The traditional VPN only uses one server, and the local data is encrypted and sent to the VPN server, and then sent out after being decrypted. So the VPN server not only knows your source IP address, but also your destination IP address.

Traditional VPN companies have all your Internet activity in their hands, leaving your privacy at a greater risk than not using a VPN.



TIPAS VPN uses two servers in the P2P network, using end-to-end encryption. The local data is encrypted and sent to the first server. The data cannot be decrypted and can only be sent to the second server. The second server decrypts it and sends it out. With TIPAS VPN, the first server does not know your destination IP address and the second server does not know your source IP address.

Except for yourself, no single device on the entire Internet knows both your source IP address and your destination IP address.

Some traditional VPN companies launch double VPN. This kind of VPN architecture is not based on P2P network, nor does it use end-to-end encryption. Instead, the first VPN server decrypts and then encrypts the data, and then transmits it to the second server. Therefore, the first server still knows both your source IP address and your destination IP address. Such a structure does not have anonymity.

The TIPAS client does not transmit the username and password to the VPN server when connecting to the VPN, but uses the token without any account information obtained when refreshing the relays, so the VPN server cannot know which user is connecting.

The TIPAS VPN server itself cannot know the user's personal information and browsing content, and your privacy is protected to the greatest extent.

Forward Secrecy

Forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key-agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised. For HTTPS, the long-term secret is typically the private key of the server. Forward secrecy protects past sessions against future compromises of keys or passwords. By generating a unique session key for every session a user initiates, the compromise of a single session key will not affect any data other than that exchanged in the specific session protected by that particular key. This by itself is not sufficient for forward secrecy which additionally requires that a long-term secret compromise does not affect the security of past session keys.

End-to-end encryption between the TIPAS client and the second server supports forward secrecy.


One of the biggest problems with P2P networks (such as Tor) and double VPNs is very low speed. The TIPAS VPN can reach 50Mbps to 200Mbps download speed  even with the most basic configuration under normal network environment.


Another biggest problem with P2P networks (such as Tor) and double VPNs is high latency. With TIPAS, video calls such as Signal and Line can be used normally, even if the four TIPAS servers of the callers are located in different countries or continents.