We wondered if it might differ based on whether you’re using Mac or Windows, so we got in touch with Live Chat: Surfshark advertises they use 256-bit AES encryption, and their Features page specify it’s 256-bit AES-GCM. There’s a slight difference, with GCM generally considered more secure than CBC. We came across a recent review from PCWorld suggesting Surfshark is using 2 types of encryption: 256-bit AES-CBC and 256-bit AES-GCM. The first step is always looking at the type of encryption and VPN protocols used. Now that we know Surfshark isn’t a threat to your online privacy, it’s time to start looking at how they protect you from external threats. Military-Grade Encryption and the Best VPN Protocols Both pages are full of legal language, but confirm Surfshark is a no-logs VPN nonetheless. We scavenged through Surfshark’s Privacy Policy, as well as their Terms of Service, in case there was a catch hidden between all the legal jargon. Other than your email address and payment information, nothing can be linked to your internet usage while using Surfshark.Įverything else is diagnostic data, which most VPN companies record so they can maintain their service and fix any problems that come up. There are no data retention laws, so Surfshark isn’t legally obligated to keep user logs.Īnd even if they were, a foreign government or intelligence agency would have to go through a prohibitively difficult process to petition for a BVI High Court order that would allow them to request that kind of information. This is easily one of the best countries for VPN providers, thanks to the BVI’s very favorable privacy laws. Surfshark is based in the British Virgin Islands. In the past, we’ve talked about how some countries are better for VPNs than others.Īnd if you’re familiar with the VPN industry – or even online privacy in general – you’ll understand why we usually suggest steering clear of VPNs located in a 5 Eyes, 9 Eyes, or 14 Eyes nation (or any of their unofficial partners, like Israel).įortunately, there’s no such concern here. See our detailed explanation of how we forensically test each and every VPN.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |