Traditional VPN companies have all your Internet activity in their hands, leaving your privacy at a greater risk than not using a VPN.
Except for yourself, no single device on the entire Internet knows both your source IP address and your destination IP address.
Some traditional VPN companies launch double VPN. This kind of VPN architecture is not based on P2P network, nor does it use end-to-end encryption. Instead, the first VPN server decrypts and then encrypts the data, and then transmits it to the second server. Therefore, the first server still knows both your source IP address and your destination IP address. Such a structure does not have anonymity.
The TIPAS client does not transmit the username and password to the VPN server when connecting to the VPN, but uses the token without any account information obtained when refreshing the relays, so the VPN server cannot know which user is connecting.
The TIPAS VPN server itself cannot know the user's personal information and browsing content, and your privacy is protected to the greatest extent.
Forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key-agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. For HTTPS, the long-term secret is typically the private key of the server. Forward secrecy protects past sessions against future compromises of keys or passwords. By generating a unique session key for every session a user initiates, the compromise of a single session key will not affect any data other than that exchanged in the specific session protected by that particular key. This by itself is not sufficient for forward secrecy which additionally requires that a long-term secret compromise does not affect the security of past session keys.
End-to-end encryption between the TIPAS client and the second server supports forward secrecy.
One of the biggest problems with P2P networks (such as Tor) and double VPNs is very low speed. The TIPAS VPN can reach 50Mbps to 200Mbps download speed even with the most basic configuration under normal network environment.
Another biggest problem with P2P networks (such as Tor) and double VPNs is high latency. With TIPAS, video calls such as Signal and Line can be used normally, even if the four TIPAS servers of the callers are located in different countries or continents.