Perfect Privacy VPN is the name of the next VPN provider that we’ll add to our ever-growing collection of such services and we must say that it’s a bold thing naming your service like that, especially if you’re not 100% sure that you can deliver.
During our reviewing of this product, we’re going to focus on the Windows app and we’re going to perform a battery of security tests against the service, to see if it leaks and if it does, how critical are the leaks, then see how fast the servers are, but we’ll also check to see exactly how capable is the service of handling P2P, TOR, streaming, unblocking and the such.
Worried this read might take a while? Well, it most definitely will, but we thought about how to make things more convenient for you and we came up with this table of content, which enables you to jump to the part that you’re interested in without breaking a sweat. Sounds good? I bet it does.
- Company information
- Switzerland Jurisdiction
- Terms of service analysis
- A quick introduction to Perfect Privacy VPN
- Creating an account
- Downloading the app on your device
- Checking the installer for malware
- Installing the application
- Running Perfect Privacy VPN on your computer
- Extra features
- Changing the settings
- List of servers
- Services unlocked
- TOR and torrenting support
- Customer support
- Security check-up results
- Speed test results
- Pricing plans
We’ve dug around for a while, but eventually, we found out that the company behind the Perfect Privacy VPN project is called VECTURA DATAMANAGEMENT LIMITED COMPANY and is located somewhere in Switzerland.
However, on the same page that we’ve learned this information from we could also find that the company has a technical implementation collaboration with a company called WEBINVEST INTERNATIONAL SA, which is located in Panama.
We know that we’ve mentioned two different companies in two different locations above, but the one we’re interested in is VECTURA DATAMANAGEMENT LIMITED COMPANY, which is located in Switzerland. However, if you’re concerned about the company, we’re glad to let you know that neither one of them is located in a 5, 9, 14 Eyes Alliances country, so you’re safe.
First thing’s first, using a VPN in Switzerland is perfectly legal, and I repeat, Switzerland is not a member of the 5, 9, 14 Eyes Alliances. Switzerland’s constitution embraces penalties against all forms of discrimination, privacy violation and hate speech. However, you might want to know that a while ago, 70% of Switzerland’s citizens voted in favor of a bill that enables the state to perform surveillance operations on its citizens’ online activities
Terms of service analysis
This is a thing that we do for every single VPN provider (i.e. performing an analysis on their Terms of Service documentation), regardless of the size of said document, because customers usually skip doing so, they hit that “next” button like there’s no tomorrow.
So we’ve decided to give the terms a thorough read, extract the essentials from the documentation and bring them back for you, our readers, to see. Fortunately, Perfect Privacy VPN has one of those short and cute documents that you can easily read during a 5-minute break.
- Although it doesn’t impose an active limit on its bandwidth and its usage, Perfect Privacy VPN has a fair usage clause in the documentation, which states that users are encouraged to use the status page and pick servers with low traffic and refrain from using servers with low bandwidths for large downloads or similar traffic-intensive purposes;
- Your account is your own and no one else’s, so you are not allowed to share your account credentials with third parties and you’re not allowed to make the credentials public (why would you?). Doing so might lead to your immediate account termination;
- Although you’re not allowed to share your credentials with others, you might still use the service from several devices that you own;
- You can request a refund if you’ve changed your mind about purchasing a subscription plan, but you need to make the request within seven (7) days from the date of purchase for it to be valid;
- It is not possible to receive a refund if you’ve made a gift-card, coupon-based, cash or bitcoin purchase;
- Since Perfect Privacy VPN advertises itself as a no-logging VPN provider, there’s a list of activities that you’re requested not to do, stating that the lack of logs shouldn’t be seen as a “free ride for criminal activities”;
- You are not allowed to send, introduce or execute malicious content to networks or servers including but not limited to viruses, malware, spyware, key loggers, trojan horses, RATs, and worms;
- You are not allowed to cause or initiate security breaches or disrupt network communications or connectivity by means such as floods, email-bombing, packet spoofing, and forged routing information;
- You are not allowed to engage in any activity that might resemble hacking;
- You are not allowed to intercept any data that are not intended for you (i.e. sniffing);
- You are not allowed to circumvent or evade authentication by means of brute-forcing, cracking or using dictionary attacks or any other similar methods;
- You are not allowed to interfere with any other services or denying service to other users, hosts or networks by using attacks such as DoS or DDoS;
- You are not allowed to make use of any program that might interfere with another user’s session or disrupt it;
- You are not allowed to engage in any form of unsolicited communication including but not limited to spam, pyramid schemes, chain letters and the such;
- You are not allowed to forge email headers (spoof);
- You are not allowed to issue dangerous threats, encourage or threat bodily harm or property destruction;
- You are not allowed to harass another or encourage such behavior;
- You are not allowed to collect and/or distribute personal information about non-celebrities and other persons without their consent and/or knowledge;
- You are not allowed to transfer (send, receive) or request any content that infringes intellectual property rights or violates trade secrets;
- You are not allowed to use Perfect Privacy VPN to access or distribute child pornography or bestiality;
- You are not allowed to use Perfect Privacy VPN to host hidden services or servers that are publicly available (I think they mean .onion websites);
- You are not allowed to commit crimes, felonies, criminal offenses, misdemeanors or administrative offenses while connected to the service;
- You are not allowed to act in such a manner that Perfect Privacy VPN might be subjected to liability as a result of your behavior;
Long story short, don’t break the law and you should be fine. Even though Perfect Privacy VPN won’t keep logs of your activity and will have no idea who you are, you should still not see this as a challenge and use Perfect Privacy VPN in a responsible manner.
“Specifically, we do not record or log any user traffic so potential sharing such data with third parties is technically impossible. We do not store IP addresses, access times or duration, nor bandwidth caused by individual users.”
For the servers to operate optimally they collect and display general server information on the website and for detecting and eliminating potential technical issues, the total load of individual servers is recorded. As you can agree, there’s no way of zeroing-in onto a user’s identity based on this information.
The following details are collected for billing purposes and customer support:
- Your login credentials;
- The expiry date of your account;
- Your email address (which can also be a ghost email);
Credit card details are not stored by Perfect Privacy VPN, as they’re being handled by third-party payment processors.
So there you go: zero logging of personally-identifiable data. Again, this is not an invitation for you to act haphazardly.
A quick introduction to Perfect Privacy VPN
As you have probably figured out already and as its name strongly suggests (twice, I might add), Perfect Privacy VPN is a VPN solution that was designed to help you keep your connection safe and private, out of the reach of prying eyes. But why don’t I let them do the talking on this one?
“Perfect Privacy is an initiative of private and independent individuals from different parts of the globe, dedicated to protect your privacy and anonymity online. Our services are fully compliant with the law. We do not monitor, review, log or store your communication/connection data.”
Simply and nicely put. Three phrases that have told us everything we needed to know. Well, not everything, we still have to talk about the unique features they provide you with. Did I say too much? Moving on.
Creating an account
Of course, a premium service such as Perfect Privacy VPN couldn’t function without an account and you heard what they said, that they need your credentials for billing and customer service, so we’re on our way to create an account. Doing so can be accomplished quickly and easily if you just follow our steps:
- Navigate to the product’s main page;
- Locate the “My Account” button at the top-right corner and click it;
- Hit the “Create your account” button in the newly-opened page;
- Choose a subscription plan from the list;
- Type your email address in the designated field;
- Choose a payment method from the menu;
- Type your payment information in the corresponding fields;
That’s it, you now own a Perfect Privacy VPN account and also have a neat subscription plan for you to play around with. I mean use in an adult and responsible manner.
Downloading the app on your device
Downloading the Perfect Privacy VPN Windows app on your computer is a breeze, especially since you don’t have to own an account in order to trigger the download process to start. But we’ll show you how. Are you ready? Just follow these steps:
- As before, navigate to the product’s main page;
- Locate and click the “VPN APPS” button at the top-right corner of the screen;
- In the newly-opened menu, hit the “Download” button for the device you want;
That’s it! Easy as 1-2-3 (pun intended). Wasn’t it a walk in the park? Note that if you encounter any difficulties with deploying Perfect Privacy VPN on your devices, in the “VPN APPS” page that you’ve opened earlier you can find a “Tutorials for all Devices” button, you just have to scroll down a bit to find it.
Checking the installer for malware
Now that you have the installer executable on your computer, you might be tempted to just double-click-next-next-next-install-finish it in one sitting, right? Well sure if I wouldn’t care about your safety and all, but luckily for you, I do.
So I’m going to direct you to VirusTotal, where you can perform a comprehensive “full-body scan” of the installer executable that you’ve just downloaded on your computer.
The reason why I prefer VirusTotal over any singular antivirus solution is pretty obvious: regular antivirus solutions only have their own engine/database combo while VirusTotal holds an impressive collection of engines, which makes detecting anything easier. Strength is in numbers, after all.
Anyway, if you run your own scan or more conveniently take a look at our results, you may notice that Perfect Privacy VPN’s installer triggered not one, not two, but three alerts, one of them from popular antivirus McAfee.
However, if you take a second look at the community score bar, you’ll see that it’s on the green side and it has 14 votes, meaning that 14 other users tested it and found the alerts to be false-positives. We’ll still proceed with caution, though.
Installing the application
Now comes the fun part. Not really. Well, maybe, if you take pleasure in setting up stuff on your computer, which is totally understandable. Luckily, if you’re a novice, there’s not much that you need to do in order to deploy Perfect Privacy VPN on your computer.
Assuming that you’ve already downloaded and scanned the installer’s executable, launch it by double-clicking it, hit the install button, wait for the process to finish and hit the finish button after deciding whether or not Perfect Privacy VPN should be run when you close the installation window. Told you there’s nothing much to do.
Running Perfect Privacy VPN on your computer
Good, so you have installed the Perfect Privacy VPN Windows app on your computer, now what? If it hasn’t launched already, give its desktop shortcut a hearty double-click. Note that the shortcut is named VPN Manager instead of Perfect Privacy VPN, so you avoid any name-generated confusion.
The main screen of the app is quite user-friendly and features intuitive controls. Most of the window consists of a list of servers that you can connect to or show information about (it’s actually a local log, so you can keep track of events).
The top of the screen lets you view your connection status, whether you’re connected or not, your real or assigned IP and the server that you’ve connected to. At the bottom of the screen, you can see additional controls that let you perform ping tests for servers, minimize or close the app and last but not least, access the configuration window quickly.
As we’ve mentioned earlier, Perfect Privacy VPN comes with a series of extra features and it’s very likely that you won’t see them when using other VPN services, so stick around and find out what it’s all about.
Well, it’s actually two features that we’re interested in, since the others are not exactly unique, and we’re talking about the NeuroRouting and TrackStop ones.
NeuroRouting is a technology that reportedly makes sure that your data remains within Perfect Privacy VPN’s encrypted network for as long as possible by using a neural network and some algorithms to calculate the best routes for your destinations dynamically.
TrackStop may not sound as impressive as NeuroRouting, but its purpose is still important. This feature is actually a filter that blocks content from questionable sources, such as advertisements, social media tracking, phishing websites, malware-ridden pages, inappropriate content and more. You can even adjust the filter to fit your needs.
If you want to make use of these features (and some more), log into your account on the website, scroll down while you’re on the dashboard and activate the tools you want to use.
Changing the settings
As we’ve mentioned before, you can access the configuration menu directly from the main window of the app. All you have to do is click the “Settings” button at the bottom of the main window. The configuration window holds six categories that encompass the whole collection of parameters that you can optimize to your taste, as follows:
- Perfect Privacy Settings: here you can log into your account, view your credentials (only your username is visible) and choose between IPSEC and OpenVPN connection modes;
- Program Settings: this section enables you to set the app to start with Windows, launch it minimized, automatically connect the VPN upon startup, change the server sorting mode, display gigabyte servers on top, invert the bandwidth panel, choose the OpenVPN encryption mode, toggle TCP configuration file usage and enable or disable single server configuration mode;
- Firewall and DNS: activate the firewall or DNS leak protection while the tunnel is active, when the program is active or activate them permanently, toggle the firewall local router option, allow the GUI to download traffic data without VPN, prevent IPv6 leaks and manually select DNS servers;
- IP and Ports: enable random exit IP addresses, toggle default port forwarding, activate custom port forwarding, choose a server for custom port forwarding, add 1-to-1 port forwarding rules, manage custom port forwarding and set the app to automatically renew expired forwardings;
- Cascading and Stealth: enable cascading and choose the maximum number of hops, toggle the stealth VPN feature (obfuscation) and configure its settings, enable proxy and configure it (username, password, server, port);
- Other: set the debug level to consider when creating logs, set the app to always show logs, check for updates and reset networking settings;
As you can see, there are a lot of options that you can configure to your liking, but if you’re new to this whole VPN business and don’t know what you’re doing, you’d probably want to leave most of the settings untouched. By the way, the firewall we’ve mentioned above is actually the app’s kill switch (it’s a more familiar term).
List of servers
Perfect Privacy VPN provides you with several servers in 26 countries all around the world. While this seems like a narrow server park, you should know that only dedicated servers are used and absolutely no virtual servers are employed.
That being said, we’ll include a list of servers that Perfect Privacy VPN lets you connect to, but if you want to see the live status of each server (server load), you should head to the official page. Here you’ll only find basic server info, such as location, bandwidth, IPv6 support and P2P-support.
|Chicago1||United States of America||[1000 MBit/s]||Yes||No|
|Dallas1||United States of America||[1000 MBit/s]||Yes||No|
|London1||Great Britain||[1000 MBit/s]||Yes||Yes|
|London2||Great Britain||[1000 MBit/s]||Yes||Yes|
|LosAngeles1||United States of America||[1000 MBit/s]||Yes||No|
|Miami1||United States of America||[1000 MBit/s]||Yes||No|
|NewYork1||United States of America||[1000 MBit/s]||Yes||No|
|Nottingham1||Great Britain||[1000 MBit/s]||Yes||Yes|
|Prague1||Czech Republic||[1000 MBit/s]||Yes||Yes|
Perfect Privacy VPN actually recommends you to always choose a large-traffic server if you’re about to perform large downloads or use huge chunks of bandwidth. Also they advise you to check if the server’s not too loaded and recommend that you always choose the freest server on the list.
Unfortunately, Perfect Privacy VPN isn’t capable of unblocking even the most popular entertainment websites or services such as Netflix, the U.S. version of Netflix, the U.K. version of Netflix, Hulu, Spotify, Amazon Prime Video and BBC iPlayer.
However, this shouldn’t immediately put you off since most of these providers have waged war against VPN services and their customers, in an attempt to limit and even restrict them from accessing content that would otherwise be unavailable to them.
TOR and torrenting support
One of the most popular reasons why people turn to VPN services is that they need that privacy boost whenever they engage in P2P file-sharing activities such as downloading or uploading torrent files, so naturally we checked to see if Perfect Privacy VPN can handle the heat.
Torrenting works fine with this VPN, just as long as you remember that you need to connect to P2P-friendly servers. The P2P-compatibility might have something to do with server performance since P2P file sharing isn’t an illegal activity just as long as you remember that you shouldn’t download illegal content or one that violates copyrights or other intellectual rights.
TOR works as well (we’ve tried), but before you attempt to run TOR in conjunction with Perfect Privacy VPN (actually with any VPN service you might be thinking of), you should consider the fact that your speed will be severely limited and your privacy might be compromised as a result of you landing on a malicious TOR exit node. Your idea doesn’t sound that good now, right? My advice would be: just pick one and stick with it (i.e. between VPN and TOR).
We’re gonna go ahead and say it from the start: Perfect Privacy VPN does not have a live chat system, so stop looking around for it and focus on the actual options. Heading to the “Contact” section of the website can be done by scrolling down to the bottom of their site and clicking the “Contact” button.
Here you can find a FAQ section that could help you diagnose and possibly fix your issue by yourself, without additional assistance. If it doesn’t or you’re not that tech-savvy, you can create a ticket by using the ticket system, contact them via email or get in touch by using the contact form, which is also email-based.
If you decide to contact them via email, you can encrypt your communication by downloading a public PGP key and use the fingerprint available in the email section. The customer support might be a bit slower than what you’re used to, but it’s still effective.
Security check-up results
Now that we’ve got past the thorough service testing, we can focus on the security part of our assessments. Yes, this is the part where we run several security tests while we’re connected to a Perfect Privacy VPN server to try and see if it cracks and leaks. Hopefully, it won’t but who knows what we might find?
Anyway, these tests will unfold just as we’ve described in this article, on a server located in Miami, U.S.A. (we’re also looking for location inconsistencies, which might hint at using virtual servers).
Conclusion: as you can see, there were no leaks during our security tests (IP, DNS, WebRTC and Flash IP), and not even one location inconsistency was detected. Perfect Privacy VPN is indeed a secure VPN solution and can provide you with an airtight, reliable connection.
Speed test results
Now that security’s out of the way, we can start focusing on things that probably seem more interesting to you, such as how fast can Perfect Privacy VPN’s servers go. Well, we’re about to find out. Note that these tests will take place on several servers from different locations since we’re aiming to determine if location can affect speed and if it does, we want to see how much a difference does it make. That being said, let’s begin our tests.
|Location||Internet Speed||Latency||Upload Speed||Downloaded||Uploaded|
|U.S.A.||51 Mbps||153 ms||220 ms||5.9 Mbps||80 MB||20 MB|
|Germany||56 Mbps||33 ms||169 ms||24 Mbps||90 MB||100 MB|
|Hong Kong||27 Mbps||248 ms||264 ms||7.2 Mbps||50 MB||20 MB|
|Australia||27 Mbps||324 ms||337 ms||3.3 Mbps||90 MB||10 MB|
|Without VPN||69 Mbps||4 ms||149 ms||49 Mbps||110 MB||250 MB|
As you can see for yourself, the speed values aren’t exactly breathtaking and we’ve also noticed a bit of slowdown compared to our default, non-VPN connection.
If you head down to Perfect Privacy VPN’s pricing plans page, you’ll notice that there are three different subscriptions, but there are actually five of them, you just need to click the little (almost invisible) plus-shaped icon to expand the list.
The plans are as follows:
|Plan type||1 Month||3 Months||6 Months||1 Year||2 Years|
For all your devices
Cascading of multiple VPN servers
Configurable port forwardings
No traffic limit
Up to 1000Mbps bandwidth
Easily usable client software
Support via email, forum, and TeamViewer
Quickly switch between OpenVPN and IPsec/IKEv2
Stealth VPN Technology
7 Days Money Back Guarantee
As you can see, the plans are quite pricey and the discounts for larger plans aren’t as big as expected.
To sum it up, Perfect Privacy VPN is, as its name double-suggests, a VPN solution to keep you private and secure while you’re online. The company behind the project is called VECTURA DATAMANAGEMENT LIMITED COMPANY and is based in Switzerland.
Switzerland has quite the unhampered Internet access, with the jurisdiction having some pretty tough laws against tampering with freedom of speech and privacy violations, however, some time ago, most of its inhabitants have voted in favor of a bill that offers the government the legal framework to perform surveillance operations on the online activities of Switzerland residents.
The Windows version of Perfect Privacy VPN can be easily downloaded from the official website without needing an account. However, you’ll need an account to establish a secure VPN connection from within the app, so keep that in mind.
The app has a different name but serves the Perfect Privacy VPN service, so you shouldn’t get confused about seeing VPN Manager on your desktop instead of Perfect Privacy VPN. The interface of the app gave us the feeling that it’s quite outdated, and not only because of the dull theme, but also the buttons, menus and such tend to be kind of sluggish.
If you launch the settings window, for instance, and try to close it quickly, it will take quite some time to do so, because it checks to see if you modified anything, even though you just opened it and closed it. The app tends to freeze for a bit when attempting to establish a VPN connection and does the same thing when you disconnect from a server.
Sometimes, attempting to quit the app does nothing, especially if you’re in the process of connecting to or disconnecting from a server, so you should make sure that the app is, in fact, closed, if you need it closed.
A lot of settings are pushed towards you but some of them are really technical so you might refrain yourself from making any modifications if you’re not an advanced VPN user, since you might affect (in a negative way) the functionality of the service (on your side).
Perfect Privacy VPN is not capable of unblocking some of the most popular entertainment services and websites such as Netflix (U.S. and U.K. versions, too), Hulu, BBC iPlayer, Amazon Prime Video, and Spotify, but supports torrenting.
Security tests have proven that Perfect Privacy VPN can keep your connection private and secure since we’ve detected no leaks and speed-wise we’ve got slightly above-average results. However, connecting to a server can take a while. Furthermore, Perfect Privacy VPN doesn’t have the most impressive server park we’ve encountered. It’s actually quite the opposite.
Last, but not least, the subscription plans it offers are a bit pricey for what it has in store. Sure, the service has some never-seen-before features such as a neural network + algorithm combo that routes your traffic dynamically, but there’s really no way for us to check on that, we’ve noticed no difference from regular browsing.
Do we recommend Perfect Privacy VPN? Yes, if you don’t mind the price. It’s a decent VPN service provider, has good security and a lot of customizable options, but it can’t unblock Netflix, has a narrow server park and their speeds are not the greatest.
+ Good security; (5)
+ Switzerland jurisdiction; (3)
+ No logs; (5)
+ Supports torrenting; (5)
– Average speeds; (3)
– Can’t unblock Netflix; (0)
– Narrow server park; (1)
– App feels a bit sluggish at times; (1)
– A bit pricey; (2)
Perfect Privacy VPN receives a 2.77/5 rating.