ISPs from throttling your connection because it prevents them from seeing what you’re doing. Without access to your activity, it’s harder for them to know when to slow down your connection. This means you can enjoy the best speeds for downloading, torrenting, gaming, and streaming.
It also means you can torrent more securely. Torrenting without a VPN can be risky: not only is your IP address visible to peers, but your ISP can also see that you are accessing torrenting sites and apps, too.
We don’t condone downloading copyrighted material – if you’re partaking in legal filesharing using a VPN is essential to keep your P2P activities private. To find out which services we recommend for torrenting, read our dedicated best VPNs for torrenting guide.
How Does a VPN Work?
A VPN works by creating an encrypted internet connection between your device and a private server. This means your data is protected from your ISP and any other third parties that try to view it. They might see that data is being transferred, but not what the data is.
The private server then sends your traffic onto the website or service you want to access, making the request look like it came from the VPN server’s location and not your device’s location.
Once you have chosen and connected to a safe VPN server, the service works in the following way:
The VPN software on your device looks up the IP address of your chosen VPN server and initiates a connection.
Your device and the server exchange data, such as your login credentials, and use encryption technologies in order to establish a secure VPN tunnel.
Your internet traffic is sent through the encrypted tunnel to the VPN server.
The server decrypts your traffic and forwards it onto your desired website or service.
When the website sends information back to your device, it is again routed via the VPN server. At the server it is encrypted, sent through the VPN tunnel, and decrypted by the software on your device.
How the VPN tunnel is constructed and how secure it is depends on the type of encryption being used.
Encryption is the process of turning a string of plain-text data into an unintelligible code, so that only individuals with the correct decryption ‘key’ can understand it. Strong and up-to-date VPN encryption is essential to shield your data from onlookers and improve online privacy, anonymity, and freedom.
A VPN is only as secure as the encryption it uses
Two fundamental features of VPN encryption are VPN protocols and encryption ciphers. We’ll cover these in the next sections. However, for a more detailed explanation, you can read our beginner’s guide to VPN encryption where we cover additional encryption features like handshakes, hash authentications, and perfect forward secrecy.
VPN Encryption Protocols
VPN protocols are the set of rules and processes that a VPN client follows in order to establish a secure connection between your device and the VPN server. The VPN protocol determines how your secure tunnel is actually formed.
Depending on the protocol in use, a VPN might have different speeds, capabilities, or even vulnerabilities. Most service providers will let you choose which protocol you’d like to use.
There are several VPN protocols available, but not all of them are safe to use. We recommend using a service with OpenVPN whenever possible.
The most common VPN protocols are:
OpenVPN: This is our preferred VPN protocol. It’s open-source, very secure, and compatible with almost all VPN-capable devices. OpenVPN has been well-tested and is the best available option. You should use OpenVPN where available.
IKEv2/IPsec: Used alongside IPsec, IKEv2 is a newer, closed-source VPN protocol. It is very secure, very quick, and handles network changes with ease. This makes it the ideal protocol for mobile devices which constantly switch between WiFi and mobile data.
WireGuard: The newest VPN protocol to date, WireGuard is being heralded as potentially the new benchmark. It aims to be fast, secure, and more easily implemented than other protocols by using far fewer lines of code. While it is still early days for WireGuard, it now forms the basis of NordVPN’s new NordLynx protocol and is being supported by an increasing number of VPN providers.
SoftEther: SoftEther is another relatively new VPN protocol. It delivers very fast connection speeds and good security. Unfortunately, it’s held back by some default configuration vulnerabilities and is only compatible with a small number of providers.
L2TP/IPsec: This protocol is fairly outdated and comes with a couple of security flaws. There have been some suggestions that the protocol has been compromised by the NSA.
SSTP: SSTP is another closed-source VPN protocol. It’s Microsoft-owned and based on SSL 3.0, which is vulnerable to a specific MITM attack called Poodle. It hasn’t been confirmed whether SSTP is affected by this attack, but we don’t think it’s worth the risk.
A cipher is an algorithm that encrypts and decrypts data. While a VPN protocol creates the VPN tunnel, a cipher is what encrypts your data before it flows through the tunnel.
When talking about encryption, we usually refer to a mixture of cipher type and key length. Generally speaking, the shorter the key length the less secure the encryption is. For example, AES-128 is a less secure cipher than AES-256.
AES-256 is the current gold standard for VPN encryption protocols. AES is the cipher, and 256 is the key length
As is the case with VPN protocols, there are several different ciphers available to providers. Here are the most popular ciphers used in VPN software today:
Advanced Encryption Standard (AES): AES is the VPN industry’s leading cipher. It provides ‘military-grade’ encryption and is used by the US government for confidential data. You’ll commonly find two key lengths: AES-128 and AES-256. Both are considered to be extremely secure.
Blowfish: Blowfish used to be the default cipher used in OpenVPN, but it has largely been replaced by AES now. Blowfish isn’t as secure as AES, and is vulnerable to ‘birthday attacks’.
Remember that the right VPN for one person may not be the right VPN for you.
If you’re looking to travel to China, for example, you will need a VPN with strong encryption and advanced features like obfuscation. If you’re concerned primarily with streaming or torrenting, you’ll want one with fast speeds and reliable access.
In this chapter, we’ll walk through each of the above questions one-by-one so that you can learn how to choose the best VPN for you.
A high-quality VPN service will typically cost around $10 per month if you pay on a monthly basis. But this can drop considerably if you’re happy to pay up front. FastestVPN, for instance, can cost as little as $0.83 per month if you sign up for a five-year plan.
VPN subscriptions vary in price considerably, and a service’s cost doesn’t necessarily match its level of quality. You shouldn’t need to spend beyond your means to get a good-quality service.
There’s also the option of free VPNs. These can be appealing but be aware that while they won’t cost you any money, you’ll often end up paying for a free VPN with your privacy and security.
Not only could they put you at risk, but free VPNs also tend to be quite limited in the service they provide. You’ll need to look out for:
VPNs are illegal in Belarus, Iraq, North Korea, and Turkmenistan.
VPN use is heavily restricted in China, Russia, Iran, Turkey, Oman, and the United Arab Emirates (UAE).
In every other country around the world using a VPN is perfectly legal, including in the US, UK, Australia, and Canada.
It’s important to note, however, that illegal activity is still illegal whether you’re using a VPN or not.
How Safe Is the VPN?
Unfortunately, not all VPNs are safe to use. Many popular services are poorly-made, unreliable, and even dangerous.
An unsafe VPN can:
Log your browsing activity
Share your data with authorities
Fail to encrypt your traffic
Leak your identifying information
Infect your device with malware
Track your activity
To determine whether a particular VPN service is safe to use, there are a number of important topics to consider and questions to ask:
1Logging Policy: Does the VPN Keep Logs?
When you use a VPN you are trusting the provider with all of your internet traffic — that includes your IP address, all of the websites you visit, the messages you send, and all of your personal data.
If you find that the VPN records your personal IP address or any activity data, avoid it at all costs.
The best VPNs have a zero-logs policy, meaning they don’t log:
In our recent investigation into 90 of the most popular VPN services’ logging policies, we found that a shocking 26% log your originating IP address.
For details of this investigation, as well as more information about logging policies, what to look out for, and which VPNs to avoid, check out our guide to VPN logging policies.
2VPN Jurisdiction: Where Is the VPN Based?
Where a VPN company is based — otherwise known as its jurisdiction — can have a huge impact on the privacy of your personal data.
Certain countries are more likely than others to force VPN companies to log private information or censor content.
Intelligence agencies in the Five Eyes, Nine Eyes, and 14 Eyes countries have the power to compel organisations to store user information, which they then share among themselves.
These logging requests may also be accompanied by a gag order which makes it illegal for the provider to publicly disclose what they’re being compelled to do. In terms of privacy, these countries are the worst places to base a VPN company.
Heavily-censored countries, like China, Russia or Turkey, are also unsafe jurisdictions for a VPN. These countries are more inclined to force service providers to log or censor user activity.
Ideally, a VPN should be based in a country with strong privacy and net neutrality laws. The jurisdiction should have no ties to international surveillance regimes and no history of prosecuting citizens based on the contents of their browsing history.
Some of the best VPN jurisdictions include the British Virgin Islands, Cayman Islands, Panama, and Seychelles.
If you want to learn more about Five Eyes countries, VPN jurisdictions, and which providers to avoid, read our dedicated guide to VPN jurisdictions.
3Encryption Strength: How Good Is the VPN’s Technical Security?
A good VPN service needs to offer the latest and most secure levels of encryption in order to protect its users’ privacy and security. If a provider isn’t willing to disclose what encryption the software uses, then it’s not a safe VPN.
We recommend looking out for OpenVPN as it is the safest VPN protocol around. If a VPN only offers PPTP then don’t use it.
For encryption strength, you shouldn’t accept anything less than AES-256. It is the industry gold standard and is widely used by VPN providers.
4IP, DNS & WebRTC Leaks: Does the VPN Leak Your Data?
Low-quality VPN services can leak your personal information to third parties without you even knowing. This could include your location, your IP address, the websites you visit, and more.
Needless to say, it’s unsafe to use a VPN that leaks your personal data. Even if the provider has a zero-logs policy, anyone viewing your connection will be able to see your identity or activity — making the VPN useless as a privacy tool.
There are four types of leak to be aware of:
IP Leaks: This happens when your VPN fails to mask your IP address with one of its own. This is a significant privacy risk; your ISP and any websites you visit will be able to link your online activity to your true identity.
DNS Leaks: A VPN is supposed to route your DNS requests to its own DNS servers. If instead it routes your DNS requests outside of the encrypted VPN tunnel, it’s called a DNS leak. This exposes your browsing activity and any websites you’ve visited to your ISP or any other eavesdroppers.
WebRTC Leaks: WebRTC is a browser-based technology that allows audio and video communications to work inside web pages. WebRTC has clever ways of discovering your true IP address even if a VPN is on. The best VPNs block WebRTC requests. Alternatively, you can disable WebRTC completely at the browser level.
IPv6 Leaks: IPv6 is a new format of IP addresses, but not many VPNs currently support it. Unless VPNs support or actively block IPv6, your personal IPv6 address can be exposed. This is called an IPv6 leak.
Our comprehensive guide to VPN leaks will teach you more about the different types of leak, how to test for a VPN leak yourself, and which leaky VPNs you should avoid.
5Malware and Tracking: Does the VPN Contain Malware or Tracking Tools?
Some of the most popular VPN services on the market are infected with malware that can do irreversible harm to your device.
Malware — short for ‘malicious software’ — is code designed to damage a computer or server and steal data from it. Attackers use malware to:
Hack into your online accounts
Steal your money
Steal any goods you own online
Lock you out of your devices until payment is received
Free VPNs offered by obscure companies are the most common offenders when it comes to hosting malware.
In short, you have to be careful. The popularity of a VPN app in the Apple or Google Play Store does not guarantee its safety.
Instead, a good practice is to look for a VPN provider that has been independently audited, such as TunnelBear or VyprVPN. These services have been thoroughly tested for security vulnerabilities by independent experts, so you can trust that they are safe to use.
To avoid copycat applications you should also always download your VPN software from your chosen provider’s official website or app store page where possible.
Which Devices Does the VPN Support?
Now that you know which VPNs are safe and within your price range, you’ll want to find a service that is compatible with all of the devices you need to protect.
Do you have a Windows or Mac computer? An Android or iPhone? Will you want to use the VPN on specific streaming devices or games consoles?
Not every VPN will work on every device, so it’s important to do your research to find the right VPN for you.
You should also consider how many devices you want to use. The majority of services place a limit on the number of devices that can connect to the VPN simultaneously.
If you want to protect any devices over-and-above this limit, you’ll have to install your VPN at router level. This will encrypt the internet traffic from any devices that connect to it.
How Fast Is the VPN?
Connection speed is always important to consider, especially if you’ll be using the VPN to stream, torrent, or game.
Our VPN Speed Test Tool lets you test how fast a VPN is before you buy. You can compare up to five VPNs to see which one will give you the fastest and the most reliable connection speeds in your location.
How Big Is the VPN Server Network?
Different VPN providers choose to implement their server networks in different ways. A lot of the time this isn’t something you need to worry about, but there are certain aspects of a server network that might be important:
Server Locations: If you’re looking to bypass censorship or access specific region-restricted content, you’ll need to make sure your VPN has servers located in the countries you need. For example, to access US-only news content, you’ll need a VPN with servers in the US.
Number of Servers: VPN providers vary dramatically in how many servers they offer. A larger network size can reduce the amount of server congestion and increase the likelihood of connecting to a server close to your physical location, both of which improve connection speeds.
You should also consider the dangers posed by rented servers and virtual server locations. Our complete guide to VPN servers explores these issues in detail and explains what you can do to protect yourself.
Does the VPN Work with Streaming and Torrenting Services?
If you plan to use your VPN for streaming or torrenting services, you’ll need one that reliably works for each service.
When it comes to streaming, many VPN services are unable to unlock the ‘hidden’ content. And not every VPN that works with Netflix also works with Hulu or BBC iPlayer, for example.
You should consider which streaming sites you’ll want to access and find a VPN that is known to work with those services. If you have a region-specific content library in mind (e.g. Australian Netflix), you should ensure that your VPN unlocks it, as a VPN might unlock some Netflix libraries but not others.
When we review a VPN, we thoroughly test whether it works with multiple Netflix libraries, BBC iPlayer, Disney+, Hulu, HBO, Amazon Prime Video, and many more streaming services. For more, check out our best VPN recommendations for BBC iPlayer, Netflix, and Overall Streaming.
If you’re looking to torrent, you should also be careful about which VPN service you choose. As we mentioned, torrenting without a VPN can be dangerous so you can and should use a VPN if possible.
That said, some service providers don’t permit P2P traffic, while others restrict it to particular servers. The comparison table below gives a quick overview of which VPN services allow torrenting.
If you live in or travel regularly to highly-censored countries that actively block VPN traffic, it is important to choose a service that uses special techniques to bypass the censors.
These special techniques are known as obfuscation tools — or, sometimes, ‘stealth’ protocols. They work to scramble VPN traffic so that it looks like normal HTTPS traffic. This makes it harder for the censorship system to detect.
If a VPN doesn’t come with obfuscation tools it’s unlikely to work in China, and it shouldn’t be your first choice for other high-censorship countries like Iran or the UAE.
A high-quality VPN will offer great speeds, advanced security features, and will never record, share, or sell your personally-identifying data.
Here’s a quick comparison of 15 popular VPNs. Every one of these services uses leading AES-256 encryption, doesn’t leak user data, and is compatible with all the major platforms such as Windows, MacOS, iOS, and Android.
There are lots of different ways to set up a VPN on your device, and the process will differ depending on the type of device in question. By far the easiest and most common method is to download a custom app directly from your chosen service provider.
Most commercial VPNs come with custom apps for Windows, MacOS, Android, and iOS, but some also provide native apps for routers and streaming devices like Amazon Fire TV Stick too.
To install a VPN using a custom app:
Purchase a VPN subscription from your provider’s website and verify your account by email. We’ll use NordVPN as an example.
Download the VPN software from your provider’s website or click through to the Google Play Store or Apple App Store for Android and iOS devices. Click through the installation prompts and agree to the Terms of Service.
Log into the VPN app using your account credentials.
Go into the settings menu and enable the kill switch and leak blocking if available. Select the VPN protocol of your choice. We prefer OpenVPN.
Go back to the app’s main screen and select a VPN server location from the locations list.
Click the connect button. You will now be connected to a VPN server in your chosen location.
It’s important to note that not all VPN services come with custom apps for every device. However, you may still be able to use your VPN on a different device if it supports manual configuration.
Manual configuration can be a complicated process, but if you follow the instructions provided on the provider’s website you shouldn’t have a problem.
Most devices have integrated VPN support, which means that all you need to do is upload the VPN service’s configuration files to the built-in client. You can usually find the client within network settings.
If you’d like to use OpenVPN, you’ll have to download a third-party app — like OpenVPN’s client software — and then upload the VPN service’s configuration files.
You can also set up your own VPN server at home, but it’s a complicated process with a lot of room for error. Home-made VPN servers aren’t ideal for accessing restricted content or for your online privacy as your ISP can still log your online activities.
A VPN (Virtual Private Network) creates a secure connection between your device and the internet. The service encrypts your data and sends it through a remote, private server before passing it onto your requested website or application.
When you use a VPN, it masks your IP address and allows you to:
Protect yourself against government and ISP surveillance
Prevent attackers from spying on your personal information
Hide your identity and activity from advertisers
Bypass internet censorship and IP blocks
Stay safe on public WiFi networks
Stop ISP throttling
Access region-restricted streaming sites and unlock Netflix libraries
Using a VPN is one of the best ways to ensure your privacy, security and freedom online.
Are Free VPNs Safe?
There are lots of free VPNs on the market, but most of them are limited at best and dangerous at worst.
Without an income from subscription fees, free VPNs are far more likely to offer insecure, slow, or ineffective services and monetize their users by tracking, storing, or selling your personal information and online activity.
Here at Top10VPN.com we’ve conducted a number of investigations into free VPN products and our findings have often been disturbing:
Clearly, using a free VPN can sometimes be worse than using no VPN at all.
It’s not all bad news, though. There are some free VPN services that we consider safe to use. They might not unblock Netflix reliably or work for torrenting, but they’ll hide your IP address, secure your data without leaks, and give you good connection speeds.
There are also ‘freemium’ VPN services, where providers offer users a free trial or restricted version of their paid product.
Freemium VPNs are more trustworthy than free VPNs. They make money from subscriptions, so are less inclined to monetize their users.
All VPNs will slow down your internet speeds to some degree. With the very best VPNs, however, the impact is negligible.
Fundamentally, a VPN works by diverting your web traffic through its own servers. As with any diversion, this adds distance to the connection’s journey and reduces its speed.
Encryption can also add to the time taken to load sites or download files. Loosely speaking, the stronger the encryption, the longer the delay.
To maximize your VPN speeds, you can choose a VPN server closer to your physical location or change the VPN protocol. Faster protocols include IKEv2 or WireGuard.
In some circumstances, a VPN might actually improve your connection speeds. If you’re experiencing ISP throttling on your normal internet connection, using a VPN can stop your connection being throttled and therefore increase your internet speed.
Can You Be Tracked If You Use a VPN?
Yes, you can still be tracked when using a VPN.
With a VPN, your online activity will be much more private compared to surfing the web without one. However, a VPN will not make you completely anonymous.
If someone was serious about trying to track your activity, your IP address is just one approach they could use to try and identify you.
Other methods they could use include:
Cookies and Trackers:Cookies and web trackers are tools used by websites and advertisers to customize their services for specific users. They store information — such as your name, gender, location, and sometimes browsing habits — which can be used to identify you even when you use a VPN.
Browser Fingerprinting: Your device provides websites you visit with detailed information about your operating system, browser, and hardware. The sum of this information forms a unique ‘fingerprint’, which attackers might use to track and identify you.
IP, DNS and WebRTC Leaks: A poor-quality VPN can expose your identity by leaking information like your true IP address or DNS requests. To avoid tracking, it’s crucial to use a trusted VPN service.
Traffic Fingerprinting: When you use a VPN, your ISP can still see that data is being passed between your device and a VPN server — it just can’t see any details about that data (e.g. its content or destination). However, it’s sometimes possible to determine the kind of traffic being transmitted (i.e. web pages, streaming, P2P etc.) through a sophisticated analysis of timings and density, known as Traffic Fingerprinting.
Browsing Behaviour: If you’re signed into web accounts such as Facebook and Google while browsing the internet, it won’t matter that your traffic is encrypted. These companies will be able to monitor your activity and link it to your VPN IP address.
Our guide to private browsing explores a number of ways you can keep your activity private and free from tracking, which extend beyond using a VPN.
Though a good VPN is an essential tool for every internet user, it can’t do everything. It is important to be aware of what a VPN won’t do, as well as some of the dangers associated with using a VPN:
Slower Connection Speeds
As mentioned, using a VPN will almost always result in some degree of speed loss. Encrypting your data and routing it via an external server will inevitably add delays to the connection. With a good-quality VPN, however, the speed loss is so small you won’t even notice it.
You’re Not Fully Anonymous with a VPN
Though a VPN will hide your identity from the websites you visit and prevent third parties from monitoring your activity, it will not provide you with complete anonymity. The VPN provider itself still has the capacity to see what you’re doing.
This is why it is crucial to use a trustworthy VPN service with a verified no-logs policy. Often poor-quality services, including most free VPNs, will exploit their privileged position in order to collect and sell your personal information.
Websites That Block VPNs
Websites and services, such as Netflix, are getting better at blocking VPN users from accessing their content. They do this by figuring out which IP addresses belong to VPN servers and banning those addresses from entering the site. If you plan to use a VPN to access streaming content, make sure you find a service that is known to unlock your preferred platform.
Your Online Accounts May Become Temporarily Suspended
When browsing with a foreign IP address, online accounts such as internet banking may register a security breach and temporarily suspend your account as a safety precaution. This is only a small annoyance though as these suspensions are temporary and can be easily removed.
Is a VPN Worth It?
Absolutely. A good VPN is as a worthy investment into your security, privacy, and freedom. It prevents costly data loss, opens up your browsing capabilities, and protects your right to privacy.
We thoroughly test each VPN reviewed on our website and make sure to keep our recommendations up-to-date so that you can make an informed decision. You can read all about our review process here.