What is VPN encryption?
You have the right to privacy
You have the right to privacy
You have the right to privacy
Enter the secure VPN tunnel
Solution to unsafe HTTP websites
All your activities turned private
Enter the secure VPN tunnel
Solution to unsafe HTTP websites
All your activities turned private
Enter the secure VPN tunnel
Solution to unsafe HTTP websites
All your activities turned private
Encryption is confusing. How does it all work?
1. Tunneling
2. Encryption
3. Safe delivery
1. Tunneling
2. Encryption
3. Safe delivery
1. Tunneling
2. Encryption
3. Safe delivery
Our encryption standards
VPN protocols
VPN protocols
VPN protocols
WireGuard®
Read more
IKEv2/IPSec
WireGuard®
Read more
IKEv2/IPSec
WireGuard®
Read more
IKEv2/IPSec
Form of encryption
Form of encryption
Form of encryption
ChaCha20-Poly1305
AES-256
ChaCha20-Poly1305
AES-256
ChaCha20-Poly1305
AES-256
Hash algorithms and PFS
Hash algorithms and PFS
Hash algorithms and PFS
BLAKE2s
SHA-384
BLAKE2s
SHA-384
BLAKE2s
SHA-384
Perfect forward secrecy
Read more
Noise framework forward secrecy
Perfect forward secrecy
Read more
Noise framework forward secrecy
Perfect forward secrecy
Read more
Noise framework forward secrecy
Why encrypt internet traffic?
Why encrypt internet traffic?
Why encrypt internet traffic?
Free yourself from digital surveillance
Advertisers
The digital ad ecosystem makes it possible for advertisers to know you better than your family members.
Internet Service Providers
ISPs can theoretically collect a treasure trove of user data. Some companies can also monetize it.
Law enforcement agencies
Online tracking and surveillance can play a huge role in responding, detecting, and preventing crime.
Governments
Some countries strictly control and censor the internet, often blocking content deemed unsuitable.
Hackers
Perpetrators use various techniques for intercepting users’ requests to steal sensitive information.
Advertisers
The digital ad ecosystem makes it possible for advertisers to know you better than your family members.
Internet Service Providers
ISPs can theoretically collect a treasure trove of user data. Some companies can also monetize it.
Law enforcement agencies
Online tracking and surveillance can play a huge role in responding, detecting, and preventing crime.
Governments
Some countries strictly control and censor the internet, often blocking content deemed unsuitable.
Hackers
Perpetrators use various techniques for intercepting users’ requests to steal sensitive information.
The digital ad ecosystem makes it possible for advertisers to know you better than your family members.