Security & Technical Details

Transparent information about our encryption, protocols, and security practices

Our Security Features

Military-grade encryption and advanced protection protocols

🔐

Encryption Standards

Algorithm: AES-256-GCM

Key Exchange: Elliptic Curve Diffie-Hellman (ECDH)

Authentication: SHA-256

Military-grade encryption that secures your data against known and theoretical attacks.

🛡

VPN Protocols

OpenVPN: Battle-tested, widely compatible

IKEv2/IPSec: Mobile-optimized

Multiple protocol options for maximum compatibility and performance.

🔒

DNS Leak Protection

DNS Leak Blocking: Prevents ISP tracking

WebRTC Protection: Blocks real IP leaks

Advanced leak protection ensures your true identity remains hidden while using our VPN.

No-Logs Policy

Zero Activity Logging: We don't store any logs

Transparent Privacy: Your data stays yours alone

We maintain a strict no-logs policy - we don't collect, store, or sell your data.