Questions and answers regarding Perfect Privacy

Here you find the most frequent matters of concern of our members.
Questions our support gets asked multiple times are published on this page.

If you have a question which is not listed already, please contact our support.

General questions regarding Perfect Privacy VPN

No. On none of our servers are any logs which would enable a de-anonymization.

Our server status page provides up to date information regarding bandwidth utilization and possible issues. Members may also use the Server page in the Member’s area to view additional details about our servers.

As Perfect Privacy member you can use our services on any number of your devices. It is not permitted to pass your login credentials to any third party, they are for your personal use only.
In principle your ISP (and third parties having access via your ISP) can only see an established connection from your IP address (the one assigned to you by your ISP) to one of Perfect Privacy’s servers. When using a VPN all data within this connection is encrypted, including the address of a website you visit. In short: Your provider can only see that you are using Perfect Privacy, but not what for.
In principle the speed of your Internet connection should not be affected, at least when using one of our servers with 100mbps or 1000mbps connection. This is a lot more bandwidth than ISPs usually provide to their customers. The Internet connection will however not become faster, as all (encrypted) traffic still has to pass through the connection provided by your ISP.

Admittedly the latency of your Internet connection – the time it takes to transport data packets back and forth – may change, since the packets may be routed differently. To verify this effect on Windows you can use the command tracert [hostname], on Mac and Linux use traceroute [hostname].

No. For total anonymity you have to take a couple of things into account. Most important is the protection of your identity, as of course it can still be disclosed (intentionally or unintentionally) while using a VPN. If you for example place an order on Ebay or Amazon where you have to enter your name and address anyway, there is no anonymity in such case.

Another typical attack vector is the so called browser tracking: By analyzing information provided by your internet browser it may be possible to uniquely identify users to some extent. Remedy can be gained by using the “Incognito”-mode of your browser, as Firefox and Chrome offer. The Squid proxy services on the Perfect Privacy servers filter header information that may be used for identification, and thus can help to improve anonymity.

Perfect Privacy’s servers are distributed worldwide. You can see all locations on our server status page. Members may also view additional information regarding the services offered and the ports used on the server page in the Member’s area.
No, the server’s IP addresses are used by all members, in order to increase our member’s anonymity.
Yes, at least on most servers not located in the USA. Unfortunately the hosting companies there are under strong pressure from media agencies, to proceed against any sort of filesharing and BitTorrent. This implies in case of alleged DMCA violations the hosting company often terminates the contract with their customer (Perfect Privacy).

Thus we prevent access to BitTorrent trackers on servers located in the USA, to avoid unnecessary trouble for the hosting companies and ourselves as well.

On most Perfect Privacy servers located outside the USA all ports and services can be used without any limitations.

Yes, if there is a server available in the corresponding country. For example the US servers enable you to access Hulu, and via the servers in London video contents of the BBC can be accessed.
It depends what kind of router you are using. In general you can use OpenVPN on your router if you have system access and the router meets the minimum system requirements such like a FritzBox.

If you do not have an adequate router you can order one at our partner flashrouter.com who provides several router models pre-configured for the use with Perfect Privacy. For more information on this please visit our router site.

Accounts & payment

The prices are depending on the duration of the membership. Please have a look at our overview on memberships and prices.
No. All services offered by Perfect Privacy are covered by the regular membership fee.
We currently do not offer any free test accounts.
We currently offer the following payment options:

  • PayPal
  • BitCoin
  • PaySafeCard
  • Cash
  • EgoPay
  • WebMoney

Your account will be activated faster when using an electronic payment option (Bitcoin, PayPal et cetera) as if using cash (two to six weeks depending on mail travel time).

Depending on anonymity or speed being more desirable, there are different payment options to choose from. The actual protection of your anonymity on the Internet – regardless of the payment method chosen – is provided due to the fact that Perfect Privacy, without having any log files, is unable to assign any data packets or traffic to a member later on. In this respect we think using a completely anonymous payment method is not a necessity.

As a good compromise between speed and anonymity we recommend the pseudonymous payment with Bitcoin.

As soon as we receive your payment, we will send you an email with your login credentials for Perfect Privacy.
Please contact us via email.
Unfortunately processing payments with PaySafeCard results in relatively high fees for us. These fees are thus covered by the members using PaySafeCard for their payment.
Memberships run until the end of the period chosen, and can be extended at any time. In case of an automatic renewal, the renewal may be canceled at any time. The membership then ends upon the end of the currently running period. If you have any questions, please don’t hesitate to contact us.
Please send us a detailed description of the issue. If applicable please also use our TeamViewer support so that we can help you to solve the issue quickly!
It is true that Perfect Privacy ranges in the upper price region when comparing prices with other VPN providers. But then the features and services offered should also be compared. Perfect Privacy understands itself as premium VPN provider and in particular provides the following core features:

  • All services are running on dedicated root-servers
  • Servers with up to 1000mbps bandwidth
  • Protocols: OpenVPN, IPSec, PPTP, SSH2, Squid- and Socks5-proxies on all servers
  • 30+ servers distributed worldwide
  • No bandwidth limitations
  • Cascading possible
  • Support (also via TeamViewer) included
  • Unlimited connections per member
  • Comfortable user interfaces/clients for many operating systems

When taking these points into consideration, it will get hard to find a comparably extensive VPN offer for a lower price. Perfect Privacy also offers the functionality that other VPN providers have – if you miss anything, please don’t hesitate to tell us about your wishes.


We offer multiple port forwarding options, one default and one customizable. Per default you get three port forwardings, the ports you get derive from your internal VPN IP address, and therefore change with every connection you establish. The scheme is quite easy, but we also offer a JavaScript form to easily calculate your current ports.

The second customizable port forwarding allows for up to five additional customized port forwardings on the server group chosen. For security reasons each port is only valid for a limited time period of seven days. You may pick your destination port, or stick to the default, which is the same as the randomly chosen source port. The latter is what you usually want for use with file sharing software etc., but if you want to have some port being redirected to e.g. your sshd on port 22, you can do so.

In principle OpenVPN and our software should work without trouble on older computers also. Orienting on the system requirements of OpenVPN we have the following minimal system requirements:

  • Processor: Single Core, 1GHz+
  • RAM: 512MB (1GB recommended)
  • Harddisk: 5MB of free space
No. As modern VPN encryption per se is – up to best knowledge – safe enough from attacks even from secret service agencies, there are other attack vectors arising when such an agency in principle has the possibility to eavesdrop on all Internet communication worldwide.

A fundamental problem exists for example when traffic is being eavesdropped between your local router and your ISP, and gets correlated with the traffic of the VPN (exit) node.

How promising such a traffic correlation is, depends on many factors – the amount of traffic that passes through the VPN node and not least how much expenditure is put into such an analysis. Also this of course requires the eavesdropper having identified the target already, as otherwise he would not know whose traffic to eavesdrop at the ISP.

The TOR project does offer a superior protection against such attacks, since a traffic correlation within the TOR network is a lot more difficult. But even the most sophisticated routing of traffic does not offer protection, when data is extracted directly from your computer or via other methods such as social engineering.

When using a proxy in combination with a VPN there is something important to pay attention to, so that the traffic to the proxy is being routed via the encrypted VPN tunnel: If the VPN server used is the same as the proxy server, e.g. “moscow1.perfect-privacy.com”, it is absolutely necessary to use the internal IP of the proxy server in use.

With the hostname “moscow1.perfect-privacy.com” as proxy server, all traffic would be routed unencrypted and not trough the VPN tunnel. The reason is the routing, which – in order to have a working VPN tunnel – transmits all data to the VPN server via the default route into the Internet and all other (non local) traffic gets routed through the VPN tunnel. The connection to the proxy server would thus be a direct one, bypassing the VPN tunnel. Traffic with the internal IP address of the proxy on the other hand gets routed through the encrypted VPN tunnel.

While a VPN connection offers a fully encrypted tunnel, a proxy itself does not offer any encryption, but just forwards traffic (in some cases modified).

So the encryption has to be ensured in addition by using the proxy service combined with an encrypted connection, e.g. an SSH2 tunnel.

Content providers such as Google do not only rely on the IP address to determine the location of a user, but use additional data as well.

Thus it may happen the country shown does not match the country of the server’s location. In such cases it usually helps to use another server outside Europe (e.g. Montreal or Hong Kong).

The IP addresses and ports used can be viewed on the Server page in the members area.
The Server status page shows up to date information on current bandwidth usage and possible server issues.
The Configuration page offers the possibility to chose whether or not the VPN services should use a random exit IP address. This setting only affects the VPN services.
If using our VPN services you get assigned two other randomly chosen Perfect Privacy servers as DNS servers. These might be located in another country than the server you have established your VPN connection to.
The HTTP proxy squid is for use with web browsers and should always be your first choice for this use case. SOCKS5 proxies are for use with other client software, which support using a SOCKS5 proxy.
When using a proxy in connection with a VPN there might be something important to note, to ensure the traffic to the proxy is being routed through the encrypted VPN connection. If the proxy server used and the VPN server used are the same, e.g. moscow.perfect-privacy.com, if you want to use a proxy you have to use the internal IP address of the proxy server as proxy host! Would moscow.perfect-privacy.com be entered again, the connection to the proxy server would bypass  the VPN connection unencrypted! The reason is the routing, which, in order to have a working VPN tunnel, routes the data to the VPN server directly via the default route to the Internet, while all other (non local) traffic is routed through the VPN tunnel. The connection to the proxy server thus would also be routed directly and not through the VPN tunnel! The internal IP address of the proxy server on the other hand will be accessed via the encrypted VPN tunnel.