Perfect Privacy VPN Protects Your Privacy
Premium VPN in 24 countries
Perfect Privacy is committed to the privacy and anonymity of its members since 2008 and is one of the most secure VPN providers worldwide since the beginning. The protection of your privacy is our main concern – therefore we do not record user activity.
You can freely choose between all of our fast VPN servers. These are distributed throughout the world, including popular locations like Sweden, Russia, Iceland, Hong Kong and the Netherlands. Most of our servers have IPv6 addresses and bandwidth up to 1000 mbps.
We trust in open source software and develop our privacy solutions in-house without third parties. For encryption we use proven and safe industry standards like OpenVPN (AES 256 bit) and IPSec, which are usable on all common operating systems.
Our team of developers constantly researches new technologies to integrate useful features like NeuroRouting into our VPN service that serve the comfort and security. In addition, we regularly conduct audits internally and externally to detect possible security gaps and inform other VPN providers about these to make the Internet more secure for everybody.
Moreover we provide our members our secure VPN client software customized for Perfect Privacy, available for several operating systems.
Your advantages with Perfect Privacy
|For all your devices|
|Cascading of multiple VPN servers|
|No traffic limit|
|Up to 1000mbps bandwidth|
|Easily usable client software|
|Support via email, Forum and TeamViewer|
|Quickly switch between OpenVPN and IPSec|
|SSH and proxies for advanced users|
|Stealth VPN Technology|
Our VPN client offers unique features
No VPN provider offers you more functionality
|Cascading over up to 4 servers. Free choice of servers.|
|Integrated firewall protection|
|DNS leak protection|
|8 port forwardings included (e.g. use with torrent)|
|Switch servers as often as you like|
|Check server latencies in real-time|
Instructions for setting up a VPN on Linux, MacOS, iOS and Android can be found in our howto section.
Best price / performance ratio in the high-end VPN market
Protect Your Privacy!* Compared to monthly payments
Perfect Privacy VPN vs other VPN Providers
Pay attention to important and critical details
|Feature||Perfect Privacy VPN||Other VPN-Provider|
|Logging policy / Data Retention||No logging of any user specific data or activity. No data is kept.||Depending on provider connection data and user activity may be logged and kept indefinitely.|
|Multi-VPN||Cascade your VPN connection with up to four OpenVPN servers plus additional proxy and ssh tunnels.||Most providers offer no cascading at all. A few providers offer cascading with a maximum of two hops.|
|Limits||No bandwidth or traffic limit. Unlimited number of simultaneous connections.||Depending on provider, traffic and bandwidth may be limited. Number of connections are always limited (usually to a maximum of 2).|
|Server park||Only dedicated servers which are running in a ramdisk to secure your anonymity and privacy.||Often several VPS running on a single server with data physically stored on the hard drive.|
|Client software||In-house developed native client for Windows and Linux. Supports many features such as switching protocols, cascading, firewall and DNS leak protection.||Depending on provider, no custom software or clients with limited features.|
|Proxy server||Socks5 and Squid proxies on all servers. All proxies can resolve .onion (TOR) addresses.||Depending on provider, some Squid or Socks proxies at certain locations, no .onion resolving.|
|IPv6||We offer IPv6 addresses on most servers. Anonymous connections to IPv6 services from everywhere are possible without any problems.||Most of the VPN providers neither offer IPv6 addresses nor IPv6 leak protection like the Perfect Privacy VPN Manager does.|
|Warrant Canary||We have a Warrant Canary page, which we updated regularly. This way we want to make sure you can easily see we have not been served any subpoenas.||Many providers do not offer this service. Often because they are located in countries which simply prohibit such statements.|
Exclusively at Perfect Privacy VPN
Maximum Anonymity with Multi-Hop VPN
What is a Multi-Hop VPN ?
Some VPN providers offer the option to tunnel your Internet traffic with two VPN servers. With the Perfect Privacy client software for Windows you can even encrypt your traffic with up to 4 hops – and using additional proxy servers and a SSH tunnel offers even more!
Such cascading will make it much more difficult to trace back your activities. However, this comes at the cost of slower speed: While your bandwidth should not be affected, your latency will increase depending on the number of hops you are using.
The advantage is that you can choose the specific route for your tunnel. This way it is possible to route all your Internet traffic through four continents.
How it works
You first establish a connection to a VPN server of your choice, for instance oslo.perfect-privacy.com. Then you connect to an additional server, e.g. montreal.perfect-privacy.com. In the same manner you then add further hops, in our example bucharest.perfect-privacy.com and singapore.perfect-privacy.com. If the servers used in the cascade support IPv6 you will also have a full dual stack IPv4 & IPv6 connection.
Your ISP will see that you are connecting to a server in Panama but your actual traffic will exit in Singapore since all packets are being relayed from Sao Paulo over Montreal and Bucharest and to Singapore before they enter the Internet.