-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 https://vpntesting.info/ I tested 29 Windows VPN clients for DNS, IPv4 and IPv6 Leaks. Six (AirVPN, FrootVPN, IVPN, Mullvad, Perfect Privacy and SlickVPN) performed perfectly. Three others (CyberGhost, oVPN.to and SecureVPN.to) hit VPN-specified nameservers directly while reconnecting after uplink interruption. But that's not a huge issue, in that they didn't hit other nameservers. The other 20 Windows VPN clients failed in various ways. Over half leaked IPv6 packets whenever the machine was connected to the Internet. After uplink interruption, some failed to reconnect automatically, and some leaked IPv4 packets. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXYjtvAAoJEGINZVEXwuQ+DrQH/2KZYuuj8Gy9uW0txWL/JInP s2VxNZGV7q3glqW25tgjGDEXSCV7wS6z7YGBgoORYgv9VgsG27ISdVvmSKTGeKuN zvDghFv5uHjGBMCLqOeb06sAVqBb6neldnwqNOOIgyK0pRRdET0/j1lbw8LkxyGD pr+Ne1ura3yywAl4OwjOGEENhmFGqboF9m8b99/Jeznr+fMHvi5oJwrCMurIJ41n ojpOtYgNZU4boEh8osUZV+Q9+WGVV2xrZSL/FQUbjyibM6gjXI+cfXJnYOg0T7QV wE13FOAaFE7nJypEC0HiEDEZPmJ0jH9JcMCDgn0cMQmdcWFbG0eYjSaQ2M6kS5A= =2eVp -----END PGP SIGNATURE-----