Introducing
The Slant team built an AI & it’s awesome
Find the best product instantly
Add to Chrome
Add to Edge
Add to Firefox
Add to Opera
Add to Brave
Add to Safari
Try it now
4.7 star rating
0
What is the best alternative to Cryptomator?
Ad
Ad
GNU Privacy Guard
All
10
Experiences
Pros
8
Cons
1
Specs
Top
Con
It may be hard to find a GUI frontend that suits your needs
If you decide not to use the CLI version of GPG, it may be hard to find a GPG GUI version that suits your needs simply because of the sheer number of different versions available.
See More
Top
Pro
Cross-platform
GPG works on OS X, Linux, and Windows with extensive selection of wrappers.
See More
Top
Pro
Multiple types of encryption algorithms
GPG supports public key cryptography (RSA EIGamal, DSA), symmetrical key algorithms (Blowfish, AES, IDEA, etc), cryptographic hash functions (RIPEMD, SHA), and compression (ZIP, ZLIB, BZIP2).
See More
Top
Pro
Excellent but...
Open source (the free version of openPgp), other similar products are offered for other platforms (Gpg4win for Windows for example). It is the most secure way to send emails today, close to military encryption. Some negative points: not all mail clients support it and when a key is not only on your hard disk but also on a server (pgp.mit.edu for example), it is complicated to remove it. Last positive point: it can also be used other than for emails, to encrypt and sign documents. Bitcoin releases are signed with the GPG keys of the developers ;)
See More
Top
Pro
Supports paired keys
Allows for encrypted communication.
See More
Top
Pro
Volume and individual file encryption
With GPG you can encrypt you whole volume or files individually.
See More
Top
Pro
Supports expiring signatures
GPG keys by default expire after a set amount of time. The amount can be changed and this feature can be turned off.
See More
Top
Pro
Both CLI and GUI versions available
GPG can be installed as a command line tool, or you can choose between several different GUI frontends available for it.
See More
Top
Pro
Open-source and battle-tested
GPG is the oldest and most reliable encryption software available.
See More
Specs
Open Source:
Yes
Hide
See All
Experiences
Get it
here
171
9
EncFS
All
4
Experiences
Pros
3
Cons
1
Top
Con
Not up to speed with modern cryptography practices
From some audits in the past, EncFS has had some issues with being up-to-date as far as cryptography practices go. For example, it uses the same key for encryption and authentication or file holes not being authenticated.
See More
Top
Pro
Encrypts on per-file basis
This makes it suitable for using with Dropbox or similar cloud storage platforms.
See More
Top
Pro
Cross-platform
Works on Linux, OS X and experimentally on Windows.
See More
Top
Pro
Configuration is stored in the working directory
The configuration for EncFS is in the form of a dotfile (.encfs6.xml) and it's stored in the working directory. This way you only have to remember the passphrase because all the other metadata is stored in the configuration file.
See More
Hide
Get it
here
19
7
VeraCrypt
All
14
Experiences
Pros
10
Cons
3
Specs
Top
Pro
On-the-fly encryption
Veracrypt is an on-the-fly encryption tool. Meaning that it decrypts files only when they are needed and that the files are otherwise kept encrypted the rest of the time.
See More
Top
Con
Can't create volumes on the Mac.
The password used to create the volume doesn't open the volume one minute later. VeraCrypt 1.21/FUSE 3.82/macOS 10.12.6. Recreated on 3 Macs now. Unusable.
See More
Top
Pro
Free
This project is free and users are encouraged to donate something to keep the project going.
See More
Top
Con
Not plug and play
Requires some tech savvy, so some skill is required, particularly if things go wrong. In the Windows world different UEFI implementations can cause problems in one, not in others, and the solutions are not uniform between issues. For Bitlocker, Microsoft worked out issues with vendors before hand, so if Windows installs and works without bitlocker, it will likely work with it.
See More
Top
Pro
Several encryption cyphers supported
Supports AES, TwoFish and Serpent encryption cyphers.
See More
Top
Con
The UI is not compliant with the Mac
This program does not use Mac UI standards. Nevertheless, it is acceptable.
See More
Top
Pro
Open source code
The source code is open to review. It has already had a security audit and it did well, with small problems fixed by authors within days of being reported. Its predecessor source, Truecrypt, had a detailed audit that found its capabilities sound, completed (ironically) shortly before the TC folks decided to call it quits. Anyone skeptical or curious about what it does can see how it works, at the gut level.
See More
Top
Pro
Support for AES code in CPU
Most Intel and AMD (and possibly other) CPUs have AES specific instruction sets, so you needn't task the CPU during the en/de/crypt process when using AES, VC throughput is as if the code were in 'firmware'; you can see the effect if you choose anything but AES as your cipher.
See More
Top
Pro
Can create containers
It can create containers (like a encrypted folder) which is very useful.
See More
Top
Pro
Regular updates
Veracrypt is in active development with constant and regular updates and several external audits in the planning stages.
See More
Top
Pro
Multiplatform
Veracrypt is supported on MacOS, Linux and Windows.
See More
Top
Pro
Built on top of TrueCrypt
See More
Top
Pro
Easy to use
It's easy to understand and use.
See More
Specs
Platforms:
Windows, Linux, Mac
Open Source:
Yes
Hide
See All
Experiences
Free
112
11
AxCrypt
All
6
Experiences
Pros
3
Cons
2
Specs
Top
Pro
Easy to use
Integrates with right-click menu for easy access.
See More
Top
Con
Android app is low quality
See More
Top
Pro
Self-extracting archives
AxCrypt can create encrypted archives that extract without requiring AxCrypt on the computer. So you can send a file to someone safely, they just need the password.
See More
Top
Con
Supports all major plattforms
See More
Top
Pro
Easy to share encrypted files
AxCrypt has a build in key sharing.
See More
Specs
Platforms:
Windows, Mac, Android, iOS
Hide
Free / paid
21
8
BitLocker
All
5
Experiences
Pros
3
Cons
2
Top
Pro
Native Windows support
It offers the best integration, ease of use and support with Ultimate and Enterprise editions of Microsoft's Windows Vista and Windows 7, and with the Pro and Enterprise editions of Windows 8.
See More
Top
Con
Proprietary
No public audits possible. Microsoft could want or be legally required to puts backdoors without users knowledge.
See More
Top
Pro
Volume-based encryption
BitLocker allows encrypting an entire volume including the OS.
See More
Top
Con
Not available on Windows home versions
See More
Top
Pro
Multiple authentication methods
You can use a combination of methods consisting of Trusted Platform Module, PIN, and a passphrase on a USB thumb stick.
See More
Hide
Free
12
10
AES Protect
All
7
Experiences
Pros
4
Cons
3
Top
Pro
It is portable
See More
Top
Con
Not available for Android, iOS
See More
Top
Pro
It doesn't make their mark on file like xyz.aes .Simply you give any name
See More
Top
Con
Its time to encrypt or decrypt is little bit slow
Approx takes a 500mb file 1 or 2 minutes to encrypt/decrypt.
See More
Top
Pro
His AES Metal provides many types of encryption
If you it download from directorandgeneral.com then it comes with small size portable software that contain AES protect,AES metal,AES command [whole software size 37kb approx].If you want High encrption then AES Metal give random or manual Key of Numbers without Passphrase.
See More
Top
Con
If you forget password then there is no way to get it back from software or site
So keep safe your password if you encrypt any important file.
See More
Top
Pro
It encrypt almost any file
See More
Hide
See All
Experiences
Free
2
0
dm-crypt via LUKS
All
6
Experiences
Pros
4
Cons
1
Specs
Top
Pro
Flexible
Encrypt whole disks, removable media, software RAID, partitions, files and logical volumes.
See More
Top
Con
Requires advanced command line knowledge
In order to use dm-crypt you need to have advanced knowledge of Linux and of the command line, as well as the Linux filesystem. However, most distros support easy creation of LUKS-encrypted drives when installing Linux transparently.
See More
Top
Pro
Native Linux support
It offers the best integration and ease of use on Linux.
See More
Top
Pro
Free and open-source
Open-source for cryptography is a requirement, not just a bonus.
See More
Top
Pro
Support for multiple keys/passwords
If several people should be able to decrypt a volume, each one can have their own password/key.
See More
Specs
Platforms:
Linux
Hide
25
5
Disk Utility
All
3
Experiences
Pros
2
Cons
1
Top
Pro
Native OS X support
It offers the best integration, ease of use and support with OS X.
See More
Top
Con
Mac only
Disk Utility is available for OSX only.
See More
Top
Pro
Disk image and volume encryption
You can create a disk image that requires a password to mount. It can use a different filesystem than OS X, like exFAT, that can be used to move files between Windows and OS X. Additionally, you can encrypt file volumes by right-clicking and selecting encrypt.
See More
Hide
9
2
Matrix
All
14
Experiences
Pros
12
Cons
1
Specs
Top
Pro
Built on an open standard
Matrix is an open standard, defining simple HTTP APIs so that devs can easily write their own clients, bots, bridges or servers. You're not locked into a specific set of implementations.
See More
Top
Con
Keys cannot be checked automatically
You cannot automatically check keys of your recipients. Only manually.
See More
Top
Pro
Bridges other networks into a single decentralised network
Matrix has bridges to IRC (freenode, moznet, oftc, snoonet etc), Slack, Gitter, Rocket.Chat, XMPP, SMS, SIP and others. The point is to 'matrix' all the different networks out there into one single decentralised network.
See More
Top
Pro
Has an easy to use client called Riot
Riot.im is the easiest way to use Matrix, with great clients for Web, iOS and Android (and Fdroid).
See More
Top
Pro
Does not require a centralized server to establish a connection between two users
Matrix is decentralized, there's no one central point that the information goes through and so no once central point of failure or control.
See More
Top
Pro
Matrix prioritizes direct messaging with people the same as Slack-style groups
Matrix aims to "provide an analogous ecosystem to email - one where you can communicate with pretty much anyone, without caring what app or server they are using" using a neutral identity system.
See More
Top
Pro
Supports different kinds of communication
Matrix is designed to support Instant Messaging, VoIP/WebRTC signalling (voice and video) and Internet of Things communication.
See More
Top
Pro
Has an app store for 3rd party integrations & bots
Riot.im includes an app store with integrations for Github, JIRA, Jenkins, Giphy etc - and anyone can add more via Matrix.
See More
Top
Pro
Offers choice of clients
Which can be found here.
See More
Top
Pro
Maintains full conversation history
See More
Top
Pro
Has an active community behind it
See More
Top
Pro
Can be integrated with existing communication services
Matrix is designed to support Instant Messaging, VoIP/WebRTC signalling and Internet of Things communication and allows cross-communication between those services. Meaning one person could be using IRC and another Slack for IMs, or one person could be using Skype and another Google Hangouts for videoconferencing.
See More
Top
Pro
End-to-end encryption
Matrix features end-to-end encrypted chats which are syncronized accross all your devices. E2E is implemented in the matrix-js-sdk library and Riot.im client.
See More
Specs
Platforms:
Mac/Windows/Linux/Android/Browser/iOS/and more
Price:
FREE
VoIP:
Yes
Open source:
Yes
See All Specs
Hide
See All
Experiences
Get it
here
328
46
CipherShed
All
4
Experiences
Pros
3
Cons
1
Top
Pro
Built on top of TrueCrypt
CipherShed is built on top of the famous and now abandoned TrueCrypt and it comes with a lot of things that TrueCrypt had.
See More
Top
Con
Difficult to enhance key derivation
Since CipherShed decided to keep the TrueCrypt compatibility, and stick with that format they also have to stick with TrueCrypt's key derivation which was released in 2004 and understandably does not offer the same security that it did when first released.
See More
Top
Pro
Completely free
CipherShed is completely free and open source.
See More
Top
Pro
Cross-platform
Available on Windows, OS X and Linux
See More
Hide
Get it
here
1
0
Turtl
All
7
Experiences
Pros
3
Cons
3
Specs
Top
Pro
Multiple Platforms (Windows, Linux, macOS, Android, Firefox, Chrome)
Turtl has applications for all the major operating systems, as well as Android. In addition, there are extensions available for Firefox and Chrome that cooperate with the downloadable applications.
See More
Top
Con
No iOS app
While many other operating systems have a client, iOS does not have one yet (though it is planned).
See More
Top
Pro
Open source
The app is licensed under GPLv3 making it open source. This means that anyone can use the code and contribute. This also makes it easy to use on one's own server or for company solutions.
See More
Top
Con
No image embedding
Instead of image embeddings, there's a sort of poor man's substitute: image + description. If you add an image, you can create a description of any size and with all the formatting features. It can be used instead of image embedding but much more limited: only one image and only at the very top.
See More
Top
Pro
Good security
After assigning a password to your account in Turtl, a key is created to encrypt the entire account. No data is stored on their servers meaning they have no access to unencrypted content. This is a huge leg up when comparing to other Evernote alternatives.
See More
Top
Con
Internet dependent
Requires Internet connection to initiate offline mode, loses access to notes without Internet or server.
See More
Specs
Platforms:
Windows, Linux, Mac, Android
Hide
See All
Experiences
Free
517
81
Standard Notes
All
8
Experiences
Pros
6
Cons
1
Specs
Top
Pro
Encrypted
Notes are encrypted and secured so only you can decrypt them.
See More
Top
Con
Formatting enabled only as extension for money
See More
Top
Pro
Extensible
Editors, components, actions, and themes.
See More
Top
Pro
Open-source
See More
Top
Pro
Simple
Faster and lighter than most notes apps.
See More
Top
Pro
Cross-platform
Available on Web, Mac, Windows, iOS, Android, and Linux.
See More
Top
Pro
Themes
See More
Specs
Platforms:
Windows, Linux, Mac, iOS, Android, Web
Technology:
TypeScript, Docker
Hide
See All
Experiences
Free / paid
180
35
uBlock Origin
All
9
Experiences
Pros
8
Specs
Top
Pro
Light weight
See More
Top
Pro
Open source
See More
Top
Pro
Promised to remain commercial interest free
uBlock will remain free from any commercial as stated by the creator. uBlock is meant to be strictly for the users and completely free.
See More
Top
Pro
Lots of advanced features
For example, you can add more items to your HOST files like disable social tracking.
See More
Top
Pro
Thoughtful UI
Its non-invasive design shows you how many times something's been blocked on a given web page – that number quickly jumps to the double- if not triple-digits in some cases.
See More
Top
Pro
Can be used on Firefox Mobile
See More
Top
Pro
Detects skimming
Skimming means replacing links so that they are rerouted, this is mostly a more friendly way to make money than showing ads.
See More
Top
Pro
Edge version
Also available for Microsoft Edge browser.
See More
Specs
Supported platforms:
Browser Addon
Blocking:
Browser Only
Browsers::
Available on Chrome,Firefox,Opera & Edge Stores. Can be used in brave & vivaldi with chrome store
Hide
See All
Experiences
Free
429
79
Cock.li
All
6
Experiences
Pros
3
Cons
2
Specs
Top
Pro
Allows registration through Tor and VPN
See More
Top
Con
Obscene domains
There are many domains to choose from, and just about all of them are memes and nsfw.
See More
Top
Pro
Support for IMAP/SMTP
See More
Top
Con
Invite needed
You need to be invited by another Cock.li user.
See More
Top
Pro
Obscene domains
There are many domains to choose from, and just about all of them are memes and nsfw.
See More
Specs
IMAP:
Yes
Web interface:
Yes
Hide
FREE (by invite)
22
8
KeePassXC
All
26
Experiences
Pros
21
Cons
4
Specs
Top
Pro
It is free and open source
Free. No hidden tracking. 100% Open Source.
See More
Top
Con
Dark theme on macOS needs some work
The tabs for multiple databases and about menus are unreadable in dark mode on macOS.
See More
Top
Pro
Active development
See More
Top
Con
Qt dependency hell
See More
Top
Pro
Cross platform autotype
Autotype available for all apps.
See More
Top
Con
Browser plugin doesn't always connect to KeepassXC on the first attempt
Restarting the Browser or restarting KeePassXC fixes the integration. Enabling "Automatically reconnect to KeePassXC" option in KeepassXC Browser Extension fixes this problem permanently.
See More
Top
Pro
Strong end-to-end Encryption
Zero-knowledge. Military-grade AES-256 & Argon 2 unbreakable encryption algorithms.
See More
Top
Con
Non native UI
See More
Top
Pro
New secure browser integration plugins
Official Browser plugins for Chrome, Firefox, Edge, Brave, Opera, Vivaldi and all other Chromium or Gecko based browsers.
See More
Top
Pro
Passphrase generator
See More
Top
Pro
Easy to use
It has a really clean looking design, unlike Keepass. Makes it really friendly to get into.
See More
Top
Pro
Good UI
User-friendly and straightforward. Easy to use.
See More
Top
Pro
Better than KeePassX
KeepassX discontinued in 2017.
See More
Top
Pro
Support for time-based one-time passwords (TOTP)
See More
Top
Pro
Stores passwords locally instead of in the cloud
Don't trust anyone.
See More
Top
Pro
Support for adding/removing SSH keys in system key agent
See More
Top
Pro
Import and export to different file formats
See More
Top
Pro
Available web browser extension (keepassxc-browser)
See More
Top
Pro
Outrageous better than some paid password managers
It has plenty tweaks which lets you feel under control of your data.
See More
Top
Pro
Portable, Tails and Whonix come loaded with it too
The preferred choice of Qubes users as well. Long story short, it's no coincidence that every one of the Linux distros renowned for it's security and anonymity features comes standard with a massive neon, blinking arrow pointing right at this full-featured, OSS, cross-platform password manager. The Slant community even lauds it as the category's second-only to what is essentially a command-line tool with a title someone could have picked out of a random spoonful of alphabet soup. Approved for Ages 8-78!
See More
Top
Pro
File attachments and custom attributes
See More
Top
Pro
YubiKey challenge-response support
And onlykey*
See More
Top
Pro
Database reports (password health, HIBP, and statistics)
See More
Top
Pro
Solid
See More
Top
Pro
KeeShare shared databases (import, export, and synchronize)
See More
Specs
Supported platforms:
Windows, macOS, GNU/Linux, BSD
Browser integration:
Google Chrome, Mozilla Firefox, Microsoft Edge, Chromium, Vivaldi, Brave
Password Generator:
Yes
TOTP codes:
Yes
Hide
See All
Experiences
Free
375
95
Signal
All
16
Experiences
Pros
10
Cons
5
Specs
Top
Pro
Provides security and privacy
Signal uses an advanced end to end encryption protocol that provides privacy for every message every time.
See More
Top
Con
Needs access to your phone number and contacts to work
See More
Top
Pro
Free and open source
Signal is free and open source software, enabling anyone to verify its security by auditing the code. It's the only private messenger that uses open source, peer-reviewed cryptographic protocols to keep your messages safe.
See More
Top
Con
Single device
Signal can only be registered to one mobile device at a time. But you can link Signal to Signal Desktop.
See More
Top
Pro
Supports encrypted group chats
See More
Top
Con
Servers hosted in the US
A security risk due to National Security letters, which require giving up data to the US state, and making it illegal to disclose that.
See More
Top
Pro
Has a desktop app
Signal Desktop can be used on multiple devices and has most features of the Android version, although it still requires you to register with your phone.
See More
Top
Con
Unreliable notifications
Sometimes messages won't be received if the Signal app has been closed for a long time or hasn't been opened after booting the device.
See More
Top
Pro
Supports sharing of various different media types
Signal supports: emoji, pictures, videos, audio, contacts, any location and GIF.
See More
Top
Con
Poor support
Their E-mail adress for support are not working. They have a Community support on here. Sometimes if you need a support, you need to create an account on their forum and need to share a topic and wait for long time.
See More
Top
Pro
Note to Self feature
Allows you to "send: messages to yourself and sync to desktop so you can use Signal as a kind of encrypted Pushbullet alternative
See More
Top
Pro
You can easily view all media exchanged
You can easily view all media shared in the chat without scrolling back to when it was shared.
See More
Top
Pro
Annonymous Sender (Encrypted)
The sender credentials can be encrypted with the rest of the message, leaving only the recipient address readable by the Signal server. Even if Signal wanted they couldn't see who is talking with who by this mean.
See More
Top
Pro
Works everywhere in every country
Unlike most messenger apps, Signal works reliably in all countries by securely circumventing internet censorship.
See More
Top
Pro
Recommended by Edward Snowden
Edward Snowden uses this messenger and recommends it to everyone who is concerned about his privacy.
See More
Specs
Platforms:
Android, iOS, Linux, Windows, Mac OS X
Publisher:
Open Whisper Systems
End-to-end encryption:
Yes
Media:
images / audio / video / files / contacts / GIFs / location
See All Specs
Hide
See All
Experiences
Free
687
181
ProtonMail
All
14
Experiences
Pros
5
Cons
8
Specs
Top
Pro
Built-in end-to-end encryption
See More
Top
Con
Javascript-intensive Webmail
Free accounts are required to use Javascript webmail and encryption is done in the browser. Javascript cryptography is harmful for security and should not be used.
See More
Top
Pro
No personal information needed
To create an account you don't need to give any personal information, just choose username, domain, and password. Even the recovery email address is optional.
See More
Top
Con
Encryption Keys are stored server-side
The keys are generated during account creation. Using your existing keys is prohibited and ProtonMail must store and control the private keys. Encryption cannot be secure unless the user controls the private keys.
See More
Top
Pro
Privacy respecting
User data is protected by strict privacy laws because all servers are located in Switzerland.
See More
Top
Con
Still lacks some useful features
At the moment, there is no calendar feature and contact management is quite poor. They will, however, start to work on it.
See More
Top
Pro
Open Source
See More
Top
Con
Ties to US Investors
ProtonMail takes money from US Investors
See More
Top
Pro
Mobile apps
Apps for Android and iOS available.
See More
Top
Con
No IMAP and SMTP support for basic accounts
Basic accounts are restricted to the Protonmail web client. Support for IMAP and SMTP is available with a paid subscription only, and as such with basic accounts it is not possible to send and receive email with external applications.
See More
Top
Con
Overly expensive for desktop support
See More
Top
Con
Requires phone number for login
If you sign up over Tor or a VPN, it will require email or phone number verification. Email verification is disabled if you use an email that isn't from Google or Outlook.
See More
Top
Con
Not fully Open Source
See More
Specs
End-to-end encryption:
Yes
Free tier:
Yes
Open source:
Yes
Web interface:
Yes
Hide
See All
Experiences
FREE+
181
65
Hide Me
All
20
Experiences
Pros
15
Cons
4
Specs
Top
Pro
No logs are kept, it's completely anonymous
Because Hide.me is based in Malaysia, where there are no laws that would require a company to retain their data, the VPN service has chosen to avoid logging any personal data. Actually, no logs of any kind are kept. This saves them from liability and ensures your privacy. Additionally, if the Malaysian government would change laws requiring retention of logs or customer data, Hide.me promises to change countries to be able to protect your privacy.
See More
Top
Con
Guides for DDWRT, OpenWRT, and Pfsense missing details and not working
No stealth VPN to defeat DPI.
See More
Top
Pro
Free plan
The free plan allows for 1 connection that's limited to 3 servers (Canada, Netherlands & Singapore), 2GB of data, 3Mbit/s of bandwidth speed and it doesn't support OpenVPN. There's also the "plus" package that uncaps bandwidth speed, increases data limit to 75GB and adds OpenVPN support. Finally, there's the "premium" package, that uncaps data, allows for 5 simultaneous connections and port forwarding.
See More
Top
Con
Mac OS software is leaking IP address
See More
Top
Pro
Softether support
Accepts tor network, encryption upon itself using another protocol, no server throttling.
See More
Top
Con
Wireguard is only allowed within the app. No Config generater that allows use on routers for Example
There should be config Generator like any other VPN provider to allow use outside the app like openWRT router or pfsense firewall
See More
Top
Pro
Supports multiple devices (premium)
With the Hide.me Premium Plan (9.99 $/mo) you can connect up to 5 devices simultaneously including mobile devices and routers, meaning you can safely browse even on devices without VPN support.
See More
Top
Con
Incompatible with Windows RT
While Hide Me clearly puts forth effort to maintain compatibility across devices, Windows RT is incompatible with this service.
See More
Top
Pro
Pass-through of any kind of encrypted or tor traffic
Accepts passthrough of even self re-encrypted traffic of any protocol, any provider and tor traffic, this is proof of transparency.
See More
Top
Pro
Fast
Hide.me is among the fastest VPN services available. It does not impose any limits on their services and the speed is mostly determined by your own internet connection speed and chosen exit country.
See More
Top
Pro
IPsec over IKEv2
IPsec over IKEv2 is one of the fastest, most reliable VPN protocols and as secure as OpenVPN, but you can choose other options if you prefer. Hide.me supports OpenVPN, Softhether, IPSec (IKEv1 & IKEv2), L2TP/IPSec and PPTP protocols.
See More
Top
Pro
Quick setup
Setting up requires downloading and installing software that asks once for your e-mail.
See More
Top
Pro
No traffic or protocol restricitions except for US
You can use any and all protocols at your disposal, no traffic is restricted, except for US where P2P and BitTorrent traffic is restricted with a firewall. Additionally, users are encouraged to avoid US/UK locations for their filesharing activities.
See More
Top
Pro
Watch IPTV
With Hide.me you can watch popular streaming services such as Netflix, HBO and Hulu even in countries where they are blocked. Hide.me also guarantees that speeds stay fast so you aren't waiting at an endless buffering screen.
See More
Top
Pro
Cross-platform
Hide.me software works on OS X, Windows, Android, Windows phone, Windows RT, Ubuntu, and iOS. Not only this but it also works on devices like Xbox, Roku, Routers, etc.
See More
Top
Pro
Over 80 international payment methods
Including Paypal, credit cards, bank transfer, PaySafeCard, and UKash.
See More
Top
Pro
Supports popular devices
Hide Me specifies that their services are compatible with PC, Mac, and Android gadgets. However, no additional operating systems are mentioned.
See More
Top
Pro
Anonymous signup
You don't need to enter your street or phone number, etc. You just need a valid email address.
See More
Top
Pro
It supports every device, not just Mac, Windows, Android, and iOS
Hide.me VPN supports all devices and platforms available out there, including Linux and routers. They also have a well-maintained blog which has a how-to section, which gives you a step by step guide to set up Hide.me VPN even on devices like PlayStation, Roku, X-box, etc..
See More
Specs
Platforms:
Windows, Linux, Mac, android, ios and Routers
IPv6:
Yes
Server locations:
57 locations and 1400 servers
Based In:
Labuan/Malaysia
See All Specs
Hide
See All
Experiences
Get it
here
50
21
Privacy Badger
All
3
Experiences
Pros
3
Top
Pro
Automatic detection & blocking
Privacy Badger automatically detects and block third-party tracking. If it detects an advertiser or network tracking you across different websites, subsequent requests to the advertiser will be blocked.
See More
Top
Pro
Easy to use and configure
Everything works out of the box, you don't have to select blocking lists like in other ad blockers and there's pretty much nothing to configure.
See More
Top
Pro
Easy import & export of settings
in human-readable format
See More
Hide
Free
41
25
Built By the Slant team
Find the best product instantly.
4.7 star rating
Add to Chrome
Add to Edge
Add to Firefox
Add to Opera
Add to Brave
Add to Safari
Try it now - it's free
{}
undefined
url next
price drop