VPN secures your internet connection with advanced and virtually unbreakable encryption technology. One VPNconnection protects against monitoring, censorship and tracking, and provides access to blocked streaming services, websites, etc.

VPN is an easy and effective way to make the Internet safe, anonymous and free. One VPN-Connection is managed with user-friendly apps that anyone can figure out how to use. VPN can be used on most devices devices such as PC, smartphone and tablets.

Read more about how VPN works and what it can be used for. You will also find tests and reviews of over 20 different VPNservices, which can help you find the best VPN to your needs.

See top 5 VPNservices

What is VPN and how does it work?

VPN is an abbreviation for Virtual Private Network, which in Danish means Virtual Private Network. VPN works in short by establishing an encrypted connection between the user and one VPNserver. The server thus acts as an intermediary to the rest of the Internet. This creates a "tunnel" between user and VPNserver where the data stream is encrypted.

The encryption rewrites data so that it is unreadable and unusable for anyone other than the user's device and server. This makes it impossible for unauthorized persons to monitor and track the data flow.

It is basically the same technology that is used to secure the connection to online banking and the like. The figure below illustrates the principle.

How it works VPN
VPN secures and anonymizes data connections using an encrypted connection. With VPN one communicates with websites and services on the web through one VPNserver that acts as an intermediary. It secures the connection and at the same time hides potentially sensitive information from the outside world.

Uden VPN the data flow between the user and the Internet is not encrypted and can therefore be monitored by e.g. ISP or hackers. They can thus follow what you are doing online and intercept personal information. In addition, the user's IP address is freely available and can be used for tracking or barring streaming services, etc.

What is encryption?

Encryption is the rewriting of text or other data so that it cannot be read by unauthorized persons. Encryption is done by an algorithm that uses one encryption key, which is also used to decode the encrypted data.

A simple example of encrypting text is that letters are replaced with the position in the alphabet. The encryption key is in that case A = 1, B = 2, C = 3, etc. The word “monkey” is thus encrypted with that encryption key to “1 2 5 11 1 20”.

Such a banal encryption key would quickly be decrypted - especially with a computer to help. Hence the type of encryption VPN uses much more cunningly and in practice completely impossible to break.

Why use VPN?

Someone might be wondering what law-abiding citizens need an encrypted internet connection for? After all, it may immediately sound like something reserved for people who have something to hide. However, there are many situations where ordinary people benefit from one VPN-connection.

Generally one VPN-connect a secure, anonymous and free internet in an easy and legal way. Whether you want access to blocked streaming services, want to surf without censorship, download anonymously or in principle just think you have the right to a privacy on the web.

There can be many reasons to use VPN - also for ordinary law-abiding people. Here are some of the most typical:

En VPNconnection cannot be monitored

With VPN becomes the data stream between the user and VPNserver encrypted. Therefore, if someone tries to monitor the traffic, it will appear to the monitor as "volapyk" and be completely useless.

The technology is extremely secure and is used i.a. of the military, private companies and national intelligence services to protect confidential information. Even with modern supercomputers, breaking the encryption will take many times the life of the universe. This means that one VPN- connection in practice is impossible to hack.

An unencrypted internet connection is basically "open" and it does not actually require the great expertise to monitor it. Unauthorized persons can therefore relatively easily intercept personally sensitive information that can easily be misused. It can e.g. be private content in emails and the like, passwords, credit card information, etc. It sets VPN effectively a stop for using encryption, which makes this data unreadable to outsiders.

Fortunately, many websites use HTTPS (including of course here too VPNinfo.dk), which is end-to-end encryption between user and web server. However, not all and one VPNconnection, you are always protected against electronic monitoring.

VPN hides the IP address

Many use VPN to be anonymous so that their movements on the Internet can not be traced. This applies to both the websites you visit and what you download with e.g. P2P (BitTorrent, torrent and including Popcorn Time).

The anonymization is done by the user's IP address being hidden by the combination of encryption and by using VPNserver as intermediary. without VPN your IP address is more or less publicly available and easy to track through your ISP.

VPN ip addressse
With an active VPNconnection, the user's IP address is hidden from others on the web and replaced with VPNserver IP address. It effectively protects the identity of the user. The picture is from goldenfrog.com

With a VPNconnection, attempts to track the user will simply reveal the IP address of the server to which it is connected. It can never be connected to the person behind if VPNprovider does not log user data.

Used one VPNconnection to surf, download, etc., the activity will not be traceable to the user, who is therefore completely anonymous.

Download anonymously

If you download with P2P then as BitTorrent and does not use VPN, one's personal IP address is publicly displayed. BitTorrent the protocol is completely open, so it is very easy to see who is downloading what.

bittorrent utorrent vuze azureus popcorn time vpn
BitTorrent the protocol is open and one's personal IP address - along with what it has been used to download - is therefore publicly available. But of course not with VPN.

It is eg. based on registration of downloads and IP addresses, that A law firm a few years back sent out a sea of ​​"fines" to people who had allegedly used BitTorrent by Popcorn Time to view copyrighted material without permission.

With VPN becomes one's IP address hidden, which makes it impossible to register what you download.

Access blocked content

Just as you externally have the same IP address as it VPNserver you are connected to, it will also appear as if you are in the same place as it. All countries have specific ranges of IP addresses that are used to identify the user's location.

Are you, for example. connected to a server in Germany, you use a German IP address, which makes it look like you are in Germany.

This way, you can access websites, streaming services, TV and Internet radio stations, etc., which are otherwise reserved for users in a particular country.

It is used, for example. to access Netflix USA from Denmark or the other way, if you would like to see content on DR.dk, but are located abroad. You can only be allowed to do so with a Danish IP address and you can do so VPN.

vpn American netflix USA
Access a larger and newer selection of movies and series with Netflix USA.

Use Wifi hotspots safely

Few people think about it, but free WiFi hotspots at DSB, at airports, hotels etc. are not safe. Public WiFi is not secured with encryption, and your data is broadcast to anyone who is knowledgeable enough to deceive you.

It's actually pretty easy for an attacker to intercept your unencrypted Wi-Fi signal with one Evil Twin hotspot. Evil Twin is an unauthorized WiFi with the same name as one you might trust is safe to use.

The hacker can e.g. located in an airport where he has set up an open WiFi with an immediately credible name. If you log in to it, you will not notice anything, but because it goes through the hacker's equipment, the connection can be intercepted.

free wifi hotspot evil twin hacking

Et trials were carried out at Barcelona airportwhere a number of fake hotspots with names like "Starbucks" etc. was established. In just 4 hours, entire 8 million data packets including emails, logins and other person-sensitive information intercepted.

If you log in to a public Wi-Fi then create one VPNconnection, yours will be encrypted and thus cannot be monitored by a hacker. If you regularly travel or use public WiFi, then one VPN is a good investment in your privacy.

Protection against surveillance and censorship

At home, we are used to the fact that we largely have free access to everything on the Internet. However, this is far from everywhere and some states' states perform repressive internet censorship on its inhabitants. Iran, Egypt, Afghanistan, China, Cuba, Saudi Arabia, Syria and Belarus are examples of countries where the state monitors and restricts citizens' Internet access.

freedom on the net score censorship censorship

Here one can not freely use Google and there is also blocked for Facebook, Youtube, Twitter etc. Besides restrictions on access, in these countries one must also pay attention to monitoring. Many places follow the state to a large extent in what the inhabitants do online.

VPN is directly illegal in many of these countries, which tells us how effective the technology is. In Denmark, however, 100% is legal to use.

Monitoring and censorship in Denmark

Fortunately, this is not a bad thing for Denmark, as Denmark is generally a free country. But it will probably surprise that until recently all “providers of electronic communications networks and services” in Denmark Retention Order.

It requires "registration and storage of telecommunications data generated or processed in the provider's network". During that period, 3500 billion registrations of Danes' use of mobile telephony and internet were stored.

Fortunately, the Order has been declared illegal by the EU, but several politicians want to get the so-called session logging reinstated. If it does, companies will have to record in detail all Danes' use of everything on the Internet.

Although we have unlimited access to Google, social media, etc., there is some form of censorship in Denmark. Occasionally, ISPs are required to block websites that are found to be illegal.

VPN makes it impossible to record another activity for a user than to connect to the Internet. The encryption makes it impossible to see what he or she did. It also becomes impossible for the ISP to block access to websites etc.

Monitoring and blocking of jobs and study

It is not only the state that limits and monitors what people do online. In a company, in a school or the like, there is often a policy for that acceptable use on the network.

What that means can be interpreted in many ways and some places have introduced rather restrictive restrictions. It can e.g. be blocking social media like Facebook, YouTube and Twitter or blocking email services like Gmail, Hotmail, etc. Often the use of P2P download on that type of network has also been blocked.

That in this way it is possible to limit people's use of the network is due to the fact that the site's local network is used. It makes it easy for system administrators to block websites, services, etc. One VPNconnection creates a "tunnel" out of the restrictive network and allows you to connect to websites internet services that would otherwise be blocked for

On a local network it is also easy to keep up with what the users are doing, but here comes VPN again to the rescue. Encryption prevents systems and people from monitoring anything.

One should basically respect policies of acceptable use - and of course follow the law. But if you feel the need to bypass your specific network constraints, one will VPN connection could help you.

Use Google and other sites anonymously

When you use Google, Bing, Yahoo and other search engines, every search you make is recorded and cataloged. They are then linked to your computer's IP address and used to tailor ads and later searches to your device.

This cataloging may seem indifferent and perhaps even useful, but many would like to be in addition if possible. Many have tried to Google something that we would like to keep to ourselves, and then see advertisements for it for weeks after.

With a VPNconnection, the search engine will still register your search, but it will not be connected to your device as you join VPN does not publicly expose its own IP address.

An alternative to Google is to use the search engine DuckDuckGowho does not detect and track their users.

VPN does not protect against everything!

VPN only encrypts the connection between the user and VPNserver. The data flow between the server and the rest of the internet is NOT encrypted and can therefore be well monitored.

In addition, protects VPN not against "social hacking", phishing, viruses, malware, ransomware, etc. So you still do not have to respond to emails from alleged African princes and the like.

Whether one uses VPN or not, one should always use the net with care! If anything is scary or too good to be true, then it sure is!

VPN is 100% legal to use

In free countries there are (yet) no laws prohibiting the encryption of your internet connection.

Therefore, it is 100% legal to use one VPNconnection in Denmark!

However, this is not the case everywhere. In a number of countries such as China, Iran, Russia and more, the state is trying to control citizens' access to the Internet. Pga. the freedom and anonymity VPN provides, the technology is therefore prohibited.

vpn is banned in many countries where the state oppresses the population
Use of VPN is banned in a number of countries due to the freedom and anonymity that technology provides. The picture is from ProtonVPN.

Although using VPN, downloading pirated movies does not suddenly become legal. You are still subject to the law of the country in which you are located, even if you are connected to one VPNserve somewhere else.

Streaming with VPN is also not illegal

Do you see Netflix USA in Denmark or Danish TV from abroad, may be in violation of the Terms of Use. However, this is not the same as being illegal. Illegality requires breaking the law and it is not.

Ser man Netflix USA from another country, it is in violation of the terms of use. However, this is not the same as being illegal. Illegality requires breaking the law and it is not ..

However, this is not the same as being illegal. Illegality requires a violation of a law and it is not - only a violation of terms of use.

It can theoretically have consequences such as blocking or closing your account. It exists as far as is known not a single example of should ever have happened, but now you are warned.

Which one VPN is best?

To name the best VPN is a bit like finding the best car; it largely depends on your needs. Basically, one should VPNservice however be secure, anonymous, fast, easy to use and have servers where you need it.

In addition, the services often offer a number of additional functions, which are of more or less secondary importance. In some cases, however, these features may improve both the security and usability of VPN-The service.

The price must of course fit the budget and you often get what you pay for. However, a good need VPN not be expensive and several of the best services are actually among the cheapest!

Most VPNare gradually becoming really good, but there are a number of technical conditions and conditions they should meet. There are a sea of ​​services to choose from, so there is absolutely no need to compromise on security or privacy.


The security of one VPN lies in the encryption, which makes your data unreadable to unauthorized people. Encryption means that your data is encoded with a secret encryption key, such as yours alone VPNclient (the program on your computer, smartphone, etc.) and VPNthe server (the computer you are connected to the rest of the network through) has.

Only by having this key is it possible to decode the data stream, which is the whole core of VPN. Therefore, it is extremely important that the encryption is strong.

Encryption protocols

The encryption protocol is the technology used to encode data and obtain a secure connection between the user and VPNservice. One can rightly say that the encryption protocol is the “brain” of VPN.

Each protocol has its advantages and disadvantages, but in general they are very secure. They all use advanced mathematics to encrypt data, which in practice is impossible to break. Even with supercomputers, it takes billions of years to break ordinary 256-bit encryption used by most VPNservices.

Encryption protects data by rewriting it so that it is unrecognizable and unreadable. The rewriting is done with advanced methods based on mathematics. The picture is from https://fpf.org/.

The weaknesses of some of the protocols are for ordinary people more or less theoretical. They do not lie in the encryption itself (mathematics), but in the way it is implemented in the protocol. It may contain security holes or vulnerabilities that can be exploited.

There are e.g. reports that NSA routinely decodes data encrypted with PPTP and L2TP via backdoors in the protocols that have been compromised and weakened.

Whether it is relevant to you is a personal question. Do you use VPN for streaming, gaming, file sharing or the like, you are hardly in the spotlight of the intelligence services.

choose one VPNservice that uses open source encryption

It is recommended to use one . protocol as it provides the greatest security and anonymity. At the same time, there is no downside to it, so you might as well do it.

Open source means that the source code of the protocol is publicly available and therefore can be reviewed by anyone who understands it. It provides a huge amount of security against errors and the like as lots of professionals have reviewed the program. If the code contains errors, security holes, etc., they are quickly found and corrected.

Open source does NOT mean that anyone and everyone can go in and change the code of a program and thus build in viruses, Trojan horses and other dirt. This solely means that the code is open for all to see, which provides a great security against just malicious code.

VPNFortunately, services make extensive use of open source protocols such as OpenVPN and WireGuard. Here, WireGuard can be highlighted as the source code is very short, making it easy to go after in the seams. It is also not very resource intensive and can be used on all devices. WireGuard is “the new thing” and many of the leading services have recently started using it.

Comparison of download speeds and response times for popular VPNprotocols. WireGuard excels at being the best in both categories. The picture is from ckn.io.

The point-to-point tunneling protocol is one of the oldest encryption protocols and it therefore works on most, if not all platforms. However, the method is not completely bulletproof and has a security hole that has gotten Microsoft to discourage, that one uses PPTP. A plus of PPTP is that it is not resource intensive, which means it is fast.

L2TP and L2TP / IPsec

L2TP means Layer 2 Tunnel Protocol and as the name suggests, data is encrypted twice twice for increased security. However, it makes L2TP resource-consuming and is therefore considered relatively slow. The protocol may potentially cause network problems and the use of it may therefore require advanced network settings.


OpenVPN has been given that name since the protocol is open source. It does not appear that the protocol can be broken by the NSA, which can be attributed to the openness that is in open source. In addition, OpenVPN be difficult to block.

Although OpenVPN is open source, the source code is huge. This makes it a big task to follow the program in the seams, which is a weakness.

Another disadvantage of OpenVPN is a lack of support for mobile devices, which, however, is constantly improving.


The Secure Socket Tunneling Protocol has the advantage that it is almost impossible to block, thus it is a good choice if the purpose of VPNthe connection is to break censorship. In China, Iran, etc. the authorities are trying to prevent the use of VPN by blocking their access to the network through state-controlled ISPs.

SSTP is considered very secure and there are no reports that it should have been compromised. However, the source code is closed and therefore can not be reviewed by anyone other than the owner and developer: Microsoft.


IKEv2 or IKEv2 / IPsec is not a standalone encryption protocol, but part of IPsec. It is often used in Mac OS and iOS apps, where other protocols can be cumbersome to implement.

IKEv2 is in principle not open source, as it was developed in a collaboration between Microsoft and Cisco. However, there are open source versions.

IKEv2 uses fewer resources than OpenVPN and should therefore be a little faster.


WireGuard is a new open source encryption protocol designed to be secure, easy to revise and fast. WireGuard is immediately unconditionally the best encryption protocol and for the same reason, most VPNservices recently started implementing it.

The source code for WireGuard is incredibly compact, making the open source code easy to browse. Therefore, one can safely assume that it does not hide weaknesses or gaps as they would be quickly discovered.

WireGuard is "lightweight" and uses a minimum of RAM and CPU. Therefore, it is fast as it does not spend as many resources on either server or in apps. This is especially good news for those who use VPN on mobile devices, which usually drains the battery quickly. WireGuard should not do that.

Anonymity online

An anonymous VPNservice protects its users from tracking. In practice, this can be translated into not storing sensitive data about users.

With sensitive data is meant here information about what the users have done while they have been connected to the service. It can be visited websites, downloaded files, etc.

VPN protects against tracking

When using VPN, one's own IP address is hidden from the outside world. Unauthorized persons can only "see" the IP address on it VPNserver you are connected to.

It protects against tracking via the IP address, which is otherwise a common way to identify people on the Internet. This is done by the ISP passing on information about a customer who has used a given IP address at a specific time.

vpn make the user anonymous by scrolling the ip address
VPN ensures user anonymity by hiding the IP address.

When attempting to track down a person who uses / has used VPN, the track will end at the server. Whose VPNthe service does not store sensitive data about the users' use of the service, it can not pass on information that can be used to track the user.

If anonymity is important to you, you should therefore be aware of whether VPNThe service logs sensitive data about its users.

No-log VPNservices

VPNThe services are well aware that users value anonymity. Therefore, it is now most common that they do not log sensitive data.

It has the simple consequence that even if they were to feel like it or were forced to hand over sensitive data, there would be nothing to come after. You can not hand over something you do not have.

There is no benefit to the user in data logging, so the guideline is completely clear: Select a provider that does not log or monitor some users at all. Most people live it VPNservices up to, so there is no good reason at all to consider using those that do not.

So go for one VPNservice registered in a country where there are no legal logging requirements. It could, for example. be an American VPNservice, but there are good anonymous providers in many other countries.

Avoid Danish VPNservices

For many Danes, it is obvious to look for a Dane VPNservice, but it must therefore be strongly discouraged due to the so-called Logging Directive, which, cf. section 1, requires providers to log data about users:

§ 1. Suppliers of electronic communications networks or services to end users must record and store information on telecommunications generated or processed in the provider's network so that this information could be used as part of the investigation and prosecution of criminal offenses.

There are lots of anonymous VPNservices with servers in Denmark, so there is no reason to prefer a Danish provider for that reason.


The servers are essential for the quality and usability of one VPN-favor. They should both be fast and be found in the places one needs.

server Locations

By server locations is meant the countries, territories or cities where one VPNservice has servers that users can connect to.

The need for server locations is individual and depends on what one uses VPN to. A service with servers in all of the world's approx. 200 countries would be optimal, but smaller ones can usually do it.

what is vpn virtual private network proxy
In addition to securing the internet connection, the server also functions as an anonymous proxy that gives the user the same IP address and virtual location as the server. It can e.g. used to download anonymously or to access geographically restricted sites.

If you want to get around blocking and, for example, watch live TV in the UK, you should make sure that your VPNprovider has servers in the UK. Do you want to access American Netflix, so you need to connect to a server in the US and it has most services (if not all of them).

Danske VPNservers

For Danish users, there can be two good reasons to go for a provider, servers in Denmark:

  • To be able to access DR.dk and a number of other Danish streaming services, the visitor must have a Danish IP address. If you are abroad and would like to use DR.dk or other Danish sites, with visitor restriction, you can only access via a server in Denmark.
  • Connection to a VPNserver in Denmark provides the smallest delay and highest speed, as the data flow must be "around" the server both to and from the client. Here geographical distance plays a big role and therefore the server should be as close as possible. Alternatively, servers located in Sweden, Norway or Germany can be used, as the distance to this is also relatively short.

Many types of VPNservices have servers in Denmark, but not all, so check right after if you have the need.


By passing all your data through VPNconnection, it can easily become a bottleneck that slows down to far below what you pay for with your ISP.

The speed of one VPNconnection depends on two things: the speed of VPNthe server's own internet connection as well as the resource consumption on the server. An appropriate number of servers, with the necessary resources in relation to the number of users, is necessary to avoid low speed and long response times.

VPN speed test
Example of speed test of a VPN-connection (NordVPN). Here, a server is selected physically close, which provides maximum speed and minimum response time.

En VPNservice that saves too much on the hardware will therefore often be experienced as slow and perhaps even with outages.

Many types of VPNservices claim to be the fastest in the world, but of course not all of them can be. However, they are usually fast enough for most needs.

One should not expect the maximum benefit of a lightning fast internet connection, but most offer download speeds of up to 300 Mbit. There is plenty for streaming in even 4K, but if you download large files, you should expect it to take longer.

You can join VPN of course do not get a faster internet connection than the one you already have from your internet provider…

Servers close by provide the fastest connection

The highest speed is achieved by connecting to servers that are physically close. The farther away VPNthe server is, the slower the connection. This applies to both download speed and response time (ping / latency).

It can therefore be an advantage to choose one VPNservice that has servers in the same country as you are located. In geographically large nations such as the United States or Canada, where there are physically large distances, it is also relevant to take a closer look at which cities exist. VPNservers in.

In Denmark, you therefore get the fastest connection by connecting to one VPNserver in Denmark.

A good place to test its internet connection is speedtest.net.

additional Features

Extra features cover a number of features that can do VPN-connect more securely, more anonymously or otherwise enhance the experience.

DNS leak protection

When you type a URL such as google.com in the browser's address bar, a lookup is made in the Internet's response to a phonebook where the IP address of the URL is located. It is the IP address that tells your browser which website to display. The URL is just a way to make the display of the address nicer and easier to remember.

The register of URLs and IP addresses is called a DNS (Domain Name Server or name server). It is most often preset in the configuration of your internet connection to use your ISP's DNS.

Even if you use it VPN, you may risk making a lookup in the DNS that takes place outside of encryption. This gap in anonymity is called in the technical language for DNS leak. It can be used to associate your own IP address with a visit to a particular website.

dns leak
DNS leakage occurs if your devices make a DNS query outside VPNconnection, thereby exposing the IP address and the requested URL to the DNS server. This can be avoided by choosing one VPNservice with its own DNS servers. The picture is from ibVPN.com.

The only information that can be extracted from this is that you have visited that URL. An active VPNlink will still hide what you did on the page. However, many will still find it cross-border to know the ISP can keep up with what they are doing online.

Some VPNservices have their own DNS that customers can use. It provides complete anonymity to DNS queries, as you do not use your own ISP's DNS.

Alternatively, one can use Google publicly available DNS servers. Data from users' listings is not stored here either, if you trust Google. However, there is no immediate reason not to do so.

You can on https://www.dnsleaktest.com/ test your connection for DNS leak.

Killswitch or firewall

En kill switch completely blocks the internet connection if VPNthe connection is lost by mistake. It acts as a safeguard VPNconnection, as the kill switch prevents unencrypted data traffic from being exchanged over the Internet. Without a killswitch would interrupt VPNThe connection could otherwise leak sensitive data and compromise the user's IP address.

kill switch vpn
Kill switch is an automatic emergency switch that protects against leakage of sensitive data if VPN- The connection is interrupted by mistake.

Kill switch can either be built into VPNclient or use the operating system's built-in firewall. The latter is the best solution as it completely blocks unencrypted data on a “deeper” level.

VPNconnections are very stable and outages are only rarely experienced, but should this happen anyway, a kill switch is a useful "emergency switch". It is therefore recommended that you choose one VPNservice that offers the function, which most people happily do, but of course also ensure that it is activated.


Obfuscation means "obscurity" and is intended to obscure the use of VPN. Although the data stream is encrypted, there are markers that reveal that it is being used VPN. These markers can be found with deep packet inspection, which is a method of analyzing internet traffic.

VPNThe service may itself have developed a variant of an encryption protocol without these markers. Alternatively, obfuscation is done by placing another layer of encryption on top of already encrypted data. It does not change the strength of the encryption, but simply obscures its use VPN.

Deep packet inspection is used in systems where one does not allow VPNconnections. An example could be with ISPs in countries where VPN is forbidden. Obfuscation is therefore frequently used by users who want to use the Internet without restrictions in oppressive regimes such as China, Iran, etc.

Many people have no need for obfuscation and therefore not all ISPs offer it. Do you plan to use VPN in China, Russia, Iran, etc., one should therefore choose a service that offers obfuscation.

Smart DNS

Smart DNS is a technology used to access regionally protected streaming services such as Netflix USA . It basically has not much to do with VPN, but provides some of the same options. Therefore, a few have VPNservices chosen to include Smart DNS in the subscription (e.g. ExpressVPN).

Smart DNS has the advantage that it can be used on basically all devices. Including Smart TV, Xbox, PlayStation, Apple TV, etc., where one can not be installed VPN-client. However, the connection is neither encrypted nor anonymous.

Are you only interested in free access to streaming services regardless of location is Smart DNS an excellent alternative to VPN.

Other things worth considering

Is P2P allowed?

BitTorrent is the world's most widely used file sharing (P2P) method. It is used by both private individuals and a large number of companies to share files on the Internet.

BitTorrent is basically an open system where the users' IP address is exposed. It is therefore easy to find out which files have been downloaded and shared from a user's IP address.

As previously described, the IP address can be used to track the user through the ISP. That is why many use VPN to use BitTorrent anonymously.

If you want to be able to use file sharing (P2P /BitTorrent) together with VPN, it is essential that it is allowed at VPNservice. This is the case with many - but not all - so be sure to research it before signing up.

How many devices can the subscriber be used on?

In most VPNservices, the subscription can be actively used on several devices simultaneously. In this way you will be able to ensure e.g. his PC and smartphone at the same time.

Since there are typically several devices on the Internet in a household, it is important that the subscription includes sufficient active devices.

In practice, this also means that you can share VPNsubscription with their family and / or friends.

The maximum number of active connections varies between services. IPVanish excels at allowing as many as 10 active units, but the norm is 5-6 units.

Are there apps for all your devices?

One should of course be able to use one VPNservice on all its devices, whatever it is a PC, smartphone, tablet, router, etc.

It is therefore important to make sure that VPNThe service has apps for Windows, macOS, Linux, Android, iOS and whatever else you need. Fortunately, most have apps for all of the above operating systems.

Do you want to use VPN on your router, make sure that it is also something that the provider supports.

Er VPNclient friendly?

VPN is complicated technology, but it must be easy to use and fortunately it usually is too. Most VPNservices have gradually found that apps need to be simple and unmanageable.

As a rule, a simple user interface is used, where you connect to one VPNserver with a single click. The image below shows a screenshot from NordVPNs client, which is a pleasure to use.

northvpn screenshot
Screenshot of NordVPNs client, which is a pleasure to use.

You can often see screenshots of the clients on VPNthe website of the service and otherwise you can Google them. Have you already paid for one VPNservice with lousy apps, one can often get the money back for a period and simply try another.

Price and payment

Price and quality are often linked together and VPN is no exception; here you get (usually) what you pay for.

A great expense for VPNservices are servers that cost money both in procurement and operation. In addition, the cost of Internet connections, which by their nature must be very fast if a high number of users are to be connected without experiencing slow connections.

Therefore, the speed and especially the number of servers is often reflected very directly in the price. If you choose a cheap solution, you must therefore basically settle for a lower number of server locations.

Cheap VPN can easily be the right choice if you do not need specific server locations. Private Internet Access is one of the cheapest secure and anonymous VPNservices that keep the price down with relatively few server locations (35 countries) without compromising on quality.

For how long should you subscribe?

The majority of VPNthe services have subscriptions of different duration. The longer the period, the cheaper the subscription and vice versa.

Short subscriptions provide flexibility

A short subscription is the best in terms of flexibility. If one's needs change, it's smart not to have bound yourself far into the future. Of course, you can just sign up for a new subscription with another provider, but it's a shame to pay too much.

It is also tiring to pay for something you do not use. If one only needs VPN for a short period - e.g. a shorter stay abroad - you can therefore advantageously choose a subscription for a short period.

Long subscriptions are cheapest

Subscriptions for longer periods are cheapest in the long run. There are usually big savings on subscribing for a year rather than paying for a single month at a time.

If there is no prospect that one needs VPN changes significantly over the next long period of time, a one-year subscription is probably the best solution.

Avoid very long subscriptions

Some VPNservices have subscriptions for extremely long periods of 2 and 3 years. In some cases, lifetime subscriptions are even offered, so you only pay for one time.

If your needs change, you may have to find another provider within the period you have already paid for. In that case, you may end up not saving anything.

Another option is to VPNthe service closes and the money is wasted. The probability of this happening during a so-called lifetime subscription is inherently very high.

Money back guarantee

Most VPNservices offer a money back guarantee, where you can get a full refund for a period of x number of days if the subscription is terminated. It varies a lot how long the period is, but it tends to be 7, 14 or 30 days. VPNservice CyberGhost gives the money back for up to a full 45 days!

The idea is of course to make it easy and without obligation to subscribe and try VPNservice. It's sour to pay for a year if one quickly finds out it's a bad one VPN.

In connection with reviews of VPNservices, I have tested the system several times and have always quickly got all the money back.

Free trial period

It is more normal to give the money back for a period of time than to offer a free trial. There are, however VPNservices that can be tried for free for a limited time. There is more about them in the article about free VPN.

payment Methods

Depending on how big and tight the silver paper hat is, someone would like to avoid paying by credit card and the like. When you do that, you provide sensitive personal information to VPN-The service.

If you use a no-log VPNservice, there should be nothing to fear, but someone prefers control over trust.

If you belong to that category, you can choose one VPN, where payment can be made anonymously. With some of the services, you can pay with cryptocurrency (Bitcoin, etc.), which is difficult to track.

Reviews of VPNservices

Here at VPNinfo.dk is reviewed and reported selected VPNproviders on the basis of security, protection of users' privacy, number of servers that can be connected to and where they are located, user-friendliness, functions, speed, etc.

You can see the 5 best reported VPN services in the table below and find a collection of all the reviews here: Reviews of VPNservices

Check these top 5 VPN services

Price (from)

ExpressVPN review


Kr. 43 / md

$ 6.67 / month

NordVPN review


Kr. 29 / md

$ 3.71 / month

Windscribe VPN review


Kr. 26 / md

$ 4.08 / month

torguard vpn review


Kr. 32 / md

$ 5.00 / month

IPVanish vpn review


Kr. 33 / md

$ 5.19 / month

VPNinfo.dk has affiliate agreements with several of those notified VPNservices. If you follow links to the services' websites and pay for a subscription, you will receive VPNinfo.dk therefore a commission for the referral.

This has neither an impact on the subscription price nor on the reviews that always seek to be as objective as possible!

Available for free VPN?

Of course, there is no need to pay for anything if you can get it for free. However, it costs money to run one VPNservice, so if you do not pay for a subscription, something stays under it.

It can be something as innocent as advertising or a tasting a paid subscription, but the provider of the free service can e.g. also sell sensitive information about your use of the network.

Free VPN Providers are more likely to log your activities and display contextual ads once you are connected. They are also more likely to take advantage of your user habits to tailor future ads to you, have fewer servers, and are typically very little committed to protecting your privacy.

free vpn
It is tempting to use for free VPN, but make it open eyes. It costs money to run one VPNservice, so if customers do not pay for a subscription, something goes wrong. It can be something innocent like a taste of a paid subscription, but there are also plenty of examples of that for free VPNservices collect and sell information about users.

After all, they have to make money on something if they run a business. They can offer seemingly nice products (and who does not want things for free?), But if anonymity and privacy are important to you, it's best to avoid them.

VPN Providers who require subscription usually take your privacy more seriously because you pay for the service. They often offer a free trial or a free subscription with limited functionality so you can try out the service. Alternatively, free versions with limited functionality and / or advertising are offered.

Read more about what opportunities are available free VPN.

Get started using VPN

Although the technology is complex, it is easy to use VPN. All serious providers offer tailor-made programs / apps to manage the connection as well as simple but detailed user guides.

If you want to start protecting your internet connection with VPN, do the following:

1: Select one VPN-service

They are not all equally good, so it does not matter which one you choose. With over 300 VPNservices worldwide, there is absolutely no need to compromise! The fundamental requirements for one VPN is:

  • Safety: The ability to protect your data from being intercepted by unauthorized persons. It is done with efficient and secure encryption.
  • anonymity: The ability to protect your identity so that nothing can be traced back to you. Here is the main requirement that user data is not saved.
  • Features and servers: A good VPNservice can be used on all your devices, is easy to use, has servers in the places you need and is fast enough that you do not notice losses in speed.
  • Extra features: choose one VPN with the features you need. For example. obfuscation if it is to be used in China or the like.

2: Install the app

Once you have signed up for a subscription, you will shortly receive an email with instructions on how to use the service on your devices. Every serious provider has great apps to handle setup and daily use of VPNconnection.

Once the app is installed, you usually just need to enter your username and password and then you are good to go.

3: Activate VPNconnection

After that, all that remains is to connect to a server, which is done with a single click in the app. Often one can choose to connect to VPN automatically when the device starts up, so you do not have to mess with it every time you want to go online.

When: VPNthe connection is activated, you are ready to use the internet safely, anonymously and freely!

You can test if it works with ExpressVPNs IP tool. In that case, the ISP shown should not be the one you are getting internet from. If you are connected to a server in another country, this must also be stated.

If you do not want to use VPNservices apps, you can read more about manual configuration here: manual installation and configuration of VPN.

Check these top 5 VPN services

Price (from)

ExpressVPN review


Kr. 43 / md

$ 6.67 / month

NordVPN review


Kr. 29 / md

$ 3.71 / month

Windscribe VPN review


Kr. 26 / md

$ 4.08 / month

torguard vpn review


Kr. 32 / md

$ 5.00 / month

IPVanish vpn review


Kr. 33 / md

$ 5.19 / month