The list is regularly updated in order to reflect the real market situation at all times. If torrenting is your primary reason for purchasing a VPN, however, check out our list of the best torrenting services currently out there. On top of this, the official stance of TunnelBear sounds more like “we do not care” rather than “it is allowed.” Therefore, the representatives of TunnelBear VPN warn its users against any illegal downloads.Įven though the company finally started exploiting some loopholes in Canada’s Copyright Act, we still would not deem it completely safe to download any copyrighted content. Having said that, the Canadian law on copyright infringement is pretty clear in its intention to put a stop to this practice once and for all. However, the company has apparently changed its mind recently and started allowing P2P filesharing on its servers. P2PĮver since its inception, TunnelBear wanted nothing to do with torrenting and its policy in that regard was a resounding NO. You can also choose the server on your own. This ensures the shortest possible distance for data travel. By nearest, we mean the one with the lowest ping. Ghost – This is a proprietary version of the so-called “stealth protocol” used to ensure better performance and protection in countries with higher levels of online censorship (China, for example).īesides these security-oriented options, TunnelBear also auto-tunnels to the “nearest” server available.You do not have to ever worry about “flipping the switch” after the initial setup during installation. Always on – TunnelBear will start when you turn on your computer and stay connected until your session is done.This feature is currently available on Windows and Mac OS. Vigilant – This feature addresses the seconds-long moments while TunnelBear connects or reconnects in case of a WI-FI hiccup.IOS is encrypted with 128-bit AES and utilizes SHA-1 for authenticating data.Īpart from its solid encryption package, TunnelBear boasts a pretty impressive list of security features IPSec/IKEv2 is the optimal option for iOS devices while MAC OS X, Android, and Windows use OpenVPN.Įxcept for iOS 8 and versions preceding it, a sturdy 256-bit AES encryption is used across all the platforms. TunnelBear operates with two different protocols. Its members (USA, UK, Canada, Australia, and New Zealand) can share the gathered information, so you can draw your own conclusions. Five Eyes is an international spy network, highly secretive and notorious for spying on citizens and operating above the law. The privacy policy states that by using the service, you agree to your info being used according to the laws of Canada. Since TunnelBear is based in Canada, the Five Eyes Alliance has to be mentioned. It means the app does not monitor and store user activity. VPN Encryptionįirst of all, TunnelBear’s no logs policy is pretty strict. In other words, even if the authorities serve the company a warrant, they will receive nothing of use. You can inspect, amend, correct, and delete your data at any given moment.īottom line, TunnelBear does NOT keep any activity logs, including the sites you visit, your IP address, used applications, and other information that can be used to connect you as an individual with your online traffic. Cookies – TunnelBear uses different sets of cookies for its “regular” and team software and you can find a comprehensive list on the official website.Īpart from the cases listed in the privacy policy, TunnelBear will never share your personal information or sell it to third parties.To prevent credit card fraud, TunnelBear will also collect your session information (device type, OS, and your IP address at the time of payment). If you opt for your credit card, TunnelBear will record your last name, last 4 digits of your credit card number, date of card use, card billing address, and expiry. You can bypass this data collection by using Bitcoin. Financial data – Information given to the payment processor once you make a purchase.Operational data – Total data used per month, OS version, TunnelBear app version, operational events, and whether you have been active this month.Account user data – Email address and your Twitter ID if you decide to tweet about TunnelBear for extra traffic.TunnelBear collects minimum information required to provide its service, process payments, prevent fraud, and monitor data usage on free accounts. Click Here to Visit Tunnelbear Logging Policy
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |