PIA has the right features available to help you achieve full online anonymity. It’s significantly safer to use than others, despite it being a US-based VPN. All modern VPN and encryption protocols are available in a simple-to-use interface.
Logging
PIA is very transparent about its logging policies and even goes so far as to release regular reports. These are reassuring and allow users to see how many data requests the company has received from all the government agencies.
What separates PIA from many other VPNs is the amount of verifiable information that you can dig up about its logging practices. PIA states that it doesn’t collect anything aside from email addresses and payment details. This allows for maximum anonymity when using third-party online payment services.
It’s one of the few VPN service providers that had their servers seized by Russian authorities and subpoenaed by the US federal government and still managed to protect user identities. It’s reassuring that there are actual court cases that anyone can look up online that demonstrate PIA’s commitment in this regard.
Jurisdiction
PIA falls under the Five Eyes intelligence alliance. It is a US-based VPN provider, which means that all data collected can be subpoenaed at any time and shared between the US, the UK, New Zealand, Australia, and Canada.
Because it falls under this jurisdiction, PIA may not sound like the ideal choice for anyone that wants to remain anonymous in their online activities. However, due to the clear no-logging policy, it is safe to use.
Encryption
PIA offers two types of encryption in AES-128 and AES-256. Both are available within the client although you will have to set it to AES-256 manually if you want to.
The VPN also offers multiple security protocols, such as IKEv2, L2TP, OpenVPN, and WireGuard. WireGuard is a newer protocol mainly developed for boosting download speeds. However, it’s a bit too new and not as proven as OpenVPN, which remains the gold standard.
Data Leaks
When using the main PIA desktop client, we didn’t manage to find any DNS leaks, or IPv6 leaks, or even WebRTC leaks.
However, there have been some WebRTC leaks when using PIA browser extensions. Due to its private DNS servers and strict DNS protection protocols, all DNS requests are processed by PIA rather than the internet service providers.
Therefore, there’s a rather low risk of data leaks when using PIA. At least as far as the desktop client is concerned.
Extra Security Features
Although PIA may look like a lightweight app on the surface, it does have robust security features. The VPN kill switch is one of the most important, as is the split tunneling and port forwarding features.
The built-in tracking protection and malware prevention features are also important when browsing or when using torrent clients.
But what’s perhaps most important is the customization factor. PIA allows you more control over the security protocols and the level of encryption. For example, you can use the default RSA-2048 authentication algorithm.
That said, you can also use stronger authentication crypto keys such as RSA-4096. It’s just a matter of manually selecting a different protocol. There’s of course the relationship between higher levels of security and app performance.