We do not store any logs that would allow us or third parties to associate an IP address in a specific period of time with the user of our service. The only data we store is e-mail and username, but it's impossible to connect the user's activity on the Internet with a specific user of our service.
We are not under any jurisdiction. There are no circumstances that would make us provide information about our users. If the law forces us to do this, we will move our business to a country where this will not work, and if this does not work, we will simply close before we provide any information.
We can not comply with the DMCA, because we simply do not have the opportunity to do something with our users. Since we do not have logs, we can not associate them with users for the response.
Now we accept payments through Bitcoin, Perfect Money, Webmoney, EgoPay and InterKass. We create a unique key for the transaction to make sure that the payment for the account has passed. After that, we delete the key, so that the payment can not be associated with a particular IP. In addition, we would like to persuade our users to use anonymous e-mail and payment through Bitcoin to provide an even higher level of anonymity. We keep the minimum information about the user that is required for payment.
No, in case of simultaneous connection. If you connect at the same time, the server automatically disconnects one of the connections. But if you have a computer network, you can connect to a VPN server from a single server computer, and the rest of the computers can simply access the Internet through a server computer. Or configure the connection to the VPN server through your router (if it supports the VPN session).
It is strictly prohibited to use our servers for illegal purposes. this facilitates the receipt of complaints about our servers, and as a result, they will be disabled. This will make it difficult to provide quality services to our customers. We advise you to carefully read paragraph 2.2.7 of the "User Agreement", if you do not comply with these rules, the service has the right to refuse service without refund and further access.
You have the right to choose any server and IP address within your tariff, you can change the server and IP addresses as much as you want, it will always be free.
OpenVPN is a free implementation of open source VPN technology to create encrypted point-to-point or server-to-client channels between computers. It allows you to establish connections between computers behind the NAT-firewall, without having to change their settings. OpenVPN was created by James Yonan and distributed under the GNU GPL license. PPTP (Point-to-Point Tunneling Protocol) is a point-to-point tunnel protocol that allows a computer to establish a secure connection to the server by creating a special tunnel in a standard, unprotected network. PPTP puts (encapsulates) PPP frames into IP packets for transmission over a global IP network, such as the Internet. PPTP can also be used to organize a tunnel between two local networks. PPTP uses an additional TCP connection to maintain the tunnel. L2TP / IPsec - L2TP over IPsec is a more secure extension of the PPTP protocol. It is integrated into all modern operating systems and VPN-compatible devices, and can also be configured as easily as PPTP (usually the same client is used). Maybe a little slower than PPTP. It may not work correctly for NAT. Connections to the Internet that have a "white", a real IP address (depending on how the provider issues), L2TP does not know the problems.
TCP — is a "guaranteed" transport mechanism with a pre-established connection, which provides the application with a reliable data stream that gives confidence in the accuracy of the data it receives, relays data in the event of a loss, and eliminates duplication of data. TCP allows you to regulate the load on the network, as well as reduce the waiting time for data transmission over long distances. Moreover, TCP ensures that the received data has been sent exactly in the same sequence. This is its main difference from UDP. UDP — is a protocol for transmitting datagrams without establishing a connection. It is also called the protocol of "unreliable" transmission, in the sense that it is impossible to verify the delivery of the message to the recipient, as well as possible mixing of the packages. In applications that require guaranteed data transmission, the TCP protocol is used. UDP is commonly used in applications such as streaming video and computer games where packet loss is allowed, and re-querying is difficult or not justified, or in applications of the request-response type (for example, DNS queries) where connection creation takes more resources than Resending.
RSA-TLSv1, cipher TLSv1 / SSLv3 DHE-RSA-AES256-SHA, 4096 bit
ECC - TLSv1.2, cipher TLSv1 / SSLv3 ECDHE-ECDSA-AES256-GCM, 384 bit
ECC (Elliptic Curve Cryptography) is one of the most powerful encryption algorithms, which is much more crypto-resistant than RSA, and is also less demanding on hardware. We use the most reliable formula of the secp256k1 curve, and instead of the usual DHE, we began to use ECDHE (Elliptic Curve Diffie-Hellman with Forward Secrecy).
Wikipedia:
ECC (Elliptic Curve Cryptography) Asymmetric cryptography is based on the complexity of solving some mathematical problems. Early public-key cryptosystems, such as the RSA algorithm, are crypto-resistant due to the fact that it is difficult to decompose a composite number into prime factors. When using algorithms on elliptic curves, it is assumed that there are no subexponential algorithms for solving the discrete logarithm problem in groups of their points. In this case, the order of the group of points of the elliptic curve determines the complexity of the problem. It is believed that to achieve the same level of cryptographic stability as in RSA, groups of lower orders are required, which reduces the costs of storing and transmitting information. For example, at the RSA 2005 conference, the National Security Agency announced the creation of the "Suite B", which uses exclusively algorithms for elliptical cryptography, and only 384-bit keys are used to protect information classified to "Top Secret".


Tor v3
@FVPNS

82822222
EN
RU





