PROPRIETARY VPN

VIRTUAL PRIVATE NETWORK (VPN)
• The VPN is a proprietary, uniquely engineered network infrastructure that is embedded in three independent
cyber secure products and two independent obfuscated networks.
Secure Cyber Products
• Secure Phone (Secure/Encrypted Smartphone Communication)


• Desktop, Laptops, Tablet devices
• Bootable Encrypted TD Linux, Windows– with VPN & VOIP features based on a non-attributable VPS
Secure Obfuscated Networks
• InvisiLink – Randomized, Global, dynamic, non-attributable, “one way swim” secure VPN infrastructure


• Invisi VPN Client – Global, Dynamic Non-attributable, doubled hop with Randomized Entry Node and
Selected Exit Node secure VPN infrastructure

PROPRIETARY VPN VS. COMMERCIAL VPN

Proprietary VPN
• The Internet traffic 
is routed through an 
untraceable IP address 
that is not shared by
no one else and 
the client has access 
to the VPS server and logs.
• It operates on a different 
socket scheme that does NOT 
reveal standard VPN
signatures.
• The VPS’s/VPN’s 
infrastructure is designed 
and configured based on the 
highest
security standards 
implementation, 
with multiple layers 
of protection 
and Intrusion
Detection System (IDS) 
in place.
• The platform is designed 
to erase all the logs 
of activities, with no 
extra ports or
services running within 
the Virtual Private Server.
• The servers could only 
be accessed through 
a unique SSH key, 
128 bits long through a
virtual machine with 
a proprietary VPN.
• The engineering of 
the VPN platform has 
unique 
characteristics 
centered on a
randomization algorithm 
that 
initiates a connection 
via a .ovpn certificate 
through a
proxy based on a 
private IP 
scheme on a random port; 
therefore, the public IP 
of the
transiting servers are 
never be exposed. The 
first VPN hop initiation 
triggers a
randomization protocol
and then every http/https 
request initiates the 
next VPN hop
in a Round Robin scheme.
Commercial VPN
• IP’s are known IP’s that are associated with
the VPN Server Providers, possible to deny
VPN connectivity or hacking.
• Known VPN sockets, which will be blocked
in some countries.
• It is possible that a 
number of users can use
the same IP scheme.
• NO access or control of the servers. Clients
are unable to access the server to verify
there “Strict no logs policy”.
• Private information 
are logged on the
Provider’s server.