Disclosure:
Professional Reviews

vpnMentor contains reviews that are written by our community reviewers, and are based on the reviewers' independent and professional examination of the products/services.

• Ownership

vpnMentor is owned by Kape Technologies PLC, which owns the following products: CyberGhost, ZenMate, Private Internet Access, and Intego, which may be reviewed on this website.

• Affiliate Commissions

While vpnMentor may receive commissions when a purchase is made using our links, this has no influence on the reviews content or on the reviewed products/services. We provide direct links to purchase products that are part of affiliate programs.

• Reviews Guidelines

The reviews published on vpnMentor are written by experts that examine the products according to our strict reviewing standards. Such standards ensure that each review is based on the independent, professional and honest examination of the reviewer, and takes into account the technical capabilities and qualities of the product together with its commercial value for users, which may also affect the product's ranking on the website.

vpnMentor has teamed up with cybersecurity firm ClearSky to release this report. Following the protests that broke out in December 2017, the Iranian government cracked down on internet usage and blocked popular social media sites like Twitter and Telegram. In response, many Iranians began to use to VPNs in order to bypass these restriction...
Report: Fake Android Apps Were Used to Monitor Iranian Protesters
Kyoohyung Han is a PhD student in the Department of Mathematical Science at the Seoul National University in Korea. He recently gave a presentation at EuroCrypt 2018 titled Homomorphic Lower Digit Removal and Improved FHE Bootstrapping. He was generous enough to give me a few minutes of his time and talk a little more about his research and the ...
Interview with Kyoohyung Han at EuroCrypt 2018 on the topic of Bootstrapping and Homomorphic Encryption
Thyla van der Merwe received a BCom in Mathematics, Statistics and Economics, a BSc (Hons) in Mathematics and an MSc in Mathematics from the University of Cape Town, South Africa. She has a graduate MSc in Information Security at Royal Holloway, University of London as a FirstRand Laurie Dippenaar scholar. Prior to starting at Royal Holloway, Th...
Interview with Researcher Thyla Van Der Merwe on TLS and Online Privacy
Here at vpnMentor, we commissioned a report to test the security and privacy of three wearables in the health and fitness sectors. Digitsole Warm Insoles, Modius Headband and Ivy Health Kids Thermometer were all found to be collecting and exposing personal information, putting their users’ privacy at risk. In the case of Digitsole and Modius,...
Security and Privacy Flaws Discovered on Popular Wearable Devices
About the authors: Sudhanshu Chauhan is an information security professional and OSINT specialist. He has worked in the information security industry, previously as Senior security analyst at iViZ and currently as Director and Principal Consultant at Octogence Technologies. Sudhanshu has also written various articles on a wide range of top...
Interview with Online Privacy Experts Mr. Sudhanshu Chauhan and Mr. Nutan Kumar Panda. Authors of “Hacking Web Intelligence”
For the past 30 plus years, the IACR (International Association for Cryptographic Research) has been at the cutting edge of cryptographic research. They run three conferences a year; Crypto (In the United States), EuroCrypt and AsiaCrypt. I spoke with Orr Dunkelman, General Chair for EuroCrypt, which is taking place in Tel Aviv, Israel from A...
Getting Ready for EuroCrypt 2018 with Orr Dunkelman
Q: When did TigerVPN start the process to implement the GDPR guidelines? We were monitoring the framework development for quite some time and started to take physical actions around late January 2018. GDPR is complex and to be fair, I think we should have even started a bit earlier. It looks easy at first but to get the entire company and all p...
TigerVPN is Probably the First VPN to Take GDPR Seriously
Tresorit offers a secure cloud service that allows individuals and businesses to store, sync, and share their files. End-to-end encryption and zero-knowledge service ensure that your confidential documents remain private. Tresorit’s cloud-based solution lets you upload your files and share them with your contacts. It is, therefore, a bit like...
Tresorit’s Cloud Solution Review 2021 – Outstanding!
Online security and data privacy are two of the hottest topics there is in IT at the moment. Supporting a global industry that is predicted to top $200 billion by the end of the decade, there is no shortage of analysis, comment and discussion to be found on the latest threats and how they can best be dealt with. From developers to academics, ...
The Top 20 Online Security Blogs to Look Out For in 2021
If you’ve ever gone into technical mumbo-jumbo while using a VPN, you might have seen terms such as OpenVPN over TCP or OpenVPN over UDP. You might know that OpenVPN is the most secure VPN protocol. But what about TCP and UDP? What are these terms and what do they mean? Let’s understand what TCP (Transmission Control Protocol) and UDP (User D...
TCP vs UDP: Understanding the Difference