![]() I mean, you don’t even get a Kill Switch. As for protocols, it offers OpenVPN (TCP & UDP), L2TP/IPsec & PPTP tunneling protocols.īut as for other security features, the VPN doesn’t offer much. Starting with encryption and TigerVPN supports industry-standard AES-256-CBC encryption with 2048-bit RSA for key exchange. Encryption & Other FeaturesĪs for encryption and protocols, TigerVPN is pretty well equipped. If we talk about the connection logs that it stores, here’s what they’ve mentioned in its privacy policy:Ĭonsidering that they don’t collect too much information and their connection logs aren’t too invasive, I think TigerVPN can supposedly pass as a no logs VPN service. TigerVPN also claims that it never has and will never sell, share, or give away any of its user’s private data. In other words, we do not save, read or have technical access to any DNS queries, websites you visit, data you transferred or communications” “At no time, we store, read, analyze or in any other way process the traffic exchanged between you, our servers and the public internet. Here’s a snippet from their privacy policy: If you go through their privacy policy page, you’ll see that they clearly mention a paragraph stating that they don’t keep activity logs. Yes, TigerVPN keeps logs, but only connection logs. We’ll look over the logging policy of TigerVPN in a bit to see whether it keeps any logs or not. #Shimo vpn review freeSince there are no data retention laws in Slovakia, it is free to refrain from keeping mandatory data logs. Slovakia also doesn’t fall under the jurisdiction of the infamous 5 eyes alliance, which is also great. Now, if you don’t know, Slovakia is mostly free of censorship. It has an office location in Romania and mainly operates under Slovakian law. Jurisdiction – Where is TigerVPN located?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |