Table of Contents - Article Hierarchy
Perfect Privacy is among the biggest players in the VPN industry. Although I am not really sure where Perfect Privacy stands in this rank whether, at the very bottom, middle or at the top. For that reason, I decided to test it out and make this review. This provider promises total internet privacy and security which is great but does it live up to what it says? We are going to find out in the course of this review.
In this day and age, internet security, privacy, and freedom are of utmost importance. A good VPN service should be able to satisfy all these three elements. There are hackers all over the internet and big brother is watching. There are a couple of tests I usually carry out when I want to establish whether a VPN service is good or not. In order to give you guys an honest opinion, I will include these tests and results in the course of the review. Specifically for Perfect Privacy.
About Perfect Privacy
Perfect Privacy functions as a firewall as well as VPN. It is owned by Vectura Data management Limited which is based in Switzerland. Perfect Privacy was established way back in 2008 and has over 55 VPN servers spread across 26 countries.
Plan and Pricing
Perfect Privacy offers three plans to choose from. No feature or functionality is restricted in any of the three plans. They all offer the same functionalities. The only things that vary are how much you are going to save and the period. Basically the longer the period, the more you save.
- 1 month: $12.99 per month
- 1 year: $9.99 per month (Save 23%)
- 2 years: $8.95 per month (Save 31%)
Features, Functionalities, and Privileges
Perfect Privacy comes with some pretty neat features and functionalities which you won’t see in many VPN services. Most of these features provide the options to tweak yourself from the desktop client and customer portal. In case you do not have technical skills, you can still maintain the default settings which still work fine.
Here are the main features and functionalities you get out of using Perfect privacy:
This is a technique or algorithm implementation that quickly analyzes and responds to changes in traffic routing. This algorithm responds by choosing the shortest route to the destination. Not only does it select the shortest route but also the most secure route to the resource on the internet. Having a shorter route means having fewer attack points. Furthermore, the IP address that is exposed changes every time the destination changes.
This feature lets you tunnel your traffic through multiple VPN servers. Perfect Privacy allows you to toggle this feature on and off. You can designate a maximum of 4 hops that is 4 servers. This is four times more anonymity compared to a conventional VPN connection. The traffic is encrypted between each of the servers which makes it nearly impossible for an attacker to piece together whatever is being routed. You can only find this feature in a handful of VPN provider.
IPv6 is the newer version of internet protocol compared to its predecessor IPv4. Currently, IPv4 is the one that is in more use although it has a lot of limitations and weaknesses compared to IPv6. IPv6 is more secure and allows easy implementation of complex functionalities such as end-to-end connection integrity. For that reason, IPv6 has seen a rise in implementation in recent years. This is definitely the protocol of the future and Perfect Privacy is already there.
Supports multiple VPN protocols
Perfect Privacy comes with multiple protocols which you can choose depending with your preference in terms of the speed you want, level of encryption and security. It supports OpenVPN, SSH2 tunnel, IPsec, HTTP proxies, PPTP, and SOCKS5 proxies. OpenVPN is one of the most trusted encryption protocol and has been implemented by a majority of the top VPN providers.
No logging policy
All the servers operated by Perfect Privacy run in RAMDISK mode. This means that when power is disconnected from a particular server, all the data will be erased and cannot be recovered. Most VPN providers just give you their word or a bunch of legal formalities about not disclosing your activity to third parties and you just have to trust them for their word.
You should note that even while using a VPN to mask your IP address, your habits on the internet can still reveal who you are. That is why this VPN provider has taken it a notch higher by incorporating TrackStop feature. What this does is that it protects you from tracking chookies, blocks ads, and prevents browser fingerprinting. It doesn’t stop at that. This feature protects you from phishing sites, malware, and includes parental control which filters inappropriate content. All this does not require a browser plugin. Most VPNs out there only encrypt your traffic. Internet privacy goes way beyond just encrypting your traffic. TrackStop counteracts all the activities and scripts meant to identify you on the internet. I can honestly say I have only seen this with Perfect Privacy. Normally, while using other VPN services, you would require to install third-party extensions along with the VPN.
If for some technical reason you get disconnected from the VPN server you are currently connected to, this feature temporarily halts all traffic until the connection is made again. This gives you the time to reconnect to another server without compromising your security even for one moment. In the VPN manager, there are three levels you can set this up which I will show you in the desktop client walkthrough.
This is a protocol that disguises your VPN traffic as normal traffic. Some websites or services discourage the use of a VPN while gaining access. It draws questions as to why you are even using a VPN in the first place. Some websites assume you have malicious intents. Some countries with internet censorship know that citizens can regain access by using a VPN hence have devised a way to detect VPN traffic. With Stealth VPN enabled, packets will just look the same as when you are not using a VPN.
Device/ Platform support
Perfect Privacy is compatible with a couple of devices and platforms but not too many. But it ain’t that bad since most VPN providers are compatible with the four common platforms (Windows, Mac, Linux, and IOS). As much as it is compatible with a couple of devices and platforms, most of them require manual setup. But the good side is that they have included comprehensive setup tutorials alongside each platform/ device.
I think it doesn’t matter the number of devices or platforms that can support Perfect Privacy since it is already compatible with eBlocker. If you have never heard of eBlocker, it is the first plug and play VPN solution. It can practically be connected to any device starting from your smartphone, computer to your smart TV. Perfect Privacy coupled with eBlocker gives you multi-platform support.
Here are the devices/ platforms that can support Perfect Privacy:
- Chrome OS
- Routers running DD-WRT
- Routers with AsusWRT
- Routers with AsusWRT-Merlin
- Routers with Tomato by Shibby
- Vilfo routers
- DrayTek Vigor routers
Desktop client walkthrough
Installing the desktop client software is easy. It is just a matter of downloading it and running the setup file. It is lightweight too at around 7.5MB. Looking at the interface, it is quite simple to use and navigate. The main windows are home and settings.
The home window lists all the available servers and the available bandwidth for each server. You can also ping all the servers right from the home window. Normally the server with the lowest pings has better speed. Settings window can be accessed from the ‘settings’ button.
The settings window has a couple of tabs having the appropriate settings. One of the tabs is ‘Perfect Privacy Settings’. Here you have the option to select the encryption protocol for your traffic. IPsec has more speed but is less secure while OpenVPN is slower but more secure. Despite being slower, OpenVPN gives you more features. Features such as cascading (multi-hop) and stealth VPN are disabled when you select IPsec.
Looking at the ‘Program Settings’ tab, right at the bottom, you are provided with the option of selecting your preferred encryption cipher. A weaker cipher is preferred if you have a slow CPU. Options for TCP encryption and single server configuration are also given. TCP works hand in hand with stealth.
While in the ‘Firewall and DNS’ tab, here is where you will find the kill switch feature which is under ‘Firewall’ and ‘DNS leak protection’. There are three options for the kill switch. With ‘Activate while tunnel is active’ selected, the kill switch is active only when a connection is established. With ‘Active while program is active’ selected, kill switch will be active as long as the program is running even without a connection. With ‘Active permanently’ selected, you can only access the internet when connected to the VPN, even when you close VPN manager.
The next tab is ‘IP and ports’. Here you have the option to select random exit IP in the case where a server has multiple IP addresses. You can also enable ‘default port forwarding’ which forwards three random ports to your computer. The last option lets you designate custom ports.
The following tab is ‘Cascading and Stealth’. Here is where you have the option to enable or disable multi-hop, Stealth VPN and proxy.
My experience while using Perfect Privacy
Perfect Privacy did work fine when it comes to masking my IP address and location. I used a web tool called whoer.net for this test. While testing for my IP address, the assigned addresses were not consistent. In that, they kept on changing when I use different IP check tools. The reason for this may be because I am assigned random IP addresses which change as you surf the web. My assumption is that the assigned IP address may change when the destination of the required resource changes. Like when you access another website. I was in Kenya and connected to a server in Chicago while taking the screenshot below:
While taking a look at security, there are three basic things a good VPN service should prevent:
- IP leak
- DNS leak
- Torrent IP leak
When you are connected to a VPN service, you are not guaranteed that the public IP address is completely concealed from peeping eyes. WebRTC, a feature implemented in most browsers, is the greatest cause of IP leaks. WebRTC is able to return your Local and Public IP addresses when requested by web services. Since my local IP address was masked, Perfect Privacy did not register any WebRTC leak. Note that most web tools that test for WebRTC leak flag your connection as leaking IP even when using a VPN. As long as WebRTC returns the assigned IP address and not your local IP address, everything is okay.
DNS leak exposes domain information of the sites you visit. You can simply perform a DNS leak test using a web tool called dnsleaktest.com. This tool lists all the DNS servers it detects whether from your ISP or the one used by your VPN provider. If there is a DNS leak, you should see a DNS server from your ISP also listed. Here is a screenshot of the results while I was using Perfect Privacy:
The two DNS servers don’t belong to my original ISP.
Torrent IP leak
Your IP address can as well leak while on a peer-to-peer network. A good VPN service should be able to protect you from such a weakness. I used a free web tool provided by TorGuard to check for torrent IP leaks. What happens is that they provide a magnet link which I added to uTorrent and after a short while it detects my torrent IP address that is exposed on the network. Here is the screenshot:
The IP address that was detected was not my original Public IP address. Another thing that I noted was that the IP address that was detected was different from the one detected in other tests.
Torrenting is one of the major reason why people use VPNs. Many VPN providers discourage the use of torrent clients but after trying out Perfect Privacy, downloads seemed to proceed fine. The notable flaw is that the speed was considerably slower when compared to not using the service. Then I decided to switch to IPsec which showed a great improvement.
Connectivity and speed
Connecting to a particular server happens in a matter of seconds. Although connecting to a server while Stealth and Cascading features enabled takes quite a while. About network throughput, there is a 20 – 40% reduction depending on the server you are connected to as well as the protocol your client software is configured with. IPsec provides a faster connection but less security. OpenVPN provides advanced encryption and features at the cost of speed. It is also tasking on your CPU.
Adblock and web filter
The AdBlock feature works pretty nice although I noticed a few ads that managed to find their way on my screen. It also takes a while for the changes to take effect after you enable TrackStop from the customer web portal. I also noted that there was a black screen where the ad was supposed to appear instead of disappearing entirely. The parent control feature also worked perfectly as well but I noted some adult sites were able to load. Despite being able to access some of these sites, I could not stream at all.
Netflix US Unblocking
I tried watching some Netflix US exclusive shows while connected to Perfect Privacy, but it didn’t really work for me. I got this “Streaming Error” – You seem to be using an unblocker or proxy. Please turn off any of these services and try again. For more help, visit netflix.com/proxy. Error Code: M7111-5059. For unblocking Netflix US, I recommend ExpressVPN. Check my ExpressVPN Review here.
My verdict about Perfect Privacy
Let’s face it, you can only find multi-hop and stealth in just a few VPN providers. When it comes to features, Perfect Privacy is spot on. The downside to that is that some of the advanced settings may seem overwhelming to some users. But I did find the advanced options useful in that I am given the chance to configure what I want as well as to customize my connection. Another key thing I can talk about is the plan and pricing they offer. Their price is quite hefty compared to other providers but when you weigh the extra features you get, it is worth it.
Concerning speed, it is a bit slow but not that bad. Furthermore, it depends on whatever protocol you are using. If your traffic is being tunneled through multiple servers and has to be encrypted all the way, all that requires time and processing. A reduction in speed is normal whenever you are connected to a VPN. Perfect Privacy is meant for someone looking for comprehensive security features as well as the freedom to choose the type of connection they want, both in the sphere of security and speed.