dedicated servers only
Our VPN servers never save data that can be used to identify a customer.
Don't trust that we're not logging?
Use multihop to connect to another VPN (or Tor) before you connect to us.
no proprietary code
Available for review here.
(too many) details on how the network operates available on our blog and on our
privacy policy page.
anonymous authentication
Access tokens are hashed before connecting. Compromised/confiscated servers can't be used to identify clients.
roots in Iceland, entities worldwide
No central office, anywhere.
Someone wearing a tin-foil hat might say we're too paranoid
Features you won't find anywhere else
protecting clients before they connect
Chain DNS traffic with Anonymized DNS
Public DNSCrypt servers for encrypting your DNS traffic before you connect
keeping your real IP safe
Stops IP leaks
Prevents malicious trackers from working
Many different killswitches available to prevents leaks if disconnected
unrestricted access
(not even on our free service)
Minimizes downtime
On the next page, the first and last name can be left as 'N/A', but the email address has to be real.
Your cryptostorm access token will be delivered to the email address you provide.
If you don't want to use your real email address, use a disposable email service such as our https://cs.email/
(no signup required)
We use OpenVPN, so if they support your OS, then so do we. We also support WireGuard.