TunnelBear VPN and how does it work

  • by
mcafee.com/activate

TunnelBear may be a public virtual private network (VPN) service based in Toronto, Canada. it had been created by Daniel Kaldor and Ryan Dochuk in 2011. In March 2018, TunnelBear was acquired by McAfee.

TunnelBear was acquired by McAfee in March 2018. TunnelBear continues to work as an independent VPN service.

A freeware TunnelBear client is out there on Android, Windows, macOS, and iOS. It also has browser extensions for Google Chrome and Opera. Alternatively, Linux distros are often configured to use TunnelBear.

Like other public VPN services, TunnelBear has the power to bypass content blocking in most countries.

Because of government censorship, TunnelBear temporarily loosened up data limits for individuals living in nations like Iran, Turkey, and Venezuela, where the govt impeded admittance to specific sites.

All TunnelBear customers use AES-256 encryption except for the customer for iOS 8 and prior, which utilizes AES-128. When connected, the user’s actual IP address won’t be visible to the websites visited. Instead, the websites and/or computers would be ready to see the spoofed IP address provided by the service.

TunnelBear was among the primary consumer VPNs to conduct and publicly release the results of an independent security audit. They record when their users hook up with the service and publish annual reports on the amount of times enforcement has requested user information.

Why TunnelBear is the right VPNsolution for you

TunnelBear works quietly within the background to guard all of your devices. With apps for phones, laptops, desktops, and browser extensions, you’ll secure all of your data, regardless of what device you’re on, or where you’re.

Using TunnelBear is straightforward. Once you’ve installed TunnelBear, you only pick a rustic and switch it on. All of the complicated work is completed for you.

Privacy and logging

TunnelBear’s security policy is one among the preeminent thorough we have seen from any VPN supplier, with top to bottom data on everything the service collects, and all that it doesn’t. We do mean thorough, too – the small print goes right down to the names, purposes, and expiry dates of the cookies employed by TunnelBear.com.

The logging strategy is obviously depicted, with TunnelBear clarifying that it doesn’t gather “IP addresses to visiting our site”, “IP addresses upon service association”, “DNS Queries while connected”, or “Any data about the applications, services or sites our clients use while connected with our Service.” accordingly, the corporate says, it can’t interface any of its clients to an activity controlled by a chosen IP address. Sounds great to us.

Click here to download

The service does record what it calls ‘operational data’, updating this once you hook up with the network. that has the OS version of your device, TunnelBear app version, whether you have been active this month and therefore the bandwidth you’ve used. almost zero logging, then, but it is but we have seen elsewhere, and there is nothing here that anyone could use to start to link you to a selected online action.

While that appears great, there’s normally no thanks to telling whether you ought to trust what a VPN provider is telling you. But TunnelBear may be a little different. the corporate now has independent specialists Cure53 run an annual peace audit covering many various areas of the service. (The third audit, covering 2019, included the mobile and Windows clients, browser extensions, the service infrastructure, backend and frontend systems, and therefore the public website.)

The audit results weren’t perfect (we would are suspicious if they were), and therefore the report detailed several vulnerabilities, with two of them critical. That’s no surprise when a service puts itself under this level of scrutiny, though, and everyone’s issues are now fixed.

Overall, we must applaud  TunnelBear for its degree of straightforwardness, which tramples on wherever the vast majority of the opposition. Most VPNs haven’t had any sort of security audit, and therefore the providers who have actually made some movement during this direction, typically have one-off audits with a far narrower scope. That’s just not ok, and it’s great to ascertain TunnelBear leading the way.

TunnelBear VPN browser extensions

The TunnelBear browser extension may be a lightweight encrypted proxy that you simply can control from the browser window. TunnelBear offers browser extensions for:

  • Chrome
  • Firefox
  • Opera

I tested the TunnelBear Chrome extension for this review and located it to figure alright. Here is that the TunnelBear Chrome extension in action, which you’ll see within the upper-right corner of the browser.

Many VPNs now offer browser extensions. In some cases, like with TunnelBear, the browser extension acts as a further proxy for the browser itself, changing the IP address and DNS requests within the browser. In other cases, like with ExpressVPN, the browser extension just extends the VPN desktop client into the browser for easier functionality. during this case, you’ll simply control the desktop VPN client through the browser.

McAfee.com/activate.