Indeed, it doesn’t keep any logs whatsoever and as for connection protocols, it permits you to use OpenVPN, IKEv2, and socks on all your units. While what can make it a terrific privateness Software is its “stealth method”. It’s a far more Superior tunnelling protocol ( It much too http://manueljdtjz.jiliblog.com/26113204/the-cisco-systems-vpn-client-diaries