Our infrastructure is totally agnostic and we do not even check traffic to see which protocols are becoming made use of.
7. We settle for Bitcoin, a extensive array of cryptocurrencies, PayPal and significant credit rating cards. About PayPal and credit playing cards, the common information pertaining to the transaction and account/credit history card holder are retained by the economical establishments, and it is achievable to correlate a payment to a person (which is fantastic for refund purposes when required).
When this is unacceptable for security reasons, then Bitcoin or some other cryptocoin really should be used. Bitcoin is not anonymous by itself, but it can be presented with a rather https://vpn-server.net/keepsolid-vpn-review/ superior anonymity layer basically by managing the Bitcoin consumer behind Tor. On leading of that we also accept some cryptocurrency which offers intrinsically and by default a strong anonymity layer guarding the transactions. 8.
VPN expert services: what can I use them for?
We would endorse our setup which incorporates Best Ahead Secrecy, 4096 bit RSA keys, 4096 little bit Diffie-Hellman keys and authentication on each sides not dependent on username/password. In general, we would also advise to be cautious and get effectively documented in advance of leaping to ECC.
Our support set up, based on OpenVPN, is the subsequent:DATA CHANNEL CIPHERS AES-256-CBC with HMAC-SHA1 for authentication. CONTROL CHANNEL CIPHERS AES-256-GCM with HMAC-SHA384 for authentication AES-256-CBC with HMAC-SHA1 for authentication. 4096 little bit Diffie-Hellman keys measurement TLS Ciphers (IANA names): TLS-DHE-RSA-WITH-AES-256-CBC-SHA, TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 TLS added authorization layer essential: 2048 little bit Best Ahead Secrecy through Diffie-Hellman key trade DHE. Soon after the original vital negotiation, re-keying is carried out every single sixty minutes (this benefit can be reduced unilaterally by the customer)9 and 10) Our cost-free and open resource computer software “Eddie” (introduced beneath GPLv3) for GNU/Linux, Home windows, OS X and MacOS, implements attributes which reduce the standard DNS leaks in Home windows and any other leak (for instance in circumstance of unpredicted VPN disconnection). Leaks prevention, termed “Network Lock”, is not a trivial eliminate-switch, but it helps prevent various leaks that a classical kill change cannot block: leaks caused by WebRTC, by applications binding to all interfaces on a misconfigured technique and by malevolent program which attempts to identify the “genuine” IP handle.
We block outbound IPv6 packets at the moment on customer facet (a remedy chosen over disabling IPv6, which remains in any case an optional element). In 2016 we planned IPv6 support for 50 percent or late 2017 and at the moment we are fine with this deadline. We deliver guides, based on firewalls and not, to reduce leaks on several programs for all those individuals who won’t be able to or never want to use our shopper application Eddie.
11. Our servers are housed in information centers which we have physical obtain to, offered that the access is arranged perfectly in advance for security reasons.
Obtain to servers is also assured to the information heart technicians, for any need of on-internet site aid. 12. We have servers found in several countries.