![]() DNS leak protection and IPv6 leak protection ensure that your data is always routed through our servers and never to a third party, for example. Our apps offer several additional security features to ensure your safety on the internet. Keys are also rotated regularly within each session Forward secrecy generates new keys for each VPN session, so even if one session is somehow compromised, no others are.There are no known methods to defeat RSA when used with a 4096-bit key size. RSA-4096 is a cipher that secures the TLS key exchange used to establish a secure connection between your device and our VPN servers.It is used by the US government to secure top secret information. AES-256 is an NIST-approved cipher that protects your actual data.Our apps use OpenVPN and IKEv2 because they are secure VPN protocols, and we implement them at their strongest encryption settings.įor example, both OpenVPN and IKEv2 use the following security features:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |