• Do your services completely hide my online activity?

    VPN services will hide your online activity from your ISP and prevent web sites and e-mail recipients from knowing your true IP address. Because many users share the VPN IP address, web sites can't tell the difference between your data and someone else's. The more people sharing the same VPN server and IP address, the more randomized the data becomes. The VPN is an important tool in maintaining your security and privacy. This will prevent data mining, many hacking attempts, and profiling for any legitimate purpose for which you use the Internet. Scramble servers go an extra step and hide the VPN header from your ISP.

    Government agencies in countries around the world have been known to plant cookies and even malware on unsuspecting users in order to record data. Web site operators and search engines use many techniques to try and follow you across the internet. You must be aware of all of these methods and guard against them as well:

  • Follow the steps on this page to keep your browser from reporting your activity to web sites you visit and otherwise link to and to clear history and cookies.
  • Do not use proprietary browsers tied to search engines or search engine tool bars. The only reason they offer this stuff is to make it easy to track everything you do.
  • Install Bleach Bit on all your computers and use it at least daily for basic cleaning.
  • Don't log into web sites with a user name and password if you don't absolutely have to. If you do log into a web site, close your browser to clear all history and cookies before going elsewhere.
  • Only use your main e-mail account to communicate with people you trust.
  • When shopping or signing on to web sites, get a throw away account and change it often.
  • Private browsing, incognito and similar browser settings do not hide anything and will not protect you from being tracked. Using this makes you think you've accomplished something and makes you feel safe. In reality it hasn't changed anything.
  • The "Do Not Track" option promoted in recent browsers is useless. There is nothing that prevents a web site from tracking you based on this setting. It is another feel good option and nothing more.

  • Why do you not offer hundreds of VPN IP addresses to choose from?

    Our service is designed to protect your identity and make you as anonymous as possible on the internet. The best way to confuse the search engines and other tracking sites using a traditional VPN is to combine the data of thousands of users into a single IP address. For this reason we only use a single IP address in each country we offer services in.
  • Why does your web site look so dated and simple?

    Our web site uses standard html on all pages. We do not use any Java script or other programming languages. This allows you to look at the web page source and see that there is no tracking code, cookies or any other software running on the page that can be used to track your movements across the internet. We feel that the need to present our customers with a verifiably clean web site which doesn't link to dozens of other tracking sites and places no cookies or other tracking information on their computer far outweighs the benefit of a modern and flashy site. The only pages on our site that contain any scripting are the order pages and these are the links to purchase the product provided by the payment providers.

    In addition, since our web site is standard html it does not in anyway link to our authentication or order processing servers. Therefore, there is zero risk of your personal information being able to be hacked from our servers. This risk was recently made evident when another VPN company who uses all the modern instant processing techniques and fancy scripted web pages was easily hacked. The names and e-mails of their customers were then stolen by hackers and used by them. All of our orders are processed manually with a real human being between your order and the internet. This break between the web site and the service side of the operation makes the above described hacking impossible.
  • Why don't you encrypt the e-mail for your e-mail service?

    We don't provide built in encryption for our e-mail service because doing so means we control the encryption keys. This means that anyone who gets their hands on the keys could decrypt your messages. We realize that other companies offer fancy encryption schemes and promote how safe your e-mails and online storage are because of this. What they aren't telling you is, since they hold the keys, they (or anyone who they are forced to give the keys to) can decrypt your messages. Our recommended approach to encrypting your actual e-mail messages is to use OpenPGP. You create your own encryption key and you are the only one that has access to it. This is the only safe and secure way to encrypt your e-mail messages regardless of what anyone tries to tell you.

    Our e-mail service encrypts the actual e-mail connection in two ways. First it requires the use of the encrypted VPN to access the mail server. Second the actual e-mails are sent using SSL encryption. This prevents anyone watching the network including your ISP from even knowing that you are sending or receiving an e-mail Nobody at any point on the internet can access the message. What we don't do is encrypt the message contents for the reasons stated above.
  • Why don't you make everything one click and easy like other providers?

    All of our services, both on the Client end and on the Server end, employ open source solutions. The only exception is PPTP and L2TP which is built into both the Windows and Mac operating systems. Open source guarantees that the software is clean. Anyone can view the source code and determine that there are no back doors, key loggers and similar. If we wrapped all of this in a pretty one click package like most other providers you would loose this assurance. You would have no way to know what the package contained. Our installers for both Mac and Windows simply combine the off the shelf open source software with our configuration files which are text based and easily read. In fact, you don't have to use our installers at all and can easily set up your service by downloading the software from the source and then adding the text based configurations. While not great looking, our software is secure, open and verifiably clean. Again, we believe this is more important to the security conscious user than a flashy interface and nifty installer.
  • How do I know which service I need?

    High Security Offshore e-mail - Prevents your e-mails from being saved by your ISP, e-mail provider or other agencies and made accessible by others for decades. Put simply, something stupid you say to someone in an e-mail today won't pop up and bite you down the line.

    This e-mail service also provides additional security features. First, we scrub the sending IP address from the header of the e-mail This prevents the recipient or anyone who may intercept the e-mail from knowing the sending IP address of the e-mail The servers themselves are encrypted to secure the data and are only reachable via VPN connection. This ensures that your e-mail account and the server the e-mails are hosted on is safe from hackers and others. No logs or backups of any kind are kept ensuring that your communications remain private. We scrub the servers of deleted data daily. Messages you delete are constantly securely deleted and non recoverable from the server. We recommend that you download and save all your e-mail and delete it from the server as often as possible.

    VPN Service - Encrypts all your communications, hiding your activity from your ISP, others sharing your network, or from other providers like wireless hotspot operators. Offshore VPN's take the encrypted data and put it on the internet in locations around the world that have strong privacy laws and low levels of snooping.

    On a side note, if you use wireless hotspots like coffee shops or bookstores then everyone logged in to the hotspot can see your data. School kids with hacker software downloaded from the Internet sit at these hotspots for hours gathering all this data. The encrypted VPN solves this issue as well.

    Offshore Web Site Hosting - Helps keep the data on your server secure from the unintended consequences of a raid on an ISP targeting one site and, in the process, taking down hundreds of others as the servers hosting all of these sites are seized
  • Why Columbia, Czech Republic, Denmark, Hong Kong, Mexico, Netherlands, Norway, Russia, Singapore, South Africa, Sweden, Turkey and Switzerland?

    These countries are either known for their strong privacy laws and minimal government actions against web sites and operators and/or lack of cooperation with other countries and their data retention and disclosure policies.
  • What about the US and UK?

    These countries are not known for strong privacy laws and cannot be considered privacy secure locations. We offer these only as a convenience to our customers who may need access to these locations. Some people may have banking or credit accounts that require access from within the country. Others may simply want to watch Hulu, Netflix or the BBC, etc. At the very least the VPN will combine their data with hundreds of other users data making it much more difficult to track the customers data. However for any other use that does not require a USA or UK presence we strongly recommend using only the offshore servers. The offshore servers are on a totally independent network that is isolated from the USA and UK server network to ensure maximum privacy for the offshore users.
  • How can I prevent my real IP address from being revealed if the VPN connection should drop?

    While there are several software solutions to this issue none of them are foolproof.  In order to secure your connection and prevent any traffic from passing if the VPN drops it must be done at the router.

    The procedure entails setting your router to block all ports except the port the VPN connects on, for example 1194. This will prevent any traffic from flowing to the internet  through that router except the VPN connection. However, once the VPN is connected it will pass all traffic. So as long as the VPN is connected you can be on the internet. As soon as the VPN is disconnected all traffic to the internet immediately stops. If you need more details on how to do this or if you would like us to configure a router for you e-mail us.

  • How can I prevent my IP from leaking out via IPv6

    It is important to disable IPv6 on all of your computers network adapters to prevent such leaks. E-mail us if you need instructions and indicate what operating system you use.
  • How can I prevent DNS Leaks?

    The best and most reliable way to prevent DNS leaks to your ISP is to use Outside private and non logging DNS servers. Go to Open NIC and choose at least two of their servers closest to you. Replace the DNS on your computers Ethernet and or Wireless cards with these custom DNS servers. Let us know if you need help doing this. When inquiring please let us know what kind of operating system you are using.

Customer Service Hours: 8:00-17:00 (GMT -8) E-mail: contact@unspyable.com