What is VPN encryption?

You have the right to privacy

You have the right to privacy

You have the right to privacy
Enter the secure VPN tunnel
Solution to unsafe HTTP websites
All your activities turned private
Enter the secure VPN tunnel
Solution to unsafe HTTP websites
All your activities turned private
Enter the secure VPN tunnel
Solution to unsafe HTTP websites
All your activities turned private
Encryption is confusing. How does it all work?
1. Tunneling
2. Encryption
3. Safe delivery
1. Tunneling
2. Encryption
3. Safe delivery
1. Tunneling
2. Encryption
3. Safe delivery
Our encryption standards

VPN protocols

VPN protocols

VPN protocols
WireGuard®
Read more
IKEv2/IPSec
WireGuard®
Read more
IKEv2/IPSec
WireGuard®
Read more
IKEv2/IPSec

Form of encryption

Form of encryption

Form of encryption
ChaCha20-Poly1305
AES-256
ChaCha20-Poly1305
AES-256
ChaCha20-Poly1305
AES-256

Hash algorithms and PFS

Hash algorithms and PFS

Hash algorithms and PFS
BLAKE2s
SHA-384
BLAKE2s
SHA-384
BLAKE2s
SHA-384
Perfect forward secrecy
Read more
Noise framework forward secrecy
Perfect forward secrecy
Read more
Noise framework forward secrecy
Perfect forward secrecy
Read more
Noise framework forward secrecy

Why encrypt internet traffic?

Why encrypt internet traffic?

Why encrypt internet traffic?
Free yourself from digital surveillance

Advertisers
The digital ad ecosystem makes it possible for advertisers to know you better than your family members.

Internet Service Providers
ISPs can theoretically collect a treasure trove of user data. Some companies can also monetize it.

Law enforcement agencies
Online tracking and surveillance can play a huge role in responding, detecting, and preventing crime.

Governments
Some countries strictly control and censor the internet, often blocking content deemed unsuitable.

Hackers
Perpetrators use various techniques for intercepting users’ requests to steal sensitive information.

Advertisers
The digital ad ecosystem makes it possible for advertisers to know you better than your family members.

Internet Service Providers
ISPs can theoretically collect a treasure trove of user data. Some companies can also monetize it.

Law enforcement agencies
Online tracking and surveillance can play a huge role in responding, detecting, and preventing crime.

Governments
Some countries strictly control and censor the internet, often blocking content deemed unsuitable.

Hackers
Perpetrators use various techniques for intercepting users’ requests to steal sensitive information.