Security & Technical Details
Transparent information about our encryption, protocols, and security practices
Our Security Features
Military-grade encryption and advanced protection protocols
Encryption Standards
Algorithm: AES-256-GCM
Key Exchange: Elliptic Curve Diffie-Hellman (ECDH)
Authentication: SHA-256
Military-grade encryption that secures your data against known and theoretical attacks.
VPN Protocols
OpenVPN: Battle-tested, widely compatible
IKEv2/IPSec: Mobile-optimized
Multiple protocol options for maximum compatibility and performance.
DNS Leak Protection
DNS Leak Blocking: Prevents ISP tracking
WebRTC Protection: Blocks real IP leaks
Advanced leak protection ensures your true identity remains hidden while using our VPN.
No-Logs Policy
Zero Activity Logging: We don't store any logs
Transparent Privacy: Your data stays yours alone
We maintain a strict no-logs policy - we don't collect, store, or sell your data.