A new player in the world of VPNs with the Privado VPN service. The tool, in addition to protecting your connections and anonymizing your surfing, offers you to protect yourself from malicious software.

”  Make Internet browsing even safer with Privado Control Tower!”  is the promise of the VPN that easy tutorials has just tested for you. The tool allows you to surf in a secure way, without leaving traces on the sites, forums and other social networks that you may visit.

The little extra of this Swiss tool, the possibility of disabling advertisements and other trackers, while allowing the blocking of malicious websites and attempts at infiltration by pirate software. One of the tool’s options also blocks known and suspected scam websites (cryptocurrency) or prevents known and suspected ransomware vectors from accessing your system. In short, Privado VPN goes far in its proposal.


Installation takes seconds. The menus are clear, although I find the colors a bit garish. But here we are only talking about aesthetics. You might be surprised to see the application stuck at the bottom of the window, but there is an option to place it wherever you want. Once your configuration is done (protocols, country, etc.) all you have to do is click on ”  connect  ” and you’re ready to choose from several hundred servers around the world, covering more than 60 cities. Ten simultaneous connections possible. One of the plans offers a parental control option. The free version allows a connection, enough to test and get an idea.

Logs or not logs

PrivadoVPN says it has no user or customer data that could be associated with a request for information based on a PrivadoVPN address. “  We do not store any identifying information about what you browse, view or do online via a PrivadoVPN connection,  ” explains the Swiss company. Be careful, this detail does not mean that this VPN will let you do anything and everything!


This VPN works on PC, Mac, Android.

In terms of speed, everything will depend on the country chosen, of course the connection via Hong Kong, Taiwan or even Japan will be slower for a French person, but the choice of countries and cities will allow you to find your comfort of use.

Several rates, which in this period of sales, are interesting. For example, 1 year of VPN will cost you 30€.

Understanding pseudonymity, anonymity and confidentiality

Faced with such threats associated with the privacy of Internet users, the application of effective recommendations and solutions becomes essential. As such, the definition of confidentiality, anonymity and pseudonymity escapes many Internet users. How to differentiate these terms in order to better understand the risks and resolutions associated with your privacy on the Internet?

Privacy on the web (or from a more “general” perspective) refers to the sharing of sensitive or personal data while controlling access to that data. In other words, the publication of data is authorized according to previously designated Internet users. Registration on a website and the use of a social network are perfect theoretical examples here. Nevertheless, privacy can be compromised (intentionally or not).


Unlike confidentiality, anonymity is based on a principle of non-identification. Thus, the publication of information or the use of online services evokes transparency and guarantees the protection of the Internet user. The denunciation of sensitive subjects is obviously a perfect example associated with anonymity.

If certain platforms or sites on the Internet promise non-identification of their users, the IP address provided during each connection remains a virtual fingerprint. As such, installing a VPN is highly recommended to hide your browsing data and thus preserve your anonymity. As you will have understood, confidentiality and anonymity are indeed distinct but complementary terms. Pseudonymity is a less used term than anonymity. The etymology of this word obviously refers to the use of a pseudonym on the web. Certainly, the idea of ​​”hiding” is similar to anonymity. However, identification under a deliberately illegitimate name differs from the principles previously cited in this article.

If you liked this article, please subscribe to our reddit community to discuss it. You can also find us on Twitter and Facebook.

5/5 - (1 vote)

About the Author

SAKHRI Mohamed

Founder & Editor

Passionate about the web, new technologies and IT, I share on easy-tutorials.com tutorials, tips, advice, online tools and software for Windows, Mac and Linux. I'm the founder of this blog and I'm very interested in anything to do with technology, but I also love playing games. I was born in Constantine, but now I live in Algiers/Algeria

View All Articles