Perfect Privacy VPN Protects Your Privacy
More than 30 servers distributed worldwide
Perfect Privacy is committed to the privacy and anonymity of its members since 2008 and is one of the most secure VPN providers worldwide since the beginning. The protection of your privacy is our main concern – therefore we do not record user activity.
You can freely choose between all our fast VPN servers. These are distributed over the world, among them popular locations like Sweden, Russia, Iceland, Hong Kong and the Netherlands. Most of them has IPv6 addresses and bandwidth up to 1000 mbps.
We trust in Open-Source software and develop our privacy solutions in-house without third parties. For encryption we use proven and safe industrial standards like for example OpenVPN (AES 256 bit) and IPSec, which are usable on all common operating systems.
Moreover we provide our members our secure VPN client software customized for Perfect Privacy, available for several operating systems.
Your advantages with Perfect Privacy
Our VPN client offers unique features
No VPN provider offers you more functionality
|Cascading over up to 4 servers. Free choice of servers.|
|Integrated firewall protection|
|DNS leak protection|
|8 port forwardings included (e.g. use with torrent)|
|Switch servers as often as you like|
|Check server latencies in real-time|
Instructions for setting up a VPN on Linux, MacOS, iOS and Android can be found in our howto section.
Best price / performance ratio in the high-end VPN market
Perfect Privacy VPN vs other VPN Providers
Pay attention to important and critical details
|Feature||Perfect Privacy VPN||Other VPN-Provider|
|Logging policy / Data Retention||No logging of any user specific data or activity. No data is kept.||Depending on provider connection data and user activity may be logged and kept indefinitely.|
|Multi-VPN||Cascade your VPN connection through up to four OpenVPN servers plus additional proxy and ssh tunnels.||Most providers offer no cascading at all. A few providers offer cascading to a maximum of two hops.|
|Limits||No bandwidth or traffic limit. Unlimited number of simultaneous connections.||Depending on provider, traffic and bandwidth may be limited. Number of connections are always limited (usually to a maximum of 2).|
|Serverpark||Only dedicated servers which are running in a ramdisk to secure your anonymity and privacy.||Often several VPS running on a single server with data physically stored on the harddrive.|
|Client software||In-house developed native client for Windows and Linux. Supports many features such as switching protocols, cascading, firewall and DNS leak protection.||Depending on provider, no custom software or clients with limited features.|
|Proxy server||Socks5 and Squid proxies on all servers. All proxies can resolve .onion (TOR) addresses.||Depending on provider, some Squid or Socks proxies at certain locations, no .onion resolving.|
|IPv6||We offer IPv6 addresses on most servers. Anonymous connections to IPv6 services from everywhere are possible without any problems.||Most of the VPN providers neither offer IPv6 addresses nor IPv6 leak protection like the Perfect Privacy VPN Manager does.|
|Warrant Canary||We have a Warrant Canary page, which we updated regularly. This way we want to make sure you can easily see we have not been served any subpoenas.||Many providers do not offer this service. Often because they are located in countrys which simply prohibit such statements.|
Exclusively at Perfect Privacy VPN
Maximum Anonymity with Multi-Hop VPN
What is a Multi-Hop VPN ?
Some VPN providers offer the option to tunnel your internet traffic over two VPN servers. With the Perfect Privacy client software for Windows you can even encrypt your traffic over up to 4 hops – with additional proxy servers and a SSH tunnel even more!
Such cascading will make it much more difficult to trace back your activities. However, this comes at the cost of slower speed: While your bandwidth should not be affected, your latency will increase depending on the number of hops you are using.
The advantage is that you can choose the specific route for your tunnel. This way it is possible to route all your Internet traffic through four continents.
How it works
You establish a connection to a VPN server of your choice, for instance saopaulo.perfect-privacy.com. Then you connect to an additional server, e.g. montreal.perfect-privacy.com. In the same manner you then add further hops, in our example bucharest.perfect-privacy.com and singapore.perfect-privacy.com.
Your ISP will see that you are connecting to a server in Panama but your actual traffic will exit in Singapore since all packets are being relayed from Sao Paulo over Montreal and Bucharest and to Singapore before they enter the Internet.