PROPRIETARY VPN

Experience
CIS was founded by a former member of the U.S Department of Defense, with over 20 years of experience in Computer Network Operations (CNO), Computer Network Exploitation (CNE) and cyber operations within the Intelligence Community.

Transparency
The VPN platform configuration is designed in such way that the servers space and IPs do not cross nor share any customer space.











Anonymity
Our servers and cloud infrastructure platforms are configured and maintained based on a unique provision mechanism based on an anonymous financing support that does not reveal any ownership or customer information, nor allows data farming.
Security
The VPS’s/VPN’s infrastructure is designed and configured based on the highest security standards of implementation, with multiple layers of protection and Intrusion Detection System (IDS) in place.




VPN Comparision

Proprietary VPN and Commercial VPN Comparison

Proprietary VPN

  • The Internet traffic is routed through an untraceable IP address that is not shared by anyone. The client maintains access to the VPS server and logs.
  • VPN operates on a different socket scheme that does NOT reveal standard VPN signatures.
  • The VPS’s/VPN’s infrastructure is designed and configured based on the highest security standards of implementation, with multiple layers of protection and intrusion detection system (IDS) in place.
  • The platform is designed to erase all the logs of activities, with no extra ports or services running within the virtual private server.
  • The servers can only be accessed through a unique SSH key, 128 bits long through a virtual machine with a proprietary VPN.
  • The engineering of the VPN platform has unique characteristics centered on a randomization algorithm that initiates a connection via a .ovpn certificate through a proxy based on a private IP scheme on a random port; therefore, the public IP of the transiting servers are never exposed. The first VPN hop initiation triggers a randomization protocol and then every http/https request initiates the next VPN hop to the next available server.

Commercial VPN

  • IP’s are known IP’s that are associated with the VPN server providers, possible to deny VPN connectivity.
  • It is possible that several users can use the same IP scheme.
  • No access or control of the servers. Clients are unable to access the server to verify the “Strict no logs policy”.
  • Known VPN sockets, which are blocked in some countries.
  • Private information is logged on the provider’s server.
No Logs
No data farming, no logs, customer has direct access to the VPS servers IPs.
Secure VPN infrastructure
Global, dynamic, non-attributable (Company or Government) secure VPN infrastructure.
Vendor Diversity
The platform supports over thirty data center providers.
Worldwide Coverage
Presence in multiple countries around the world, and numerous locations in the US.
Port obfuscation
VPN signature obfuscating through different socket scheme (https port 443 UDP/TCP).
SECURITY
Hosts are automatically secured using industry standard hardening techniques.
Configuration
Supports an ample dynamic configuration.

ABOUT US

A VETERAN THAT CARES ABOUT PRIVACY

OUR FOUNDER

Alexander Purta is the President and CEO of Cyber Intell Solution, LLC.
Mr. Purta is a former member of the U.S Department of Defense, with over 20 years of experience in Computer Network Operations (CNO), Computer Network Exploitation (CNE) and cyber operations within the Intelligence Community.He holds a Bachelor of Science in Foreign Languages, and a Master’s of Science in Computer Offensive Security from Eastern Michigan University. For over twenty years and in over thirty countries, Mr. Purta has succeeded in developing divergent solutions, capable of solving complex problems through an indirect and creative approach utilizing cutting edge cyber technology and encryption protocols. An experienced veteran and cyber security professional, Mr. Purta decided to use his knowledge and passion to fund Cyber Intell Solution, LLC , to offer organizations and individuals a say when it comes to keeping their data and lives private.

   OUR MISSION

Our mission is to provide specialized privacy solutions to organizations and individuals concerned about their privacy. 
With over two decades of experience in national and tactical security, innovative technologies, and cyber operations, you can rest assured we have the knowledge and expertise to help you claim back your privacy.  

CONTACT US

CLAIM YOUR PRIVACY

Help Desk

Phone: 209-442-3133
eMAIL: [email protected]

Working Hours

Monday-Friday: 9:00 – 18:00 (ET)
Saturday: 11:00 – 17:00 (ET)