Contents
Introduction
At the beginning of last year we have already surveyed the несколько VPN-client : Tunnel Bear, Hideninja VPN and Hotspot Shield VPN. Given the fact that today this theme is still popular, we decided to go back to it again.
And let my colleague spoke in detail about known at the time programs, but times change, and such solutions is growing. It is not superfluous to understand how to transform this software, what has changed for the better or worse, how well it works.
So, then we will look at two well-known applications. VPN + TOR does not only offer VPN, and complete privacy. A Free VPN Proxy by Betternet an easy-to-use solution to access any sites.
As the test equipment used tablet DEXP Ursus 8EV2 3G (Android 4.4.2, MT8382 processor, 4 x Cortex-A7 1.3 GHz GPU Mali-400 MP2, 1 GB RAM, 4000 mAh battery, 3G module, Wi-Fi 802.11b / g / n) and smartphone Homtom HT3 Pro (Android 5.1 Lollipop, processor MT6735P, 4 x Cortex-A53 1.0 GHz, 64-bit, GPU Mali-T720, 2 GB RAM, a battery 3000 mAh battery, 4G-module, Wi-Fi 802.11b / g / n).
A bit of VPN-client
Before you start is a bit to refresh your memory and find out what such a beast – VPN-client. In order to avoid repetition, I will quote the description of the client’s work on VPN + TOR example (Cloud VPN Globus Pro). «After connecting to the VPN-server, all programs will automatically run through a VPN-tunnel, then there is no need for each application to prescribe specific settings, how to do it at work through a proxy. Traffic encryption is carried out due to the fact that over the open channels of communication through which the packets created by the VPN-tunnel, and all the all the information that passes through it is encrypted, as a result it is impossible to intercept the data that the user sends or receives over the Internet.
Even the provider will not be able to know what sites you visited and what information exchanged. Thus, you save, for example, the privacy of your e-mail correspondence, make it impossible to intercept your passwords to payment systems, etc. Even if the information is intercepted, it will contain a set of characters that can not be decrypted. In addition to encrypting data traffic compression is performed, it contributes to increase the speed as before information is transmitted, it is compressed on the VPN-server and transmitted in compressed form on the user device.
As a result, besides the growth rate you will get more and saving. VPN-server when this scheme is a constant input node, after the encrypted traffic is sent in the Tor network. In practice, the scheme is simple to implement: Tor-browser, which automatically adjusts the desired route through the VPN tunnel-first connects to the VPN-server, then run. The use of such a scheme to hide the fact of using Tor by your ISP. We will also be closed on the input node of Thor, which will see the VPN-server address. And in the case of theoretical compromise the Tor, you will protect our the VPN, which is abroad, of course, does not keep any logs. »
I think that everything is quite clear described. It turns out that bypass the locks do not necessarily need to visit banned sites, but also for the protection of “wiretapping” of which we have already said, describing the protected messengers. It is on the security and will focus in considering the VPN-client data. Well, let’s start.
VPN + TOR (Cloud VPN Globus Pro)
Introduction
This paragraph could be and miss, as the program described in detail above, but it is worth to remind that it is not free. We’ll have to pay from $ 7.99 per month to $ 32.94 per year, which means that it is necessary to think hard whether you need such a security. Here we note that the examples of open banned sites will be driven not so dispense verbal description without screenshots.
In fact, you yourself know what is currently gravitates most Russians, and it makes little sense to promote bypassing blockages of the resources that are included in the “black list” Roskomnadzor. And for particularly picky as an example, we try to go to the Spotify website that was used in last year’s survey. I think this will be enough to prove the program.
So, the main thing for us – is to check the application operation, the load on the system, “readability” Internet speed and battery consumption.
Evaluation of Google Play | |
Number of downloads in Google Play | |
Application Compatibility with other versions of OS Android | |
The size distribution | |
Application Version | |
In-app purchases | |
Key features:
- No log;
- VPN (IPSEC VPN and OpenVPN);
- Personal server cloud VPN;
- Strong protection in open Wi-Fi-networks;
- There are no restrictions, allowed all internet protocols and P2P networks, connections;
- High speed;
- Ability to use VoIP-telephony;
- Compatible with all messengers;
- Fully anonymous Internet access;
- Free access for seven days;
- Tor via VPN
.
Permissions:
Other:
- Unlimited access to the Internet;
- View network connections.
The first impression and configure
The first thing you notice, open the program, is that it is fun is not free, that is, us gently offer directly subscribe and surf anywhere, and anonymously.
If we talk about the interface (English-speaking), the here unchanging left sidebar, where you can get support, log into your account and view the list of available servers. The choice of countries imposing. Below each of the flag – the percentage of load on the server. By the way, if you want to use the Tor also, do not forget to connect to the appropriate server from the list.
In general, everything is simple, clear, and is activated only key. OK, now try to VPN + TOR in action.
VPN
So, a test trial we have. It remains only to dispel suspicions Android and allow the use of VPN.
a random server connection (not elected specifically) lasted five seconds, which is not critical.
So, and now we have discovered the entire Internet, and thus themselves remain in the shadows. Check the last statement is difficult, so you have to believe word for the developers.
Now let’s try to open something sort. For this purpose, so as not to fool yourself and your head, use the normal system browser. It should be noted that the loading of pages I have taken a long time. Maybe the whole thing in 3G, which is sometimes buggy in my locality. Well, I go to a more confident Wi-Fi.
But here the situation is not very different. Well, I will try to change the server, for example, the vaunted Tor. As a result, the exact same song. I do not lose hope and try to reconnect through the US, UK and China.
Amen! After a series of experiments, all booted quickly, but at the desired page I did not let myself system browser – consider this fact. We’ll have to still use the UC.
But there emerged problems. The fact is that even go to Google Play could not be normal, because the connection is constantly reset and hence the stability of the application is clearly not enough. We can not all servers are equally fail.
However, in the Chinese browser page loading takes painfully long . So I decided to throw me this thing as half an hour can not upload a single page, which is not surprising. Network speed test screenshot itself speaks for itself.
The load on the system
With regard to the load on the system, the application of CPU in the peak of 0.5%, consuming 51 MB of RAM. In principle, it is a bit, but the battery is dipped by 3%. In this case traffic to your needs program took 1.9 MB.
Conclusions
Frankly, VPN + TOR has not coped with the task and can arrange only those who love to expect when the application will contact the server and begin to download web pages. Against this background, any dignity – no dignity.
Maybe it’s a trial period, but without verification does not want to subscribe for the money, not to bother with registration at the website.
Advantages:
- Low consumption of resources;
- Easy management;
- Select Server manually
Disadvantages.:
- Long loading or not loading a web page
Evaluation:. 1.0 on a scale.
interface | |
The ability to self-configure | |
Total efficiency | |
The maximum load on the system (CPU / RAM) | |
traffic flow by the program | |
Battery Consumption | |
page load time | |
Reset connection | |
Server Auto | |
Working with blocked sites | |
- price collapsed on the GTX 980! Yes, she collapsed:)
- Megasliv coolest ASUS R9 FURY STRIX Gaming
<-! R-139088-2 Yandeks.RTB block ->
Dear visitors!
Comments containing insults, profanity (including disguised mat), extremist statements, advertisements and spam , deleted regardless of content , and their authors can be applied measures up to ban to write comments and application in the administration of the social network.
No comments:
Post a Comment