Desafortunadamente, no está disponible actualmente el contenido de esta página en el idioma seleccionado.

Strong Encryption is Your Key to a Private and Secure Online Experience

Keeping your online experience safe

Updated on July 13, 2021: From now on, traffic filtering, malware protection, and suspicious DNS activity blocking are available as a part of the separate DNS Firewall app.

Is your private data truly private and secure? The desired answer is obvious. However, it isn’t always true. There are ways for third parties to intercept and read information you transmit over the internet, especially if do that in insecure public networks. Your sensitive information may include social security numbers, private correspondence, credit card information, social account password and many more.

How to protect all that information? Easy! Strong encryption provided by a reliable VPN app is the solution. It works like a barrier between you and others in the cyberspace, ensuring that no unwelcome third party has access to your personal data except you.

There are a wide variety of encryption methods that can be used to protect your online identity. Today, we will continue to talk about the methods we use in our security products.

Protect your sensitive data with strong encryption of VPN Unlimited!

FREE 7-day trial

Encryption technology used in VPN software by KeepSolid

Encryption is the process of encoding a message or file, so that only the party who the information is intended for, can read it. The process involves secure encryption algorithms used to scramble the data. The receiving party then decodes the information with a special encryption key.  

KeepSolid team stands for a safe access to the open internet. We studiously reevaluate possible threats and use the most reliable encryption techniques to provide you with a high-quality service and the strongest protection. That’s why we offer an extremely strong 256-bit encryption. It is considered to be one of the most secure encryption methods. AES 256-bit encryption is one of the types of encryption used by the US government to protect sensitive financial, military or government-owned data.

You can learn more about AES encryption in our blog post Let’s talk about encryption.

What authentication method is used in VPN Unlimited

In our software, we use RSA as an authentication method. It is considered as one of the most secure form of authentication. It does not rely on the network, routers, domain name servers, or the client machine. The only thing that matters is access to the private key.

According to Wikipedia, “RSA is one of the first practical public-key cryptosystem and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret.”

Keys denoting the private encryption key

This means, the asymmetry in RSA allows a private key to be shared to encode messages, without giving any information on the private-key to decode messages. Therefore, this public-key may be published online so that anyone can send a message to the publisher, however, only the publisher will know how to read it.

For browser plug-ins we use following aspects:

Supported Server Cipher(s):

Preferred TLSv1.2 256 bits AES256-GCM-SHA384

Accepted TLSv1.2 256 bits AES256-SHA256

Accepted TLSv1.2 256 bits AES256-SHA

Accepted TLSv1.2 256 bits CHACHA20_POLY1305_SHA256

Accepted TLSv1.2 128 bits AES128-GCM-SHA256

Accepted TLSv1.2 128 bits AES128-SHA256

Accepted TLSv1.2 128 bits AES128-SHA

SSL Certificate:

Signature Algorithm: sha256WithRSAEncryption

RSA Key Strength: 2048

Cryptographic handshake

The cryptographic handshake is used to establish a secure connection. Its effect is highly influenced by a private key size. The longer is the key, the more secure is your connection. We use a Diffie-Hellman (DH) method with a minimum 2048-bit key, and Elliptic curve Diffie-Hellman (ECDHE) protocol with 256 bits.

These encryption algorithms are extremely hard to crack, as they allow a key establishment to happen independently of the server’s private key. This gives the connection a forward secrecy (a fresh public key is created for every single connection). A very useful option that protects your personal data from being decrypted even after the fact the private key is somehow exposed.

Bottom line

When it comes to your personal data, there should be no alternatives or doubts about who owns it. Your data is your business, and no other party is eligible to access it on your behalf without your permission.

Don’t lose your right to be free and secure online. Encrypt your internet traffic now with VPN Unlimited.

Download VPN Unlimited

Get VPN Unlimited right now and start enjoying a secure and private internet with absolutely no borders!