VPN Docs Overview
Start Here to Understand
These are links to the docs. Click the article.
Why & How
Start Here:
Fast Overview: They are Coming for Your Data
Big Tech is selling your sensitive data, and here’s how to defend yourself. 5-minute read
The Epic Pitch: How and Why this VPN exists
This covers the suppressed truth on surveillance, and how it can be solved. 20-minute read
Video Version: Everything You Know About VPNs is a Lie
This is the video version of the above article “How and Why this VPN exists” on this project’s mission. 6-minute Video
Masked Transit: NSA Taps Ocean Cables, So Our VPN Splits Traffic
This explains how and why we use a Double Layer Approach. Formats: Article, Video, & Podcast
Instructions To Use
Note: You probably will be able to “just figure it out” from using it for 5 minutes. But if you are the kind of person to read the manual, here it is:
Install & Download
How to Download and Install it.
How to Make a Browser-Only Profile
Step-by-step picture and/or video guide to making an isolated browser fingerprint (for WireGuard). Format: Video & Article
Hide Tor: How to Make a Tor-to->Proxy Profile
What you need to know about making profiles to hide Tor use, with isolated fingerprints. Format: Video & Article
Docs (Behind the Tech)
Note: You don’t need to read this stuff to use it. It’s like driving a car, where you can just hop in. But if you want to know how it works under the hood, here it is:
What do you mean by “Isolated Encrypted Proxies”?
Float like a Proxy Butterfly, But Sting like a Virtual-Machine Bee.
Podcast: Blueprints to Beat Surveillance
Get the tech spoon-fed to you in an easy format. This is the podcast format for our documentation on “Isolated Encrypted Proxies” and “Browsers?! Linux Distros are Negligent”. Format: Audio Download or Podcast RSS
Browsers?! Linux Distros are Negligent!
When it comes to distributing web browsers, Linux distros suck! Learn how our system solves this problem.
How do Socks5 proxies Work?
How can you evade Tor or VPN bans? What is the difference between a VPN and a Proxy?
What this Solves
Podcast: Browser Fingerprints: The Cancer of VPNs
Learn How Large International Corporations Share & Collect Your Data. Why is Mullvad Browser Flawed? Format: Audio Download or Podcast RSS
Why Cloudflare Sucks
If you are not familiar with how Cloudflare works, and why it is a threat to privacy.
Code
How to Run it From Source
Our System maximizes your freedom by empowering you to run it directly from the Python Code, without compiling it. The code is copyleft GNU/GPLv3. While the art, logo, and graphical designs are copyright protected.
Logistical & Legal
FAQ
Frequently asked Questions regarding the Company, WireGuard keys, terms, Android, and other questions.
Terms of Service
You must follow the laws of the country the IP address is in. Please review our policies.
Legal
We respond to DDoS and some copyright infringement requests. Please review our policies.