VPN Docs Overview

Start Here to Understand

VPN Docs Overview

These are links to the docs. Click the article.

Why & How


Start Here:

Fast Overview: They are Coming for Your Data

Big Tech is selling your sensitive data, and here’s how to defend yourself. 5-minute read

The Epic Pitch: How and Why this VPN exists

This covers the suppressed truth on surveillance, and how it can be solved. 20-minute read

Video Version: Everything You Know About VPNs is a Lie

This is the video version of the above article “How and Why this VPN exists” on this project’s mission. 6-minute Video

Masked Transit: NSA Taps Ocean Cables, So Our VPN Splits Traffic

This explains how and why we use a Double Layer Approach. Formats: Article, Video, & Podcast



Instructions To Use

Note: You probably will be able to “just figure it out” from using it for 5 minutes. But if you are the kind of person to read the manual, here it is:

Install & Download

How to Download and Install it.

How to Make a Browser-Only Profile

Step-by-step picture and/or video guide to making an isolated browser fingerprint (for WireGuard). Format: Video & Article

Hide Tor: How to Make a Tor-to->Proxy Profile

What you need to know about making profiles to hide Tor use, with isolated fingerprints. Format: Video & Article



Docs (Behind the Tech)

Note: You don’t need to read this stuff to use it. It’s like driving a car, where you can just hop in. But if you want to know how it works under the hood, here it is:

What do you mean by “Isolated Encrypted Proxies”?

Float like a Proxy Butterfly, But Sting like a Virtual-Machine Bee.

Podcast: Blueprints to Beat Surveillance

Get the tech spoon-fed to you in an easy format. This is the podcast format for our documentation on “Isolated Encrypted Proxies” and “Browsers?! Linux Distros are Negligent”. Format: Audio Download or Podcast RSS

Browsers?! Linux Distros are Negligent!

When it comes to distributing web browsers, Linux distros suck! Learn how our system solves this problem.

How do Socks5 proxies Work?

How can you evade Tor or VPN bans? What is the difference between a VPN and a Proxy?

What this Solves


Podcast: Browser Fingerprints: The Cancer of VPNs

Learn How Large International Corporations Share & Collect Your Data. Why is Mullvad Browser Flawed? Format: Audio Download or Podcast RSS

Why Cloudflare Sucks

If you are not familiar with how Cloudflare works, and why it is a threat to privacy.


Code


How to Run it From Source

Our System maximizes your freedom by empowering you to run it directly from the Python Code, without compiling it. The code is copyleft GNU/GPLv3. While the art, logo, and graphical designs are copyright protected.

Logistical & Legal


FAQ

Frequently asked Questions regarding the Company, WireGuard keys, terms, Android, and other questions.

Terms of Service

You must follow the laws of the country the IP address is in. Please review our policies.

Legal

We respond to DDoS and some copyright infringement requests. Please review our policies.


If you really want to learn and take your privacy to the next level, subscribe to our new content via: Session, Nostr, Bastyon, RSS, Ethereum Push

Related Posts