Available in our Bundeled Plans!
We built Our VPN with extra security features to make it better at protecting your privacy than an ordinary VPN.
When you use Our VPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, Our VPN’s advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access websites that might be blocked in your country.
Our VPN’s Secure Core architecture gives our secure VPN service the unique ability to defend against network-based attacks. Secure Core protects your connection by routing your traffic through multiple servers before leaving our network. This means an advanced adversary who can monitor the network traffic at the exit server will not be able to discover the true IP address of Our VPN users, nor match browsing activity to that IP.
Secure core servers are located in hardened data centers in Switzerland, Iceland, and Sweden, protected by strong privacy laws, and operated on our own dedicated networks.
We use only the highest strength encryption to protect your Internet connection. This means all your network traffic is encrypted with AES-256, key exchange is done with 4096-bit RSA, and HMAC with SHA384 is used for message authentication.
We have carefully selected our encryption cipher suites to only include ones that have Perfect Forward Secrecy. This means that your encrypted traffic cannot be captured and decrypted later if the encryption key from a subsequent session gets compromised. With each connection, we generate a new encryption key, so a key is never used for more than one session.
We use only VPN protocols which are known to be secure – IKEv2/IPSec and OpenVPN. Our VPN does not have any servers that support PPTP and L2TP/IPSec, even though they are less costly to operate. By using our VPN, you can be confident that your VPN tunnel is protected by the most reliable protocol.
Although virtually no personally identifiable data is stored on them anyway, all Our VPN servers are protected by full disk encryption. This helps secure them from resource-intensive man-in-the-middle attacks of the kind that can be performed by governments. Full disk encryption secures server certificates and all other configurations and software stored on an exit server, so that even if the server is somehow compromised, attackers would not be able to access any data stored on it.