IPVanish
   HOME

TheInfoList



OR:

IPVanish VPN (also known as IPVanish) is a
VPN service A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geoblocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks. A wide va ...
based in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
, with applications for
Microsoft Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for serv ...
,
macOS macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and lapt ...
, Android,
iOS iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also include ...
, and
Fire TV Amazon Fire TV (stylized as amazon fireTV) is a line of digital media players and microconsoles developed by Amazon. The devices are small network appliances that deliver digital audio and video content streamed via the Internet to a connected ...
. Manual configuration is available for
ChromeOS ChromeOS, sometimes stylized as chromeOS and formerly styled as Chrome OS, is a Linux-based operating system designed by Google. It is derived from the open-source ChromiumOS and uses the Google Chrome web browser as its principal user interfa ...
,
Windows Phone Windows Phone (WP) is a discontinued family of mobile operating systems developed by Microsoft for smartphones as the replacement successor to Windows Mobile and Zune. Windows Phone featured a new user interface derived from the Metro design l ...
,
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
, and DD-WRT routers.


History

IPVanish was founded in 2012 by Mudhook Media Inc, an independent subordinate of
Highwinds Network Group Highwinds Network Group, Inc. (Highwinds) was a company founded in 2002 that offered IP services including CDN, cloud storage, IP transit, transport and colocation. The company headquarters were located in Winter Park, Florida, United States. H ...
in
Orlando, Florida Orlando () is a city in the U.S. state of Florida and is the county seat of Orange County, Florida, Orange County. In Central Florida, it is the center of the Greater Orlando, Orlando metropolitan area, which had a population of 2,509,831, acco ...
. The VPN service started with 32 servers and a client for Windows operating systems. In later years, software support was expanded to macOS, iOS, Android, and Fire TV. The IPVanish owns and controls a private
fiber-optic An optical fiber, or optical fibre in Commonwealth English, is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair. Optical fibers are used most often as a means t ...
network of tier-1 servers and owns roughly 90% of its points of presence (
POPs Pops may refer to: Name or nickname * Pops, an informal term of address for a father or elder * Pops (nickname), a list of people * Pops (Muppet), a Muppets character * Pops (Johnny Bravo), a character from the Cartoon Network animated television ...
), where the company controls the data center and hardware, or "the rack and stack." Its infrastructure is leased from third-party operators in regions "where it doesn’t make sense to have our own gear," such as
Albania Albania ( ; sq, Shqipëri or ), or , also or . officially the Republic of Albania ( sq, Republika e Shqipërisë), is a country in Southeastern Europe. It is located on the Adriatic and Ionian Seas within the Mediterranean Sea and shares ...
. In 2016, The company suspended operations in Russia due to conflicts with the company's zero-log policy and local law. In 2017,
Highwinds Network Group Highwinds Network Group, Inc. (Highwinds) was a company founded in 2002 that offered IP services including CDN, cloud storage, IP transit, transport and colocation. The company headquarters were located in Winter Park, Florida, United States. H ...
was acquired by CDN company StackPath which included IPVanish as part of the acquisition. In 2019, IPVanish was acquired by
J2 Global J2 Global, Inc. was an American technology holding company based in Los Angeles, California. The company provided Internet services through two divisions: Business Cloud Services and Digital Media. History J2 Global was founded in December 1995 ...
with thei
NetProtect
business. In July 2020, IPVanish removed its servers from Hong Kong


Controversy

According to a June 2018 article by ''
TorrentFreak __NOTOC__ TorrentFreak (TF) is a blog dedicated to reporting the latest news and trends on the BitTorrent protocol and file sharing, as well as on copyright infringement and digital rights. The website was started in November 2005 by a Dutchma ...
'', court documents have shown that IPVanish handed over
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
about a customer to the Department of
Homeland Security Homeland security is an American national security term for "the national effort to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards where American interests, aspirations, and ways of life can thrive" t ...
(HSI) in 2016. The customer was suspected of sharing
child pornography Child pornography (also called CP, child sexual abuse material, CSAM, child porn, or kiddie porn) is pornography that unlawfully exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a ...
on an
IRC Internet Relay Chat (IRC) is a text-based chat system for instant messaging. IRC is designed for group communication in discussion forums, called '' channels'', but also allows one-on-one communication via private messages as well as chat an ...
network. The information, which allowed HSI to identify the customer, consisted of the customer's name, his email address, details of his VPN subscription, his real IP address ( Comcast) "as well as dates and times econnected to, and disconnected from, the IRC network.” The logging of the customer's IP address and connection timestamps to the IRC service contradicts IPVanish's privacy policy, which states that " PVanishwill never log any traffic or usage of our VPN." In 2017, IPVanish and its parent company were acquired by StackPath, and its founder and CEO, Lance Crosby, claims that "at the time of the acquisition, ..no logs existed, no logging systems existed and no previous/current/future intent to save logs existed." The story attracted attention on
Reddit Reddit (; stylized in all lowercase as reddit) is an American social news aggregation, content rating, and discussion website. Registered users (commonly referred to as "Redditors") submit content to the site such as links, text posts, images ...
, when the court documents were posted on the /r/piracy
subreddit Reddit (; stylized in all lowercase as reddit) is an American social news aggregation, content rating, and discussion website. Registered users (commonly referred to as "Redditors") submit content to the site such as links, text posts, images ...
.


Uses

IPVanish funnels the internet traffic of it users through remote servers run by the service, hiding the user's
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
and
encrypting In cryptography, encryption is the process of Code, encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can ...
data transmitted through the connection. Users can simultaneously connect an unlimited number of devices. Like other VPN services, IPVanish also has the ability to bypass
internet censorship Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org) but exceptionally may extend to all Int ...
in most countries. By selecting a VPN server in a region outside of their physical position, an IPVanish user can easily access online content which was not available in their location otherwise. IPVanish can be used to play games that are regionally-restricted due to licensing agreements. In their 2017 review of the service, IGN named IPVanish as “one of the best gaming VPNs.” During a speed test of the VPN with League of Legends, the reviewer noted a ping drop of just one millisecond.


Technical details


Features

IPVanish VPN offers several features, including: *
IPv6 Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
leak protection * DNS leak protection * OpenVPN scramble * SOCKS5 web proxy * Unlimited
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
* Unlimited
P2P P2P may refer to: * Pay to play, where money is exchanged for services * Peer-to-peer, a distributed application architecture in computing or networking ** List of P2P protocols * Phenylacetone, an organic compound commonly known as P2P * Poin ...
* IP address cycling *
Port forwarding In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a ne ...
* Access via UDP/ TCP *
Internet kill switch An Internet kill switch is a countermeasure concept of activating a single shut off mechanism for all Internet traffic. The concept behind having a kill switch is based on creating a single point of control (i.e. a switch) for a single authority ...


Encryption

IPVanish uses the
OpenVPN OpenVPN is a virtual private network (VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It implements both client and server app ...
and
IKEv2 In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP.The Internet Key Excha ...
/
IPsec In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in ...
technologies in its applications, while the
L2TP In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It uses encryption ('hiding') only for its own control messages (usin ...
and
PPTP The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. PPTP has many well known security issues. PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PP ...
connection protocols can also be configured. IPVanish supports the AES (128-bit or 256-bit) specifications, with SHA-256 for authentication and an RSA-2048 handshake.


Servers

IPVanish owns and operates more than 1500 remote servers in over 75+ locations. The largest concentration of VPN servers is located in the United States,
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and North ...
, and
Australia Australia, officially the Commonwealth of Australia, is a Sovereign state, sovereign country comprising the mainland of the Australia (continent), Australian continent, the island of Tasmania, and numerous List of islands of Australia, sma ...
. The company suspended operations in Russia as of July 2016, due to conflicts with the company's zero-log policy and local law. In July 2020, IPVanish removed its servers from Hong Kong, alleging that the
Hong Kong national security law The Hong Kong national security law, officially the Law of the People's Republic of China on Safeguarding National Security in the Hong Kong Special Administrative Region, is a piece of national security legislation concerning Hong Kong. It ...
puts
Hong Kong Hong Kong ( (US) or (UK); , ), officially the Hong Kong Special Administrative Region of the People's Republic of China ( abbr. Hong Kong SAR or HKSAR), is a city and special administrative region of China on the eastern Pearl River Delt ...
under the “same tight internet restrictions that govern mainland China.” IPVanish is headquarters in the United States, which does not have mandatory
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The different ...
laws.


Recognition

In 2016, IPVanish was awarded the Silver Award for Startup of the Year from the Info Security PG's Global Excellence Awards and Lifehacker AU rated the service as its #1 VPN.
PC Magazine ''PC Magazine'' (shortened as ''PCMag'') is an American computer magazine published by Ziff Davis. A print edition was published from 1982 to January 2009. Publication of online editions started in late 1994 and have continued to the present d ...
rated IPVanish “excellent” in an April 2017 review, praising its nonrestrictive BitTorrent practices while noting it as one of the more expensive VPNs. In a 2018 review highlighting IPVanish ‘zero logs’ policies and nonprofit support,
CNET ''CNET'' (short for "Computer Network") is an American media website that publishes reviews, news, articles, blogs, podcasts, and videos on technology and consumer electronics globally. ''CNET'' originally produced content for radio and televi ...
ranked IPVanish as one of the best VPN services of the year. The reviewer also noted that its integrated plugin for Kodi, the open-source media streaming app, is unique to the VPN industry.
TechRadar ''TechRadar'' is an online publication owned by Future and focused on technology. It has editorial teams in the US, UK and Australia and provides news and reviews of tech products and gadgets. It was launched in 2007 and expanded to the US in ...
rated the service 4 out of 5 stars in their March 2018 review, commending it for its powerful features while criticizing its “lethargic support response”. An annually-updated TorrentFreak article reviewing the logging policies of VPN services lists IPVanish as an anonymous provider.
Tom's Guide ''Tom's Hardware'' is an online publication owned by Future plc and focused on technology. It was founded in 1996 by Thomas Pabst. It provides articles, news, price comparisons, videos and reviews on computer hardware and high technology. The si ...
wrote that the lack of a kill switch on the mobile application "may be a downside for some".


Related media

In September 2015, the ex-husband of
Phillip Morris USA Philip Morris USA is the American tobacco division of the American tobacco corporation Altria Group. History Creation The company's namesake Philip Morris was born in Whitechapel, United Kingdom in 1835, the son of a recent immigrant from ...
tobacco heiress, Anne Resnick, was accused of hacking his estranged wife’s phone to spy on her during the divorce proceedings. During the deposition, the husband plead the Fifth Amendment 58 times when questioned about bank records indicating subscriptions to
mSpy mSpy is a brand of mobile and computer parental control monitoring software for iOS, Android, Windows, and macOS. The app allows users to monitor and log activity on the client device. History mSpy was launched as a product for mobile monit ...
as well as IPVanish.


See also

*
Comparison of virtual private network services A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geoblocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks. A wide ...
*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
*
Encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
*
Secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...


References

{{reflist Virtual private network services