CryptoLab VPN Documentation

C

Once you’ve purchased your CryptoLab VPN Service you will receive secure email with your VPN configuration files. You will use these files to set up each individual VPN connection. You will be issued 5 VPN connections for each VPN connection city. This means you can mix and match which files you install on which computers or mobile devices.

How It Works

The first thing you will need to do is install WireGuard on the computer or mobile device you want to configure a VPN connection.

Download WireGuard Software

Below you will find documentation on how to install your VPN connection on different types of technologies.

Each configuration file allows 1 connection. Once you use the configuration file on one computer, you cannot use it on another. The configuration files are custom to you and to the VPN it will be connecting to. These connection files do not require you to know a user name or password. They are the user name and password, so keep these files in a safe place after the’ve been issued to you.

The emailed folder will contain 5 connection files for each VPN connection city. You can use all 5 connections yourself or split it with your friends and family. The .conf files & .png files contain your user names and passwords. You never need to use your email address or an account name to log into a VPN. Below is an example of the files you’ll be receiving.

Using the example folder above, the atlantanoads11.conf file would be used to create a connection on your desktop computer. The atlantanoads11.png file would be used to create a connection on a device that had a camera attached like an iPhone, iPad, Android, etc. The atlantanoads11.conf is a text file that contains all the connection information needed to make a VPN connection to Atlanta, GA. The atlantanoads11.png is a image file that contains all the connection information needed to make a VPN connection to Atlanta, GA.

Once you have used the atlantanoads11.conf OR atlantanoads.11.png file you should not use them again on any other computer. You could simply delete them or move them to a folder you created called “used”. You should not use either of these files on another computer until you remove it off the computer you had it installed on. Once you install a VPN connection you will not need to re-install it on the computer again unless you delete the connection or WireGuard.

Naming Convention

In the example above, I have named the files to associate where you are making the VPN connect. Let’s break down the file name

atlantanoads11.conf

atlanta = city you are connecting into
noads = ads are blocked 
11 = file number you are issued
.conf = a text file to up load to a wireguard connection
.png = a QR picture to make your wireguard connection

Locations & DNS

Below are the locations where each VPN is located. You will also see that all but the Dallas location has ad and malware blocking. This is in addition to using Quad9 as a DNS provider. You can read why I’ve selected Quad9 as our DNS provider.

LocationAd BlockingEncrypted DNS
AtlantaYesYes – Quad9
DallasNoYes – Quad9
NewarkYesYes – Quad9
Silicon Valley (Calfiornia)YesYes – Quad9
London (UK)YesYes – Quad9
Sydney (AU)YesYes – Quad9

Why Quad9 For DNS?

Quad9 is a free, recursive, anycast DNS platform that provides end users robust security protections, high-performance, and privacy. Quad9 is designed to provide an extra level of end user protection. Quad9 helps to protect users from attacks by automatically blocking against known malicious domains, preventing your computers and IoT devices from connecting to malware or phishing sites.

From a privacy point of view, Quad9 is specifically committed to protecting the users’ privacy and its service doesn’t retain request data. As mentioned in their FAQ: “When an entity or an individual is using the Quad9 infrastructure, their IP address is not logged in our system

Why Would I Want To See Ads?

No one really wants to see ads, but sometimes you have to, to play the game, see the news or just visit a site. VPN connections are not perfect and can be identified. There are times when websites show you content that might be blocked by ad-blocking technologies. To get around this you can simply change your VPN connection to the Dallas location. The technology that we use to block ads is not like the ad blockers in your browser. The technology that we have implemented is more in line with how a Pi-Hole works.

What Is A Pi-hole?

You can think about a Pi-hole as a DNS blackhole. I’ll be completing that article shortly and give you the down and dirty on how a Pi-hole can help the privacy of your home or work network. But if you want a sneak peak.

How Do They Know I’m Using A VPN?

If you’d like to understand why companies know you’re coming from a VPN, check out my article. It’s hard to obfuscate your IP address when all the data about every IP address lives in a distributed network. Yes, the internet might seem centralized at times, but it really isn’t.

Real IP

What is Real IP? Real IP is a project i’ve been working on conceptually for the last 6 months. But now it’s headed into Alpha testing, with Beta testing not far behind.

Real IP is a concept that might allow us to trick the companies of the world into thinking we are not coming from an VPN, when we actually are. The research I did into the article How Do The Know Your On A VPN birthed the idea.

I share this with you because I’m excited, I know it can happen, I know it can be done. We can play by their rules and trick their systems. Real IP might become an add-on to the CryptoLab VPN Service, but it will not be part of the current service. This concept is much more capital intensive the the current service. We will see if anyone might be interested. Either way I like the idea. It’s also one way to see if people make it to the end of some dry documentation 🙂

Recent Posts

Recent Comments