ProtonVPN Review

Deyan Georgiev
Deyan Georgiev

Updated · Oct 11, 2022

Techjury is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more.

We wrote this ProtonVPN review to help you decide whether it's the best VPN service for you. 
Read below to find out!

Company location

Geneva, Switzerland

Number of servers

1000+

Zero-log policy

Yes

Protocols

OpenVPN, IKEv2/IPSec

Stealth VPN

Yes, Secure Core

Double VPN

Supported

Ad-blocker

Yes

Torrenting

Supported

Streaming

Supported

Customer support

Email, Ticket, Twitter

WORKS ON:

apple linux chrome mac-os router android fire-tv windows
ProtonVPN Review

MINIMUM PRICE: Free

Visit Website
Visit Website

Best for: Anonymous browsing and secure P2P transfers

Strengths
Strengths Reliable connections
Strengths Onion routing
Strengths No logs policy
Strengths Decent server distribution
Weaknesses
Weaknesses No live chat assistance
Weaknesses Low speeds
Weaknesses Not great for bypassing geo-blocks

Developed by CERN scientists, ProtonVPN is a security-focused VPN service. This Swiss-based VPN provides you unrestricted access to the internet. Backed by impressive security tech, this unlimited free service utilizes industry-grade encryption when transmitting anonymized data via secure tunnels. Routed via the Layer 2 Tunneling Protocol, the PPP (Point-to-Point) transfers within the tunnel are backed by secure encryption mechanisms. The presence of Tor browser extensions allows users to hop onto an anonymous network with ease. The slick client of ProtonVPN provides an easy-to-operate user experience as well. Scroll down to read our comprehensive ProtonVPN review.

ProtonVPN Features

ProtonVPN comes with:

Secure core

This technology prevents network attacks such as code and SQL injections, man-in-the-middle attacks, Distributed Denial of Service (DDoS), insider threats, unauthorized access, and privilege escalations.

How?

By routing the traffic through multiple network servers. Using deception technology, such as network decoys, network attackers are distracted from the main target. Strong Network Address Translation (NAT) mechanisms, lower the probability of attacks. ProtonVPN safe servers in the Secure Core network landscape are located in countries that have strong privacy laws. Servers and networks are operated on dedicated networks as opposed to leased networks. 

Strong encryption

Encryption of traffic is multi-pronged combining network encryption, key exchange, and message authentication. The 256 bits key length AES-256 encryption over internet Key Exchange v2 makes it impossible to penetrate the network on the virtue of it being one of the strongest 256-bit symmetric cipher keys. Network handshakes are done with 4096 bit RSA. It is followed by the Diffie Hellman key-agreement to establish the veracity of the keys. Using HMAC with SHA384, message authentication is applied. ProtonVPN SHA384 is a reliable cryptographic hash function that powers its network security. ProtonVPN HMAC implementation converts the cryptographic function into MAC (Message Authentication Code).

Forward Secrecy

TLS/SSL cipher suites with strong algorithms in the realm of the bulk encryption algorithm, key exchange algorithm, and message authentication code establish forward secrecy. Cryptographic algorithms enable the exchange of keys, encryption, and decryption applies message secrecy. Bulk encryption encrypts and decrypts data at each routing point, doubling the security of traffic even with simultaneous connections on multiple devices. With forward secrecy, each session generates a unique set of traffic. With each connection, a new encryption key is generated. One key is used per session. 

Protocols

Reliable protocols such as IKEV2/IPSec, Open VPN are used. Using Camellia, AES, and many other 256-bit ciphers, traffic-utilizing IKEV2 establishes certificate-based authentication. 

Kill Switch and Always-on

ProtonVPN Kill switch and settings

The ProtonVPN kill switch periodically polls all servers connected in the VPN and monitors the network topology. If a VPN server is down or connection times-out, network traffic is blocked. Subsequently, the Always-on feature issues a fresh encrypted connection. The kill switch blocks the connection to the VPN server or the network region until the servers are up and running. This prevents accidental exposure of sensitive data. Hackers are denied any access to data even when a network route is down or in maintenance. 

P2P support

Speedy file sharing is achieved via the P2P support, which is a self-organized network of servers. ProtonVPN’s algorithms help partition tasks and workloads between peers. Processing power, disk capacity, network bandwidth is shared between the nodes. Consuming as well as supplying resources, peers in the ProtonVPN topology form a virtual community of VPN servers engaged in shared tasks. Functioning simultaneously as clients and servers, the data transmission is speedy, and so is the resource discovery and routing. 

DNS leak prevention

DNS leaks are non-existent because the traffic is channeled through secure encrypted tunnels. Private DNS service ensures that all DNS requests are routed through the private DNS instead of ISP’s DNS. DNS requests are encrypted over HTTP or TLS despite net neutrality. 

Interface

ProtonVPN Interface

The highly intuitive interface enables self-explanatory use of the client shell. ProtonVPN iOS, Android, and Windows apps all have the same sleekness. It requires no programming knowledge or coding experience. There are no configurations to be made too. We were pretty happy with the ease of use when we were doing the test for this ProtonVPN review.

ProtonVPN Advanced Features

In addition to the industry-standard features, ProtonVPN also goes the extra mile.

Tor over VPN

Your data travels through an anonymous volunteer overlay network comprising of roughly 7000 relays. No network surveillance software or traffic analysis bots can detect ProtonVPN traffic through the anonymous Tor over VPN network. This onion routing mechanism implemented as part of a communication protocol stack’s application layer, sends encrypted data via a virtual circuit consisting of thousands of Tor relays randomly selected. Multiple encryptions and decryptions are levied on the circuit, with each layer of the routing pathway encrypting and decrypting traffic multiple times. Using Tor over VPN allows devices on the network to identify the presence of a visitor, but cannot capture details of the visitor – even if it did, the details are hidden because of the obfuscated VPN technology.  

NetShield

Not many VPN providers offer an ad and malware blocker, but NetShield does. It improves your experience by getting rid of ads, trackers, and guards you from malware. The best thing about it is that it’s available on all ProtonVPN apps – Windows, macOS, Android, and iOS.

Fully encrypted servers

ProtonVPN goes above and beyond to ensure maximum security. That’s why the company uses full-disk encryption on its servers, keeping data safe from man-in-the-middle attacks. This way, you can rest assured that your confidential data remains private.

ProtonVPN Servers and Locations

More than 1000 servers spread across 55 countries enable a combined data throughput of 1,248 Gbps. Governed by zero traffic logs policies and supporting peer-to-peer transfers, servers are categorized as Secure Core and Standard. Secure Core servers are placed in countries such as Switzerland, Sweden, and Iceland that have strong privacy laws. Data centers are housed in underground storage cabinets to ensure physical security. Servers in Iceland are placed in a former military base. All Secure Core servers are owned and operated by ProtonVPN. These are not third-party servers, thus ensuring the integrity of data. 

ProtonVPN Speed

ProtonVPN speed was tested in multiple locations. The following results were obtained. 

Before connecting to VPN, the download speeds were in the range of 64 Mbps

After connecting to VPN to a nearby server in the US, the connection dropped. This side of the network was supposedly the fastest network. We experienced some massive drops in speed even when connected to the closest servers. 

Each server and how much traffic it is handling presently is shown, giving an indication of the overall network traffic. 

In the next test, we chose the US West Coast server. This server was showing low traffic. The VPN speed improved by a huge margin, but it was still about 30 Mbps, which is more than a 50% speed drop than our regular speed. 

A speed test was undertaken in servers in Germany. The speed was functional, but not out of the ordinary. With about 19 Mbps, we wouldn’t call ProtonVPN the fastest VPN out there. 

Speed tests conducted in the UK returned the same results too - more or less under 20 Mbps. These speeds were the same even up to Hong Kong. 

Overall, ProtonVPN speeds are far from blazing fast. It’s even slower than the industry’s average. On the upside, the network is highly secure. 

ProtonVPN Privacy and Jurisdiction

ProtonVPN is located in Geneva, Switzerland. The VPN service is protected by some of the strongest privacy laws in the world. Being outside of the jurisdiction of the US and EU, there are no restrictions associated with being part of a Fourteen Eyes group of countries. Therefore the company is not obligated to store logs because of government mandates. This is reflected in the zero-logs policy of ProtonVPN. 

ProtonVPN reviews in 2020 indicate that this VPN service has not been involved in any scandals. There have not been any cases where the data integrity of customers has been compromised. 

ProtonVPN Security and Protocols

Using the IPSec tunneling protocol, strong VPN privacy is established using a combination of authentication headers, encapsulated security payloads, and immutable security associations. Based on double-layer security, and onion routing, ProtonVPN security, and protocols enable safe and anonymous browsing, bypassing geo-restrictions using the ProtonVPN Tor network. 

  • IKEv2/IPSec – The virtually unbreakable x.509 authentication certificates-based mechanism followed by the Diffie-Hellman key exchange process makes ProtonVPN IKEV2 implementation reliable. Traffic is routed through secure private DNS servers; shared secrets and anonymous network sessions establish peer to peer sharing and transport. 
  • AES-256 – The implementation of the AES-256 algorithm prevents ProtonVPN network traffic from being attacked by man-in-the-middle or brute force attacks. Side-channel attacks, key-recovery attacks, XSL attacks, are impossible on this network. Requiring only eighteen clock cycles per byte of encryption, ProtonVPNs’ network data UDP packets encrypt and decrypt over the onion layered security topology adequately. 
  • OpenVPN – Underlying ProtonVPN’s OpenVPN usage is the AES 256 block cipher that secures all communication channels such as SSL and TLS. Keyed-hash MAC secures network packets using ciphers that encrypt and decrypt the network data at each vertex of the network topology. During peer to peer transfers, public-private key encryption enables peer to peer authentication during ProtonVPN torrenting. The VPN tunneling protocols are adequately secured by strong ciphers that can be extended by third-party plugins. 

ProtonVPN Leak Test Results

It wouldn’t be a complete ProtonVPN review, without some leak test results.

ProtonVPN’s unique selling proposition is its strong security features. When browsing over a Tor network via the ProtonVPN Chrome extension or using the VPN tunnel, your IP address is adequately masked. Your IP address is not sent to the ISP; instead, it is sent to a private DNS. ProtonVPN has an in-built DNS leak security feature. 

In the following test, made especially for this ProtonVPN review, no DNS leaks were detected. When located in the US, the connection was made through a server in Hong Kong. The real location, (in this case, the US) is not revealed. 

ProtonVPN and Streaming Services

Streaming services are restricted based on the country of residence or location of the user. ProtonVPN secure core servers allow users access to content that is blocked by geographic restrictions. ProtonVPN provides guidelines on the server to connect in the respective country depending on the streaming service chosen.

For example, to unblock ABC.com and safely browse the TV Everywhere services, you need to subscribe to ProtonVPN Plus or Visionary. You then install the ProtonVPN app. After connecting to a plus server in the United States, you select a show and start watching it at ABC.com. The last step is optional. You can register your participating TV provider with ABC.com to access more shows from ABC.com.

Likewise, there are guidelines from ProtonVPN on how to connect to various streaming services like Amazon Prime Video, BBC iPlayer, Disney +, DisneyNOW, ESPN+, F1 TV, FuboTV, HBO Max, HBO Now, Hulu, Netflix, NOW TV, Pluto TV, RAI, Sling TV and SyFy. ProtonVPN user reviews praise the fact that it can unblock so many of the popular streaming services.

How Good Is ProtonVPN for Torrenting?

ProtonVPN’s onion routing ensures that ProtonVPN free torrenting via peer-to-peer sharing and transfers. Even if not speedy, it is safe and reliable. ProtonVPN supports the BitTorrent client and has guidelines regarding usage. One important guideline is to use a P2P friendly server. Such a server is indicated in the server list by an icon. When connecting to a non-P2P server, maintained by an external data center, ProtonVPN may not guarantee a connection, as there could be a P2P redirection. Some partner data center servers may not provide torrent support. 

Torrent transfers are considered amongst the riskiest content and data sharing activities on the network. In this regard, ProtonVPN can be considered a good VPN service for peer-to-peer transfers. 

Can ProtonVPN Bypass Geoblocks?

ProtonVPN can bypass geoblocks. But there are restrictions. 

It needs to be via servers located in Germany, the US, and the UK. It is available only on the Plus pricing plan as well. So if you launch the app, and subscribe to the Plus plan, and select an Australian server to connect to ProtonVPN Netflix, the connection will not be made. Instead, if you connect to a US server that has the ‘P’ letter next to it, you will access Netflix. 

So the answer is yes – ProtonVPN can bypass geoblocks. However, if you try to watch a Netflix version of a series unavailable in the US, you can still do it:

  • Use torrenting to download the show you want
  • Try another platform such as Hulu or Amazon Prime

Ease of Use

While doing the test for this ProtonVPN review, we encountered no difficulties using the app. The navigation is easy and intuitive. The first time you access the app you are given a brief introduction or walk-through of the important features of the app. 

Available server locations are listed on the left, and current connection status is displayed on the top. There is also a map that indicates (in green triangles) the countries where servers are placed.

Customer Support

Unlike many of its competing VPN service providers, ProtonVPN does not provide live chat assistance. There is no phone option too. That’s something mentioned quite negatively in ProtonVPN reviews.

The only way to get in touch with support is to submit a ticket or send them an email. After submitting a question, you will have to give them 24 hours to respond. But the response you receive will be informative and helpful. There is also the knowledge base to rely on. This is a comprehensive set of articles offering assistance on common troubleshooting information. 

ProtonVPN Price

Now comes the ProtonVPN pricing part. There are four types of plans:

Free

$0/month

Access servers in only three countries. Connect only one device. Medium speeds.

Basic

$4/month

Access servers in all countries. Connect up to 2 devices. P2P transfers are available. Plus, you get NetShield included.

Plus

$8/month

Offers all features of the Basic plan, plus access to Secure Core tech, Tor Servers access, allows up to 5 devices, Secure Streaming, and up to 10 Gbps speed.

Visionary

$24/month

Connect up to 10 devices. ProtonMail Visionary included.

ProtonVPN Review - Verdict

ProtonVPN has a track record of providing secure VPN services. The company manages its own servers. More than 1000 servers in 55 countries ensure an abundance of internet coverage and lots of avenues to choose from to stream or browse websites. ProtonVPN also supports P2P via its P2P friendly servers, has a kill switch, no DNS leaks, and has inbuilt Tor routing for its Onion sites. Native apps for IOS, Mac, and Windows exist – enabling you to access the VPN service from popular platforms. The only downside is that ProtonVPN P2P speeds are low compared to some of the competition.

You can also check out ProtonVPN’s competitors in our VPN reviews list, or jump straight to the best VPN services on the market.

FAQ.


Is ProtonVPN trustworthy?

Yes it is.

On its website, ProtonVPN cites the case of Hotspot Shield that infringed customer data and was subject to an FTC complaint. ProtonVPN claims to be open-source, audited and backed by legal guarantees. 

Is ProtonVPN really free?

Yes, it is.

Still, the free version is limited.

Is ProtonVPN a virus?

No, ProtonVPN isn't a virus.

It’s absolutely safe to use.

Does ProtonVPN sell your data?

ProtonVPN is formed by CERN scientists and is operated by the company that is behind ProtonMail – an encrypted email service. ProtonVPN has no known cases of data theft. It does not come under the Fourteen Eyes jurisdiction and therefore isn’t obliged to store logs. You can find more detailed information about that in our ProtonVPN review.

SHARE:

Deyan Georgiev

Deyan Georgiev

Deyan has been fascinated by technology his whole life. From the first Tetris game all the way to Falcon Heavy. Working for TechJury is like a dream come true, combining both his passions – writing and technology. In his free time (which is pretty scarce, thanks to his three kids), Deyan enjoys traveling and exploring new places. Always with a few chargers and a couple of gadgets in the backpack. He makes mean dizzying Island Paradise cocktails too.

Leave your comment

Your email address will not be published.