List of Recommended VPNs

Recommended VPNs

Proton VPN – 56/59
IVPN – 53/59
Windscribe – 52/59
AirVPN – 51/59
Mullvad – 50/59
NordVPN – 41/59

Note: Only the top VPNs are included in this list. ffsKISS uses Mullvad.

Criteria and Comparison Tables

Technology:

  • Protocols: Look for support of strong protocols like WireGuard & OpenVPN.
  • Killswitch: Should have highly configurable options (enable/disable on specific networks, on boot, etc.)
  • Multihop Support: Important to keep data private in case a single node is compromised.
  • Open-Source Clients: If the VPN provider has its own software, it should be open-source for better transparency.
  • IPv6 Support: The VPN should support and provide access to IPv6 addresses.
  • Remote Port Forwarding: This aids in creating connections for P2P file sharing or hosting services.
  • Own DNS Servers: VPNs that operate their own DNS servers can offer an additional layer of privacy and security, reducing reliance on third-party DNS providers and ensuring that DNS queries remain within their controlled infrastructure.
FeatureWeight (1-5)ProtonVPNAirVPNWindscribeIVPNMullvadNordVPN
Protocols5
Killswitch3
Multihop Support2
Open-Source Clients2
IPv6 Support1
Remote Port Forwarding3
Own DNS Servers4
Total Score20191817171715

Security:

  • Encryption: Utilization of strong encryption such as OpenVPN with SHA-256 authentication, RSA-2048 or superior handshake, and AES-256-GCM or AES-256-CBC data encryption.
  • Forward Secrecy: Ensures that even if encryption keys are compromised, past sessions remain secure.
  • Security Audits: Regular, published security audits from reputable third-party firms.
  • Vulnerability Management: Bug-bounty programs and/or coordinated vulnerability-disclosure processes.
FeatureWeight (1-5)ProtonVPNNordVPNWindscribeMullvadIVPNAirVPN
Encryption5
Forward Secrecy4
Security Audits3
Vulnerability Management3
Total Score15151512121212

Privacy:

  • Payment Methods: Acceptance of anonymous methods like cryptocurrency or cash.
  • Minimal Personal Data: Providers don’t require any identifying personal data including emails.
FeatureWeight (1-5)MullvadIVPNWindscribeAirVPNProtonVPNNordVPN
Payment Methods5
Minimal Personal Data2
Total Score7777755

Policies & Terms:

  • Logging Policy: It’s vital to know if the VPN logs your activities and, if so, what kind and for how long. Ideally, choose a no-log VPN.
  • Fair Use Policy: Some VPNs might restrict certain activities or have bandwidth limits.
  • Refund Policy: Understand the conditions under which you can get a refund if you’re not satisfied with the service within 30 days.
FeatureWeight (1-5)ProtonVPNIVPNWindscribeMullvadAirVPNNordVPN
Logging Policy5
Fair Use Policy3
Refund Policy1
Total Score9998886

Trust:

  • Transparent Leadership: The company’s leadership and ownership should be public-facing.
  • Transparency Reports: Regular and comprehensive transparency reports detailing requests for user data, etc.
FeatureWeight (1-5)ProtonVPNIVPNWindscribeMullvadAirVPNNordVPN
Transparent Leadership3
Transparency Reports2
Total Score5555330

Marketing:

  • Self-Hosted Analytics: Avoids third-party trackers like Google Analytics on websites.
  • Responsible Language & Clear Communication: Avoids use of alarming or misleading language in its interfaces and marketing materials. Accurate explanation of scenarios where Tor or other security measures might be more appropriate than their VPN.
FeatureWeight (1-5)ProtonVPNWindscribeMullvadIVPNAirVPNNordVPN
Self-Hosted Analytics2
Responsible Language1
Total Score3333330

Note: No single VPN will be the best fit for everyone. It’s essential to prioritize your needs and balance them against any trade-offs to find the VPN that works best for you.