When it comes to the sheer number of servers to choose from, it’s tough to beat IPVanish. One of the most popular VPNs worldwide, IPVanish takes privacy very seriously and has been built with torrenting in mind. It creates no logs, not even the connection logs used for troubleshooting like ExpressVPN. L2TP and OpenVPN protocols both use 256-bit encryption. IPVanish uses shared IP addresses, and even has a built-in feature that lets users switch IPs periodically, such as every 60 minutes.
Some unscrupulous free VPN providers could well be scraping users’ personal data and selling it to third parties. One such high-profile case was Hola, a free VPN provider based in Israel. Hola was caught selling users’ bandwidth, and it was criticized for being opaque about how each Hola user became a node on the network rather than hosting its own dedicated VPN servers.
Panama-based NordVPN keeps neither connection nor traffic logs. 256-bit AES encryption with perfect forward secrecy is the default, along with optional double-hop encryption and Tor over VPN features. Speeds are great, but can be a bit volatile. DNS leak protection and a kill switch can both be toggled on in the settings. The traditional all-or-nothing kill switch is one option, or you can specify which programs get cut off from the internet if the VPN connection drops, such as a BitTorrent client.
This testing works well for comparisons, but it is far from a comprehensive assessment of a VPN's overall performance. So many factors can affect network performance, from the time of day to the individual configuration of VPN servers that I cannot account for all of them. Therefore, it's useful to think of these results as a snapshot of performance.
How to watch 2019 NBA Finals on KodiMay 28, 2019 / by Sam CookHow to watch the French Open on KodiMay 21, 2019 / by Sam CookHow to watch the US PGA Championship on KodiMay 15, 2019 / by Sam CookHere’s how to use the Kodi Github Browser from TVAddonsApril 17, 2019 / by Ian GarlandHow to watch the NCAA Frozen Four and Championship on KodiApril 10, 2019 / by Sam Cook
Know that not all kill switches are created equal. A simple dropped connection is fairly easy to plan for, but the kill switch might not be equipped to handle other types of network disruptions, crashes, and configuration changes. You can read more about leaks that occur in these scenarios in our VPN leak testing analysis, which we will extend to more VPNs as time goes on. The two types of leaks most pertinent to torrenters are IP address and IP traffic leaks.
Romania-based CyberGhost allows P2P filesharing on any server that isn’t located in the US or Russia. Due to legal pressure, CyberGhost actively blocks BitTorrent traffic in those two countries (presumably by blocking popular ports used by BitTorrent clients, but we haven’t tested this). CyberGhost isn’t wholly adverse to torrenting, though, and even has a “Torrent Anonymously” profile that will connect you to the best torrenting VPN server available.
ExpressVPN has an impressive server network of 2000+ servers in 94 countries spread across 148 VPN locations. Its huge number of servers helps you get torrenting servers in most of the countries that don’t have strict data retention policies. With ExpressVPN, you’ll enjoy features like split tunneling, automatic killswitch, multiple protocols, and DNS & IPv6 Leak protection.  We’ve managed to get an exclusive 49% of ExpressVPN.
The practical upshot is that no one can intercept your web traffic as it moves from your computer to the VPN server. And if you're connecting to websites via HTTPS (which you should), your data remains encrypted for its entire journey, even after it leaves the VPN server. This is why you need a VPN. VPNs are particularly important when you're using public Wi-Fi or unfamiliar networks. In these situations, hackers may be lurking on the network or even running the network themselves, hoping to snag your personal information.
Thanks for your comment. As far as comparing AirVPN with PureVPN goes, there’s a lot of difference between the two. PureVPN has servers in over 140 countries whereas AirVPN has only a handful of servers. If we compare the prices, then PureVPN also has an edge over AirVPN. On the contrary, AirVPN and PureVPN offer similar security measures: OpenVPN protocol and AES 256 bit encryption.

BitTorrent has an unsavory reputation, one that is both unfair and yet also well deserved. At its best, BitTorrent addresses the bottleneck created when too many people try to download the same files from a single source at once—be they bootlegged tv shows, hot music tracks, DRM-free books, or photos of cats. BitTorrent turns a file's popularity into a benefit, instead of a bottleneck, by having each of the downloaders distribute pieces of the file to every other downloader. Furthermore, it's decentralized, with no main server to choke under the burden of traffic. There's no disputing that torrenting is a clever idea. While it can be used for legitimate purposes, its decentralized nature also makes it perfect for illegally sharing copyrighted content online, too.
The short answer is that, yes, a VPN can shield your online activities from your ISP. And that's a good thing, not only if you have legally iffy torrenting habits, but also because it protects your privacy in general. An online survey of 1,000 conducted by PCMag found that 25 percent of respondents named ISPs as the biggest threat to their online privacy. That's entirely correct.
VPNGate is a fantastic academic initiative out of Japan that aims to uncensor the web for people living under oppressive anti-free speech regimes. It uses a network of volunteer nodes around the world as relays. It discourages P2P filesharing activities that would hog the network, however, and it keeps logs for up to three months to help weed out abuse and criminal wrongdoing.
Your account credentials are only to manage your account—we’ll need a new set of credentials for the Proxy service. In the client control panel, click the “Generate Password” button under “PPTP/L2TP/SOCKS Password.” This is what we’ll be using to configure our BitTorrent client. Write down the username and password that appears here (it’s different than your regular account credentials) and move on to step two.

The Streaming option is one I've seen in other products, including CyberGhost and PureVPN. In Ivacy, the streaming option serves as quick links to servers for watching the BBC iPlayer and watching streaming TV in the US. There's an option to request new "channels," but I prefer CyberGhost's setup that allows you to simply create your own presets for different sites and services.
Others argue it is unnecessary and, when using a torrenting VPN service, only serves to make torrenting more difficult and can even degrade user privacy. This is because other users sharing the same VPN IP address will all be limited to the same ports except for the one who chooses to port forward. That can make P2P activity more easy to trace back to a single user.
What is the Assistance & Access Bill & what does it mean for your security?May 29, 2019 / by Josh LakeWhat is an exploit kit (with examples) and how do cybercriminals use them?May 7, 2019 / by Aimee O'DriscollCan cryptography be used to secure electronic voting systems?May 7, 2019 / by Josh Lake7 best online cybersecurity courses for beginnersMay 6, 2019 / by Aimee O'DriscollHacking with Python – 6 best online courses for ethical hackersApril 30, 2019 / by Aimee O'Driscoll
How to watch 2019 NBA Finals on KodiMay 28, 2019 / by Sam CookHow to watch the French Open on KodiMay 21, 2019 / by Sam CookHow to watch the US PGA Championship on KodiMay 15, 2019 / by Sam CookHere’s how to use the Kodi Github Browser from TVAddonsApril 17, 2019 / by Ian GarlandHow to watch the NCAA Frozen Four and Championship on KodiApril 10, 2019 / by Sam Cook
While Public Wi-Fi is a real convenience, it also poses a threat to you privacy. Unsecured public Wi-Fi networks leave you very vulnerable to advertisers, criminals and hackers trying to steal personal data and information. Windscribe VPN for Chrome encrypts your internet connection to secure it preventing others from tracking your browsing activity and leaving invasive tracking cookies in your Chrome browser which compromise your privacy even after you disconnect.
A proxy (like Private Internet Access) funnels traffic—in this case, just your BitTorrent traffic—through another server, so that the BitTorrent swarm will show an IP address from them instead of you. In this case, Private Internet Access’ proxy server is in the Netherlands. That way, those anti-piracy groups can’t contact your ISP, and your ISP has no cause to send you a harrowing letter.

This is another VPN that features a built-in killswitch, so even if leaks were detected, your torrenting security would still be protected. The problem with leaks is that they often go undetected. So an oblivious user would carry on, thinking that they were safe and secure, all the while their ISP is watching every move they make. A killswitch counteracts this vulnerability.
I have used Ivacy for almost two years and just a couple of failures with their KILL SWITCH. The downloading of my data stopped….very nice. Unfortunately the uploading did not! This has happened numerous times and the last time I got the letter from Hollywood via my Internet provider. Something about a copyright infringement. This is the second one while using the Ivacy program. Various servers in numerous countries, yet I am getting the same IP address assigned to me when I hook up.
×