Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Proxy.sh
#1
[Image: DHfjEBqiT7aTWg0Rou4NNA.png]

Launch in 2012, Proxy.sh is a reliable VPN operator and a non-profit company that is part of Three Monkeys International Inc which based in Republic of Seychellesand. It had since growth steadily as one of the most trusted VPN provider in the market where to date serving more than 20,000 active customer around the globe.


How does it works?

[Image: SV_5ecoCQnC3QMBK5HlgdA.png]
[Image: APf_Mr42T4iuSRogc-VMXw.png]


Features


- Unblock restricted content

Proxy.sh provide several hundreds of VPN nodes running through various ports and with various protocols such as TOR or ECC/XOR to ensure its user able to unblock everything they wish to access online and also limitation imposed by their ISP or government. You can now access any website no matter where you are be it at workplace or while on school network!


- Security and privacy

Proxy.sh provide a strong-encrypted connection that allow user to hide their identity and location by masking IP address so that no one would able to track your online activity. To further enhance the security Proxy.sh also provide ECC encryption, XOR scrambling method DNSCrypt, SOCKS, TOR, SoftEther and all sorts of network security protocols. Besides having its zero logging policy it also had a customize billing platform that does not record user identity as it allow paid member to turn their username login credential to anonymous token. 


- VPN powered by TOR

Proxy.sh is known to be the first VPN provider to offer a direct integration of TOR's obfsproxy within its OpenVPN network and its VPN client configuration. Obfsproxy is an obfuscation program that guise your traffic to make it untraceable to firewalls and third parties such as governmental monitors agency or your ISP.


- Elliptic curve cryptography

[Image: DnEHaX8SScyKfmuYXdpr5A.png]


- Bypass Anti-VPN detection

Proxy.sh is proud to be one of the rare VPN providers to offer OpenVPN's recently developed XOR obfuscation option. It lets you alter the "look and feel" of the traffic that goes between your devices and our VPN network, making it more difficult for any external watchers such as network administrators or governmental agencies to detect you are behind a VPN.

Proxy.sh provides XOR in exclusivity with ECC. The latter allows you to make sure your traffic will be next to impossible to decipher, while XOR allows you to make sure the third party cannot detect you are using OpenVPN.


- Multi-Hoop

The Multi-Hoop allow a total full control over the entry and exit points, across a large portion of the VPN network. A special scrambling occurs between the entry and exit point, leading your connection to jump across up to ten nodes throughout the five continents. Multi Hoop feature is an available add-on for Pro user with additional of $5 fees while it is available for free for Pro plan user.


- Full total transparency

Proxy.sh strive for net neutrality and disregard any form of intervention with its users activity in which they implement an unique system known as the Transparency Report with the aim to keeping their users updated regarding any abuse notice they received for security concern. Its addition, Proxy.sh claim that it will not hesitate to relocate from it current operation site which currently based in Republic of Seychelles in case its domestic law contradict with Proxy.sh mission and value, as per stated in their ethical policy page here.


- First class support

A user-friendly ticket system is easily accessible from user dashboard in which any technical issue and service related question will be answered within 3 day business hour, in which they claim their usual respond time in average is 4 to 12 hours. The support system is available 24 hour per day and 7 day per week and user are free to make any inquiries such as sales and so on.



Network

[Image: VSoxpFMxTI2vFHdCjEJVOw.png]

A great and secured VPN network in over 57 countries and more than 300 locations maintained and handcrafted for user to choose from.

[Image: 8Tx-SGdlSfSSs_okzVj3jg.png]

You can check the network list and its latest status here.



The Application

The application - know as the Safejumper- is easy to use apart from having a sleek design on it. Simply download the application and login with the credential provided which received by email upon sign up.

[Image: dXKsPSnWQOO_2MiItBRfKg.png]
Image above show the application main interface after login.


[Image: xFXISXGsTyy7g2NhNqXIPg.png]
The top selection box is where user can choose their preferred protocol type to be connected to.


[Image: x37vaJlFQnqZnyC6J78C4w.png]
The second selection box is the where user can choose the server location to be connected in which you can see the server current ping and also capacity.


[Image: HqMM-WmNRuirTQg2887OWw.png]
From the setting menu user can set the behavior of the applications such as Kill Switch, enable or disable the debug logging, the ability to set DNS and also the OpenVPN port/encryption.


[Image: 21AHdpa-RbeHFZULFPMHUA.png]
The application log also accessible from the setting menu which is helpful for troubleshooting purposes as it might be required by the support to help solve your issue.


[Image: zudZGD0ITt2PDLdwhICWvA.png]
From the option available from the application system tray user can connect and also launch the application interface easily.


Speedtest

[Image: 6424503888.png]
Speedtest result showing my original speed without VPN


[Image: 6424516151.png]
Speedtest result connected to Proxy.sh Boost Singapore Hub server.


[Image: 6424524708.png]
Speedtest result connected to Proxy.sh Japan Hub server.


[Image: 6424534480.png]
Speedtest result connected to Proxy.sh UK Hub server.


Pricing

[Image: 3Bbl5mbDSBSEi_NDD6WGCw.png]
[Image: V502F2cvQSuZJbOrA4tmmA.png]


Final Verdict


Pros:

- Big list of server/nodes available
- VPN powered with TOR
- Support P2P
- Unlimited bandwidth
- Advanced application with full customization
- Zero logging policy
- Sleek application
- Kill switch
- Support various devices from Window OS to Linux
- Secure billing and account setup


Cons:

- Price is rather expensive
- Rather complicated
- Large setup file (about 47 MB) in comparison to the norm
- Some server is not stable
- No live chat support
- No free trial
Reply
#2
Thank You For Detailed Review Thumb
Reply
#3
nice review thank you Heart
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)