How the VPN Service works

What the VPN does

A VPN tunnel ‘wraps’ the data that leaves your computer in a shielded ‘bubble’ and sends it to a remote server outside of the open network that you are on. This allows you to send your data, in total privacy, across the network–even on networks with thousands of users whose data is shared and open. In addition to securing your connection the Personal VPN unblocks YouTube, unblocks Facebook and all other sites often censored in many countries.

How we accomplish this

We do this through a VPN tunnel — an ultra secure, highly-encrypted connection between two computers. The secure tunnel is used to send all of your data, encrypted, through the local network connection. This is the same high-grade encryption that governments, banks and credit card companies use to process transactions. You no longer have to worry about anyone reading your email, watching where you go, picking up your passwords or recording your personal information.

Our Personal VPN servers

Our servers are hosted at some of the largest data centers in the world –located in America, Central or South America, Canada, Africa, Europe, Australia and Asia. They are extremely reliable and fault tolerant. We operate hundreds of servers, isolated from each other, to provide this fault tolerant security. If a data center were to go down, other servers in different centers would still be up to handle the traffic.

All of your data travels, encrypted, from your computer directly to our secure servers. From there, it is forwarded to its final destination across the Internet. Nobody, including us, can see your data on the secure connection. Our Personal VPN service uses OpenVPN, a time tested and secure open source VPN client. We also offer PPTP and L2TP VPN service for legacy applications on devices that support it.


Our main servers run on the UDP Internet protocol. This protocol is very efficient for creating a VPN tunnel and for handling time-sensitive traffic such as IP phone calls. This is the default configuration for our clients. Some ISPs block UDP, for various reasons. We also offer TCP-based connections on all of our servers as a backup method to make the VPN connection.

Maximum Strength Encryption

All of our servers operate 256 bit AES encryption, SHA512 hash, TLS AES 256 and 4096 bit RSA. The OpenVPN implementation we use  provides perfect forward secrecy to insure your data remains secure over time.

Stealth SSL VPN

Some highly restricted networks block nearly all VPN activity. For this type of situation, we offer the Stealth SSL VPN service. The stealth scramble service looks like a regular, secure web page when it connects. Just about every network allows this traffic. Because of this, the Stealth SSL service can get through where others cannot. The IP address of this service changes often, making it even more difficult to block by restricting the IP address of the server.

Stunnel OpenVPN over SSL

All of our OpenVPN servers allow for a connection over SSL using Stunnel to obfuscate the connection and make it appear to be normal https web traffic.