visit
Note, that it is free to use and an open-source project (the source code can be found ).
The VPN encrypts data and disables the ability of 3 parties to collect personal information based on the user’s IP address. However, the question arises — which VPN service is worth using and which not. Before choosing one, you need to know some facts: As the VPN acts as an Internet provider, it means that they see all your unencrypted data (or logs). Many VPNs collect this data and sell it; VPN services are constantly faced with leaks and hacks. For example, see the last NordVPN hack. A lot of VPN services are built on an outdated technology stack with a large number of known vulnerabilities. If you want to learn more about problems of the Internet freedom and VPNs, check out this article.
How does it work?
Users are motivated to launch and maintain output nodes due to economic mechanisms implemented into the network design. However, nodes can be launched by anyone, including VPN providers already operating in the market. In the future, we assume that the network will act as an integration tool for VPN providers, offering high connection speed and a wide selection of locations of output servers without tracking and logging. It is important to note, that the node holder creates a whitelist of the resources to which he wants to allow access via his node. One of the main features of the network is that acceptance of payments and traffic redirection is spread between completely different network actors. This point allows us to have a simple scheme to use the service for ordinary “not-geek people” (login, password, payment by card), and at the same time, it prevents nodes/servers from identifying traffic of a specific user.
At first, you need to register on the website — and click the confirmation link in you e-mail.
Then, join our Telegram group for KELVPN beta-testers:
Download the application:
If you need detailed instruction, check this page:
Where can you find log files;
Additionally, there is a feature, which is called a Smart traffic routing algorithm. It allows you to make requests to the web (and transfer data) using the most efficient way possible (still in development).
We hope, that appearance of decentralized private networks (dVPNs) will make the Internet safer and more private. So, we invite all of you to participate in this beta test and share your thoughts with us.
Disclaimer: I have a vested interest in Cellframe, taking the Head of Research position in the company. The dVPN project KELVPN is a subsidiary project of Cellframe.