Perfect Privacy review 2020
For more than 10 years, Perfect Privacy has been offered, paying particular attention to the secrecy of the user’s identity. It sets incomparably high standards of security and protection against persecution, monitoring, and exploration. The service is one of the premium providers and it is also designed for particularly security-conscious users.
|Product description||Perfect Privacy VPN|
|Recommended applications||avoiding dissuasionsAmazon Video Germanyavoiding geo-blockingdata safetyfilesharing torrentmaximum anonymityprotection of hackers virusessafe communicationTOR (.onion) accessuse in ChinaVPN-Router (ASUS)|
Our conclusion to the Perfect Privacy VPN review
“Perfect Privacy” – The name is already their program. The provider is based in Switzerland and it is making an enormous effort to keep his users anonymous. Even government inquiries do not allow the data of the users to become public, this is ensured by special safeguards and the renunciation of any storage of user data! Highly recommended when it comes to privacy. The few euros more per month are well worth it – you have a reliable VPN provider that you can trust!
The purpose of the service was already taken into account when the company was founded. The service lets its customers pay via Switzerland and the technical operation is provided via Panama. This combination guarantees that there can be no connection between user payment data and usernames or activity logs. Besides, the legal exploration of the users is already prevented. In the end, the Swiss company does not know any usernames and the company which carries out the technical implementation does not know any billing data of the users. Something unknown, can’t be asked for.
In the following review, we will describe many of the details of the service. We tried to explain these details in a readable way, and with that, we also want to show the details in a simplified way. Especially with more complex technical services like Perfect-Privacy, this may be certainly helpful.
The small target group of users
Besides, a service like Perfect Privacy is geared towards a small group of people with a special need for digital security. But this is in contrast to many other providers so that only a small group of people who make these demands. That’s why the number of users of Perfect Privacy is in contrast to other “marketing-oriented VPNs” significantly lower.
|Operating location||Czeck RepublicFrancePanama|
|Local laws influence on clients protection||✔|
|Operation and billing are separated||✔|
|no log files||✔|
|Own DNS server||✔|
|Owner of IP-address||✔|
The service uses a large part of the revenue for the technical implementation and not like other VPNs for marketing or commissions. You also have to know that you can rent and operate a VPN server for 5 euros per month. But this happens on a VPS system, where hundreds of individual servers run virtually on one hardware. However, Perfect Privacy promises to dispense with hard drives and all providers who could also record users’ activities. That’s why dedicated server systems must be used with full hardware access. Of course, these costs significantly more and are barely under 1,000 euros a month to operate. It also changes a lot in terms of pricing.
|Prices / Tarifs|
|Tariff (1 Month )||12.99 EUR|
|Tariff (12 Months )||119.99 EUR (per month 10 EUR)|
|Tariff (24 Months )||214.95 EUR (per month 8.96 EUR)|
|Number of connections per account||unlimited|
|Test options||Money back guaranteeLimited free test time (without payment)|
The Perfect Privacy VPN Software
You can use the service on virtually any device, including Windows, macOS, Android, Apple iOS, Linux devices and of course routers many more. However, the developers of Perfect Privacy VPN do not try to create and provide third-party software or apps.
All offered variants are always purely self-development, as only with them can built-in backdoors be excluded.
Own apps without backdoors
Therefore, there are separate applications for Windows, macOS, Linux, and Android. For other devices, installation is recommended directly in the operating system. There is generally not only an extensive guide for all imaginable scenarios but also a user forum or even the support by remote support stands to the side.
However, because the instructions were already created in a perfect and exemplary way, we do without examples and link directly to the instruction menu on the website:
|Available protocols||IKEv2L2TP/IPSecMulti-Hop-VPNOpenVPN (TCP)OpenVPN (UDP)Own protocolPPTPSOCKS5SSL/Proxy|
|Own apps||AndroidApple iOSASUSWRTDD-WRTLinuxMac OS XOpenVPN UDPOpenWrtother OS/integrationTomatoWindows|
Perfect Privacy has no speed limits
The widely available power reserves of the Perfect Privacy Network guarantee functioning and fast VPN access at all times. To avoid a weak network, the utilization of the servers is monitored and, if necessary, new VPN servers are provided. The current utilization of all servers can be continuously monitored and controlled by the customers on the website.
The limitation in the achievable speeds depends on the selected security features, their Internet connection and their speed to the connected VPN server and, above all, the user’s own existing hardware equipment. (The maximum encryption of the data requires a lot of resources, which means that appropriate components must be used as well.)
If you notice strong speed losses when using Perfect-Privacy VPN, then certainly settings of the extensive possibilities will not be done correctly. Most often the wrong protocol or encryption method is used, here alone Perfect Privacy offers more than 10 different variants.
Therefore always try to change the used protocol first: OpenVPN UDP is standard in most applications, but IPsec and also the OpenVPN variant with TCP configuration usually provide a clear remedy! By further adjusting the ports or using SSh2 tunnels you can always get the maximum possible speed.
Maximum speed with VPN
The Perfect-Privacy servers already have a lot of work to do, but are also well-equipped and therefore have the necessary power reserves. Which would be the connection speed of the server the limiting factor. To make this factor transparent to the paying customers, the availability and utilization can be viewed in detail via the server status overview. Typically, Perfect Privacy VPN extends the technical requirements even at a medium load of 20%, which is why every user also guarantees the maximum transmission speeds.
More than 450Mbps over VPN?
It is therefore not rare or impossible to achieve speeds of over 450MBit/sec even with maximum data encryption. In detail, these speeds depend more on the connection of the users to the Internet, the way via the Internet to the VPN server and also the own hardware that is used. OpenVPN with 256-bit encryption sometimes requires its hardware for this type of calculation, even with the VPN client.
Security always without compromise!
Perfect Privacy VPN uses perfect technical aids to guarantee the identity of the users even against targeted attacks or even against errors in operating systems or browsers. A good example of this is the use of dedicated DNS servers and active DNS leak protection. But even WebRTC Leak or other IP leaks have no chance with the Perfect Privacy Software. In combination with the technical possibilities, we do not know any other provider who can guarantee a high level of data security on all devices. The users are therefore better protected than with all other providers and always anonymous!
No log files – at no time!
Besides, the servers of the provider don’t have any log files. Even current connections that run through the server are not recorded and all data is located exclusively in the “RAM” of the server. This means that a server that is disconnected from the mains (seizure) immediately loses all its current data and no conclusions can be drawn on users.
Perfect-Privacy also allowed us to verify the descriptions of their technique and we can, therefore, confirm that from a technical point of view, no data is recorded! Our trust has won the provider! Also, with Multi-Hop VPN or even Neurorouting ™, it is technically completely impossible for anyone or even Perfect-Privacy itself to infer the true identity (IP) of the users.
Absolute full IPv6 support! (IPv6 leak protection)
Perfect Privacy VPN was the first provider who added IPv6 support for the service. This means that after establishing an OpenVPN or IPSec connection, users will automatically receive an IPv6 address in addition to the normal IPv4 address. This gives you full access to the IPv6 network, even if your provider does not offer IPv6. Besides, the full IPv6 integration in the Perfect Privacy client also means that all users are automatically protected from IP leaks via IPv6.
|Anonymity in internet|
|Altered virtual location||✔|
|Protection from requests for information||✔|
|General monitoring protection||✔|
|Targeted monitoring protection||✔|
|no log files||✔|
Perfect Privacy for streaming
Warning-free streaming YES, but German video portals, for example, is not the strength of Perfect Privacy. The servers are missing and also the SmartDNS functions. Quickly PP has been blocked by Netflix and Co and is therefore simply not designed for this purpose.
|Streaming TV and video content|
|Use on the home router||✔|
|Use with KODI||✔|
|Supported streaming platforms||NetflixDAZNSkyEurosportMaxdomezattooWaipuJOYNTVNowARDZDFBRN24MDRrbbWDRArte3SatPro7Sat1Kabel1Disney+ (DE)MagentaTV (DE)ORFSRFServus TV|
Perfect Privacy VPN for download and torrent
If you ask for a VPN service for torrent, Perfect Privacy already has everything you could ever dream of. KillSwitch, WebRTC security, port forwarding, crazy fast servers, etc … So everything you need for a worry-free Torrent experience.
|Download and Torrent|
|Torrent usage allowed||✔|
|Own Torrent Server||✔|
Perfect Privacy on the router
The service also supports the most common VPN routers using L2TP and various OpenVPN configurations. Perfect Privacy VPN can be easily used on a variety of VPN routers without firmware modification. With the Vilfo router, we could even realize speeds of over 430MBit / s. Perfect Privacy VPN provides many functions directly via its network. The Router + Perfect Privacy combination is also a very good and usable solution for many families and home networks, where all existing devices are more than adequately protected against dangers.
Perfect Privacy for Online-Games
It is possible to use this provider for online gaming. There is DDoS protection included in the software and also a low latency is given. The only thing is that you can’t connect it to a console like an Xbox.
|Use on game consoles||✘|
Perfect Privacy by traveling
We would recommend using this VPN when you are traveling. You are safe in every situation and don’t need to care about unsafe wifi networks.
|VPN for travelling and in foreign countries|
|Using in restrictive networks (China, hotels)||✔|
|Protection in unsafe WiFi-networks||✔|
|Shadowsocks or SOCKS5||✔|
You only can contact the company via ticket. If you have questions maybe search for the answers on the Q&A website or take a look at the forum. In most cases, we also could help you with your problem. And we offer you a live chat!
|Customer service||Q&A WebsiteForum|
|Customer service language||GermanEnglish|
Perfect Privacy functions
The manual effort through the functions is enormous. Anyone who can automatically maintain or set up servers saves on maintenance. Automation is not possible with the solutions developed by Perfect Privacy itself. The elimination of server monitoring protocols adds to the fact that the Perfect-Privacy technical team is more than well utilized. Of course, an increased effort for specialists also affects the operating costs.
Every customer can use Perfect-Privacy on an unlimited number of devices at the same time and location! Anyone who recoils a bit because he sees a long list in front of him can assume that we have not even put everything here – it will be explained later. From a technical point of view, Perfect Privacy is the “world leader”.
The Perfect Privacy network
In our review, Perfect Privacy provides servers in more than 26 different countries. The locations of the servers are distributed worldwide to enable each user access to a nearby location via an encrypted connection and also to get as close as possible to the destination of the data query (webserver or web services). It was and is not directly the focus on being able to provide IP addresses from as many countries as possible, because this would have no impact on user protection. This also shows that the service is not about being able to provide other IP addresses to use, but the primary goal is to protect the identity of users.
Encrypted networked worldwide servers
The servers are linked to each other using VPN connections, and over these connections and only over it the data are transmitted between the locations. The reason for this is that the data paths in cascades (the connections over several VPN sites can not be traceable since all data is transferred between the servers so that they can no longer be separated from individual connections).
“Neurorouting” uses the potential of the network
The linking of the servers with each other makes it possible to define dynamic ways of data to keep the transmission outside of the Perfect Privacy network – as short or as small as possible. This function, also described as “Neurorouting”, was only made possible by constant networking. Also, the transmission speeds and ping times are optimized as well as possible via the cascades. (A disadvantage of the normal VPN cascades technically caused).
|Always On Server||✔|
|Multi Hop VPN||✔|
|Own IP adresses||✔|
|Own Torrent Server||✔|
|VPN with TOR||✔|
Perfect Privacy locations have been selected to provide users worldwide with fast and, above all, secure access to the PP network, while bringing the data in the secure network as close as possible to the data destinations (web servers).
Currently, Perfect-Privacy Servers are in operation in the following countries:
- Czech Republic
- Denmark, Egypt
- United Kingdom
- The United States.
Data security and the purpose of using Perfect Privacy are optimally supported because of that. In the future, however, more locations may be added.
The exclusive features of Perfect-Privacy
Multi-hop and VPN cascades
One of the most important aspects of Perfect Privacy is the possible individual VPN cascades or Multi-Mop VPNs. You can configure up to 4 locations in series using your VPN client software for Windows or macOS. The own data are transmitted over these selected locations in a multiple encrypted and no longer traceable form.
Purpose: Protection against targeted monitoring
It allows you to protect yourself from targeted monitoring even by international organizations, but at the same time, it determines how your data will be routed and also select the IP address which was used before. This form of additional protection when using VPN offers only a very few VPN services, static VPN cascade routes are also not comparable, as they would be predictable.
Neurorouting of Perfect Privacy VPN
NeuroRouting™ means that traffic stays in the strong encrypted VPN network for as long as possible by always routed to the nearest destination of a VPN server. As a result, the traffic appears only on the Internet where it is really necessary. This process happens dynamically and fully automatically as soon as this function has been activated in the customer area. This means that you can also use devices that you manually integrate with them (for example, smartphones, routers, etc).
Neurorouting ™ by Perfect-Privacy offers the following benefits:
- Selects the nearest but the most secure VPN server
- Data traffic remains as long as possible in the encrypted VPN network
- External VPN IP address changes depending on the destination
- Ideally, the traffic does not appear on the Internet at all
- The number of attack points is minimized
- Complicates the tracking considerably
- Dynamic: The algorithm “learns” and responds to changes
“Track Stop” filter for harmful or monitoring content!
With the “Track-Stop” filter function, Perfect Privacy now takes a path suggested by its users and prevents automated loading of vicious content already on the servers. What is particularly good is that the individual filters can be switched on and off manually. In addition to ad blockers, these include filters for all Google scripts and Facebook tracking codes. This can be permanently protected from surveillance with just a few mouse clicks.
Function overview: “Track Stop”
- Protection for children and teenager (porn sites, violence, etc is filtered)
- Protection against tracking cookies
- Protection against ad server infiltrated malware
- Protection against phishing sites
- Protection against tracking methods
- Blurs the track between browser usage with and without VPN
- Surf without advertising – without any additional software
- Individually configurable (selection of several blocklists)
The Perfect Privacy Server concept, only temporary! (RAM disk)
The operating system of the Perfect Privacy VPN Server runs not as usual on hard disks, but directly on the temporary memory (RAM disk). This means that when a server is disconnected from the power, all data is immediately deleted irretrievably deleted and also the speed of the server is correspondingly faster. This concept reliably prevents that NO data can be restored in the event of access by third parties to the servers (seizure, etc.), even though complicated technical possibilities. This protects users even with official accesses and permanently. However, this requires servers with much higher RAM and these are many times more expensive to buy. Consistently sure.
But there must be no compromise on data security, this is also reflected in the price of the service and is an essential distinguishing feature to conventional and cheap VPN providers!
Perfect Privacy is so far incomparable!
For all VPNs that we have tested so far are not noticed in any similar technical features. Yes, it’s true, of course, if you only compare the number of active servers or the available IP addresses of a provider, then Perfect-Privacy will not be ahead.
But in the area of application that Perfect-Privacy users want to cover with it, it’s about real security and this has nothing to do with the supposed number of servers. It is about the definitive security under all conceivable circumstances, which also takes into account the targeted monitoring by international services.
17 Benefits of Perfect Privacy Compared to Other VPN Services
All plus points of Perfect Privacy review
- No hard disk usage in the VPN servers (no data if the hardware was seized by authorities)
- No log files or logs about users or activities
- No limitation on usage or number of devices/connections per user
- Billing (Switzerland) and technical provision (Panama) of the service are in separate companies and states (protection against regulatory pressure)
- Manually selectable and dynamic VPN cascades (Neurorouting)
- All VPN sites are interconnected and encrypted. Data of individual users can not be filtered anymore.
- Own dedicated and powerful hardware with transparent free power resources (server status overview)
- No apps / third-party software (so only own developments)
- Filtering and preventing “tracking” not through web pages, in different levels (TrackStop)
- Obfuscation of the data packets for protection against detection by the Internet access providers
- Adaptation of ports and transmission techniques to enable stable connections even in highly restrictive networks
- Always consistent IP addresses or shared changing IP addresses are possible
- Using IPv6 is supported natively (in and out) on all servers.
- Different types of port forwarding are configurable
- Direct access to the Onion network is possible (VPN to TOR)
- Largest selection of protocols: PPTP, IPsec, IEKv2, SSL, SSH, SSH2, and HTTP and SOCKS5 proxies are available
- Largest selection of transmission methods:
OpenVPN over ➡︎ UDP (Layer 3) and ➡︎ TCP (Layer 2), as well
➡︎ Stealth VPN SSH: OpenVPN profiles for use within an SSH tunnel (additional software)
➡︎ Stealth VPN Obfsproxy: OpenVPN profiles for use within an obfsproxy tunnel (additional software)
➡︎ Stealth VPN SOCKS: OpenVPN profiles that connect through a SOCKS proxy
➡︎ Stealth VPN stunnel: OpenVPN profiles for use within a stunnel tunnel (additional software)
These are just the obvious technical differences to all other VPN providers in the market. The 17 points make the service unique. I do not know any other VPN provider which would offer even more than 3 of these points itself.
Frequently asked questions