OpenVPN isn’t a VPN provider. It’s a free open source software application specifically developed by OpenVPN Technologies Inc. to create highly secure VPN connections. Like SSTP, L2TP/IPsec, and PPTP it’s a standalone tunneling protocol – only much more reliable and miles more secure.
Is My Privacy Protected with Open VPN?
OpenVPN does not keep any records or logs of user activity. This is made clear in its Privacy Policies.
Data Collection, Use and Retention
We collect information from you when you register on our website, place an order, respond to a survey or fill out a form.
When ordering or registering on our website, as appropriate, you may be asked to enter your: name, e-mail address, phone number or credit card information. You may, however, visit our website anonymously.
The minimum information that OpenVPN Inc requires is an e-mail address for registration and contact purposes. We may also ask for payment and business information for invoicing purposes.
What do we use your information for?
Any of the information we collect from you may be used in one of the following ways:
To improve our website
(we continually strive to improve our website offerings based on the information and feedback we receive from you)
To improve customer service
(your information helps us to more effectively respond to your customer service requests and support needs)
To process transactions
Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.
To send periodic emails
The email address you provide for order processing will only be used to send you information and updates pertaining to your order.
Note: If at any time you would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email.
How do we protect your information?
We implement a variety of security measures to maintain the safety of your personal information when you place an order
We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology and then encrypted into our Payment gateway provider’s database only to be accessible by those authorized with special access rights to such systems and are required to keep the information confidential.
After a transaction, your private information (credit cards, financials, etc.) will not be stored on our servers.
Customer Data Access and Control:
To review, request a copy of, or delete your account information you may contact us via e-mail at [email protected]
A cookie is a piece of data that a website can send to your browser, which may then be stored on your computer as a tag that identifies your computer. While cookies are often only used to measure website usage and effectiveness and to allow for ease of navigation or use and as such, are not associated with any personal information, they are also used at times to personalize a known visitor’s experience to a website by being associated with profile information or user preferences. You can set your browser in most instances to notify you before you receive a cookie, giving you the chance to decide whether to accept it or not. You can also generally set your browser to turn off cookies. Since cookies allow you to take advantage of some of our website’s features, we recommend that you leave them turned on. If you block or otherwise reject our cookies, you will not be able to use any website services that require you to sign in
Do we disclose any information to outside parties?
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our website policies, or protect ours or others rights, property, or safety. However, non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
California Online Privacy Protection Act Compliance
Because we value your privacy we have taken the necessary precautions to be in compliance with the California Online Privacy Protection Act. We therefore will not distribute your personal information to outside parties without your consent.”
How Much is Open VPN? Is There a Free Trial?
All OpenVPN Access Server downloads come with 2 free connected devices for testing purposes. You will pay $15.00 License Fee per Connected Device per Year. Support & Updates included. Minimum purchase of 10 connected devices.
OpenVPN Access Server license keys can be purchased for more than one year at the discount listed in the following table
• Powerful 256-bit encryption
• Allows multiple simultaneous connections
• Multi-platform support
• DNS and IPv6 leak protection
• WebRTC protection
• Support for API
• Allows you to setup your own VPN
• Does VPN keep logs – No
• Includes Kill Switch – No
• Devices per license – 1
Is Open VPN Safe?
OpenVPN ranks among the most secure & powerful tunneling protocols for the security it provides for authentication using pre-shared keys, usernames&passwords, and authentication certificates. Depending on the importance of OpenVPN connection, technology can use a mix of three to authenticate users making it really secure. To power its own encryption, developers of OpenVPN programmed the protocol for using the C Language based OpenSSL(a mod of SSL/TLS) encryption library.
OpenVPN can be used in conjunction with a wide variety of ciphers, cryptographic hash functions, and public-key cryptography standards. These include:
1. OpenVPN Ciphers
OpenVPN can be customized for using a selection of different ciphering technologies, depending on the need some are so complex that not every VPN provider chooses to implement them.
AES – Advanced Encryption Standard
The successor of the old DES standard, AES (Advanced Encryption Standard) also known as Rijndael, was adopted by the US National Institute of Standards and Technology in 2001. The brainchild of two Belgian programmers, AES allows creating blocks of 128bits compared to DES which could only create blocks of 64bits.
Once data is encrypted with AES, it can use key lengths of 128, 192 & 256 bits, allowing the end user to deploy strict security if the data is sensitive in nature. AES is a symmetric-key algorithm, which simply means that it uses the same key to encrypt & then decrypt the data. This allows faster encryption, transfer and decryption of data, especially for large size data.
Most VPN providers provide AES as the default standard within their services.
Camellia is a creation from the legendary Mitsubishi Electric Corp. & Nippon Corp. of Japan, and is another symmetric key algorithm. Camellia has the processing capabilities and security framework equal to the renowned AES algorithm. Designed to create block sizes of 128bits of data, the algorithm can deploy key lengths of 128, 192 & 256bits.
The great fact about Camellia is its ability to be used with both software (VPN) and hardware (Smart Cards). Millions of computers use Camellia since it is part of the TLS (Transfer Layer Protocol) used by PC all over the world for communication security over the Internet.
Based on the CAST design procedure, CAST-128 or CAST5 is a symmetric key algorithm used with selected versions of GPG (GNU Privacy Guard) & PGP (Pretty Good Privacy used for text, emails etc.). CAST-128 is the authorized cryptography method approved by the Government of Canada implemented by the Communications Security Establishment (Canada’s national cryptography agency).
Designed in 1996, CAST-128 creates 64bit blocks of data while using 40 to 128 bit encryption key size. The patent for CAST is owned by Entrust (Software & Security Co.) which offers CAST-128 licenses for commercial & non-commercial uses.
Data Encryption Standard or DES, was the founding stone of the cryptography industry. It was widely implemented before the development of the revered AES algorithm. Now deemed insecure & obsolete, DES opened the doors for research into cryptography. DES is a symmetric key algorithm encrypting data in 64bit blocks while using 56bit key length.
Today, the Triple DES variant is used US government & military according to the cipher’s Wikipedia page. Once the algorithm was compromised by the EFF in a 22 hour test, it was abandoned in most implementations.
2. Cryptographic hash functions
The method used to store large amounts of data by converting it into alphanumeric code and saving it into tables. Every time data is required again a unique code is assigned to fetch it again. Commonly used hash functions include MD5, MD4, MD2, SHA-1, SHA-2, RIPEMD-160, MDC-2, and GOST R 34.11-94. Below is an example of a simple cryptographic hash function:
3. Public-key cryptography
The method used to authenticate or identify users over the OpenVPN network. Every OpenVPN user is assigned a public key a private key. While the public key identifies the recipient of data, the private key is used by the recipient to decrypt the data. Most prominent implementations include RSA, DSA, Diffie–Hellman key exchange, Elliptic curve, GOST R 34.10-2001.
I realize that when you make a decision to buy VPN Services it’s important not only to see how experts evaluate it in their reviews, but also to find out if the real people and companies that buy it are actually satisfied with the product. That’s why we’ve created our behavior-based Customer Satisfaction Algorithm that gathers customer reviews, comments and OpenVPN reviews across a wide range of social media websites. The data is then presented in an easy to digest form showing how many people had positive and negative experience with OpenVPN. With that information at hand you should be equipped to make an informed buying decision that you won’t regret.