Security Kiss is very good. It is easy to turn on and/or off. There are no special settings to set up - just install and that's it. I've used it for a number of years and occasionally there are time limited offers. The free edition is useful and you can use up to 300 MB per day.
It is a nice client ... some things like Server load ... are disabled by AppGuard (I think) but nothing important. Needs UAC control access to start too. Easy to turn on/off except I remember to always turn off Exclusive Tunnel mode. That is a nice feature btw. Could be less expensive though. Servers could be faster too.
Bad. Logging Policy Time and duration of the user VPN connection Bandwidth used during the connection User IP address Use OVPN.SE All our VPN servers are operated without any type of storing media. This means that the servers run without any hard drives, USB memories or CD-ROMs that could otherwise log and store information. https://www.ovpn.se/en/blog/improvement-of-the-physical-security/
True. But then, any VPN service could be lying about logging. Or the VPN's ISP could be lying to the VPN about logging. Or various TLAs could be logging ISP traffic, and not telling anyone. My point is that going by what people say can be dangerous. That's why I like chaining VPNs. Anyway, I mostly use free SecurityKISS via Tor. It's light and relatively fast for that.
"Anyway, I mostly use free SecurityKISS via Tor. It's light and relatively fast for that." which do you connect first?
I connect Tor first. It's doable in Whonix workstation. But getting Tor browser to work with it is a bloody pain, because it's locked to Tor in multiple ways. Or you can just do it in a Debian VM. Use the socks-proxy options in openvpn to connect via Tor's SOCKS5 proxy. Have iptables rules that only allow user debian-tor to use eth0, and allow all traffic on tun0.