Privacy isn’t a luxury; it’s an inalienable human right.
Have a true Internet freedom.
We don’t use servers as ordinary VPN services do. KelVPN is based on disseminated nodes that can locate anywhere. Our nodes may be on a notebook, a private server, a smartphone. It makes us very flexible – if your current node has problems you may change it immediately. As well as you can choose the nearest node with the highest speed.
Advanced routing algorithm can make your Internet connection even faster. The shortest is not always the fastest
How does your VPN differ from other well-known brands, many of which are free?
Well-known brands have been on the market for many years. During this time, they were inevitably compromised. There is no doubt paid VPNs share traffic data with the relevant government services. Free VPNs sell user data to all interested parties and profit from this. People who are seriously concerned about their security and anonymity don’t use the market leaders. Our VPN is intended for a small audience – true connoisseurs of network security and anonymity. Our advantages are blockchain architecture and modern post-quantum encryption, which guarantee the full anonymity and high-level security of users.
Blockchain is just for PR. How do you really differ from Tor and other decentralized networks?
Blockchain plays a key role in our VPN. Indeed, there are other decentralized networks, including Tor and I2P. Our blockchain is closer to the Bitcoin network in terms of decentralization. More accurately, our blockchain is a hybrid of Orchid, Cosmos, and EOS, but without smart contracts. However, with smart transactions and blockchain services, one of which is KelVPN. All KelVPN servers communicate with each other via blockchain and distributed hash tables – DHT. The blockchain allows you to optimally redirect traffic between servers and obfuscate it.
Can someone find out what I was doing on the Internet?
This is extremely unlikely. In our VPN, entry points and users are separated from each other. In other words, users’ IPs are separated from traffic, which is extremely difficult to analyze. And this complexity of traffic analysis will increase along with the growth of the VPN network. To decrypt such traffic, synchronous efforts of the security services of several countries are needed. This situation is hardly possible.
What data do you collect about users?
我们是一家私营Demlabs Ltd初创企业。我们对量子物理和互联网安全很感兴趣。当维基百科在土耳其被封锁时，我们采取了行动。我们创造了一种帮助人们维护信息自由的工具。它是 Cellframe —后量子加密的区块链协议。这项技术是KelVPN的核心。
你可以通过邮件联系我们: email@example.com. 如果你想了解更多关于Cellframe的信息, 看看我们的Telegram(电报)。
It is decentralized. Unlike other VPNs, it doesn’t have a central point of control. KelVPN combines the traffic of many servers that have become nodes. All your traffic is distributed between different nodes of the network to provide you with the best speed. This also means that decentralized KelVPN cannot collect logs, spy or sell your data.