Anonymity, reliability, security

KelVPN is a decentralized, quantum-resistant VPN
service that provides the highest level of protection
for your network connection, including protection
from quantum threats.

stone-one
KelVPN mobile app
stone-two

We do not collect any personal information about users.

What is a VPN?

Secure with a VPN connection

Security with VPN

The term VPN (virtual private network) refers to a set of mechanisms used for secure data transmission and privacy protection on the Internet. VPN services act as intermediaries between users and the online environment. They provide secure channels for transmitting information, encrypt data using special cryptographic protocols, and mask device IP addresses.

Empowerment

How does VPN empower?

VPN services help users protect themselves from various cyber threats when using open Wi-Fi networks in public places, and they also help bypass geographical and censorship restrictions, opening access to content from anywhere in the world.

Decentralized VPN

A decentralized VPN is an innovative approach to ensuring security and privacy on the internet. Unlike traditional VPNs, this approach avoids the need for a single central server to process all internet traffic. Instead, the network consists of multiple nodes (peers) that interact directly with each other, providing users with a secure and anonymous connection to the Internet.

The absence of a single distribution center in a decentralized VPN guarantees a higher level of security because eavesdropping or tracking user activity often occurs through a central server. Additionally, a decentralized VPN is more resistant to attacks and blockages as it has no single point of failure. This makes it attractive for use in countries where internet censorship is practiced or in situations where connection reliability is critical.

Decentralized VPN - KelVPN

Installation instructions

KelVPN is a decentralized VPN service that provides quantum-resistant protection for your internet connection. Here's how to get started quickly and easily:

Download VPN

Step 1

Download VPN for your platform.

Install the app

Step 2

Install the app on your device.

Purchase access key

Step 3

Purchase an access key.

Connect to server

Step 4

Choose the country and server.

Who we are

KelVPN is part of the quantum-secure Cellframe Network ecosystem, which supports various decentralized services using blockchain technologies. KelVPN has its own blockchain network and its own KEL token, which is traded on the popular crypto exchanges UniSwap and PancakeSwap. KelVPN nodes are responsible not only for validating transactions on the blockchain, but can also act as VPN providers and earn income by providing the service.

Who we are

Become a KelVPN provider

The technical requirements for nodes are minimal. To become a provider, a user needs to fulfill a few simple conditions. First of all, they need to ensure a stable internet connection with their device, then purchase and lock KEL tokens in a stake, and finally download and configure special software developed by the project team.

Learn more
How to become a KelVPN provider

VPN for different platforms

Currently, the VPN works on 4 platforms, and separate development is underway for iOS.

Download the app for different platforms

KelVPN advantages

One hundred percent anonymity

100% anonymity

The service is built on a distributed model. KelVPN blockchain nodes act as VPN access points. The blockchain-based architecture of the service does not technically allow for the collection and storage of user data. Thanks to this, your privacy always remains reliably protected.

Unique VPN protocol

Unique VPN protocol

To connect the user's device to a VPN server, we use our own DAP SDK protocol, which is encrypted under the standard HTTP protocol and, if necessary, can be wrapped in any other. This provides maximum flexibility and compatibility with various networks, ensuring a stable and secure connection under any conditions.

Highest level of security

Highest level of security

We guarantee protection against any cyber threats, including quantum computer attacks. We use the post-quantum digital signature algorithm CRYSTALS-Dilithium to protect data, and the quantum-safe Kyber 512 protocol for secure key exchange. According to National Institute of Standards and Technology (NIST) forecasts, these mechanisms will only become the generally accepted security standard five years from now, but they are already protecting KelVPN user data today.

Unlimited access to online resources

Unrestricted access to online resources

KelVPN erases cyber borders and gives users freedom of action in the internet space. We provide access to any internet resources from anywhere in the world, regardless of geographical and censorship barriers. Thanks to this technology, VPN users get full access to information and entertainment, regardless of location.

Maximum high connection speed

Maximum connection speed

The distributed model of the service provides multiple VPN servers around the world. Anyone can launch our master node and become a VPN provider, and the user only needs to select the nearest access point. This mechanism significantly increases the connection speed, reducing the "last mile".

Convenience of payment

Payment convenience

For your convenience, we have provided various payment options for the VPN service subscription. Choose the one that suits you best. You can pay for VPN services using KEL tokens - the native currency of the KelVPN project's blockchain network.

Transparent price

In 3 steps you have
  • Decentralized service
  • Purchase and usage, protected from de-anonymization
  • Quantum-resistant encryption

FAQ

Why should I use a VPN?

A VPN enhances your personal security and privacy online. It can also help bypass various types of blockages related to geographical location or censorship restrictions.

Why is a paid VPN better than a free VPN?

Free VPN services are significantly inferior to paid ones in terms of reliability and security. They may have serious limitations on connection speed, traffic quality, number of servers, and overall functionality. Therefore, experts recommend choosing paid VPN services to ensure an adequate level of security and ease of use.

On which devices can I install the VPN application?

Currently, KelVPN is supported on all popular desktop platforms: Windows, Linux, and MacOS. For mobile devices, the Android version has already been implemented, and the iOS version is under development.

Which versions of Windows does your VPN support?

KelVPN is available for Windows 7/8/8.1/10/11.

Which versions of Linux does your VPN support?

KelVPN runs on Ubuntu 20+ and Debian 10+.

Which versions of Mac OS does your VPN support?

Mac OS 11 and higher are supported.

Which versions of Android does your VPN support?

Devices with Android 8 and higher are supported.

Does VPN slow down the connection speed?

Internet speed may slightly decrease when using a VPN due to additional data encryption and routing through remote servers. However, our VPN service ensures minimal speed loss by utilizing a distributed model and reducing the "last mile" between the provider and the user.

How can I ensure security when using public Wi-Fi networks?

Use the KelVPN client. It will protect your data from being tracked at the level of intermediate network nodes (including Wi-Fi hotspots, routers, and providers) and also help hide your real IP address.

What user data does the VPN store?

We do not collect any personal information about users and do not use cookies. You don't even need a traditional password or email login to connect to our VPN service.

Can I use a VPN in a country where access to certain websites and services is prohibited?

Yes, KelVPN allows you to bypass various types of blockages, providing free access to the internet even in countries with strict censorship policies.