Perfect Privacy VPN Privacy Report

Perfect Privacy might have scored higher had they not suffered a serious breach within the last five years. As far as privacy goes, the company says that they don’t log IP addresses, timestamps, or online activity, and they have strong encryption measures in place. But in the past, Perfect Privacy has shared server data with the Dutch police.
Encryption
In Transit | Yes |
---|---|
At rest? | Yes |
All network communications and capabilities? | Yes |
Security Updates
Automatic, regular software/ firmware updates? | Yes |
---|---|
Product available to use during updates? | No |
Passwords
Mandatory password? | Yes |
---|---|
Two-Factor authentication? | No |
Multi-Factor authentication? | No |
Vulnerability Management
Point of contact for reporting vulnerabilities? | No |
---|---|
Bug bounty program? | No |
Privacy Policy
Link | https://www.perfect-privacy.com/en/privacy-policy |
---|---|
Specific to device? | No |
Readable? | Yes |
What data they log | Login credentials, expiration date of account, email address, browser type and browser version, operating system used, referrer URL, host name of accessing computer, time of the server request |
What data they don’t log | Payment information, user traffic, IP addresses, access times or duration, bandwidth caused by individual users/td> |
Can you delete your data? | Yes |
Third-party sharing policies | Do not Share |
Surveillance
Log camera device/ app footage | n/a |
---|---|
Log microphone device/ app | n/a |
Location tracking device/ app | No |
Parental Controls
Are there parental controls? | No |
---|
Company History
Any security breaches/ surveillance issues in past? | Yes |
---|---|
Did they do anything to fix it? | No |
Additional Security Features
Anything like privacy shutters, privacy zones, etc.? | n/a |
---|