PROPRIETARY VPN
VIRTUAL PRIVATE NETWORK (VPN)
• The VPN is a proprietary, uniquely engineered network infrastructure that is embedded in three independent
cyber secure products and two independent obfuscated networks.
Secure Cyber Products
• Secure Phone (Secure/Encrypted Smartphone Communication)
• Desktop, Laptops, Tablet devices
• Bootable Encrypted TD Linux, Windows– with VPN & VOIP features based on a non-attributable VPS
Secure Obfuscated Networks
• InvisiLink – Randomized, Global, dynamic, non-attributable, “one way swim” secure VPN infrastructure
• Invisi VPN Client – Global, Dynamic Non-attributable, doubled hop with Randomized Entry Node and
Selected Exit Node secure VPN infrastructure
PROPRIETARY VPN VS. COMMERCIAL VPN
Proprietary VPN • The Internet traffic is routed through an untraceable IP address that is not shared by no one else and the client has access to the VPS server and logs. • It operates on a different socket scheme that does NOT reveal standard VPN signatures. • The VPS’s/VPN’s infrastructure is designed and configured based on the highest security standards implementation, with multiple layers of protection and Intrusion Detection System (IDS) in place. • The platform is designed to erase all the logs of activities, with no extra ports or services running within the Virtual Private Server. • The servers could only be accessed through a unique SSH key, 128 bits long through a virtual machine with a proprietary VPN. • The engineering of the VPN platform has unique characteristics centered on a randomization algorithm that initiates a connection via a .ovpn certificate through a proxy based on a private IP scheme on a random port; therefore, the public IP of the transiting servers are never be exposed. The first VPN hop initiation triggers a randomization protocol and then every http/https request initiates the next VPN hop in a Round Robin scheme.
Commercial VPN • IP’s are known IP’s that are associated with the VPN Server Providers, possible to deny VPN connectivity or hacking. • Known VPN sockets, which will be blocked in some countries. • It is possible that a number of users can use the same IP scheme. • NO access or control of the servers. Clients are unable to access the server to verify there “Strict no logs policy”. • Private information are logged on the Provider’s server.
