Tunnelbear is the "client" version of VPN for Windows. It hides the real IP address and location, thus allowing you to "enter" web resources blocked by ISPs and sites that restrict "access for your region". Supports connection through servers in 21 countries, including redirecting traffic from one server to another.
Equipped with the integrated vulnerability analyzer that "resets" transmitting/receiving traffic when a threat to the user is detected. It does not log actions and does not "keep" any logs, which makes it impossible to analyze/de-anonymize traffic in a "physical" way, including - with the help of special means. Encrypts traffic using AES-256 and "more complex" cryptographic algorithms.
Tunnelbear functionality
- Creates a closed informational gateway between the "client" and "server" parts, "continuing" its "chain" through a user-specified number of servers in the country of his choice;
- Replaces the real IP address with a fictitious one, corresponding to the servers of the country that the user specified upon connection initiation;
- Encrypts "outgoing" traffic using a selected cryptographic algorithm (AES-256 by default), decrypts and interprets "incoming" data packets;
- Analyzes Internet connections in automatic mode and "resets" receiving/transmitting traffic if vulnerabilities are detected;
- Blocks and "cuts off" de-anonymization requests to prevent identification of the user, his browser, OS or PC;
- Rebuilds the "chain" of servers, in case of "excessive slowdown" of the Internet connection speed.
VPN Features
- Creating a closed "multi-chain" communication channel "in one click";
- Ability to connect through a chain of servers of several countries;
- Powerful algorithms for traffic encryption (from AES-256 and "above");
- Absence of any logs;
- Automatic connection "reset" function upon detection of attacks and/or vulnerabilities at any link of the "chain" of servers;
- Intelligent and flexible detection and blocking of de-anonymization requests (up to and including termination of data transmission if an attempt is made to determine the time set in the user's system);
- "Independent" reconnection if there is a "noticeable" drop in connection speed.
Disadvantages
- Creating a "multi-link" connection chain reduces the connection speed in direct proportion to the number of its "links";
- Automated systems for detecting and blocking attacks/vulnerabilities/de-anonymization requests do not always "react to the situation" correctly;
- Part of the functions of web resources can become inaccessible when actively connected via VPN.