What makes Cryptohippie different from other VPN providers?
There are a few things that make Cryptohippie unique among VPN providers: we don’t require you to trust a single entity for your privacy. Our sales and network are run by separate companies in different jurisdictions. The sales company never sees network traffic and the network company never sees sales data. That also makes it very hard for any authorities to pressures us into giving out any information they think we have. Our network is also multi-hop VPN giving you enhanced privacy and security by routing your traffic through nodes that are located in multiple jurisdictions, and that are controlled by independent operators.
Along with that we separate traffic generated by the user from the identity of the user by employed “out of band” authentication. The connections of a user are never linkable to each other or the user’s account by the network operators. Instead, authentication is only done towards a third party that conceals the user from the network itself. This differs from methods used by other providers who directly authenticate user sessions, thus allowing the network to associate sessions with users.
Why choose Cryptohippie?
Which is your base country (because of the applicable data protection law)?
Various parts of our operations are distributed over companies in various jurisdictions. Termination servers (where traffic exits the VPN) are operated from Panama, entry servers are operated from Germany, and customer services are handled from the USA and St Kitts & Nevis. Furthermore routers and servers are located in jurisdictions other than where the respective company is incorporated and operates from.
How is Cryptohippie.net related to Cryptohippie.com? Who does what?
Cryptohippie.net is controlled by our network operator, responsible for termination servers, DNS and Email infrastructure. It’s registered and operating from Panama. Cryptohippie.com is one of two sales companies. It is responsible for customer contact, authentication, and support. Dot-.com has no influence on network operations, it only authenticates users. Dot-net has no access to customer records.
What is an anonymous VPN and why should I use it?
A Virtual Private Network creates connections between computers that can only be understood by the people who have the proper decryption codes. It creates a “tunnel” between your devices and others – a tunnel that no one else can see into. Anonymity separates your identity from your Internet traffic.
Furthermore the VPN replaces your publicly known personal internet protocol address with one that is traceable only to the VPN provider, and that is furthermore shared by multiple users.
You should use a VPN if you want to protect your data and communications against surveillance, data theft, manipulation and identification.
Do you offer free trials?
To avoid potential abuse of our network we do not offer free trial.
Do you have refund policy?
We offer 30 days no questions asked money back guarantee. If you are not satisfied with our product contact support to lead you through refund process.
What payment methods do you accept?
We accept credit cards, SWIFT, US check, money order or cash, cryptocurrencies (Bitcoin, Bitcoin Cash, Monero, Zcash, Etherum) and gold or silver coins.
How long does it take to set up my account?
Immediately after signing up you will be able to download installation files for our software. It takes about 10 minutes to complete the installation, and we provide you with written guides for the process.
Do you send out emails to your customers?
No, we do not. We don’t even send you reminders for renewal of your account. On the other hand, we do keep our customers up to speed with our blog, Twitter profiles and internal messages.
What data do customers have to give you to use your service (name, address, e-mail, phone number, etc.)?
For our Road Warrior product no data is mandatory. However, we prefer to have an email address so we can contact you if necessary. For some enterprise products we require IDs.
Do you log any files on your customers?
We do not keep any session or traffic logs. We only the keep payment and sing up information you give us. That data is only available to sales companies, not to network companies. Network data is not available to the sales companies. And data is not stored on the same servers.
On how many devices can I use one account?
You may use your account on any number of devices you want, both computers and laptops and iOS and Android devices, simultaneously.
Are there traffic limits?
No, there are no traffic limits. That would require us to log the traffic.
Do you use virtual or dedicated servers?
We use dedicated servers only.
Do you offer port forwarding or static IP addresses?
We do not offer port forwarding or client-specific IP addresses within our consumer products. Our enterprise products can optionally be equipped with incoming gateway functionality and client-specific outgoing IP addresses.
Do you allow peer to peer connections?
We do not block any protocol for peer to peer connection, but we do not endorse illegal downloading of content in violation of intellectual property rights. That is a violation of our terms of service and might lead to action by us.
Does Cryptohippie work on routers?
Yes, our product is router compatible.
Are you a single hop or multi hop VPN?
Ours is a multi-hop VPN provider, using 2 multi-jurisdictional hops or more, depending.
Can your service be used without a proprietary software client?
RoadWarrior: Yes. Enterprise products: No. Requires hardware appliances that run partially proprietary software.
Under what circumstances would data have to be revealed to authorities in your country?
It would require at least two subpoenas in two jurisdictions. It would also require the session to still be active.
What types of customer support do you offer?
Customer support is available to you by ticket system, email and Skype or XMPP chat on request.
What access methods do you support (OpenVPN, IPSec, PPTP/MPPE)? If OpenVPN, what operating systems do you offer pre-configured clients for?
Consumer products: OpenVPN
Enterprise products: OpenVPN, IPSec IKEv2
OpenVPN preconfigurations: Ubuntu Linux, Windows, Mac OS 10.4+
We do not offer PPTP/MPPE, L2TP because of security and privacy concerns for our clients.
How do you make sure what is logged on your servers? Do you maintain them yourselves?
Our servers are located in secure, professional data centers operated under contract with us. All servers and routers are maintained by our own staff.
Do you take further effort to ensure anonymization of your clients, for example, do all users surf under the same IP address?
We use several methods:
IP addresses are used by many sessions at the same time. All IP addresses within a cascade are shared by all users on the cascade.
Entry and exit gateways are operated by different legal entities and are located in different jurisdictions.
We multiplex connections between entry and exit gateways.
We mix packets between entry and exit gateways.
Jurisdiction aware exit node allocation.
VPN termination is never done on entry node.
Do you block any specific ports, such as 25 TCP?
Not by default. But we retain the right to block certain ports or route them via protocol-specific gateways. For example, SMTP traffic will always take a special route different from all other traffic.
Is your anonymization access limited to web traffic (HTTP) or other ports or services?
Do you run your own DNS server? Who has power over it?
Yes, we run our own and we use direct resolving.
Which way is there for customers not to use your DNS server, if wished?
We force DNS traffic to our own servers to prevent DNS leaks that can break anonymity. Users are free to use non-standard ports for DNS if they want.
Do you block or plan on blocking certain DNS names for customers? By which cause and rules (for example forced by law or authorities or host)?
No. We do however redirect NXDOMAIN to blackrouted IP to prevent certain kinds of leaks over DNS.
How long do you log DNS requests?
We don’t log DNS request.
Do you block certain requested IP-connections? If yes, why and which kinds?
None by default. Should the owner of an IP request blocking we will usually comply, such as in cases of DDoS, cracking attempts and fraud. These blocks are usually temporary. Under certain circumstances (massive seeding) we temporarily block specific BT-trackers if we receive DMCA notices or equivalent. Currently no IP is blocked.
How many servers in what countries do you operate, do you maintain them yourselves?
Our Road Warrior network currently consists of over a dozen servers in multiple cascades. We also operate an undisclosed number of servers and cascades for enterprise clients. All server administration is conducted and audited by us.
Do you use server cascades, meaning that each connection is passing more than 1 server?
What kind of encryption do you use?
AES-256 CBC for traffic encryption, SHA-512 for Authentication, RSA-4096 and DHE-4096 for key agreement.
What data do you log for how long when using the product “secure e-mail account”? Is it available separately or part of RoadWarrior?
We do not log data on the secure email. However, outgoing mail through our smarthost is “tagged” by a cryptographic proof so that we can identify spammers (and shut down their accounts). It is currently NOT available as a stand-alone product.
Does Cryptohippie use software or a combination of software and hardware?
Road Warrior is software only. However, we support various hardware routers.
Does RoadWarrior come with a dedicated client application?
No. RoadWarrior can be used with Network Manager for Linux; Viscosity and OpenVPN GUI for Windows; Viscosity and Tunnelblick for Mac OS; OpenVPN Connect App for Android and iOS devices.
Furthermore we support a selection of hardware routers that are independent of your computer’s operating system.
If I use a public Wifi service, how does your service help?
When you connect to the wifi service (at a cafe, hotel or somewhere else), then connect to us, all your traffic will be passing through a strongly encrypted connection. The wiretapper next door can’t read your traffic. All your surfing exits our network in OUR name, and with OUR contact info. Unless you tell them, no one will know that it comes from you.
How do I know if I’m operating/browsing securely? What indications will I have?
If you look at the bottom on the login page you’ll see your status. Also, if you go to a site that senses your location, such as Google, you’ll probably see that they think you’re in Germany or the Netherlands (the locations of most of our exit nodes).
Do I still need a firewall?
Yes, you should have one. But, please do NOT use McAfee or Kaspersky, they are known not to work with VPN privacy systems.
Should I reject all cookies? Do you filter them out?
We do not filter cookies or in any way filter or modify data streams your computer makes or requests. We only change the protocol information on the IP-layer. The thing we suggest is that you set your browser to purge cookies and cache on quit, or that you use private browsing available in modern browsers. The problem with filtering cookies as data travels through our system is twofold:
– We could not access the contents of your data streams, even if we wanted. So we cannot change the contents, including cookies.
– Filtering out all cookies would drastically reduce usability of websites. Many websites require cookies for session-tracking and authentication.
So, your best choice (in our opinion), is to purge cookies after you leave any site that concerns you, or have them universally deleted every time you close your browser. (Most browsers have a setting for this.)
Will I have to log in every time I visit a frequent site because it no longer can collect cookies?
No. We don’t scan your traffic, so we don’t filter out cookies, etc. We recommend that you set your browser to delete them on closing, but that’s your choice.
Will I be able to view youtube videos with ease?
Mostly. Some have geo-restrictions, and they may be hidden from you. Download speed will also be reduced a bit.
Can I reset my password?
Yes you can. We can also reset passwords for you manually, however, manually resetting the email password will result in the loss of all previous emails. So, please store any new email password in a safe place. We do this to prevent anyone from resetting your password and getting all your mail.
Also, please remember that a good password should be more than 8 characters in length, both upper and lower case, and should include both numbers and special characters, such as “@&#%$!*”.