Introducing: KelVPN the First Quantum-safe dVPN

KELVPN
4 min readApr 6, 2021

KelVPN is a decentralized VPN based on the Cellframe Network protocol and realized as a t-dApp in the Cellframe ecosystem and inhabits the first Cellchain (KEL-testnet).

About

Freedom is the ultimate, essential and priceless value of every living person on the planet. Rapid technological advances have reshaped the essence of digital privacy and created new barriers for those who value digital freedom. It almost seems as if an omnipresent eye has been established, keeping track of all activity online. Enhanced blockchain-based instruments made it possible to overcome the challenges and stumbling stones of existing web technologies. We believe that harnessing the power of distributed ledger technology and various advanced features is the key to forging a better future, where your privacy will not be restricted and options will not be limited. We bring you KelVPN.

KelVPN Background

The KelVPN team has been building KelVPN since 2019 — It’s the first deanon-proof and quantum-safe decentralized VPN in prod. powered by the Cellframe Network. For the customer, KelVPN offers one-click access to a new level of privacy and security combined with high-speed data supporting up to 8k+ video streaming.

Looking at the competitive market of online security and privacy, KelVPN is able to stand out by leveraging Cellframe’s modern post-quantum encryption that guarantees the highest-level security for KelVPN users, even when quantum computing inevitably advances to a stage of risk for most encryptions.

Various VPNs have been revealed to be selling user-data to corporations. KelVPN tackles the pressing issue of privacy through decentralization by operating on top of Cellframe’s decentralized network where all traffic is distributed between different nodes. This removes the presence of a central point of control, which ensures that KelVPN cannot collect logs, spy, or sell your data.

Advantages

Bandwith — Regular VPNs often experience a drop in network quality as users compete for bandwidth on a single server, in contrast KelVPN operates by having Cellframe Nodes add bandwidth. This way, traffic is efficiently routed through the web of nodes for a more streamlined process, resulting in a higher quality of service.

Security — Node runners can’t control all the service nodes that redirect traffic and all data is encrypted to the highest standards on the Cellframe Network, ensuring a decentralized network of data. In addition, redirectors have no access to any private user’s information. There’s no trace of launching KelVPN as redirectors have no access to any private information.. “Government inspections’’ will not find a single trace as they would have nothing except transaction hashes.

Decentralization and User Experience

The first way is for those who care about decentralization. They can use KEL tokens like in any other dVPN. You stake it in a conditioned transaction, and then it will be spent during usage with returning change to you. During usage, your VPN client will sign receipts used by the service node to get some part of your stake as payment. As of now, this is still only on testnet with test KEL.

The second way is classic, for those who just want to get better content access and don’t care about decentralization. The user downloads a VPN client, pays with a credit card or crypto, and then obtains the serial key. With a serial key, you can activate one device. A central database (CDB) will authorize you and pay for your activity in the Cellframe Network.

Current Features

  • KelVPN’s original protocols vs DPI (Deep Packet Inspection) requires a lot of time to detect a trace. KelVPN’s proto is stealth enough to be undetected by the notorious Golden Firewall of China. When the DPI gets strong enough to detect the usage of KelVPN, the protocol rotates quickly keeping the user undetected.
  • Post-Quantum encryptions ensure that traffic data is secure — even quantum computers stand no chance to decrypt the traffic data.

Roadmap Features

  • Multi-hop routing hides your traffic from local DPI and gives the ability to dig through the entire blocked local network if at least one node inside found the way out.
  • Multi-channel streaming improves security, breaking your traffic by a lot of streams that make detection harder. It will also improve latency and reduce CPU and power usage.
  • Fake traffic generator covers clients from AI-powered DPI.
  • Users able to share bandwith to earn staking rewards.

Stay tuned for more info and follow us at:

Twitter: https://twitter.com/kelvpn

Telegram: https://t.me/kelvpnbeta

Website: https://kelvpn.com/

Telegram ANN: https://t.me/KELVPNANN

--

--