Some users have reported DNS leaks, while it was not possible to confirm this, it does increase the risk that your ISP could identify the websites, although not the specific pages you’re accessing. It is unclear if Pango can get that data on Bitdefender’s users or if they only have access to VPN data that Bitdefender collects. They also worryingly collect aggregated website logs, although these only show the website, not the specific page, and are not linked to any individual. Approximate location based on your IP address, which is used to find the nearest VPN server. Device information, including unique identifiers and software version information. Connection timestamps and total bandwidth, which can be stored for up to three years. ![]() Pango’s privacy policy says that it collects: IP addresses to create and maintain a VPN session and deletes them afterwards. ![]() This data is sent to Pango for data processing. While a VPN service would need to collect IP addresses to create and maintain VPN connections, it is unclear if this data is logged or deleted afterwards. Pango is the same company that runs the Hotspot Shield VPN and was historically found to be injecting trackers and ads into Hotspot Shield’s free tier traffic.īitdefender’s privacy policy states that they collect IP addresses and randomly generated or hashed tokens and IDs to identify users and devices and only use them to provide the VPN service. The top-of-the-line 256-bit AES algorithm is used to encrypt your device’s connection to the VPN server.īitdefender uses the third-party Pango, formerly known as AnchorFree to process data. Tip: Catapult Hydra is a newer VPN protocol that hasn’t gone through the same level of security analysis that the more mature OpenVPN protocol has. Windows and Android are limited to only using OpenVPN, while iOS and macOS can only use the Catapult Hydra VPN protocol. Only available when bundled with other paid software.Īppallingly deceptive shopping cart practices.īitdefender’s VPN only offers two VPN protocols. Locked into one of two VPN protocols depending on the platform. ![]() Uses the best available encryption algorithm
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |