This project is developed based on V2Ray/V2RayNG and other open source technologies, and integrates the excellent functions of existing well-known VPN applications.
One-button launch, easy to use: no additional setup or registration required; with the push of a button, users can connect devices to open networks in shared communities; and with automatic network discovery and recovery, it can break through the most difficult Web environment.
Strong privacy and security guarantees: No sensitive or personal information is stored on user devices; user information is never transmitted to servers, and servers never log traffic patterns that can be used to track personally identifiable information. Client IP addresses are hashed in server security logs and used only to identify the country where the traffic originated. The key is to keep only the minimum user and traffic data necessary for reliable service. Because we don't keep user data, no one can steal it. Use the strongest industry-grade encryption to keep user communications private and prevent network eavesdropping.
The main purpose of this application is for learning; it is only used for scientific research, learning, education, and other legitimate purposes. While using this software, please strictly abide by the laws and regulations of each country. Any behavior that violates the laws of various countries or regions and the country where the server is located is strictly prohibited. Use of this application will be deemed an endorsement of the entire content of this statement.
One-button launch, easy to use: no additional setup or registration required; with the push of a button, users can connect devices to open networks in shared communities; and with automatic network discovery and recovery, it can break through the most difficult Web environment.
Strong privacy and security guarantees: No sensitive or personal information is stored on user devices; user information is never transmitted to servers, and servers never log traffic patterns that can be used to track personally identifiable information. Client IP addresses are hashed in server security logs and used only to identify the country where the traffic originated. The key is to keep only the minimum user and traffic data necessary for reliable service. Because we don't keep user data, no one can steal it. Use the strongest industry-grade encryption to keep user communications private and prevent network eavesdropping.
The main purpose of this application is for learning; it is only used for scientific research, learning, education, and other legitimate purposes. While using this software, please strictly abide by the laws and regulations of each country. Any behavior that violates the laws of various countries or regions and the country where the server is located is strictly prohibited. Use of this application will be deemed an endorsement of the entire content of this statement.
Show More