Perfect Privacy Review (2019
Perfect Privacy Highlights
- Country: Switzerland
- Logging: No (Traffic), No (Connection), No (IP address)
- Bypass VPN Block (DPI): OpenVPN+SSH/Stunnel/SOCKS/obfsproxy
- Pricing: $9.99 (per month)
- Allows P2P/ Torrent: Yes
- Simultaneous connections: Unlimited
- Live Chat Support: No
- Custom clients/apps: Yes
- Alternative website: N/A
- Trustpilot rating: 4 out of 5 (5 users)
My First Impressions
Does Perfect Privacy keep logs?
Perfect Privacy states that they do not record any user traffic, IP addresses, access times, access duration or bandwidth. Further, they re-assure that they log nothing on the FAQ page.
- traffic logs (i.e user activity)
- IP address
- connection logs (i.e bandwidth, timestamps)
Does Perfect Privacy bypass Deep Packet Inspection (DPI) and similar firewalls?
Countries like China, Iran, UAE, Turkey, and Russia implement firewalls that block access to VPN services. As an example, China uses the Great Wall of China (GFW) system to block most VPNs and proxies. Some VPN services use extra protocols so that users in those countries can bypass VPN blocks.
Perfect Privacy offers Stealth VPN for users who are “behind the walls.” There are different “stealth VPNs” for various platforms. On Windows platform, Perfect Privacy offers a VPN Manager software that has a Stealth VPN option in it. Furthermore, there is an SSH manager which is used as an SSH Tunnel on Windows. Linux has OpenVPN with SSH, OpenVPN with stunnel, and OpenVPN with obfsproxy, whereas macOS has only OpenVPN with obfsproxy. On Android devices OpenVPN with SOCKS and OpenVPN with SSLDroid options are available, and lastly on iOS devices only OpenVPN with SOCKS is available.
All the above-mentioned StealthVPN protocols, except for Windows, are configured manually (no one click connection here). In other words, the native apps do not have StealthVPN option, I hope that would not be a problem, thanks to user friendly instructions by Perfect Privacy VPN.
StealthVPN definition given by Perfect Privacy VPN:
Stealth VPN is a method to counter against Deep Packet Inspection (DPI). In some restrictive networks and countries, it is used to detect and block VPN traffic. Stealth VPN masks the VPN packets and makes them look like regular HTTPS packets. Since this protocol is also used for secure data transmissions, most firewalls do not block it, and VPN can be used in restricted networks.
Testing Perfect Privacy
I have not yet tested Perfect Privacy VPN.
Is Perfect Privacy VPN affordable?
Perfect Privacy has one plan type with 1 month, 1 year, and 2 year subscription options. One month subscription price is expensive as on most VPN providers, but annual subscription also does not offer much discount. The only advantage is that there is no limit in simultaneous connections with Perfect Privacy. In case you use the VPN on at least 10 devices, then you will pay $1 or less per device a month for the annual subscription.
Perfect Privacy VPN accepts major credit/debit cards, PayPal, Bitcoin, Bitcoin cash and over 60 payment options supported by PaymentWall (WebMoney, QIWI, Sofort, MOBIAMO, AliPay, UnionPay, etc.)
Perfect Privacy VPN does not offer a free trial, but there is a 7-day money-back-guarantee, except for Bitcoin and gift-card payments, in case you are not happy with their service.
What features are offered by Perfect Privacy VPN?
– Supported Platforms
Perfect Privacy supports Windows, MacOS, Linux, iOS, and Android, with standalone software for the platforms. Also, the VPN can be configured on some routers. The VPN provider adds extra features like kill switch, anti-tracking, ad-blocking, multi-hop and port forwarding.
– Supported Protocols
Perfect Privacy VPN offers OpenVPN, OpenVPN+SSH tunnel, OpenVPN+SOCKS, OpenVPN+stunnel and OpenVPN+stunnel protocols, besides to HTTP and SOCKS5 proxies.
– Number of Servers
Perfect Privacy has 55 servers in 24 countries.
In addition, Perfect Privacy got a very good rating on my Simple Stealth VPN Comparison Table thanks to its good logging policy, good pricing (many devices), and various stealth methods.
What I liked:
What I didn’t like: