CyberGhost full review
CyberGhost is an easy-to-use VPN for ensuring personal privacy online, which works with Windows, OS X, Android and iOS. Read our CyberGhost review. (Also see: Best free VPN services 2015.)
CyberGhost was founded in Germany by tatooed entrepeneur Robert Knapp, before quickly moving the operation out of the country in 2010. It out-run Germany’s new data retention laws and settled in Romania where there is currently no mandate to log user activity.
The company professes a strong policy of customer privacy, turning down VC funding in favour of crowd-sourced capital raising, and it even publishes a transparency report on its website. This is more for information purposes, showing on a country-by-country basis where requests for information about its customers personal data are originating. But since it does not keep logs, we’re told there is nothing to turn over from any of these requests. Also see: How to use a free VPN: A step-by-step guide.
CyberGhost has an interesting way to cut the link between a customer’s VPN credentials and their true identity as established by payment details (or at least to seriously obfuscate the link). It out-sources account payment to a separate company that only processes card details without seeing login names.
Payment can also be made by Bitcoin; and in Germany, Austria and Switzerland it’s even possible to pay in cash over the counter at certain retailers. Also see: How to watch US Netflix in the UK.
CyberGhost VPN review: Software
The CyberGhost proprietary client software is available for Windows, OS X, iOS and Android. Or you can opt for a manual setup using any of these systems’ built-in VPN client interface. Linux users can use the service with their choice of VPN binaries that support the service’s protocols of OpenVPN, PPTP and L2TP/IPsec.
Launching the program the first time, you see a small window with a map showing your current location as established by your real IP address. If you have bought a subscription, you just enter your login name and password. Then to start a connection, click on a large yellow button in the application’s window. Or in the words of the company, ‘launch the application and press our magic yellow button. We swear, your whole life will change once you click on it.’
CyberGhost also offers a limited free service. This enables three hours use before you are logged out, and servers are limited in number and functionality – it is not possible to use P2P services, for example. Also see: Why you need a VPN.
Anti-fingerprinting technology optionally changes the browser language with server location, and removes info about your operating system and browser version. A content blocker removes social plugins like the Facebook Like button, which is used by the social network to analyse your surfing behaviour, and blocks other requests from hidden trackers on websites.
For Windws users, the application modifies Registry settings (HKCU\Software) to start automatically upon reboot in Windows, although this can be switched off from Settings.
One thing you can’t seem to do is to select your choice of VPN protocol through the CyberGhost client software. For the Windows version of the software, TAP drivers from OpenVPN Technologies Inc are installed with the program, so we can assume that OpenVPN is a possibility; OS X does not seem to have the necessary TUN/TAP kernel extensions included in the install process, suggesting an L2TP/IPsec or PPTP connection. Also see: How to watch US Netflix on an Android phone or tablet.
Delve into the Advanced Settings in the Windows version and you can exchange the default UDP connection mode to TCP, although this is not offered in the Mac version.
In our testing, the VPN connection did not appear to leak DNS requests. Our chief concern with the use of CyberGhost’s VPN software was an altogether different data leak though.
Both Windows and OS X versions of CyberGhost software were making outgoing connections to Google servers at every launch. These were to various Google-owned servers, , with connection attempts made before an encrypted tunnel is started, so your real IP is revealed to Google at the very least. After discussing the issue with CyberGhost we were informed that the company was making use of Google Fonts API, but that this potential privacy issue was now being resolved by moving the fonts to its own servers.
- 1-month account
- based in Bucharest, Romania
- no logs
- VPN protocols: L2TP/IPsec, OpenVPN, PPTP
- 5 concurrent devices
- 80GB data allowance per month
- client software for Windows and OS X
- platform support: OS X, Windows
- manual configuration option
- P2P policy blocked on some servers (free service)