ProtonVPN Review (2024)

Proton, a Swiss-based privacy service provider, initially gained prominence with its secure email service, Proton Mail. Since then, the company has expanded its offerings to include Proton Drive, a secure cloud file server, Proton Calendar, an appointment scheduling tool, and Proton VPN, a robust VPN service. All these services are available with a free plan, and users also have the option to subscribe to a comprehensive bundle encompassing all four services.

Features

  • Rating: 4/5
  • Price: $0 – $11.99 per month
  • Refund Period: 30 days
  • Headquarters: Switzerland
  • Devices per License: 10
  • Number of Servers: 1,745
  • Server Locations: 89 locations across 64 countries, including the USA, Canada, the UK, Australia, New Zealand, India, Japan, France, and Germany
  • Streaming Services Unblocked: Netflix, BBC iPlayer, Amazon Prime Video
  • Supports Torrenting: Yes
  • Logging Policy: No logs
  • 24/7 Customer Support: No
  • Website: ProtonVPN

Proton Technologies AG, established in 2014, is based in Switzerland. The company’s founders, who met while working at CERN—where some contributed to the development of the Large Hadron Collider—include notable figures such as Sir Tim Berners-Lee, the inventor of the World Wide Web.

Proton’s initial offering was Proton Mail, a secure email service launched before Proton VPN debuted in 2017. Proton VPN, like its predecessor, is equipped with advanced security features. It is open source, meaning its source code is publicly available. Despite this transparency, the robust operational security measures ensure that the system remains impervious to breaches.

A key feature of Proton VPN is its compatibility with the Tor network. Proton also offers its own mini Tor system, Secure Core, which routes traffic through multiple VPN servers. This feature is akin to the double-hop VPN connections provided by competitors such as NordVPN and Windscribe.

Proton VPN’s double-hop system involves routing traffic through a location with stringent national privacy laws, such as Switzerland, Iceland, or Sweden, thereby enhancing privacy by avoiding countries with weaker consumer protections.

To further secure the Secure Core servers, Proton Technologies AG operates these servers in its own data centers. Proton VPN servers offer high-speed performance, each with a 10 Gbps throughput rate.

The free version of Proton VPN is limited to servers in the USA, the Netherlands, and Japan, and does not provide the high-speed performance of the paid plan.

Privacy and Security

Proton VPN, along with other Proton products, integrates multiple layers of security to safeguard both data and privacy. Security measures protect against theft and damage, while privacy features prevent tracking of individual activities. Proton VPN’s dual approach to security and privacy is highly effective.

Legal Protection

The founders of Proton Technologies AG, based in Switzerland, were influenced by the country’s robust privacy laws. Switzerland’s legal framework includes three key laws related to data protection and privacy, which prohibit tracking of online activities and classify IP addresses as personal information.

Proton’s research extended to other European countries, leading to the selection of Iceland and Sweden as additional bases due to their similarly strong privacy protections.

Internet Activity Tracking

In many countries, ISPs are legally mandated to monitor and record customer activities. These records, stored for periods ranging from six months to two years, are intended to assist copyright enforcement and law enforcement agencies. This tracking is particularly concerning for users engaged in P2P file sharing.

Proton VPN Logging Policy

A key reason for subscribing to VPN services is to ensure privacy and protection during activities such as torrenting. Privacy threats can emerge from two main sources:

  1. Torrent Tracker Sites: Copyright enforcement entities may target torrent tracker websites, which can lead to the acquisition of connection logs. These logs list the IP addresses of users accessing the site, which can be traced back to ISPs. With a court order, these ISPs are compelled to provide user logs, revealing the identities of individuals associated with specific IP addresses during the relevant time period.
  2. ISP Activity Records: Another potential threat involves accessing ISP activity records to identify users engaging in file sharing. Although obtaining these records typically requires specific legal grounds in most jurisdictions, some countries have less stringent requirements.

A VPN mitigates these risks by masking users’ online activities. When using a VPN, your device connects to a VPN server via an encrypted tunnel, which effectively disguises the destination IP address of your internet traffic and obfuscates it from ISP monitoring.

VPN services replace the source IP address of outgoing data packets with the IP address of the VPN server. Consequently, if a legal entity attempts to trace a connection, the trail leads to the VPN server, not the individual user.

Upon receiving data, the VPN server uses a cross-reference table, known as Network Address Translation (NAT), to identify the appropriate client and forwards the data accordingly. Proton VPN enhances this process with a double NAT system for added security.

See also  ZenMate VPN Review 2024: Features, Pricing, and Performance

For genuine privacy, a VPN must not retain long-term activity logs. Proton VPN adheres to a strict no-logs policy, as confirmed by external audits. The company maintains a Transparency Report on its website, detailing the implementation of this policy.

Proton VPN Protocols

To ensure compatibility and effective communication across internet systems, protocols are standardized guidelines that network and internet services follow. Proton VPN supports four primary VPN protocols:

  • OpenVPN: This widely-used, open-source protocol is known for its robust security and versatility.
  • WireGuard: A newer, open-source protocol that is gaining popularity for its efficient performance and modern cryptographic design.
  • IPsec: Operating at the network level, IPsec is efficient and commonly used for mobile devices to conserve battery life.
  • IKEv2: Often paired with IPsec, IKEv2 handles key management for encryption and session parameter negotiation.

Protocol availability in the Proton VPN app varies by operating system:

  • Windows: OpenVPN, WireGuard
  • macOS: OpenVPN, IKEv2/IPsec, WireGuard
  • Android: OpenVPN, IKEv2/IPsec, WireGuard
  • iOS: OpenVPN, IKEv2/IPsec, WireGuard
  • Linux: OpenVPN

Session management protocols, known as Transport Layer protocols, include:

  • Transmission Control Protocol (TCP): A connection-oriented protocol that ensures packet delivery and order, but may introduce latency unsuitable for real-time applications.
  • User Datagram Protocol (UDP): A connectionless protocol that offers lower latency, making it ideal for interactive applications like VoIP and video streaming.

OpenVPN supports both TCP and UDP, WireGuard operates exclusively with UDP, and IPsec functions beneath the Transport Layer, rendering the choice of TCP or UDP irrelevant. IKEv2 also operates with UDP.

VPN Protocols and Procedures

Data transmitted over the internet is divided into segments known as packets. Each packet comprises a payload and a header containing administrative data, such as source and destination addresses. This combination of payload and header is referred to as a packet.

The VPN application installed on your device functions as the VPN client, managing the VPN connections. Before activating the VPN, you select a server from a list provided by the VPN application. The VPN app then establishes a connection with the chosen server and negotiates an encryption method. Subsequently, your internet connection is routed through the VPN, transforming it into a secure VPN connection.

All packets exchanged between the VPN client and the VPN server are encrypted, including the packet headers. Since internet routers rely on packet headers to determine routing, encrypted headers cannot be read. To circumvent this, the VPN client encapsulates the entire encrypted packet within another packet, addressing it to the VPN server.

The inner encrypted packet contains the actual data, with its header specifying the destination web server. Upon receiving these packets, the VPN server extracts and decrypts the inner packet, then modifies the header to reflect its own address before forwarding it to the intended destination.

Every computer connected to the internet is assigned a unique identifier known as an IP address. Due to the distribution system for IP addresses, each address is linked to a physical location. A proxy service allows you to alter your IP address, masking your true location.

When connected to a VPN server, all your internet traffic is routed through that server, which appears as the origin of your requests. Consequently, you can appear to be in a different location, such as the USA, even if you are physically located in Japan.

The web server you contact will only see the VPN server’s address and send responses to it. The VPN server then receives these responses and forwards them back to your computer using the same encryption method employed by the VPN app. As a result, your ISP cannot discern which web servers your computer interacts with.

Proton VPN Encryption

Proton VPN employs AES-256 encryption, utilizing a 256-bit key for its Advanced Encryption Standard (AES) implementation. The key is a variable in the encryption formula, and altering its value changes the transformation of the original text. While hackers may attempt to guess the key through trial and error, the length of the key significantly impacts the time required to crack it. AES-256 is highly secure, with the key length making it infeasible to guess within a human lifetime.

AES is a symmetric key system, meaning the same key is used for both encryption and decryption. To maintain security, the key must be transmitted securely. Proton VPN uses RSA, a public key encryption system, to safeguard the transmission of the key. Public key systems involve a pair of related but distinct keys: one for encryption and the other for decryption. The encryption key cannot decrypt text, nor can the decryption key be deduced from the encryption key. As long as the decryption key is kept confidential, the encryption key can be made public.

During the session establishment, the VPN app uses the VPN server’s public key to encrypt a message, which only the server can decrypt. Conversely, the VPN server uses the VPN app’s public key to send messages, including the AES key transmission. Proton VPN employs a 4096-bit key for its RSA implementation, which is significantly longer than the 256-bit AES key due to the higher security requirements for public key ciphers.

See also  TorGuard Review (2024)

For comparison, rival VPN providers such as ExpressVPN, NordVPN, IPVanish, and CyberGhost use AES-256 with RSA-4096, while Surfshark and VyprVPN use AES-256 with RSA-2048. The WireGuard system, alternatively, utilizes ChaCha20, another symmetric key cipher with a 256-bit key.

Proton VPN DNS Leak Protection

Web browsers utilize URLs based on domain names, such as nestvpn.org or google.com, which are mapped to IP addresses that routers use for routing. This mapping is stored in a globally distributed database known as the Domain Name System (DNS). To enhance efficiency, your ISP operates a DNS resolver that provides your browser with the IP address.

ISPs may use DNS queries to block access to restricted websites by returning fake IP addresses or to log your browsing activity. Proton VPN mitigates these issues by running its own DNS resolver. When the VPN service is active, all DNS queries are transmitted through the VPN tunnel to the private DNS server, preventing the ISP from blocking or logging your activities.

Proton VPN IP Leak Protection

An IP leak occurs when an actual packet header revealing its real destination address is unintentionally exposed. Proton VPN ensures that all internet traffic is routed through the VPN server before reaching its final destination and that all traffic is encrypted. Consequently, IP leaks cannot occur while the VPN is active.

However, if the VPN connection unexpectedly terminates, regular internet traffic will proceed unprotected. This can happen with any VPN service, particularly with protocols running over UDP, which may assume a session has ended in the absence of activity.

To address this, Proton VPN includes a kill switch feature. When activated, the kill switch blocks all internet traffic unless it passes through the VPN app. If the VPN connection is lost, no data can be transmitted over the internet. This mechanism alerts users to reconnect the VPN, as internet access will be suspended until the VPN is reestablished. The kill switch functions only if the VPN app remains open.

Split Tunneling

In the Proton VPN application, you can configure a feature known as split tunneling. This allows you to specify certain applications or websites that will bypass the VPN tunnel, ensuring that their traffic remains outside of the encrypted connection. This intentional routing of specific traffic outside of the VPN tunnel is not considered an IP leak, as it is a deliberate and predefined choice.

Split tunneling can be configured in two modes: split-include and split-exclude. In split-include mode, only the designated traffic is routed through the VPN tunnel, while all other traffic remains unprotected. Conversely, in split-exclude mode, traffic directed to the specified applications and websites bypasses the tunnel, while all other traffic is encrypted and sent through the VPN server.

Currently, split tunneling is available exclusively in the Proton VPN applications for Windows and Android.

Website Blocking

One of the primary uses of VPNs for individual users is to circumvent regional restrictions imposed by websites and streaming services. For instance, you may wish to access TV channels from another country, such as the USA or the UK, which often provide live streaming and catch-up services exclusively for viewers within their respective countries. These services are designed to detect and restrict access from outside their home country.

When traveling abroad, this can be particularly inconvenient if you want to continue accessing TV content from home. By connecting to a VPN server located in your home country, you can regain access to the TV station websites of your favorite channels.

Similarly, if you subscribe to streaming services like Netflix, Disney+, or Amazon Prime Video, you might encounter different content libraries based on your current location. A VPN can help you bypass these regional restrictions, allowing you to access the content library available in your home country.

We conducted tests using Proton VPN with the WireGuard protocol on several popular streaming services, and the results are as follows:

Service Test Results
Netflix Access confirmed for USA, UK, France, and Japan
Disney+ Access confirmed for USA, UK, France, and Japan
BBC iPlayer Access confirmed
ITV Hub Access confirmed
Channel 4 Access confirmed
ABC Access confirmed
NBC Access confirmed; however, video load times were significantly delayed

 

While some servers did not perform as expected, particularly with accessing Netflix in the UK, the issue was resolved after trying multiple servers.

Proton VPN Pricing

Proton VPN offers two service plans: Proton Free and Proton Plus. The Proton Plus plan is a paid subscription with three billing options: monthly, annual, and biennial. The longer subscription terms come with a discount for the initial billing cycle.

  • One month: $9.99 per month
  • One year: $119.88 ($9.99 per month), discounted to $71.88 ($5.99 per month) for the first year
  • Two years: $239.76 ($9.99 per month), discounted to $119.76 ($4.99 per month) for the first year
See also  AirVPN Review : Secure, Privacy-Focused VPN with OpenVPN

These plans are available on the Proton VPN website, which also offers a 30-day money-back guarantee for all subscribers.

Additionally, Proton offers bundled service packages through their main website, combining Proton VPN with Mail, Drive, and Calendar services at a competitive price. The available options are:

  • Proton Free: $0 per month
  • Mail Plus: $4.99 per month or $47.88 per year ($3.99 per month)
  • Proton Unlimited: $11.99 per month or $119.88 per year ($9.99 per month)

Subscriptions can be paid via credit card, Bitcoin, PayPal, or cash. For cash payments, instructions can be obtained by contacting Proton directly via email.

Speed Tests

To evaluate the impact of Proton VPN on connection speed, we conducted a series of performance tests. The Proton Plus service, which was utilized for these tests, features no bandwidth restrictions, unlike the basic free plan that has limited bandwidth and may result in slower connections. These tests were performed in the UK on The Three network, with the Proton VPN app set to use the WireGuard protocol. Speed tests were conducted using the Ookla system at speedtest.net, with each condition tested five times and the average of these runs used for the final results.

Initially, to establish a performance baseline, we tested the connection to a nearby server without VPN activation:

  • Mean Download Speed: 8.16 Mbps
  • Mean Upload Speed: 6.37 Mbps

These tests were conducted by connecting to a test server in London.

When Proton VPN was enabled, and the connection was routed through a VPN server in London while still connecting to the same test server in London, the results were as follows:

  • Mean Download Speed: 13.80 Mbps
  • Mean Upload Speed: 4.82 Mbps

Although the speeds without VPN briefly approached these figures, they were not sustained. The VPN consistently maintained a higher connection speed compared to when Proton VPN was not active.

Long-distance connections, inherently slower due to the increased number of routers and the greater distance packets must travel, were tested without VPN by connecting to Sydney, Australia:

  • Mean Download Speed: 7.77 Mbps
  • Mean Upload Speed: 5.97 Mbps

This test highlighted a slight reduction in performance due to the increased distance.

When Proton VPN was activated and the connection routed through a London VPN server to the Sydney test server, the results showed:

  • Mean Download Speed: 12.95 Mbps

This performance was consistent across all five test runs.

For a more complex routing scenario, we tested a connection to Sydney through a Proton VPN server located in New York, USA. Despite the more intricate route, the connection speed remained superior to that of the unprotected connection:

  • Mean Download Speed: 11.68 Mbps
  • Mean Upload Speed: 6.00 Mbps

Installation Instructions

1. Select a Plan: Visit the Proton VPN website, choose a suitable plan, and create an account by providing a username, password, and email address. Click the “Create Account” button.

2. Verify Your Identity: Complete the human verification process to access your account dashboard. Here, you can choose between the Proton Plus account or the Proton Unlimited bundle. Click the desired option.

3. Complete Your Purchase: Select your subscription plan and click the “Pay” button. Enter your payment details and click “Pay” again to finalize the transaction.

4. Download the Application: Once payment is successful, return to your account dashboard and select “Downloads” from the left menu. Click the “Download Proton VPN” button. After the download is complete, run the installer by clicking on the downloaded file. Follow the installation prompts and click “Finish” when complete to launch the application.

5. Install on Mobile Devices: For Android devices, download the app from Google Play. For iPads and iPhones, obtain the app from the Apple App Store.

6. Log In and Configure: Open the app and log in using your credentials. Upon first opening the desktop app, you may be offered a tour; you can either skip or view it to familiarize yourself with the main screen.

7. Connect to a Server: Click the “Quick Connect” button to automatically connect to the fastest available server. To select a specific server, click on the country name listed in the bottom left corner or use the drop-down arrow next to the country name to view a list of servers. Servers with lower loads provide faster service. Symbols next to server names indicate their suitability for P2P traffic, Tor network connections, or streaming.

8. Access Additional Functions: Click the hamburger menu to access more features. Select “Settings” from the list.

9. Adjust Protocol Settings: In the Settings screen, click on the “Connections” tab to view the current protocol. The default setting is “Smart,” which selects the most appropriate protocol automatically. Click the down arrow to choose from additional protocol options.

10. Navigate the Map: On the main screen, hover over a map triangle to view its location name. Use the plus and minus buttons to zoom in and out. To connect to a server, hover over the desired location and click the “Connect” button that appears.

11. Monitor and Disconnect: Once connected, a data throughput graph will appear at the bottom of the map. Your new IP address and active VPN protocol will be displayed in the top left corner of the app. To end the session, press the “Disconnect” button.

0 Reviews

Write a Review

Legal Disclaimer

THE-BEST-IPTV.COM does not own, host, operate, resell, or distribute any streaming applications, add-ons, websites, IPTV, or related services. This page may reference certain unverified services, and we cannot confirm whether they possess the necessary legal licenses to distribute their content. THE-BEST-IPTV.COM does not verify the legality of each application or service in all regions. Users are advised to conduct their own due diligence when using any unverified applications or services and to stream only content that is available in the public domain. The end-user is solely responsible for the media they access.