TunnelBear is the newest addition to our list of reviewed VPN service providers. There’s no particular reason why we chose it as our next subject. Okay, maybe it’s the name and their comic take on their service that got us hooked.
Yeah, we get it, this might seem like a long, boring read, but we can’t help it! There’s too much to talk about and everything is kind of important, especially when the stakes are so high (we’re talking about your security and privacy here).
Although we can’t keep it as short as you’d prefer, we’ve devised a table of content system, so that you can quickly jump to the parts that you’re interested in without having to go through the whole document. How does that sound? Good? Alright then, let’s begin.
- In the beginning
- McAfee ownership; what does it mean?
- Data logging policy
- TunnelBear’s security audit
- A bad start
- Right back on track
- Audit conclusion
- Terms of service analysis
- Becoming a TunnelBear
- Checking for malware
- Installing TunnelBear
- Running it for the first time on your PC
- Past the login gates
- Cute interface
- Simplistic controls
- Accessing the settings section
- Exploring our options
- VigilantBear and GhostBear
- Servers you can connect to
- Our customer support experience
- The tests we’re going to run
- Security test results
- Speed benchmark results
- Unlocking popular services with TunnelBear
- TOR and Torrenting support
- Free trial available
- The real money talk
In the beginning
The TunnelBear VPN service was developed by the TunnelBear company, which was founded in 2011 by Daniel Kaldor and Ryan Dochuk in Toronto, Canada. The company created, developed and supported the TunnelBear VPN between 2011 and 2018.
In 2018, TunnelBear was acquired by McAfee. A quick look at the “About Us” section on their homepage lets us know that there are more than just two “bears” involved in this project, each of them holding unique perks and amusing, tongue-in-cheek background stories. See, that’s what we were talking about before.
Not much more can be said about the company since they weren’t the subject of any scandal or set a negative example before. Moving on.
McAfee ownership; what does it mean?
So you’ve learned that McAfee recently (kind of) purchased TunnelBear. How does that affect us, regular users? First of all, TunnelBear was based in Canada, so that means that it used to obey Canadian laws when it came to privacy and data security laws.
Data logging policy
Browsing TunnelBear’s homepage for a bit, scrolling around for a while, we stumble upon their views on data logging. Obviously, they are against it, as they state, no VPN service provider will publicly admit that they collect data and sell it to whoever asks or bids the highest amount, you know.
The claim reads that TunnelBear will never monitor your browsing activity, but neither will they log or sell it whatsoever. It’s exactly what you need to hear from a VPN service before you even consider trying it. Same old story, but here’s the catch, TunnelBear has been also publicly audited, so you have one more reason to trust they will keep your connection secure and your data private. Moving on.
TunnelBear’s security audit
Alright, it appears that they weren’t subjected to just one, but multiple security audits, starting in 2016 and from the looks of it, they plan on doing that every year, so expect future reports!
What’s more, compared to other VPN service providers who only get their applications audited, TunnelBear got a “full-body scan,” meaning that their whole infrastructure has been placed under close scrutiny by an independent team and the results have been made available for the wide public to access, read and analyze.
A bad start
A quick glance on their blog reveals that the first third-party audit (Cure53) that they underwent was in late 2016 and the results weren’t exactly great. A bunch of vulnerabilities was detected in the Chrome extension, and the team was pondering whether to publish the audit results or not. However, they did, hoping that the community would appreciate their transparency and not bash them over the security flaws that have been found. Besides, they were eager to repair the harms done. The outcome was that “All findings discovered in the 2016 audit were promptly addressed by TunnelBear’s engineering team and verified to be fixed by Cure53.”
In 2017, they took an audit again and the results were more satisfying than the last time since all the things that have been found by the Cure53 team were reportedly low-risk. Again, the findings were addressed by the same engineering team as above, thus proving that the team behind the project responded promptly to flaws in their security system. The results of the 2017 audit can be accessed here. Note that this report only features critical findings, since the low-risk findings have been filtered out. However, if you’re interested to see the list of low-risk findings, you can do so by accessing this link.
Right back on track
The 2018 audit comes with a bit of flaunting and for good reason. TunnelBear stood their ground and paid for yet another audit from the same Cure53 team that they previously signed with. They claim that the audit took “a few hundred hours,” that they were given the chance to provide some feedback on the final report, where findings were considered inaccurate or impossible to reproduce, and that they are the only VPN service provider in the world who audited their whole infrastructure instead of just the apps. They used a “white-box” approach, meaning that Cure53 has received full access to their systems and code.
The findings on the 2018 security audit consisted of 2 critical findings, 5 high, 3 medium, 7 low ones and a bunch of informational issues. According to their website, all of the findings were promptly fixed. More so, reportedly, the more severe vulnerabilities would’ve been possible to exploit only if the attacker had direct access to the device and was logged in as a guest. The results can be viewed by accessing this link.
Considering that TunnelBear has been subjected to more than one independent security audit, it’s safe to say that they’ve learned the importance of regular security assessments, considering that none of the audits was 100% clean, despite the team’s efforts to keep things nice and tidy.
Technology is ever-growing and nowadays there’s no such thing as a foolproof system, one that, once fully developed, can ensure permanent protection forever without any additional assistance or tweaking. The safest way to keep you and your computer out of harm’s reach would be staying offline all the time, but that’s not really a valid option, is it?
Terms of service analysis
We understand that many of you are the type of users who just skips every time the words “terms,” “license,” “policy” or “agreement” come into view, but getting to know what you can and what you can’t do while using a service is crucial to the way things work.
So what we’re going to do instead of forcing you somehow to read these documents is we’re going to give them a full read ourselves, extract their essentials and lay them all here for you to read.
- Downloading, installing and using TunnelBear will immediately count as your acceptance to and agreement with the terms and conditions of the agreement;
- The terms and conditions can be modified by TunnelBear at any time and without prior notice, as the only form of notification will be posting an announcement on the website, but only if the alterations constitute material changes;
- If you keep on using TunnelBear after such modifications have taken place, it will be seen as your acceptance of and agreement with the newly updated terms and conditions;
- You are given a non-exclusive and non-transferable right to use the TunnelBear service, solely for your own personal purposes;
- You are not allowed to sell, resell, transfer, assign, or commercially exploit TunnelBear or build a product using similar TunnelBear components;
- You are not allowed to use TunnelBear for any commercial purposes;
- You are not allowed to engage in any form of unsolicited communication while connected to the service;
- You are not allowed to send questionable material to other users;
- You are not allowed to distribute harmful content while connected to TunnelBear such as viruses, malware, trojan horses and the such;
- You are not allowed to interfere with the service or disrupt its integrity;
- You are not allowed to attempt to gain unauthorized access to the service, as well as its networks or related systems;
- You understand that TunnelBear is available on an “as is” basis, and no warranty or representation is provided;
- Although TunnelBear will do their best to keep the service in top shape, sometimes things might be subject to various factors which can occasionally affect its wellbeing;
- TunnelBear is not responsible for any kind of loss that might arise as a result of using the service;
- You are solely responsible for making sure that your device is compatible with TunnelBear;
- You are not allowed to use TunnelBear to misrepresent or act on behalf of someone else;
- You are not allowed to change the origin of messages or posts (header forging);
- You are not allowed to do illegal stuff while connected to TunnelBear;
- You are not allowed to mask your identity for illegal purposes while using TunnelBear;
- You are not allowed to distribute copyrighted material by using TunnelBear;
- You are not allowed to put a strain on the TunnelBear service;
- You must at all times comply with applicable laws, whether local, state, national or foreign laws we’re talking about;
- If you’re caught violating the terms of the agreement, TunnelBear might terminate your account without notice;
- You are not allowed to use any TunnelBear branded component without permission;
- TunnelBear can suspend or terminate your account at any given time and without offering you any reason for doing so;
And now for the even more simplified version of the Terms of Service:
This is a legal document. If you use TunnelBear, you agree to the terms.
You can’t resell TunnelBear.
You can’t copy how it works (especially those wonderful on/off dials, that would be impossible).
You can’t use TunnelBear for any mischievous activities.
Sometimes things break. We do our best.
Surprise! You aren’t allowed to do illegal stuff with TunnelBear.
Respect our brand.
We reserve the right to euthanize your TunnelBear.
We are not liable if something goes really wrong.
We’re still not liable, but if a court says otherwise, our maximum cost is the fees you have paid.
You’re on the hook for our costs if your use of the Services drags us into court.
This part of the review will try its best to explain things like what kind of data does TunnelBear collects, how do they collect it and how do they plan on using it.
Personal data collected and what is it used for
|Account Data||What do we use it for?|
|Email address||Marketing, communications,
purchase receipts and
occasional product news
|Twitter ID (optional)||Completion of our Twitter
|Email confirmed||Confirmation that your email
address is valid
|Paid user||Provide paid users with
|Paid user expiry date||Provide paid service until this date|
Operational data collected and what is it used for
|Operational Data||What do we use it for?|
(e.g. iOS 7)
|User support, troubleshooting
and product planning
|TunnelBear App Version
(e.g. PC version 2.1.1)
|User support and troubleshooting|
|Active this month
e.g. 1 or 0
|Customer satisfaction, support,
network demand planning
|Total data used this month
e.g. 22.34 GB
|Customer satisfaction, support,
network demand planning,
granting free user data
e.g. Created an account,
complete Twitter bonus,
made a payment
|Troubleshooting account and
payment-related issues, these
events are not related to the
time and activity of VPN usage
Credit card info collected and what is it used for
|Payment Data||What do we use it for?|
|Card billing address||For use in credit card fraud prevention|
|Card expiry||For use in credit card fraud prevention|
|Last four Numbers of Credit Card||For use in credit card fraud prevention|
e.g. Device type, operating system,
The IP address at the time of payment
|For use in credit card fraud prevention|
Cookies and persistent trackers
|Cookie name||Service||Expiry date||Reason to store it|
|Session||TunnelBear records a bit of information that helps
us track how people are finding TunnelBear.
|Session||This cookie helps us understand which TunnelBear
touchpoint (eg: website, email) led you to purchase
|1 year||This cookie lets us know if you’ve already
acknowledged our cookie banner.
It saves your preferences so that the banner
doesn’t show up every time you visit the site.
|7 days||This cookie stores your account type and is used to
customize your TunnelBear.com account.
For example, if you have a paid account, we set
your bear type to Grizzly and all of the graphics
change to Grizzly Bears. We set a cookie so we
don’t have to continue checking your account
type in the database as you use the website.
|7 days||PLAY_SESSION is the authentication token for
TunnelBear.com. It allows you to use your account
without having to continuously log in.
|30 days||tb_user allows us to understand whether you are a
new or returning visitors to our website. By setting
this cookie, we’re able to customize the content on
our own without using any third-party tools.
|1 year||One common attack used against website visitors is
a cross-site request forgery attack.
TunnelBear uses this cookie to protect you from
|2 years||To make our website better, we use Google
Analytics (GA) to see how many people are visiting it.
We have set GA to use the minimum available
retention period and not store IP addresses.
|24 hours||To make our website better, we use Google
Analytics (GA) to see how many people are visiting it.
We have set GA to use the minimum available
retention period and not store IP addresses.
|1 minute||Google Analytics uses this cookie to limit the number
of requests that we can make to their service in a
given time period.
|ki_r||Qualaroo||90 days||This cookie helps us show anonymous surveys to
visitors who find us through specific services,
|ki_s||Qualaroo||90 days||This cookie tells us whether visitors have viewed or
interacted with a survey so we can stop showing it
|ki_t||Qualaroo||90 days||This cookie gives us timestamps and view counts
for pages in which surveys are active.
|ki_u||Qualaroo||90 days||This cookie provides our visitors with an anonymous
identity to associate with responses.
|1 year||TunnelBear uses Cloudflare to protect our service from
DDoS attacks. Cloudflare uses _cfuid in your browser
so that once they have checked to see if you’re a bot,
they won’t have to check again while you use our website.
|1 year||TunnelBear uses Stripe to process credit card payments
on our website. Stripe uses this cookie to help prevent
fraud on TunnelBear.com.
|24 hours||TunnelBear uses Stripe to process credit card payments
on our website. Stripe uses this cookie to help prevent
fraud on TunnelBear.com.
TunnelBear explicitly does NOT collect, store or log the following data:
IP addresses visiting our website
IP addresses upon service connection
DNS Queries while connected
Any information about the applications, services or websites our users use while connected to our Service
Becoming a TunnelBear
All you have to do is follow these steps:
- Head over to TunnelBear;
- Click the “Get it now and save 58%” button;
- Choose a premium subscription plan;
- Provide the website with your payment information;
- Hit the “Buy Now” button;
After submitting this information to the website, you can press the “Buy Now” button, which lets you choose whether to create a new account by typing an email address and a password in the designated fields or log into your existing account (assuming you already have one).
After successfully taking these steps, you’ll be prompted with an offer for their password manager, “RememBear.” If you’re not interested in purchasing it, you can press the “No thanks” button, which will redirect you to your account page. From here you can download TunnelBear on any supported device, whether it’s a Mac, Windows, iOS or Android device, or even your Chrome, Firefox or Opera browsers, if you’re interested in extensions. It’s worth mentioning that it’s recommended to verify your email address after creating your account.
Checking for malware
As you’ve already grown accustomed to, now we’re going to perform a quick malware check on the file we’ve just downloaded on our Windows computer. The reason we insist on doing that is that nowadays anyone can be a target for cyberattacks, which have gotten very creative at this point.
It’s a healthy practice to perform this check on the file yourself on VirusTotal since the document could’ve been compromised in the meantime, but if you just want to take a shortcut, take a look at our results here and in the screenshot below.
As you’re probably aware by now, we’re only getting into details for deploying the application on Windows computers. The reason behind our decision is that we believe Windows computers are one of the most commonly owned devices in a household and that, compared to handheld devices like iPhones or Android phones, it can be more difficult for users to install apps on Windows devices.
Assuming you’re already the proud owner of the installation package, you can double-click the downloaded executable to begin the setup. First thing first, you have to accept the End User License Agreement (EULA).
The next step is to decide where exactly on your computer do you want this application to be deployed and, after doing so, just click the “Install” button. The rest of the process unfolds automatically, without any additional assistance on your side, and you’ll be able to sit back and enjoy the funny progress text fragments that are displayed during the installation.
The version we installed on our computer is 4.1.
Running it for the first time on your PC
Compared to other VPN service providers, TunnelBear took a while to be completely deployed to our computer and once the installation was completed, the app was automatically launched for us to use.
Naturally, once the app is launched, you’ll be required to type your email address and password so that you can access its services or, if you lack an account, you can create one directly from within the app.
Past the login gates
Ok, you’ve logged in your account, now you’re in the app. What’s next? The first time you run TunnelBear you’ll receive a brief tutorial regarding how to use it efficiently. But don’t worry, it’s only a three-step quick guide and if you’re not in the mood for this kind of thing, you can just skip it right from the start by using the, you guessed, “Skip” button.
The main window of the app displays an interactive map with a bunch of countries. Don’t be surprised if the map is centered to display your location, it’s only natural to inform you of your real location, don’t you think? A sheep is displayed in your vicinity along with the message “Don’t be an Internet sheep!” floating somewhere above it.
You’ll notice that scattered all around the map, are some tunnels. Actually, they’re more like those tubes from Super Mario. Clicking them quickly pops a message on your screen, asking if you want to tunnel to that location (i.e. the tube you just selected).
If you push the “Yes” button, the sheep we talked about before turns into a bear and starts digging to the country you selected and from the moment it pops its head out you are officially connected to that location’s server. Note that before you were connected, the map was displayed in grayscale; now that your connection is secure, the map is all bright and colored. Nice touch.
TunnelBear’s main screen consists of an interactive map, a bunch of buttons and a dropdown menu. If you prefer to see a simplified version of the app, you can click the bottom-left button, the one with the two arrows pointing at each other. This will shrink the window so that it only displays the server you’re connected to, the On/Off switch that lets you quickly connect and disconnect to and from the VPN server, and the same two-arrow button you used to shrink the app that can now be used to enlarge it.
The hamburger button (three horizontal lines on top of each other) enables you to expand the main menu of the app and see the description of the buttons it encompasses. So, if the globe button wasn’t suggestive enough for you to understand that it takes you to the map, or if the gear button didn’t make you think about “Settings,” then this function is for you.
Accessing the settings section
Often avoided for having the potential of ruining stuff on your PC, the “Settings” section of any application should be easy to access, at least for users who are interested in having quick access to it. TunnelBear lets you jump right to it by simply pressing the gear-shaped button mentioned above.
Here you’ll notice that there are four different categories you can simply switch between by clicking the one you’re interested in. Thus, you can choose from “General,” “Security,” “Trusted Networks” and “Account.” Although the settings are explained quite clearly in the designated section, you might want to hold back if you’ve no idea what you’re doing, since you could jeopardize your privacy without even realizing if you mess with the wrong options.
Exploring our options
The “General” section, as you expected, allows you to customize general settings such as launching the app upon system startup, minimizing it to the system tray and toggling notifications for various events, but you can also enable or disable the TCP override feature.
From the “Security” category you can enable or disable two features with unique names: “VigilantBear” and “GhostBear.” VigilantBear is essentially the application’s kill switch since it blocks all traffic between reconnections and GhostBear is a feature meant to let you bypass VPN bans by making your encrypted data look like regular Internet data.
The “Trusted Networks” is actually a whitelist that you can use to include networks that you feel are secure enough to give TunnelBear a break. So, to keep it short, if you’re connected to any of the networks in the trusted list, TunnelBear won’t automatically connect to one of its servers and vice-versa.
Finally, the “Account” category only lets you manage your account by quickly opening your account page in an external browser, log out of your account and access the “Help” section of their website.
VigilantBear and GhostBear
Since these features are a bit more specific to TunnelBear itself, we’ve decided to dedicate them a full subchapter. Starting with “VigilantBear,” this feature is meant to prevent your online identity from being exposed by blocking all the traffic in those moments when TunnelBear is connecting or reconnecting to a private server. It can be really useful if you ever change WiFi networks or you are briefly out of range. TunnelBear is designed to automatically reconnect as soon as it detects the Internet connection and VigilantBear protects you in those precious seconds.
It works on Windows, macOS, and Android (Lollipop 5.0 or later). It won’t work if your computer (device) is running a custom proxy. However, some networks use custom proxies as a requirement, so before you go ahead and disable them blindly, be sure to check with your network administrator or ISP beforehand.
The second “unique” feature is GhostBear. In some countries, the usage of VPN providers is forbidden, so users need to improvise-adapt-overcome in order to bypass these limitations. TunnelBear offers these users an alternative to their problem through GhostBear, which was designed to make VPN traffic less detectable on the network they’re on, thus making it harder to block.
An important aspect of GhostBear is that it won’t work on iOS devices, due to iOS design restrictions. It is worth mentioning that GhostBear shouldn’t be used haphazardly since it can unnecessarily make your connection very slow. GhostBear should only be used if you can’t connect to TunnelBear due to VPN censorship. As the TunnelBear team puts it, “Leaving GhostBear off doesn’t make you less secure.”
Servers you can connect to
Unlike other VPN service providers, TunnelBear doesn’t provide the wide public with a detailed list of servers available for you to connect to, but only mentions the regions where they’re located. These are as follows:
As you can see, the number of servers/locations available for you isn’t impressive at all (22), but we hope that we’ll get good security results and high speeds at least.
Our customer support experience
First of all, we should mention that TunnelBear doesn’t provide you with any form of live chat. Reaching the “Support” section on their website can’t be done directly from the bottom menu, but you have to access the “Help” page, then click the “Contact Us” hyperlink. Alternatively, you can also reach this page by navigating to the “About” section, scrolling all the way down past the wall of “bears” and clicking the “Contact Us” hyperlink.
Their support system is partly automated, meaning that you need to make a few selections before you can reach the ticket text box. For instance, you can mention that you have a subscription issue or that you want to send them general feedback by clicking a radio button on the “Support” page.
After you’re happy with your selection, you can type a description of your issue in the designated field, upload a screenshot (optional) and include your email address (this one’s mandatory).
Although the lack of a live chat system isn’t an ideal situation, we received a fairly quick reply to our ticket. More so, their “Help” section (knowledge base) is quite extensive and lets you access a wide range of guides regarding various issues you might encounter.
The tests we’re going to run
As we do with any other VPN service provider, we’re going to run a bunch of tests on TunnelBear and see for ourselves whether or not it can protect you against the prying eyes of various agents (hackers, ISPs, government agencies, you name it) and if the connection speeds are satisfactory.
The importance of security is way greater than the need for fast servers since the main purpose of VPNs is to hide your identity while browsing the Internet or doing any other online activity. In an ideal world, a VPN service should be able to provide its users with both airtight security and fast servers, but we can’t always have it all.
The tests will be conducted as we’ve thoroughly described in this comprehensive article.
Security test results
We’ve finished running the security tests and if you’re impatient for the results, you can see them below:
Conclusion: Everything looks great here. Nice job!
Speed benchmark results
We’re going to pick a few random servers and run our speed test against them. The reason why we don’t just test one server (preferably the one that’s closest to us) is that we’re trying to see its behavior in various scenarios and use a reasonably wide spread while doing so.
|Location||Internet Speed||Latency||Upload Speed||Downloaded||Uploaded|
|U.S.A.||67 Mbps||112 ms||256 ms||19 Mbps||100 MB||50 MB|
|Germany||76 Mbps||32 ms||113 ms||30 Mbps||90 MB||70 MB|
|Brazil||39 Mbps||221 ms||397 ms||8.8 Mbps||110 MB||40 MB|
|Hong Kong||39 Mbps||250 ms||319 ms||5.6 Mbps||80 MB||20 MB|
|Australia||8.6 Mbps||330 ms||334 ms||3.2 Mbps||30 MB||10 MB|
The speed values for these servers is quite good; we couldn’t help but notice the difference in speed between servers in Europe, for instance, and the ones in Australia. It’s rather obvious that the server cluster on that side received a greater deal of attention. Not saying that the others were neglected, but a bit more balance would’ve been nice, too.
Unlocking popular services with TunnelBear
Usually, when a VPN service is capable of unlocking certain services that are geographically restricted for one reason or another, they proudly display it on their website. Although we weren’t able to find any specific claims on TunnelBear’s website (other than a generic “Bypass local censorship”), we decided to give it a go.
We’ve attempted to access a bunch of popular services, such as Hulu, Netflix, BBC iPlayer and Amazon Prime Video, but, unfortunately, none of these worked for us. Given that the network of servers that TunnelBear provides to its customers is quite narrow and that the providers for the said services are getting better by the day at banning VPN users, this situation is understandable.
TOR and Torrenting support
Torrenting is a viable option when using TunnelBear and, if you’re interested, you can also use TOR (The Onion Router) in combination with this VPN. However, you should understand that using TOR in conjunction with TunnelBear can and will lead to a severe drop in your connection speed.
There are other risks (such as landing on a malicious TOR exit node) that can occur if you’ve decided to use TOR in conjunction with this (or any) VPN service, but if you’ve already made up your mind about it, there’s pretty much nothing we can do about it.
Free trial available
We’ve reached that part of our review where we start talking about the money. However, you’ll be glad to learn that this time we’re going to start with a “this VPN offers you a free trial” instead of an “unfortunately, no trial is available.”
Compared to other services, TunnelBear doesn’t put a time restriction on their trial, but a bandwidth one. So, according to their website, you can use up to 500 Mbs of data per month before you decide whether TunnelBear is the right choice for you.
The real money talk
Alright, let’s get down to business. The prices Tunnelbear offer for their premium subscriptions are as follows:
|Plan type||1 Month||1 Year||2 Years|
5 connected devices
No activity or connection logs
Best-in-class 256-bit AES encryption
Priority customer service
Apps for Mac, Windows, iOS, Android
Paying for these services can be done with Visa, MasterCard, American Express, Bitcoin and even jars of honey. I’m sure the last one is just a bear-related pun (told you they’re full of bear puns and jokes), but it wouldn’t hurt to ask them if they actually accept this form of payment. Who knows?
To wrap it up, TunnelBear is a VPN service provider that’s been around for 8 years now and still provides its users with great security, despite the company has been bought by McAfee back in 2018.
It’s been audited by an independent security company a couple of times so far, but the team behind this project made it a goal to take such audits yearly and provide their customers with the results, boosting their popularity and trust through transparency. Although some vulnerabilities were detected during the audits, the engineering team solved the issues promptly, as stated in the reports.
Downloading the app to your device, installing it on your computer and using it can be done without breaking a sweat since all of these operations are user-friendly and highly intuitive. Both their website and application (and dare I say their customer support) are full of enjoyable bear-related puns, so buckle up ’cause you’re in for a ride!
Security-wise, the tests proved that TunnelBear doesn’t mess around and they offer you high protection, no leaks were detected. Speed-wise we’ve got satisfactory results, with higher speeds for the Canada servers,(cough) where the company is based (cough).
Unfortunately, if you’re looking for a VPN that can unlock popular entertainment services like Netflix and Hulu, we kindly recommend that you keep looking, since TunnelBear doesn’t provide you with these features.
They offer a trial that’s limited to 500 Mbs per month and three subscription plans: a 1-month plan, a 1-year one, and a 2-year plan. The monthly plan comes with no discount whatsoever, and compared to the yearly plan, you pay double the price per month of service if you choose this one.
+ Great security; (5)
+ User-friendly interface (and bear puns); (5)
+ Free 500 Mbs trial; (4)
+ Friendly customer support; (4)
+ Torrent/TOR support; (4)
– Narrow server/location list; (1)
– Lack of live chat support; (2)
– Can’t unlock Netflix/Hulu; (1)
– Quite slow speeds except for Canada/US servers. (2.5)
TunnelBear gets a 3.16/5 rating.