Perfect Privacy is a bit like the Porsche of VPN services. If you’re just an average commuter, you might be okay driving a Toyota or a Honda. But why settle for average when you could be cruising around in the lap of pure European luxury?
In all seriousness, Perfect Privacy vastly outperforms the rest of the VPN competition in multiple areas. If you’re looking for the ultimate combination of anonymity, speed, and state-of-the-art features, I’m convinced that they do the job better than anyone else.
Other VPN services might tell you that they don’t keep logs, or that they don’t track your connections, but Perfect Privacy is one of the few companies that I know with tangible, real-world evidence to back up their claims.
First of all, when legal authorities seized Perfect Privacy’s servers a few years ago in search for user data, they were unable to find any records, nor did Perfect Privacy have any data to hand over.
Second, Perfect Privacy lets you connect as many simultaneous devices as you want to their VPN service. That’s because they don’t even keep logs of how many connections you make.
While I’m usually hesitant about lavishing praise on VPN services (as my other reviews will attest), I’ll make an exception for Perfect Privacy because they’re clearly in a class of their own.
Sure, they’re more expensive than many other VPN services—but Porsches don’t come cheap. In fact, I’d be suspicious if their service were any cheaper.
For a detailed look at all of Perfect Privacy’s premium features, check out my extensive guide below. Feel free to skip to the sections that interest you.
Privacy and Anonymity
Switzerland-based Perfect Privacy does not keep logs of any of its users’ traffic. This mean absolutely no bandwidth data, time stamps, IP addresses, location data, or anything of the sort.
In fact, since they don’t keep track of the number of connections you make, or when you make them, you are permitted to connect as many devices as you want using a single subscription.
This goes far beyond the half-hearted no-logging policies of many other VPN services—in fact, I’d be hard-pressed to find any other VPN provider that doesn’t even keep count of the number of connections that you make.
But don’t just take it from me: in August, 2016, Dutch authorities seized some of Perfect Privacy’s servers, but were unable to find any data there, as Perfect Privacy keeps no logs or records (and their servers run as ramdisks, with nothing stored in permanent memory).
To maximize your privacy, Perfect Privacy allows you to pay for their service using anonymous methods, such as Bitcoin, and even by mailing cash.
But if you’re still not convinced, you might be drawn to Perfect Privacy’s killer feature set, which I’ll be discussing next.
Connections and Bandwidth
As I’ve already mentioned, Perfect Privacy allows you to connect an unlimited number of devices to their VPN using a single subscription. Most VPNs won’t go over 5 or 6 simultaneous devices, so this is a rare and ultra-generous perk. It’s like buying a car and finding out that the dealer will also pay for your gas.
If you regularly travel with multiple devices, or you need to keep devices in several locations at once, Perfect Privacy’s VPN service will likely offer the best value for your money.
For instance, if you have six internet-connected devices in your home, another three in your office, and you usually travel with four more devices, a Perfect Privacy subscription will make it easy to stay connected to VPN without having to keep count of your connections.
This also makes installing Perfect Privacy on your router unnecessary. If you want to connect all the devices in your household to a VPN, you can simply connect them all to Perfect Privacy.
There are also no bandwidth limits whatsoever (although Perfect Privacy politely requests that you pick servers with low traffic whenever possible).
Perfect Privacy offers servers in 23 countries, mostly in Europe, with a few in Asia and North America.
They emphasize that all of their servers are physically located in the cities displayed on their server list. There are no virtual locations (servers that pretend to be in one place when they’re actually somewhere else).
This ensures that your geographical location is always fully located in the city indicated in the server name—and makes it less likely that you’ll be tracked by your ISP or other snoopers.
Perfect Privacy’s servers also have a huge bandwidth surplus. I’ve never seen their total server utilization go over 12%. This means that you’ll always have a fast server to connect to (I’ll be discussing speed in a later section).
Geoshifting (Netflix, Hulu, BBC, YouTube, and more)
Perfect Privacy allows you to change your virtual location (geoshifting) by switching between different VPN servers. This lets you access geographically restricted content from around the world.
For example, if a specific website is only available in the UK, you should be able to access it by connecting to Perfect Privacy’s London servers.
During our tests, we tried accessing YouTube videos that were blocked in the country we were traveling in (Thailand) by connecting to the New York server. Perfect Privacy unblocked the videos without a hitch.
However, during our tests we were unable to watch US Netflix shows when connected to the New York server. I was also unable to access BBC’s iPlayer by connecting to the London server.
Unfortunately, that’s entirely normal: major content sites use sophisticated technology to ban VPN IP addresses, and many VPNs find it difficult to compete. (If you need for a VPN specifically for accessing geo-locked content, I recommend trying NordVPN.)
P2P File-Sharing (BitTorrent)
As Perfect Privacy does not keep logs or monitor traffic, they don’t restrict or tamper with P2P file-sharing traffic. Feel free to use BitTorrent to your heart’s content while using Perfect Privacy—just be courteous about watching your bandwidth usage and picking a low-traffic server than can handle your downloads.
Keep in mind that Perfect Privacy’s US and French servers don’t support P2P traffic at all, as authorities in those countries are quick to shut down servers that may be engaging in copyright violations. Servers in other locations fully allow P2P traffic without speed or volume restrictions.
If you’re concerned about copyright claims or ISP monitoring, you’ll be 100% safe on Perfect Privacy. There isn’t any way for your P2P activities there to be traced back to you.
Censorship Bypassing (China, Schools, Hotels)
I’ve already explained that Perfect Privacy is an ideal VPN for travel because it supports an unlimited number of connections. But even more importantly, Perfect Privacy is renowned for its ability to circumvent internet censorship and bypass VPN blockers used in restrictive countries like China, Iran, Turkey, and elsewhere.
That’s because Perfect Privacy’s obfuscated StealthVPN protocol can mask your VPN traffic so it looks like regular HTTPS traffic, which is rarely blocked by firewalls.
Even if you’re not planning to travel to any restrictive countries, you should be aware that many hotels, schools, businesses, and ISPs routinely throttle or limit VPN traffic. But if you use Perfect Privacy’s StealthVPN protocol, you can safely bypass these blocks by disguising your VPN traffic so it won’t be recognized as such, not even by your ISP.
This is an incredibly useful feature to have whenever you need to hide the fact that you’re using a VPN, no matter where you are.
Advanced Protocols (Multi-hop, SOCKS, Tor)
Perfect Privacy, in my opinion, goes above and beyond the pack by providing innovative protocols and features that its competitors don’t or can’t offer. This is what truly differentiates Perfect Privacy from the rest of the VPN crowd.
I’ve already mentioned their obfuscated StealthVPN protocol, a feature that disguises the fact that you’re using a VPN. This lets you bypass censorship and internet blockers, such as the Great Firewall of China, or your hotel’s VPN-unfriendly network.
Perfect Privacy also offers a cutting-edge feature called NeuroRouting, which is their proprietary AI-based protocol that continuously analyses and re-routes your VPN traffic to make it extraordinarily difficult to track. The protocol works by keeping your traffic within Perfect Privacy’s servers for as long as possible by means of artificial intelligence-based programming.
I also like that Perfect Privacy offers an advanced cascading (multi-hop) protocol, which routes your traffic through multiple servers and makes it very difficult for snoopers to monitor you.
Like most VPN providers, Perfect Privacy also offers the standard OpenVPN protocol, as well as IKEv2, IPSec, SSH2, and PPTP. They also offer Tor access, Squid proxies, and SOCKS5 proxies.
Perfect Privacy offers its own VPN client software for Windows and Linux users. Mac users have the option of using the open source Tunnelblick VPN software, which comes with OpenVPN and is relatively easy to use.
For this guide, I’ll be testing Perfect Privacy on macOS.
The first step is to install Tunnelblick by following Perfect Privacy’s instructions. You should remember to click “I have configuration files” when prompted by Tunnelblick.
You then have to download Perfect Privacy’s OpenVPN configuration file (available under Member > Download) and drag-and-drop it into the Tunnelblick menu icon.
Once that’s done, you can connect to any Perfect Privacy server by clicking on the Tunnelblick menu icon and selecting a server. You’ll need to enter your Perfect Privacy username and password.
And that’s it. We’re now connected to Perfect Privacy VPN. Let’s use Perfect Privacy’s Check IP page to make sure we’re not leaking our local IP address.
If you want to enable NeuroRouting on macOS, you can do so by visiting Member > Config. Windows users can change all settings using the native VPN client.
Enabling StealthVPN on macOS takes a bit more work. You need to install Homebrew, and follow fairly complex instructions on Perfect Privacy’s website.
Overall, I found usage on macOS intuitive and easy to follow, but that may be because I’m experienced with VPNs. A user who isn’t as familiar with technology might have a harder time configuring Tunnelblick to work with Perfect Privacy on macOS.
Fortunately, there is a Perfect Privacy macOS VPN client under development (currently available in beta form) that will let users configure cascading/multi-hop and StealthVPN directly from the desktop. However, I would be wary of using the beta version until Perfect Privacy releases a stable version (which should be soon, hopefully).
Perfect Privacy’s mobile apps are still under development, but in the meantime it’s still possible to connect to Perfect Privacy using built-in functions in iOS and Android.
For this guide, I’ll be testing Perfect Privacy on iOS (iPhone).
The recommended protocol is on-demand VPN with IKEv2. This does not require downloading any apps, but it does require following specific instructions.
The instructions require you to download a file for each server location and install each individually. I found this rather tedious, and I hope the situation will be ameliorated when Perfect Privacy releases its native app for iOS.
Once you open a profile using Safari, you will be taken to the “Install Profile” settings page, where you can install the VPN profile on your device.
After entering my username and password, my phone installed the VPN profile and it was available for always-on VPN use.
Overall, the process was fast—but this was only to connect to a single server location. Repeating the process for all of the other server locations would be fairly time-consuming and not something the average user would relish doing.
Cascading (multi-hop) and StealthVPN are also not available on mobile, which is a pity—but hopefully the release of Perfect Privacy’s mobile app will make this possible in the future.
We tested Perfect Privacy with speedtest.net while traveling in Bangkok, Thailand. Our original connection (without a VPN) tested at 51.13 Mbps for download speed and 17.19 Mbps for upload speed.
While connected to Perfect Privacy’s nearby Singapore server location, we were able to get 26.40 Mbps for download speed, and 15.51 Mbps for upload speed. This represents about a 50% reduction in download speed—which is about what we’d expect from any reliable VPN service.
Next, we tried a more distant server. While connected to the New York server location, we managed to get 10.96 Mbps for download speed, and 3.10 Mbps for upload speed. That’s also to be expected considering that we were more than 8,000 miles away from New York.
We also tried a less rigorous test by watching streaming media while connected to the New York location. Despite the distance, we were able to watch 1440p videos on YouTube without interruptions.
Customer Service and Support
What I like most about Perfect Privacy’s support is that it’s all in-house—they don’t use any third-party systems that could potentially leak your data to outsiders.
You even have the option of contacting support via PGP-encrypted email, and you can set up your account to receive only PGP-encrypted emails by uploading your PGP public key in your account settings.
When I contacted Perfect Privacy support via their contact form, they replied within two hours, which I thought was an excellent response time considering the small size of their company.
If you’re looking to have 24/7 chat or phone support, Perfect Privacy is probably not the right choice for you. Ideally, you should have enough technical know-how that you won’t be needing someone to guide you through the entire installation and usage process. (If you’re savvy enough to download and install a new browser on your computer, you could probably install Perfect Privacy without a problem.)
As a premium VPN, Perfect Privacy costs a bit more than most of the VPNs that we recommend here on BestSafeVPN.com. You can expect to pay €9.99 (approximately $12.29) per month for an annual plan.
But keep in mind that this lets you connect as many devices as you want, and every single device will have access to incredibly high server speeds. You’ll also have access to obfuscated StealthVPN servers, NeuroRouting, cascading (multi-hop) servers, and excellent customer service.
Most importantly, Perfect Privacy offers a verified commitment to keeping you private. Their no-logging policy has stood up to real-world legal scrutiny—and there aren’t many VPN services that can make that claim.
While the installation process currently takes a bit of work (especially if you’re a Mac user), the effort is worth it when you consider their state-of-the-art feature set.
If you’re still not sure, you can always try Perfect Privacy risk-free by taking advantage of their 7-day money-back guarantee.
- Absolutely no logging
- Verified commitment to absolute privacy
- Allows anonymous payments
- Unlimited number of simultaneous devices
- StealthVPN protocol bypasses VPN blockers worldwide
- Offers OpenVPN, multi-hop, Tor, IPSec, and more
- P2P-friendly, no restrictions
- All major platforms: macOS, Windows, Linux, iOS, Android, etc.
- 7-day money-back guarantee
- Yearly plan €9.99 ($12.32 per month)
- Some features not available yet for mobile users
- Set-up for Mac and mobile users can be time-consuming