![]() |
|
Surfshark VPN : Award-winning VPN service - Printable Version +- Geeks for your information (https://www.geeks.fyi) +-- Forum: Windows (https://www.geeks.fyi/forumdisplay.php?fid=12) +--- Forum: Software Updates and New Versions (https://www.geeks.fyi/forumdisplay.php?fid=42) +--- Thread: Surfshark VPN : Award-winning VPN service (/showthread.php?tid=17662) |
RE: Surfshark VPN : Award-winning VPN service - jasonX - 08 April 25
Surfshark Apps Version Updates
Windows App Changelog - Surfshark 5.14.3 (31-03-2025) What's new:
Windows App Changelog - Surfshark 5.14.2 (20-03-2025) What's new:
macOS App Changelog - Surfshark 4.18.1 (27-02-2025) What's new:
iOS App Changelog - Surfshark 3.23.1 (01-04-2025) What's new:
Android App Changelog - Surfshark 3.14.1 (01-04-2025) / Surfshark 3.14.0 (21-03-2025 What's new:
Android App Changelog - Surfshark 3.13.2 (20-02-2025) What's new:
Data and info drived / lifted from Surfshark Customer Support with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 05 May 25
Surfshark Apps Version Updates
Windows App Changelog - Surfshark 5.15.2, 2025-04-23 What's new:
macOS App Changelog - Surfshark 4.19.0 (08-04-2025) What's new:
iOS App Changelog - Surfshark 3.23.2 (16-04-2025) What's new:
Android App Changelog - Surfshark 3.16.0 (25-04-2025) What's new:
Android App Changelog - Surfshark 3.15.0 (11-04-2025) What's new:
Data and info drived / lifted from Surfshark Customer Support with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 05 May 25
Surfshark New Pricing May 2025
Surfshark prices from Surfshark's Birthday will soon revert back to normal prices. Current prices in the USA for Surfshark Starter is $1.99/mo, and Surfshark One at $2.49/mo will remain until end of May 2025. ![]() Please find the new prices for 24-month subscriptions below and comparison of features included. ![]() ![]() ![]() Note: Surfshark Starter bundle includes 'VPN' and 'Alternative ID' Surfshark One bundle includes 'Antivirus', 'Alert', 'VPN', 'Alternative ID', 'CleanWeb', and 'Search' private search tool. Surfshark One+ bundle includes all 'Surfshark One' features plus 'Incogni'. All new pricing with Surfshark's 30-day money-back guarantee! RE: Surfshark VPN : Award-winning VPN service - jasonX - 15 May 25 ![]()
Surfshark DNS - a free public DNS service for all!
Surfshark has recently introduced their very own "free" public DNS service! This is a "first-of-its-kind tool" in the industry focused on privacy and ease of use. And yes, you read it right, it's FREE! Works on all major platforms and uses UDP, TCP, TLS, HTTPS, QUIC protocols. As compared to many traditional DNS providers that log user data, Surfshark DNS is built on a strict no-logs policy, with absolutely no tracking or data collection. It’s a simple yet powerful way for both individuals and organizations to take more control over their online privacy. In addition to enhanced privacy, users may also benefit from faster and more reliable connections, thanks to Surfshark’s globally distributed infrastructure. ![]()
What is a DNS server?
DNS (Domain Name System) is a system that translates human-readable domain names into numerical IP addresses. Think of it like the internet’s phone book, converting website names into computer-friendly numbers. DNS servers are usually provided by your ISP (Internet Service Provider), allowing it to see the websites you visit. Surfshark offers a public privacy-oriented DNS service that anyone can use instead, ensuring your data is never tracked. ![]()
Why do you need a DNS server?
DNS ensures your browsing works smoothly, loading whatever content you want quickly and efficiently. Surfshark DNS servers also offer: Safer browsing Add a layer of protection to your daily browsing using a DNS service that doesn’t log, track, or sell your data. Good speeds Surfshark’s global infrastructure ensures stable and consistent speeds for your online activities. No costs Our DNS services are free for everyone. There are no secret fees, integrated ads, or trackers.
How do DNS servers work?
When you type a website name into your browser, your computer asks a DNS server to look it up. The DNS server quickly translates the website name into an IP address so your computer knows where to find it. Your device uses your ISP’s DNS. However, you can change it to Surfshark’s. Note: Keep in mind that DNS servers do not change your IP address. You can check for DNS leaks using our DNS leak test.
Why should you use Surfshark’s free DNS server
Unlike the conventional DNS resolution services provided by your ISP’s, which could track and record your activity, Surfshark's new public DNS server ensures privacy by not logging or banning any data.
How to set up DNS on your devices
To use DNS servers, you need to configure your device or router to point to the DNS server addresses you want to use. Here’s how to do it on major platforms: Windows:
MacOS:
Android:
On iOS:
On a Router:
Data and info from Surfshark with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 04 June 25
Surfshark Apps Version Updates
Windows App Changelog - Surfshark 5.16.1 (03-06-2025) What's new:
macOS App Changelog - Surfshark 4.19.0 (08-04-2025) What's new:
iOS App Changelog - Surfshark 3.23.2 (16-04-2025) What's new:
Android App Changelog - Surfshark 3.16.2 (29-05-2025) What's new:
Data and info drived / lifted from Surfshark Customer Support with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 20 June 25 ![]()
Surfshark's "No-logs policy" was verified again!
Surfshark believes privacy should be the rule — not the exception. This is the reason why they had their no-tracking claims independently verified. Again. Deloitte, one of the Big Four auditing firms, recently confirmed that Surfshark doesn't monitor what their users do online and they do not keep logs of user's activities. Surfshark's no-logs assurance scope The recent assurance provided by Deloitte delved into our systems and internal processes. Here’s a detailed look at what Deloitte did:
What this means for us 'users' This independent verification confirms that Surfshark operates according to the highest privacy and quality standards. Deloitte reaffirms that all user's browsing and activities are not logged or tracked. Deloitte independently verified Surfshark's adherence to their privacy policy, providing proof, not promises. Users can browse, connect, and explore the internet with peace of mind, knowing his privacy is protected at every step. The importance of independent verification “In an era where digital privacy is constantly threatened, independent verification is a crucial pillar of trust for any digital services. This assessment demonstrates Surfshark’s proactive approach to privacy, showing that we are continually seeking ways to fulfill our promise of not tracking nor monitoring our users’ activity. Having Deloitte, one of the Big Four auditing firms, reconfirming that is a big confirmation of privacy and transparency to our current and future users,” says Surfshark’s CTO, Donatas Budvytis. More Info HERE Data and info from Surfshark with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 12 July 25
Surfshark Apps Version Updates
![]() Windows App Changelog - Surfshark 5.16.1 (03-06-2025) What's new:
macOS App Changelog - Surfshark 4.20.0 (05-06-2025) What's new:
iOS App Changelog - Surfshark 3.24.1 (26-06-2025) What's new:
Android App Changelog - Surfshark 3.17.0 (30-06-2025) What's new:
Data and info drived / lifted from Surfshark Customer Support with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 13 July 25
Introducing Surfshark Everlink
![]() Surfshark recently introduced 'Surfshark Everlink', a patented self-healing VPN infrastructure for stable VPN protection ensuring even better VPN (Virtual Private Network) connection stability. This means that your VPN connection remains uninterrupted, even in the event of server maintenance, without requiring any manual intervention. What is Surfshark Everlink? Everlink is a patented (US11190491B1, US20240080302A1) VPN server infrastructure that makes your connection more stable and reliable. In the event of a server failure or maintenance, Everlink acts as a self-healing mechanism and revives your connection by reconfiguring the VPN tunnel without disconnecting you from the VPN service. Surfshark Everlink
Everlink provides a smoother, more reliable VPN experience — almost like having an infinite connection. And because you remain connected to the VPN the whole time, your data stays protected, and your IP (Internet Protocol) address stays hidden. Surfshark Everlink servers are globally distributed and accessible via anycast IP addresses, ensuring that the Everlink service remains consistently available. How does Everlink work? All traditional VPNs establish a static tunnel between the client and a single server. In the event that your VPN connection goes down or drops (due to maintenance and the like), you the user, needs to reconnect manually. Manual reconnection or constant reconnection due to connection drops is not ideal especially when dealing with sensitive information or using public Wi-Fi. Surfshark Everlink technology changes that. When you connect to our VPN, you’re also (automatically) connected to Everlink. Whatever server issue you are having, 'Everlink' instantly and seamlessly reconfigures the VPN connection to another working server. You don’t get disconnected, and your VPN protection stays intact. It’s all automatic, and you won’t even notice it happening. ![]() Why is Everlink important? VPN reliability has traditionally been reactive — relying on kill switches or manual reconnections to mitigate server failures. Everlink represents a proactive, infrastructure-level solution that eliminates the need for disconnection altogether. Everlink goves the user the benefits of:
Kill Switch and Everlink, what's the difference? The difference between a Kill Switch and Everlink comes down to how they handle VPN interruptions. A 'Kill Switch' is a reactive security measure that cuts your internet connection the moment your VPN drops. While effective, it disrupts service and requires you to reconnect manually. 'Everlink', by contrast, is a proactive, self-healing system. Instead of terminating the connection, it revives it by reconfiguring the VPN tunnel without disconnecting and reconnecting you from the VPN service. That way, you, the user, maintains connectivity and security without any intervention. It’s a fundamentally different approach to VPN reliability. Thus: Kill Switch
Everlink
How do you use Everlink? Everlink is available by default with the WireGuard protocol on all platforms, including iOS, macOS, Windows, Android, and Linux. There’s no extra cost for existing Surfshark VPN users. Here’s how to check your selected connection protocol on major platforms:
![]() ![]() MORE Info HERE Data and info derived / lifted from Surfshark Customer Support with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 13 July 25
IKEv2 VPN Explained
![]() IKEv2 is a VPN (Virtual Private Network) protocol that uses IPsec encryption to create secure connections between devices and VPN servers. Known for its excellent stability and built-in support across modern operating systems, IKEv2 excels at maintaining reliable connections, especially on mobile devices that frequently switch between networks. Mr. Alek Furgal of Surfshark shares with us a detailed explanation about IKEv2 protocol.
What are the Pros and cons of IKEv2 VPN?
![]() Is IKEv2 VPN secure? What is it used for? IKEv2 provides strong security through IPsec encryption and is considered secure for most use cases. The protocol supports modern encryption standards and provides reliable protection for data transmission. Why use IKEv2:
Why not to use IKEv2:
IKEv2 and battery life on iOS/Android IKEv2’s efficient design makes it particularly battery-friendly on mobile devices. The protocol’s ability to maintain connections without constant re-authentication reduces processor load, extending battery life compared to protocols that require frequent handshakes. IPv6 support and limitations IKEv2 supports IPv6 connectivity, but implementation varies by operating system and VPN provider. Some configurations may experience IPv6 leaks if not properly configured with appropriate firewall rules. Why is IKEv2 popular among VPN protocols? IKEv2’s popularity stems from its native integration across platforms, excellent mobile performance, and reliable stability. The protocol’s built-in support eliminates compatibility issues common with third-party VPN clients. How IKEv2 works with IPsec IKEv2 serves as the key exchange mechanism for IPsec, handling authentication and establishing secure tunnels. IPsec then encrypts and authenticates the actual data transmission, creating a comprehensive security framework. How to set up IKEv2 VPN in 3 easy steps (for Surfshark users) Setting up IKEv2 with Surfshark is straightforward, thanks to built-in platform support.
Setting up IKEv2 manually Manual setup provides more control over configuration and works on devices without dedicated VPN apps. Windows Due to IKEv2’s dwindling popularity on Windows devices, Surfshark has decided to remove IKEv2 support for Windows and focus on more secure and efficient alternatives instead. That said, the general steps for setting up an IKEv2 connection on Windows devices are as follows:
See, Surfshark Removes IKEv2 for Windows macOS For more information, see our detailed IKEv2 setup guide for macOS.
Android (via strongSwan) For more information, see our detailed IKEv2 setup guide for Android.
iOS For more information, see our detailed IKEv2 setup guide for iOS.
Troubleshooting common IKEv2 VPN issues While IKEv2 is generally reliable, connection issues can occasionally occur due to network configurations, firewall settings, or authentication problems. Here are solutions to the most common IKEv2 VPN problems: Stuck on “connecting” or “negotiating security” This typically indicates authentication or configuration issues. Verify server details, check certificate validity, and ensure your credentials are correct. Try different server locations or contact your VPN provider for updated configuration files. No internet after connecting DNS configuration problems often cause this issue. Manually set DNS servers (like 8.8.8.8 or 1.1.1.1) in your network settings, or disable IPv6 if experiencing conflicts. Certificate errors Expired or invalid certificates prevent successful connections. Download fresh certificates from your VPN provider, ensure the system date/time is correct, and verify certificate installation. DNS or IP leak problems Configure your device to use VPN-provided DNS servers, disable IPv6 if unsupported, and use built-in kill switch features when available to prevent leaks during disconnections. IKEv2 compatibility: devices, networks, and firewalls IKEv2 enjoys native support across modern platforms:
Firewall and NAT traversal IKEv2 includes NAT (Network Address Translation) traversal capabilities, allowing connections through most home routers and firewalls. However, some corporate firewalls may block IKEv2 traffic on ports 500 and 4500. Router compatibility Many modern routers support IKEv2 configurations, allowing network-wide VPN protection. Check your router’s firmware documentation for IKEv2 support and configuration options. Mobile networks and carrier issues Most mobile carriers support IKEv2 traffic, but some may throttle or restrict VPN connections. Connection stability may vary based on carrier network quality and roaming agreements. IKEv2 in regions with strict internet censorship laws IKEv2 faces significant challenges in heavily censored regions. Because the protocol’s handshake is distinct, it is relatively easy to detect, and it gets blocked by deep packet inspection (DPI) systems. Government firewalls often block IKEv2 traffic, making using it unreliable in regions with strict internet censorship laws. IKEv2 vs. other VPN protocols Understanding how IKEv2 compares to other VPN protocols helps you choose the best option for your specific needs. While all modern protocols offer strong security, each has distinct advantages depending on your priorities and use case.
IKEv2 vs. OpenVPN
![]() IKEv2 vs. WireGuard ![]() IKEv2 vs. L2TP/IPsec L2TP/IPsec is an older, deprecated protocol that offers no practical advantages over IKEv2. IKEv2 provides better performance, security, and stability while maintaining similar compatibility. IKEv2 vs. PPTP and SSTP Both PPTP and SSTP are outdated protocols that should be avoided. IKEv2 offers superior security, performance, and compatibility compared to these legacy options. Conclusion: should you use IKEv2 VPN in 2025? IKEv2 remains a solid choice for users who prioritize built-in platform support and mobile stability. While WireGuard generally offers better performance and OpenVPN provides more flexibility, IKEv2 still excels in scenarios where native integration and reliable mobile connectivity are primary concerns. MORE Info HERE Data and info derived / lifted from Surfshark with permission RE: Surfshark VPN : Award-winning VPN service - jasonX - 14 July 25
Can your ISP see you’re using a VPN? Here’s exactly what they see
![]() Can your ISP see you’re using a VPN? Yes, definitely! Your ISP (Internet Service Provider) can detect that you’re using a VPN (Virtual Private Network) because they see a connection to a VPN server’s IP address. However, due to VPN encryption, they cannot see your specific online activities, such as websites visited or downloads. All ISPs handles all internet traffic, so they notice when you connect to unfamiliar IP addresses. But while they know you’re using a VPN, the encryption prevents them from seeing what you actually do online. But yes, they can detect you when you're using a VPN.
What ISPs can and cannot see when you’re VPN-protected
![]()
What VPNs hide from ISPs and why it matters
Some ISPs are legally allowed to slow down your internet speed. A VPN encrypts your internet traffic, creating a secure tunnel that prevents ISPs from seeing your actual online activities. 1. Websites visited What good VPNs do: ISPs cannot see which specific websites you visit, your browsing history, or website URLs and page content Why it matters: Prevents ISPs from building detailed profiles of your interests and habits for commercial purposes or government surveillance 2. Search queries What good VPNs do: Search terms remain encrypted and invisible to ISPs, along with which search engines you use Why it matters: Your private searches, research topics, and personal interests stay completely confidential 3. Content downloads and uploads What good VPNs do: ISPs cannot see what specific files you download or upload, including their content, types, or sources Why it matters: Prevents ISPs from throttling your connection based on file-sharing activities or reporting download behavior 4. Streaming activity What good VPNs do: ISPs cannot see which streaming services you use, content you watch, or streaming quality patterns Why it matters: Helps avoid bandwidth throttling during peak streaming hours and prevents ISPs from blocking or prioritizing specific streaming services 5. Data entry information What good VPNs do: Personal information entered on websites, login credentials, and financial data transfers are encrypted Why it matters: Protects sensitive information from ISP monitoring and reduces data available in potential security breaches 6. Messaging content What good VPNs do: Email content and recipients, messaging and social media activity, and video call participants remain private Why it matters: Ensures private communications stay confidential and prevents ISPs from selling communication data to third parties
What can your ISP see when you’re using a VPN, and how?
While a VPN provides significant privacy protection, your ISP still can track your VPN use to some extent, including: 1. VPN connection status Your ISP can identify that you’re using a VPN because your traffic flows to an unfamiliar IP address (the VPN server) instead of directly to websites. This creates a recognizable pattern that indicates VPN usage. What this means: Your ISP knows you’re using privacy tools, but cannot see what you’re doing with them. 2. VPN server IP address When you connect to a VPN, your ISP sees all your traffic going to a single IP address — the VPN server. This is different from normal browsing where traffic would go to multiple different website servers. What this means: ISPs can identify the VPN service you’re using by comparing destination IPs against VPN server databases. Privacy impact: Low — only confirms VPN use, doesn’t reveal browsing activity. 3. VPN protocol information Different VPN protocols use specific network ports, creating identifiable traffic patterns that ISPs can recognize:
What this means: ISPs can identify which VPN technology you’re using by way of monitoring traffic on VPN-associated ports. Privacy impact: Minimal — identifies VPN type but not content. 4. Connection timestamps and duration Your ISP can see when you start and stop your VPN connection, plus how long you stay connected. This is the same information they collect about all your internet usage. What this means: ISPs know your general usage patterns but cannot correlate this with specific online activities. 5. Bandwidth usage patterns ISPs can monitor how much data you transfer and make educated guesses about your activities (streaming uses more data than browsing), but they cannot see the actual content. What this means: ISPs might suspect you’re streaming or downloading large files, but they cannot identify specific content or sources. 6. VPN encryption fingerprints ISPs can analyze the structure of your encrypted traffic to identify VPN usage, even when VPN traffic uses common ports like 443 (HTTPS) What this means: Advanced ISPs use Deep Packet Inspection methods to analyze traffic patterns and identify encrypted VPN tunnels, even when using common ports like 443 (HTTPS). Privacy impact: None for quality VPNs — content remains encrypted.
Maximizing your privacy: best practices
In order to ensure your VPN provides maximum protection from ISP surveillance: Choose quality VPN providers
Optimal configuration
Additional privacy layers:
VPN alternatives: how they compare
Other privacy tools can also improve your online safety, but the level of ISP protection they offer varies, and so do the trade-offs. Tor Browser How it works: Routes traffic through three encrypted relays before reaching destination websites. ISP visibility: ISPs can see Tor usage but not destinations or content. ![]() Proxy servers How it works: Routes traffic through a single proxy server without encryption. ISP visibility: ISPs can typically see most proxy traffic and activities. ![]()
Free VPNs: why they’re not recommended
Free VPNs seem attractive but, as we outline in the free VPNs vs. paid VPNs article, the free options come with significant privacy and security risks:
Paid VPN services like Surfshark invest in proper security, don’t sell user data, and provide reliable performance.
Regional considerations: when ISPs care about VPN use
ISP attitudes toward VPN usage vary significantly by location and local regulations (see: Are VPNs legal?). VPN-friendly regions (the United States, Europe, Canada, Australia):
Restricted regions (VPN in China, Russia, Iran, the UAE):
Troubleshooting ISP-related VPN issues
When ISPs actively interfere with VPN connections, there are still things you can try to restore reliable access. Common problems and solutions include: Connection blocking If an ISP blocks known VPN server IP addresses:
Speed throttling If an ISP deliberately slows VPN traffic:
Connection instability In case of frequent disconnections or unreliable VPN performance:
Round-up: what your ISP sees
![]()
Conclusion: Keep your data to yourself, not your ISP
Your ISP can detect when you’re using a VPN, but that’s where their insight ends. The encrypted tunnel created by a quality VPN service effectively blinds your ISP to your actual online activities, protecting your browsing history, downloads, searches, and personal information. In an era where ISPs can legally monitor, collect, and even sell your browsing data in many regions, a VPN provides essential protection. Choose a reputable provider with strong encryption, verified no-logs policies, and additional privacy features to ensure your online activities remain private from ISP surveillance. MORE Info HERE Data and info derived / lifted from Surfshark with permission |