Is TigerVPN Safe?

Pinterest LinkedIn Tumblr +

TigerVPN was founded by a company known as Tiger at Work & Co in 2011. The VPN service has its headquarters in Bratislava, Slovakia. The VPN claims to have amazing usability and good security protocols and encryption but is TigerVPN safe? 

TigerVPN is actually not as safe as the company claims primarily because they store personal and payment information in their logs. 

Let’s look at some of the VPN service’s security features to demonstrate how low their security levels are. 

TigerVPN’s Jurisdiction

The only good thing about the TigerVPN when it comes to the safety of user information is the VPN’s country of jurisdiction. TigerVPN is located in Bratislava, the capital city of Slovakia. The advantage of this location is the fact that Slovakia is outside the 14-Eyes alliance and does not have mandatory data retention laws. 

The country has a privacy-friendly judiciary apparatus that works to prevent legislative directives from the EU that infringe on privacy rights. Slovakia is one of the best locations for fully secure VPN services.

Logging Policy

TigerVPN is open enough to admit that they collect and maintain selected logs. When you sign up for their VPN services, they’ll collect your email and password and payment information, which can be used to easily uncover your identity. They’ll also store all the communication you have with their support desk if you reach out to them via their ticket system. 

To make matters worse, every time you connect to a TigerVPN server, the company records each session from the start time to end time as well as the data you have transferred. 

They justify the data logging practice by stating that they do not target individual customers and only log the information for performance purposes such as accounting, troubleshooting, preventing abuse of their services, and to ensure that the network works efficiently. However, the data they collect from you is kept in their servers for six months!

Keep in mind that TigerVPN also uses cookies, web beacons, pixels, affiliate links, and app identifiers to gather information about people who visit and use their website and apps. This is not a zero-log VPN and therefore not the safest available today.  

Security Features

There are, however, a few good things about TigerVPN when it comes to VPN protocols and encryption. The VPN service supports the best tunneling protocols including OpenVPN (both UDP and TCP), PPTP, L2TP, and IPsec. 

The VPN’s Windows, Android, and Mac apps run on OpenVPN UDP by default while iOS apps run on IPsec. You can easily change OpenVPN UDP to TCP any time you wish. When it comes to encryption, TigerVPN uses military-grade AES 256-bit encryption which is the highest level of data encryption and is often used by banks and government agencies. It is an unbreakable encryption standard.

However, despite the impressive encryption and protocols, TigerVPN does not have a kill switch feature. Any VPN can only protect your identity and actual location as long as it is up and running but what happens when it suddenly goes down leaving your IP address and browsing data momentarily exposed? 

This is where the kill switch feature comes in to cut off your Internet connection and ensure that you are never left exposed or unprotected when the VPN connection suddenly drops. TigerVPN’s lack of a kill switch presents a danger of exposure if something happened to the VPN while you are still connected.

TigerVPN Alternatives

TigerVPN is not a safe option which is why we don’t recommend using the service if you value safety when surfing the internet anonymously. 

Here are a few safer and more reliable VPN services:

VPN
  • Provider
  • User Rating
  • Our Review
  • Price
Our #1 Choice
NordVPN Logo
PureVPN Logo
ExpressVPN logo

Conclusion

Is TigerVPN safe? It is not safe at all because they collect and store your information and don’t even have a kill switch feature. If you want to surf the internet safely via a VPN, choose one of the alternative VPNs mentioned above. 

Share.

Leave A Reply