A Virtual Private Network (VPN) allows you to create a secure pathway for your traffic over the internet. Everything sent to and from your computer will be encrypted making it virtually impossible to read traffic if intercepted.
This ensures that anyone intercepting your traffic will get encrypted data.
By encrypting your traffic you ensure that intermediaries such as your service provider or hackers cannot read your data. We use the proven OpenVPN protocol with AES-256 end-to-end encryption.
The Tor network can be vulnerable to several attacks. The most dangerous to your privacy being the correlation attack. If an attacker can match your incoming traffic to the Tor network with that of a compromised exit node they can de-anonymize you. With ZSVPN your input traffic would come from our servers instead. For most applications we would not recommend using Tor as well for performance reasons.
In most cases, yes. Enabling the stealth option in the client settings allows you to bypass some of the most restrictive content filtering systems.
Microsoft Windows 7, 8 and 10.
Apple Mac OS X 10.9 and above.
Linux Debian or Red Hat based.
Android 4.0 and above - iOS 9 and above.
Tails - The Amnesic Incognito Live System.
We accept: PayPal, Visa, Mastercard and Crypto currencies through BitPay (BTC/BCH/ETH).
Our system stores the payment method you last used. For credit card payments we utilize the Stripe gateway. Only the following data is stored in our database: card type (visa, mastercard, etc.), last 4 Digits of the card number, expiry date and the remote token. Your full credit card number and CVV are never stored. You may remove your payment method at any time from the client area.
Please contact us by opening a ticket here. We handle refunds on a case-by-case basis and will do our utmost to accomodate your situation.
To connect simply use the username and password provided during sign-up. Please click here if you forgot your password. If you forgot your username, simply log in to the client area using your email address and password and click "Update Your Details". You may also find it in the "Welcome to ZSVPN" email.
Please download the appropriate client for your device from here and use your credentials to log in.
Please make sure that you are using the credentials used to access the client area.
Start by purchasing a subscription. You can use the ZSVPN website or even the clients to register and then purchase. Once you have an account and your VPN credentials are generated, you can use them to log in to the VPN client.
From the main interface you can choose a server and then click 'Connect'.
To get the best performance you should pick a server that is geographically close to you. For privacy reasons you may not want to use a server in the same country as the one you reside in.
DNS leaks occur when DNS requests made by your device escape the VPN even when your traffic is protected. This allows parties such as your internet provider to see the websites you access. ZSVPN clients protect your DNS requests from unwanted access by automatically configuring the DNS settings on your device.
WebRTC (Web Real-Time Communication) permits web browsers to communicate directly in a peer-to-peer fashion. This allows communication without an intermediary server. Websites can exploit this protocol to obtain your real IP address. By disabling WebRTC you can prevent this leak of information.
Chrome: Install the official Google extension: WebRTC Network Limiter.
Firefox: Type "about:config" in the address bar, accept the warning, scroll down to/search for "media.peerconnection.enabled" and then double click to set it to false.
Safari WebRTC is already disabled.
Opera: enter "about:config" in the address bar or go to "Settings". Select "Show advanced settings" and click on "Privacy & security". At "WebRTC" mark select "Disable non-proxied UDP".
Indeed you can, our favorite service is ipleak.net.