Proxy.sh Review (2019)

Proxy.sh Highlights

proxysh_logo
  • Country: Seychelles
  • Logging:  No (Traffic), No (Connection),  No (IP address)
  • Bypass VPN Block (DPI):  TOR’s obfsproxy (obfs2, obfs3, scramblesuit), ECC, ECC+XOR, SoftEther
  • Pricing: $2.50 (per month)
  • Allows P2P/ Torrent: Yes
  • Simultaneous connections: 3
  • Live Chat Support: No
  • Custom clients/apps: Yes
  • Alternative website: N/A
  • Trustpilot rating: N/A

My First Impressions

The name, proxy.sh, may fool you that it is a proxy service provider, but that is not the case. Proxy.sh is a VPN provider, has launched in 2012, and is operated from Seychelles, and is a part as a non-for-profit division of Internet incubator Three Monkeys International Inc. The team of 14 people behind the VPN, prefer to stay anonymous and do not give much information about themselves. The company is not that famous, and it is normal if you have not heard of them.

Proxy.sh has a good website which has a multi-language website via Google Translate, however the website lacks a live chat support. According to the info given on the website, they serve over twenty thousand customers. Proxy.sh claims to be the most transparent and privacy friendly VPN provider. Also, I would like to add that, the VPN provider offers free VPN service to activists, NGOs, and press members.

Does Proxy.sh keep logs?

Generally, I prefer the VPN service providers to have a very clear description on what they log and what they do not log. In this case, I could not find a clear statement. Proxy.sh claims, that it does not log collect or log any traffic or use of VPN/proxy technologies. Only after looking in the FAQ, I could find more precise information on the logging policy of Proxy.sh.

Proxy.sh VPN Logging Policy

To sum up, Proxy.sh VPN does not log/store:

  • traffic logs (i.e. user activity)
  • IP address
  • connection logs

Even though Proxy.sh has to provide data to legitimate authorities, when ordered by a court of competent jurisdiction. The provider claims that there is not much to find because of the non-logging policy.

Proxy.sh VPN Privacy Policy

Does Proxy.sh bypass Deep Packet Inspection (DPI) and similar firewalls?

Countries like China, Turkey, Turkmenistan and Russia implement firewalls that block access to VPN services. As an example, China uses the Great Wall of China (GFW) system to block most VPNs and proxies. Some VPN services use extra protocols so that users in those countries can bypass VPN blocks.

Proxy.sh impressed me with its variety of anti-DPI protocols:

  • TOR’s obfsproxy 
  • SoftEther
  • ECC
  • XOR

In the VPN industry, obfsproxy is offered by several VPN providers, but the number of VPN providers offering SofthEther, ECC and XOR is limited.

 

What is obfsproxy?

Obfsproxy is an obfuscation program that will scramble, or if you prefer, disguise your traffic to make it undetectable to firewalls and governmental monitors. It is what makes TOR users undetectable unless you monitor the exit nodes.

What is SoftEther?

SoftEther VPN is free open-source, cross-platform, multi-protocol VPN client and VPN server software, developed as part of Daiyuu Nobori’s master’s thesis research at the University of Tsukuba. VPN protocols such as SSL VPN, L2TP/IPsec, OpenVPN, and Microsoft Secure Socket Tunneling Protocol are provided in a single VPN server.

What is ECC (Elliptic Curve Cryptography)?

ECC provides an alternative to RSA. We coupled it with a 4096-bit Diffie-Hellman key, and our curve is ECDH secp384r1. Our full control channel is made of TLSv1.2, cypher TLSv1/SSLv3 ECDHE-ECDSA-AES256-GCM-SHA384 while the associated cypher is AES-256-CBC and the auth SHA512, making the whole combination one of the strongest known to the cryptographic research field.

What is XOR?

It lets you alter the “look and feel” of the traffic that goes between your devices and our VPN network, making it more difficult for any external watchers such as network administrators or governmental agencies to detect you are behind a VPN.

Proxy.sh provides XOR in exclusivity with ECC. The latter allows you to make sure your traffic will be next to impossible to decipher, while XOR allows you to make sure the third party cannot detect you are using OpenVPN.

Testing Proxy.sh

As usual, I test the VPN on Windows 7 PC, and an Android phone running Android 6.0.1. I am testing on an ADSL internet provided by the local telecom company and cellular internet provided by our local mobile operator.

Windows Test

In the previous chapter, I mentioned that a wide range of anti-DPI (or stealth) protocols have impressed me. After running tests using various combinations I was disappointed. None of the protocols could bypass the firewall in my tests. 

The test started with Safejumper software (OpenVPN software by proxy.sh) on Windows. The software has both standard OpenVPN and ECC, ECC+XOR protocols. None of them connected. Next, I tried the manual configuration using OpenVPN and Viscosity (another OpenVPN alternative software), which also resulted in a failed connection. 

The third test was CGIProxy. The link did not even respond. And the last test was SoftEther. The free servers by VPN Gate normally connect and bypass the firewall, even with slow speed, which is my I thought that the last test could succeed. And, as the previous Windows tests, SofthEther VPN could not evade the VPN blocking firewall. 

Similar tests were performed on my Android device. Sadly, the anti-DPI protocols are not included in the Safejumper app, only standard OpenVPN is added. 

As always, I tested the VPN both on its native app, Safejumper and on OpenVPN app, using a wireless connection and a cellular network. Proxy.sh failed to pass the android test, as it has on  Windows.  

proxysh_android_test
Proxy.sh Android test

To sum up, even though Proxy.sh offers various stealth protocols, none of them could bypass the firewall, neither on Windows nor on Android devices.

If you are not sure if Proxy.sh is for you, you can try the VPN by paying $2 for 3 day usage.

Is Proxy.sh affordable?

Proxy.sh VPN offers various plans, from 3-day paid trial to the plan with dedicated nodes. The best plan that suits for the comparison with other VPN providers is Solid Plan, which includes all servers offered by the VPN provider. The plan allows 3 simultaneous connections, which makes the price per device per month $2.50 ($1.11 on the Basic Plan). With its pricing plan, the VPN does not enter into the affordable VPNs list.

proxysh_pricing
Proxy.sh Pricing

Proxy.sh accepts Visa, Mastercard, American Express, Diners, Carte Bleue, DK, CartaSi, eNETS, PostePay, Fortumo, WebMoney, Sofort, Money Polo, W1, OOOPay Sberbank, Alfa Click, BTC-E, Mts, Beeline, Tele2, Exmo, Bancontact, WebMoney, PayPal, Cherry, Rbety, ePoints, DineroMail, MercadoPago, ClickandBuy, Mycard, Indomog, Pagseguro, Fanapay, RBK, Tutudo, Qiwi, Bank Transfer, iDeal, Poli, Dotpay, SanalPara, Postage, toditoCash, Mint, CashU, Ukash, WaveGame, Neosurf, GScash, Zong, Daopay, M1, Allopass, boxPay, BitCoin, LiteCoin, XCoin and Mikroodeme. 

Proxy.sh has the best refund policy, I have ever encountered. They refund whenever you want, for any possible reason. In addition, if the payment method is not refundable (like Bitcoin), they give you an anonymous voucher code.

 

What features are offered by Proxy.sh?

– Supported Platforms

Proxy.sh supports Windows, MacOS, iOS, and Android, with standalone softwares for the platforms. Safejumper, the custom software of Proxy.sh, is available on all platforms, however the anti-DPI protocols are not included in all of them. Also, the VPN can be configured on some routers. Torrenting/P2P is allowed.

– Supported Protocols

Proxy.sh VPN offers OpenVPN (UDP and TCP), TOR’s obfsproxy (obfs2, obfs3, scramblesuit), ECC, ECC+XOR, SoftEther protocols and HTTP/SOCKS proxies.

– Number of Servers

Proxy.sh has 64 servers in 37 countries.

Conclusion

What I liked:

  • Does not store/log traffic, IP address and connection logs
  • TOR's obfsproxy (obfs2, obfs3, scramblesuit), ECC, ECC+XOR, SoftEther stealth protocols
  • Bitcoin accepted
  • Wide range of payment methods
  • P2P/torrenting allowed, kill switch, DNS leak protection, port forwarding
  • Refund whenever you want

What I didn’t like:

  • Stealth protocols failed the tests
  • Pricing, $2.5 per device per month
  • No stealth protocols on the mobile apps
Close Menu