Answers to Common Questions

Can't find the answer you need? Please contact us and we will be happy to help!

Our software and servers are programmed and setup to combat any potential chance on DNS leaks. We treat the potential on DNS leaks (A DNS leak refers to a security flaw that allows DNS requests to be revealed to ISP DNS servers, despite the use of a VPN service to attempt to conceal them) very serious and have state of the art measures to prevent this from happening.
The Remote ID is the server address and the Local ID is the vpn username. IKEv2 is also known as Internet Key Exchange version 2. It is an advanced VPN protocol that provides a balance between security and speed. It is an ideal protocol for mobile devices.
321inter The primary benefit of configuring L2TP with IPsec/IKEv1 in a remote access scenario is that remote users can access a VPN over a public IP network without a gateway or a dedicated line, which enables remote access from virtually anyplace with POTS. An additional benefit is that no additional client software is required.
10 connections One vpn username can have 10 connections at the same time on any kind of device.
Yes We support both P2P downloads or torrents. You can connect with any server and use them for P2P or torrents.
No We do not keep any logs. No connection logs. No usage logs. No logs at all.
We do not log, so we don’t know how much bandwidth is used, so yes its unlimited.
A VPN is a private network that can be used while you are connected to a public network. It enables users to browse the internet across shared or public networks over an encrypted connection—often referred to as a VPN tunnel—adding a substantial layer of protection for the data in transit.
At home: Browsing the internet or shopping online —for your favorite gadgets- should be a hobby you can do securely and confidently, and it can with inVPN. Home routers have been known to be easy targets in the event you don’t use a strong password. Even within the confines of your own home you aren’t always safe from the bad guys. Hackers can easily intercept your internet activity as if you were on public Wi-Fi.

Public Wi-Fi: Whether public Wi-Fi networks are provided by businesses for your enjoyment or intentionally set up to steal information from users by bad guys, you should always use a VPN on public networks. We can’t emphasize this point enough – it’s incredibly easy to intercept information on a public network but it can be prevented with inVPN.

Traveling: When vacationing it’s easy to forget you’re in unfamiliar territory. This makes connecting to hotels, coffee shops, and restaurant Wi-Fi risky because you can become an easy target to hackers. Logging into your favorite social media platform to post your vacation pictures, or checking your credit card balance, are methods hackers can use to steal your personal information. Using inVPN is the easiest way to secure a private network while traveling and using unknown public network connections.

Working Remotely: The more personal and professional business we conduct in public places, the more necessary it is to protect internal and proprietary assets. With the number of remote workers on the rise, inVPN is an essential business need because it keeps your work confidential when you aren’t working from a secure server.
Our easy to navigate, quick-connect features make connecting to a secure connection possible with just the click of a button. With over 50+ VPN servers worldwide you will always have access to the fastest connection.

The setup process is quick and easy:
1) Activate your inVPN account
2) Configure your VPN username and password
3) Download the application for your appropriate device
4) Launch inVPN for secure browsing and experience the web securely!