Return Home

VPN: The Reality Check

Encryption is mathematics, not magic. We believe in being honest about what our tools can and cannot do for you.

What We Protection Against

  • ISP Surveillance: Your Internet Provider cannot see which websites you visit or sell your history to advertisers.
  • Corporate Profiling: We prevent data brokers and ad-tech companies from building a persistent profile of your IP address.
  • Public Wi-Fi Spying: Hackers at coffee shops or airports cannot intercept your passwords or credit card data.
  • IP Tracking: Websites only see our server IP, not your home address.

What We Cannot Fix

  • Criminal Impunity: We are a privacy shield for citizens, not a haven for crime. We comply with valid legal warrants regarding account holders. Our Warrant Canary is a consumer protection tool to ensure transparency, not a warning system for bad actors. If you are looking to break the law, do not use our service.
  • Human Error: If you download a virus or give your password to a scammer, encryption cannot save you.
  • Logged In Identity: If you log into Facebook while using a VPN, Facebook still knows it's you.

Our Architecture

Why We Charge Money

If a VPN is free, you are the product.

Running high-speed, secure servers costs money. "Free" VPN providers often pay their bills by logging your traffic, packaging your browsing habits, and selling them to the exact advertising networks you are trying to avoid. They become the surveillance tool they promised to replace.

We charge a flat fee so we never have to look at your data. We cannot sell what we do not have. By paying us directly, you ensure that our loyalty is to you, not to third-party investors or data brokers.

🛑

Clean Network Policy

We use aggressive rate-limiting to prevent criminals from using our servers for Botnets. This ensures our IPs remain clean for legitimate users like you.

🔒

DNS over HTTPS

We encrypt your DNS queries using Cloudflare DoH. Even we cannot see which domains you are resolving. Your requests are blind to our system.

💾

Zero-Log Infrastructure

We keep your account active so you can connect, but we pipe all traffic logs to /dev/null. We have no history of your activity to hand over to anyone.

Identity Lifecycle

01

Secure Provisioning

When you sign up, our nodes generate unique cryptographic keys for your identity. These are stored locally in our encrypted database and synced with the WireGuard gateway. Once your TXID is verified, your tunnels go live.

02

Identity Hibernation

You are in control of your subscription. You can purchase one month of defense, let it expire, and return two months later to renew. During hibernation, your configurations remain saved but are automatically disabled at the node level.

03

Seamless Restoration

By logging in after an expiry, you are taken to the Restoration Gateway. Once a new renewal is verified, your existing configs are re-enabled instantly. No need to re-download profiles or re-configure your devices.

04

The Final Purge

To ensure node efficiency and metadata minimization, accounts that remain expired for more than 12 consecutive months are scheduled for a complete system purge. This action is irreversible.

System Retention Policy

Identities not renewed within 365 days of expiry are wiped from all nodes. This includes the deletion of your account, associated device profiles, and all cryptographic configuration text. We do not keep backups of purged data.