
Unfortunately, you are unable to run the VigilantBear protocol if your computer runs a custom proxy. This is handy if you move between WiFi networks or move out of range of a network. This feature is also designed to automatically reconnect as soon as it detects an internet connection again. The VigilantBear feature (which is a Kill Switch) ensures that your data and location remain private in the short time that it takes TunnelBear to reconnect.

This is one of TunnelBear’s more advanced and appealing features. Luckily this is an optional feature, so if you find that you are experiencing speed and efficiency problems, you may disable it. However, this can lead to unnecessary memory usage and can end up slowing some machines down quite significantly. This feature is useful for those who don’t want to have to reconnect it on restart. You can set TunnelBear to launch each time you start up your device.

The TunnelBear application is well thought out, but this feature is only available to those running Windows, Android, and macOS, and must be turned on in the app’s security settings. It is also especially useful for users living under governments that are repressive and have limited internet access laws, as well as severe theft penalties for those who forgo these limits. This feature is mainly for users who want to be as discreet as possible when browsing online. TunnelBear can keep up with some of the more sophisticated VPN providers, thanks to its obfuscation feature. Unfortunately, this is the only encryption protocol that TunnelBear uses.

This method of encryption is used by government and military organizations across the world, so you can certainly rely on it for personal use. Many people use it to encrypt and decrypt extremely sensitive data. For those who are not familiar, AES is an acronym for Advanced Encryption Standards. Encryption ProtocolsĪs with most VPNs these days, TunnelBear uses AES 256-bit encryption. But not everything is great as you can see in our full review.įor now, let’s look at the security tools in the apps. These tools protect you from cyber-criminals and hijackers. Like most VPNs, TunnelBear claims to protect you from the various dangers of the internet with the use of some security tools. So we asked ourselves: is TunnelBear truly trustworthy? Let’s find out! Security: What Are The Security Tools in Apps?

But there is more to the company than meets the eye. At first glance, TunnelBear appears to be a great, safe, and free VPN service. This is why so many people have considered using TunnelBear as their main VPN. It’s no secret that nothing is cheaper than free.
