Skip to content

Proxy.sh VPN Review – Best Secure Anonymous VPN service  for Windows, Mac, Android, iOS (iPhone/iPad), Linux

Proxy.sh is a professional and well known No log VPN service provider based in Seychelles that offers a wide array of world class proxy & VPN technology solution with a variety of features for different users. They redesigned their network to deploy advanced configurations for ECC, XOR & TOR’s obfsproxy, resulting in more stability and reliability. They are a non-for-profit operation made up of brilliant & skilled individuals who are located throughout the world and collaborate in a digital manner. They are incredibly discreet, fast and secure as well completely private. They allow their users to hide their IP address (Internet identity) and location from unwanted sights without leaving traces while surfing.

Proxy.sh gathered sufficient strategy, human resources and capital to build up and grow the most anonymous, disruptive and one of the best logless VPN service providers of the market. They operate it from the Republic of Seychelles and have no physical presence other than their board’s meeting in Victoria. Their staff members have parallel careers and do not wish to disclose their full identities for various reasons, mostly for convenience and security. The only people who know about them are the authorities of the respective countries they operate through. They are bright entrepreneurs and engineers who believe that privacy for everyone should resist and prevail on the Internet. Their staff is entirely from Asia, Africa and Europe while their server locations are spread throughout the world except in locations where they believe privacy is not fully ensured at the moment.

Proxy.sh is operating with 300+ VPN servers located across 57 countries worldwide. They are increasing their peering presence throughout the world by adding more countries and more locations across already covered ones.

They served 20000+ clients worldwide.


Pricing Plan with Remarkable Features

In this Proxy.sh VPN review I’ll introduce you first with the pricing plan of this provider so that you can choose one plan that best suits your need while using this best anonymous VPN service. Proxy.sh currently offers different packages as well as separate add-ons as stated below so that you can just pay for only what you really need.

Quick Plan

  • $2 per 72hr
  • No yearly price
  • 1Gbps Shared (30+ nodes)
  • Unlimited Bandwidth
  • Safejumper and OpenVPN protocol
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 2 countries available: United States, Netherlands

Basic Plan

  • $3.33/month ($5/month) if billed annually
  • $5/month if billed monthly
  • 1Gbps Shared (50+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 5 countries available: United States, Netherlands, Germany, France, United Kingdom

Solid Plan

  • $7.50/month ($10/month) if billed annually
  • $10/month if billed monthly
  • 1Gbps Shared (300+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • Worldwide access to tunnels in the following 57 countries:

Pro Plan

  • $16/month ($20/month) if billed annually
  • $20/month if billed monthly
  • 50Gbps Premium Network (7 nodes)
  • Access to $10 network/features
  • Generous quota (250GB/month)
  • Access to multi-hop technology
  • Early access to new features
  • Early access to Safejumper betas
  • SoftLayer Network (U.S. West, East, South, UK, Germany, Japan & Singapore)
  • This package gives you access to the entire Proxy.sh network ($10 package), plus a generous access to the Boost network and the multi-hop technology, among other surprises such as early access to new features.

VPN Add-On Details

  • BOOST from as low as $1
  • 50GBps Dedicated Bandwidth
  • SoftLayer Network (U.S. West, East, South, UK, Germany, Japan & Singapore)
  • This add-on gives you access to the Boost network made up of ultra-fast VPN servers located in 7 different locations across 5 countries. Bandwidth is metered across this network and you can get started with 25GB for $1.

MULTI-HOP from as low as $5

  • Different VPN entry & exit points
  • All locations available and random intermediaries
  • The Multi-Hop technology will let you connect to any VPN server as entry point, and then it will randomly route you through various VPN nodes across their network up to your selected exit point which will become your public IP.

ANONYMOUS TOKEN (FREE)

  • Turn VPN credentials into anonymous hash
  • Compatible with any OpenVPN client as username & password details
  • They offer with any VPN membership a free option to turn the VPN username & password into an anonymous token. Attention, they won’t offer any support for your membership after that because they will no longer be able to identify your VPN account/membership.

Go to Proxy.sh


Accepted Payment Methods

The number of payment methods offered by proxy-sh is very impressive. They offer no less than 100 different secure payment methods from nearly anywhere in the world. These gateways are available either through PaymentWall, SafeCharge or OKPay. The Payment methods are as below-

Visa/Master Card, American Express, Diners, Carte Bleue, DK, CartaSi, eNETS, PostePay, Fortumo, WebMoney, Sofort, Money Polo, W1, OOOPay Sberbank, Alfa Click, BTC-E, Mts, Beeline, Tele2, Exmo, Bancontact, WebMoney, PayPal, Cherry, Rbety, ePoints, DineroMail, MercadoPago, ClickandBuy, Mycard, Indomog, Pagseguro, Fanapay, RBK, Tutudo, Qiwi, Bank Transfer, iDeal, Poli, Dotpay, SanalPara, Postage, toditoCash, Mint, CashU, Ukash, WaveGame, Neosurf, GScash, Zong, Daopay, M1, Allopass, boxPay and Mikroodeme.

Some of these payment gateways are available only for specific locations, so you will have to select the country from which you’re going to pay before accessing the gateways, or attempt to connect from such a location using VPN. Note that they, as the best anonymous VPN service provider, do not store your selected country in their database.

Proxy,sh also offers payments from crypto-currencies. Bitcoin is available with their Coinbase gateway, or you can get in touch with them to request their Bitcoin hash. It is important to note that paying with Bitcoin manually is limited to packages purchase for a minimum length of one year. For alternative currencies, from LiteCoin to XCoin, they suggest to check either OKPay or eDigiCash.

Go to Proxy.sh


300+ Server Locations in 57 countries

For a competent VPN, Proxy,sh offers a good number of choice in its server locations. They have self managed 300+ VPN servers located across 57 countries worldwide. With unlimited speeds and unlimited server switches, you can connect from anywhere in the world if the package you purchased allows. Proxy.sh has handcrafted with love, months after months, the widest and most secure VPN network. They are increasing their peering presence throughout the world by adding more countries and more locations across already covered ones.


Compatible VPN apps for major Devices and OS

Pretty much any operating system is compatible with proxy.sh and their technologies work with systems like Windows, MacOS/iOS, Linux, Android, Google OS, BSD, any Unix-based operating system and many more.

Generally speaking, Safejumper, the VPN client should be working flawlessly for any Windows version from XP to windows 10, as well as any Mac OS X version. It should also work on the most recent iOS and Android versions. As far as Linux is concerned, most general distorts such as Ubuntu or Mint should work flawlessly. But in case you stumble across a problem and wish then to make the application compatible with a particular OS version, then you may contact them for help without hesitate. They are very talented.

Apple’s iOS is a very restricted limited and they do not allow any OpenVPN app other than the native OpenVPN Connect one. Safejumper for iOS therefore allows you to generate a configuration file you can import in a tap to OpenVPN Connect. You then need to tap Connect on the OpenVPN app.

Yet if you are having a software issue and Safejumper cannot be installed or run on your OS, then you may contact them.


Very Powerful VPN Client Software/app -‘SafeJumper’ 

In this Proxy.sh VPN review, I’ll depict an overview of the security and privacy level of their client software/app in detail.

Proxy.sh, with their dedicated team composed of talented and expert IT security personnel, has been able to develop an easy-to-use but at the same time world class, innovative, impressive, competitive and very powerful VPN client software called ‘Safejumper’ that has, with great features, one of the most secured and end-to-end encryption technology in the industry to ensure the most up-to-date, high performing and feature-rich privacy and security service. They have developed this vpn software to defeat censorship, protect your personal identity and prevent tracking you while surfing. The reasons why I said this client software world class are as below-

Simple and user-friendly VPN Client software/app

Proxy.sh’s user-friendly software application ‘Safejumper’ allows you to connect to their world class VPN network in few clicks or taps. All you need to do is simply enter your VPN username and password, then log in and select the country you wish to connect to. You may also select the port and protocol you wish to use, then click the Connect button and let it do all the hassle on your behalf.

Safejumper also allows you to tweak many network and account settings. It is a formidable companion to keep your Internet traffic strongly encrypted.

SafeJumper includes all necessary options for ensuring your military grade privacy

  • Different protocols and nodes  for ensuring different level of encrypted privacy
  • Re-connect when your connection drops
  • Auto-connect when unsecured Wifi
  • Kill-switch for killing whole internet’s movements when disconnects
  • DNS leak Protection
  • IPv6 Leak protection

Different Protocols for different levels of encrypted privacy

I am very delighted to state that all VPN servers of proxy.sh are powered with state-of-the-art security and protocols configuration you can choose from according to your need of privacy level. Their  encryption level is high with top notch privacy and security. It is clearly stated in Proxy.sh as below-

OpenVPN-TCP: For encryption the cipher in use is CBC mode of ARS with encryption strength of 256bit, hash algorithm is 512bit SHA (SHA512), and the control channel is same TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. Their 4096 bit RSA key is changing every hour, preventing most advanced hackers and covert teams part of governmental agencies from breaking through.

OpenVPN-UDP: It is same encryption and security as OpenVPN-TCP, but working via UDP protocol. This allows better speeds and bypasses more restrictions.

OpenVPN with ECC: For encryption they use Diffie-Hellman initialized with 4096 bit key along with ECDH curve secp384r1. Their full control channel is made of TLSv1.2, cipher TLSv1/SSLv3 ECDHE-ECDSA-AES256-GCM-SHA384 while the associated cipher is AES-256-CBC and the auth SHA512, making the whole combination one of the strongest known to cryptographic research field. They provide this ECC environment on port 465 (both UDP and TCP).

OpenVPN with ECC+XOR: For encryption they provide Diffie-Hellman initialized with 4096 bit key along with ECDH curve secp384r1. Their full control channel is made of TLSv1.2, cipher TLSv1/SSLv3 ECDHE-ECDSA-AES256-GCM-SHA384 while the associated cipher is AES-256-CBC and the auth SHA512. Furthermore, this environment is supplemented with OpenVPN’s XOR scrambling option, making the whole combination probably the strongest known to cryptographic research field. They provide this “ECC + XOR” environment on port 995 (both UDP and TCP).

OpenVPN with TOR’s obfsproxy: It makes use of the default encryption for OpenVPN along with obfsproxy on port 888 (both UDP and TCP). They offer obfs3, obfs2 and obfs3,obfs2 as obfsproxy standards.

PPTP: For encryption PPTP uses MPPE 128bit cipher with compression and MS-CHAPv2 authentication.

L2TP: L2TP is using IPSec for encryption with 256 bit key for encryption, 3DES/AES algorithm.

Proxy-sh is also running djb’s curve25519 in internal testing and available for beta to customers with a custom solution (i.e. not a standard package). They assure that they are working hard on upgrading their network and their client as soon as possible to provide always higher and more diverse encryption levels.

Capability to hide your IP address and associated geo-location information

I performed a test using OpenVPN protocol (RSA-4096bit) at different IP tracker websites to how much capable Proxy.sh VPN is of hiding my real IP assigned to my local ISP. I am highly impressed that I found all of them supremely ‘OK’. I, for example, show below here the image of the result got at the renowned IP tracker website ipleak.net . The image shows that their client software ‘SafeJumper‘ works perfectly in hiding my local IP address, as my IP is not visible. You can only see a  Netherlands IP Address 185.47.202.158  perfectly altered by Proxy.sh

Capability to prevent DNS Leak 

You should know that your Internet Service Provider (ISP) is able to read and monitor what you do on the internet by storing file-logs and records in their servers about your whole internet activities. When connected to a VPN, a user automatically connects with VPN’s DNS server instead of ISP’s DNS. This way, the ISP doesn’t know which domain you are accessing or what website you are visiting. But, in rare cases it can happen that your system will revert back to your ISP’s DNS server, exposing your online activities to your ISP. So ‘DNS leak protection’ feature has been invented by VPN providers to mask your local ISP’s eye to let them not see and record your internet activity at all.  To do this, Proxy-sh added DNS Leak Protection option in their VPN software.

I performed multiple ‘DNS Leak’ tests at different ‘DNS-Leak-tracker-websites’ to know about the performance of Proxy,sh and honestly I am very delighted to report that ‘DNS leaks’ were never detected during my tests. I, for example, show below here 4 images of my test results got at hidester.com/dns-leak-test/ , www.perfect-privacy.com/dns-leaktest/ , ipleak.net and  www.dnsleaktest.com . You can see below  they all show the common result of ‘No DNS Leak’, as you only see some other DNS IP addresses and related information replaced by Proxy.sh; not the information of DNSs assigned to my local ISP.

Capability to prevent IPv6 Leak 

IPv6  stands for ‘Internet Protocol version 6’. It is also called IPng (Internet Protocol next generation). IPv6 is the most recent version of the IP (Internet Protocol). It is a basically communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the ‘Internet Engineering Task Force (IETF)’ to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace the current version of IPv4 (Internet Protocol Version 4).

As IPv6 routes traffic across ISP (Internet Service Providers) and Websites, nowadays it may be possible that user’s traffic requests will be traced by third party or malicious attacker even when connected to an IPv4 VPN. This risk may take place stealthily while surfing any website by downloading any advertisement, image, or css file from an IPv6 URL, and it can even occur over Bittorrent also. In this way it would be possible to spy on the user’s website browsing history or online activity simply from leaked IPv6 requests. So, protecting IPv6 leakage is very important.

This is why Proxy,sh has added a feature that specifically forces all IPv6 traffic to route through their VPN tunnel; thus blocking any potential leak at the source. I have performed a ‘IPv6-leak’ test at ipv6leak.com and found ‘No IPv6 Leak’ at all. See the image below-

Capability to prevent WebRTC Local IP Leak 

Reports from some users have brought to light a Internet security hole first in VPN industry that might reveal your local IP address to websites/webBrowsers through ‘WebRTC’. The ‘RTC’ in WebRTC stands for Real-Time-Communication, and the API directory is used for voice calls, video chats, and p2p file sharing.  This WebRTC was originally developed to aid certain types of connections between browsers without the need for an additional plugin. But today’s most remarkable worrying subject in VPN industry has been WebRTC that could be used to discover your local IP address provided by your local ISP, even under the presence of a VPN connection.

So, does Proxy,sh client software have the capability to protect your local IP address from being leaked through WebRTC?

To get this answer, I performed a test using OpenVPN protocol (TCP-433, RSA-4096bit) and Mozilla Firefox browser (without extension) at renowned WebRTC IP tracker websites ipleak.net to see how much capable Proxy.sh VPN is of preventing WebRTC IP leakage. I am very delighted to say that I got No WebRTC IP leakage during my test. The below image shows that Proxy,sh’s client software works perfectly as the result only shows a Netherlands Public IP address 185.47.202.158 and another IP 10.0.4.30 as WebRTC Local (Private) IP address both of which are assigned to Proxy-sh; Not assigned to my local ISP, at all. See the image below-

Note: To increase ‘WebRTC Local IP address leak protection’ security, I recommend you to use updated Mozilla Firefox browser (and completely avoid Google Chrome, Opera, Safari, Comodo Dragon etc browsers), while being connected with VPN, for ensuring more privacy. If you add ‘Disable WebRTC’ extension to Mozilla Firefox Browser and perform the same test at ipleak.net and perfect-privacy.com/webrtc-leaktest/, then you’ll get more perfect result and even your VPN’s WebRTC local (Private) IP address will be absolutely invisible. See the image below-

In case you use ‘Google Chrome‘, you are recommended to add ‘WebRTC Control‘ extension to an updated Google Chrome to prevent ‘WebRTC IP Leak’ perfectly.

Capability to bypass DPI (Deep Pack Inspection) in censored locations

Nowadays different websites, ISPs and Governments of different countries around the world are using DPI (Deep Pack Inspection) technology to spy on people’s online activities and control their access to the Internet. This DPI can only tell them that you are using encryption and that your packets are coming from a VPN server. And It is not a magic wand that breaks encryption. And so far, despite pretending to do exactly that, not even the NSA has ever broken a single packet with or without DPI.

I performed a test using OpenVPN (TCP-433, RSA-4096bit) protocol at www.doileak.com to know about how much capable Proxy,sh is of preventing its  VPN connection from being inspected and traced by any 3rd party. I am happy to say that No VPN connection was detected and traced by www.doileak.com .  The result says- ‘We could not detect your connection type‘. See the image below-

If VPN connection was detected, then it would say – ‘You are connected via generic tunnel or VPN and have made …. hops. Your connection type (generic tunnel or VPN) is rather uncommon for the average internet surfer, and could suggest proxy/VPN use’.

So, Proxy.sh is a great choice for the users who live in such countries that practice Internet censorship such as China, Turkey, Iran, the United Arab Emirates etc

Kill-Switch: So that you’re Not Exposed in case of any Unwanted VPN disconnection

Kill-switch is an innovative feature to ensure data privacy and security of all users by disabling all internet activities when the VPN disconnects. To ensure complete protection, Proxy,sh added this ‘Kill Switch’ feature in their VPN software that disconnects all your internet activities if the VPN connection drops.  But, this tool only manages to protect the user’s privacy until it is connected. In most disconnection cases, users do not even realize that their VPN connections have stopped working. Cyber criminals and surveillance agencies stay on the lookout for these few unprotected moments to get into a system and compromise its security. Luckily, this will not be the case anymore with Proxy.sh users, because they have introduced this Kill Switch feature in its VPN Apps. It means when kill-switch is enabled and the connection interrupts, the client software automatically blocks all outgoing network connections so that your real IP is protected from being visible. This is an optional feature so you can switch it on if you feel the need.

The Kill Switch feature covers the following:

  • When enabled, the Kill Switch will close all applications in case of an unwanted VPN disconnect.
  • When combining Kill Switch with the Auto Reconnect feature, the client app will not only close all applications that are running but also re-open the apps as soon as the VPN connection has been re-established.

We recommends that Kill Switch is always enabled in order to prevent any un-encrypted traffic (private information, passwords, files, etc.) from being exposed. It is also recommended that you enable Auto Reconnect in case you don’t want to interrupt your invisible browsing activity.

According to my practical experience, Proxy,sh’s Kill-Switch technology works perfectly. I’m very impressed.

Reconnect Automatically

You don’t have to connect the software again and again if the connection drops.  Just Enable their ‘Auto Reconnect’ option. When your Internet connection is interrupted, their vpn app is intelligent enough to stop and reconnect once your internet connection resumes. This feature guarantees extra privacy and security for their users.


Multiple VPN Connections Simultaneously

Each proxy.sh account can only be used for up to 3 concurrent connections, but you can of course buy additional accounts at any time. Please note that some routers/firewalls have troubles handling multiple VPN connections to the same destination. In such a case you may ask for a trial account to test along with your normal account to conclude if additional VPN accounts can or can not be handled by the router/firewall. Please note nevertheless that you can simultaneously connect as many devices as you wish if they originate from the same network.


Configuration facility with Router 

If you have multiple computers or various devices connected to your network, and wish for them to be routed through VPN servers of Proxy-sh, you may prefer to setup a VPN connection on your actual router. By doing so there is no need to configure every device separately, as your router will automatically connect all devices to proxy.sh’s service. This is especially useful for connecting devices with no built-in VPN support. Most of routers do support proxy and VPN. It depends on the brand/model of your router.

You should not need to open any ports or adjust your firewall settings to establish VPN connections. OpenVPN utilizes port 443 and PPTP uses port 1723; these ports are open by default for most systems. However, your ISP must allow GRE protocol for you. Nevertheless, in most cases you won’t experience any problems connecting to their VPN server from any place. In case if you face any server connection problem,  you may contact them.


VPN Server Network Speed

You surely want great network speed. Yes Proxy-sh offers an add-on facility to boost network speed which includes-

  •  50GBps Dedicated Bandwidth
  •  SoftLayer Network (U.S. West, East, South, UK, Japan & Singapore)

This add-on gives you access to the Boost network made up of ultra-fast VPN servers located in 7 different locations across 5 countries. Bandwidth is metered across this network and you can get started with 25GB for $1.

I am happy to say that they have developed a special tool called “Speed Assistant” and available at https://proxy.sh/speedtest if you would like to test the speed quality between your location and the various VPN servers they have. This assistant is limited to 10 checks per day in order to make sure their network remains unaffected by this tool. For security reasons, you may only access the speed-tests using this assistant, logged into your account (although you do not require an active membership).

But you should always keep in mind that there are a number of factors that will determine the speed you get behind a VPN server. The most obvious factor is your Internet speed to begin with, and the distance between your physical location and the location of our VPN server nodes. For example connecting from Canada to Hong Kong VPN server corresponds to some thousands of kilometres long trip, and therefore some speed loss is going to be inevitable. The closer you are to proxy server locations, the lesser chance you’ll experience speed loss. Usually, their proxy will not slow down your Internet connection and your system to an extent that is noticeable. You might just eventually lose some milliseconds in your ping time, and won’t be able to access your real high peak speed. Your average speed, nevertheless, might remain the same.

Sometimes a proxy can act as a speed leverage to access some other resources on the Internet. They say it as a matter of fact, if you are from China and you use their Hong Kong VPN, you will certainly experience better speeds to access YouTube. That is because the routing between you and our servers, as well as between their servers and YouTube’s, is better than using mainland DNS as the latter may lead you to go through unwanted nodes before actually accessing YouTube, resulting therefore in speed loss.

Proxy.sh is really committed to providing you the best possible service they can. You need to know that they never throttle any server and that they always make sure that servers are not overloaded. Nevertheless, if you experience generally slow speeds and that you believe your original Internet connection is much better than what you get while hidden by proxy-sh, they provide few tips for you. First of all, you can go to their private tutorials in this knowledge-base and find out private articles on how to gear up your connection to their proxy. Secondly, you can make sure the proxy you are connected to is located nearby your country. If not, try to upgrade to a US $10 account and switch to a better location. Finally, try to switch to other proxy technologies, sometimes it might help, especially if you choose OpenVPN which is known sometimes to be slower than other technologies. After applying these procedure of speed-tests to all locations, select your preferred one. Yet you face any problem regarding this issue,  their support team will recommend after you raise a support ticket to them.


Logging Policy

Proxy-sh is seriously committed to client’s privacy that you can trust on. To ensure their users privacy they accept BitCoin too from their users to pay for their services. So, you can pay anonymously using your username and email address.

Proxy-sh is also one of the best logless vpn service provider; meaning they neither store user’s connection-logs (user’s local IP address, time-stamps during connecting or disconnecting attempt) nor activity-logs whatsoever. They neither can relate any internet activity with any specific user account nor can they match any specific user’s identity with any Internet activity, because they work entirely on the basis of shared IPs, meaning that a single IP is used by uncountable number of users and does not track back to an individual user. Proxy.sh clearly says-

We do not keep any logs internally. The only thing we log here is your e-mail address and your purchase details (your invoices linked to your e-mail and your product details). We do no log your activity on our proxy (neither the authentification nor the traffic). We don’t even know whether you use our proxy or not. We do not log IP or location, nor anything such as your browser details. Nevertheless, you must be aware that our payment gateways will log your IP, location and any information you provide to them. It’s your call to decide what you should or should not release out.”

Privacy related 12 Questions  answered by Proxy.sh’s support team 

1-Q: a) Which country is your VPN Company officially incorporated in and under what jurisdiction(s) does it basically operate? b) Is there any mandatory data retention law under that jurisdiction(s) to store any personal information (like name, local address, country, contact number etc.) or any kind of identifiable connection logs or activity logs of your VPN users in your database?

Ans:- a) We fully operate in and fall under the law of the Republic of Seychelles, but our staff comes from the following countries: Argentina, Belgium, Bulgaria, Germany, Laos, Philippines, Russia, Seychelles, Spain, Switzerland, Thailand. There is no mandatory data retention law under its jurisdiction. b) No, we do not keep any log at all. We do not log IP or location, nor anything such as your browser details. Nevertheless, you must be aware that our payment gateways will log your IP, location and any information you provide to them. It’s your call to decide what you should or should not release out.

2-Q: Is your VPN Company a sister company of any company incorporated under such jurisdiction which has any law that can be used to impose your VPN Company, through the company of which your VPN Company is sister company, to handover any personal information or any identifiable logs of your VPN users whenever they want?

Ans:- No, we are not affiliated with any other companies. We are a non-for-profit operation made up of brilliant & skilled individuals who are located throughout the world and collaborate in a digital manner.

3-Q: a) Are the servers you use as VPN gateway in different locations basically built-in-house servers that you own or are they Dedicated servers or VPS/Cloud servers hosted on 3rd party hosting companies for rent? b) What privacy and security measures do you take to keep them safe and secure from any possible adversaries of current time? I am asking this, because there is an argument specially about VPS/Cloud servers that if VPN providers don’t own the VPN servers rather host them on third party hosting companies, they have no way to be sure the hosting companies don’t have any stealth key or backdoor into the hosted servers to keep logs, and there may have possibility for hosting companies to store or take snapshots of use- logs. What do you say about this privacy issue?

Ans:-We use of a mix of collocations, dedicated servers and virtual private servers to make up our network. We work with more than 300 hosts and data centers throughout the world.

That is a wrong assumption. But we still own most of our hardware. However, even if you own it, it does not mean the data center is not logging your machine. Same goes if you own the whole data center, it does not mean the government or the ISP is not logging. Fortunately, all of them can only log encrypted stuff, so it does not much matter.

We publish it to our transparency report and also open a network alert about the affected servers that will come to see an intervention from law enforcement authorities. In case we cannot publish it, we’ll use our warrant canary (proxy.sh/canary) to signal our members about interventions.

4-Q: a) Where have you hosted your VPN website —on built-in-house server or any VPN gateway server or absolutely separate server other than them? b) When an customer gets registered, which server do you manage to store user’s account information — on any VPN gateway server or same server where website has been stored or absolutely separate server other than them? c) Is the account area you provide to users after registration—a built-in-house account area or any third party software? d) What privacy and security measures do you take to keep users’ account area and personal information safe and secure from any possible adversaries of current time?

Ans:- Everything is in-house. We host our own WHMCS instance for billing and support. We do not keep any logs internally. The only thing we log here is your e-mail address and your purchase details (your invoices linked to your e-mail and your product details). We do no log your activity on our proxy (neither the authentification nor the traffic). We don’t even know whether you use our proxy or not. We do not log IP or location, nor anything such as your browser details. Nevertheless, you must be aware that our payment gateways will log your IP, location and any information you provide to them. It’s your call to decide what you should or should not release out.

5-Q: a) For getting registered, beside ‘username’, email address and password do you also require full name, local address, country, contact number, postal code etc from users? If so, then why? B) Do you store debit/credit card information, bitcoin wallet address etc on your database if user uses those respective payment methods to purchase any VPN plan? Many argue that these types of information mentioned in (a) and (b) reduce user’s privacy and anonymity specially when court order or subpoena is received to investigate about any active user. What do you say about this privacy issue?

Ans:- No, we do not ask our users personal information. The only thing we log here is your e-mail address and your purchase details (your invoices linked to your e-mail and your product details).

6-Q: We see what username and password are used to login to user account-area are also used to login to VPN client software/apps. And that means user account area is linked with VPN client software/app . a) Do you store or monitor user’s real IP address and time stamps when he mare logs in to or logs out from both the account area as well as VPN client software/app? If you do, then which server do you manage to store them —VPN servers or any separate servers where website or user’s personal account information is stored?

Ans:- Customers will need to use their email address (or a fake email address, free to choose) to access their account panel. They will receive a separate login credentials to connect to our VPN network. We do not log IP or location, nor anything such as your browser details.

7-Q: When user pushes ‘Connect button’ of VPN client, then obviously user’s VPN client software understand which username belonging to which user-account is authenticating VPN Server access for VPN tunneling. Do you store ‘username’ and IP address and timestamps other identifiable logs of user when he connects to or disconnects from VPN tunnel through VPN client software/app?

Ans:- No, we do not keep logs at all. We also have an option to kill accounts and turn them into completely anonymous tokens https://proxy.sh/panel/knowledgebase/55/Tokens) with no panel or membership link at all, for the most paranoid customers (in the positive sense of the term).

8-Q: Do you store any user’s activity logs on VPN gateway servers that can help specify any specific user? If so, then it is for how long and why?

Ans:- No, we do not.

9-Q: Suppose a court order has come to your company against any of your IP addresses that has been used for any online activity and that should be under official investigation. If enforcement agency goes into the entire content of associated VPN servers which the accused IP address belongs to, then will you or enforcement agency be able to find out any connection/activity logs of any particular period of time in any way that can be matched with any user account. I am asking this because, we know all most all of the professional VPN providers basically provide shared IP addresses to ensure sufficient interface crowding on the servers and crowding is used to increase the total number of users sharing the same IP, which combined with encryption makes it harder for a 3rd party to attribute an outgoing connection to an incoming one thereby significantly increasing users’ privacy. So it becomes harder to identify any particular user’s logs. But yet, if hypothetically we assume that user ‘X’ is the only user who is using a VPN server at a particular short period of time (for example 10 minutes) and none other else, then can you anyhow identify which account-user is using the server, what his real IP address is, what location he is residing in and what activities he is performing at that specific time period?

Ans:- We do not restrict any activity on our network, other than those displayed in our ethical policy. As our terms state it, we will respect your privacy and never engage in negotiations with third party regarding personal information leakages, including to governmental institutions. Nevertheless, there are ethical limits we would like to detail out with you and you can check it here, https://proxy.sh/panel/knowledgebase/5/Ethical-policy.html

How could you assume that the user X is the only one on the VPN account? You mean you just have a single peer online to the VPN server? It does not matter much neither as the identification of that user is not possible. So whether you have one or ten users connected, each account cannot be identified unless you decrypt the whole user auth.

10-Q: There is an argument that third party DNS servers may keep user’logs. Do you use third party DNS server? If so, then how do you protect user’s privacy?

Ans:- We provide our customers our own DNSCrypt instance. They also have the freewill to use third-party DNS servers.

11) Do you use any third party support software (like email software, Live Chat software etc) which is linked to the user-accounts and that holds information or logs of subscribed users?

Ans:- No, we do not.

12) If you receive a valid court order or subpoena that requires your company to identify any active user of your VPN service, then a) what do you do? b) what will you be officially able to provide them from account area and VPN servers?

Ans:- We publish it to our transparency report and also open a network alert about the affected servers that will come to see an intervention from law enforcement authorities. In case we cannot publish it, we’ll use our warrant canary to signal our members about interventions.


Refund Policy

They assure that they are happy to offer a full refund for any order as long as your payment method allows it. For prepaid cards or cryptocurrencies such as Bitcoin, they can convert your membership into an anonymous voucher code that you can exchange or trade on the Internet. For any other case, they will issue an immediate refund, no question asked.


Customer Support

Proxy,sh provides email support and FAQ & tutorials to solve customer’s problem. Their support team is available to provide a 24/7 happy sales, tech & admin support through their tickets system. They assure that they strive to happily answer within less than 4 hours and in average less than 12 hours, and maximum less than three business days.  They are available throughout the year.

Remarkable Pros

  • Operated basically from Republic of Seychelles
  • No physical presence of office; Anonymous group
  • 300+ VPN Server Locations in 57 countries
  • Unlimited traffic, bandwidth and Server switching
  • Basically username & email address required to sign up
  • Anonymous Token (128-bit hash) for anonymous purchase
  • 100% No connection/activity Logs; everything runs from RAM
  • Full featured & Powerful VPN Client software/apps
  • IPv6 leakDNS Leak Protection & Kill-switch options
  • OpenVPN (UDP, TCP), L2TP/IPSec & PPTP protocols
  • OpenVPN with with up to 256Bit-AES/CBC, SHA-512 and 4096-bit RSA
  • OpenVPN (XOR+ECC) to bypass DPI Firewall of censored countries
  • OpenVPN (TOR’s obfsproxy) makes Tor users undetectable
  • Entire network configured with SoftEther and OpenVPN
  • The Boost Network up to 50GBps Dedicated bandwidth
  • Up to 3 simultaneous devices connection at a time
  • Compatible with all major Operating Systems and Devices
  • About 100 Payment Methods including Bitcoin
  • Any time an unconditional refund policy adopted
  • 24/7 email/ticket customer support

Remarkable Cons

  • No Live Chat support
  • Boss Plan is Expensive

Our Take on Proxy.sh VPN

In this Proxy.sh VPN review, I am very excited and  truly delighted to say that Proxy.sh is, according to me, one of the best secure VPN service providers in industry. Firstly, because  Proxy.sh perfectly ensures military grade encrypted privacy of user’s identity and other important information, while surfing online, by hiding local IP and geo-location from unauthorized inspection of any third party. Secondly, Proxy.sh is a true logless vpn service provider; meaning they neither store user’s connection-logs (user’s local IP address, time-stamps during connecting or disconnecting attempt) nor activity-logs whatsoever. They neither can relate any internet activity with any specific user account nor can they match any specific user’s identity with any Internet activity. And apart from this vital factor, Proxy.sh is under Seychelles Jurisdiction, which is outside the risk of corrupted political territory of USA and EU, which offers certain advantages especially for privacy and the risk of overzealous government surveillance, and also where there is no mandatory data retention law. So, Proxy.sh is a great choice in terms of users’ privacy especially for those (like truth seeker journalist, news reporter, blogger) who face a severe need of end-to-end online anonymity and privacy in upholding true information in the internet against powerful bad organizations ( like bad governments, bad law enforcement agencies, bad politicians etc.) with a view to protecting themselves from the probable harassments that might take place by those bad organizations, because if these organizations even illegally force Proxy.sh to handover all possible identifiable logs of any specific user to them, they will neither be able to officially had it over to them as Proxy.sh  does not store logs of any kind, nor can they match any specific user’s identity with any Internet activity. Thirdly, Proxy.sh might be suitable and highly recommended for those users also who want to bypass any country’s Internet Censorship &  Content Surveillance, as well as to access any Geo-Blocked Website, or to view or download any legal file or video with military grade privacy . So, if privacy is your priority, then you can use Proxy.sh without any question.  I consider Proxy.sh as one of the best anonymous VPN as well as best no log VPN service providers in industry.

nv-author-image

Michael

Michael Reddy is a tech enthusiast, entertainment buff, and avid traveler who loves exploring Linux and sharing unique insights with readers.