Bypass anti-VPN detection

Proxy.sh can fake your traffic with XOR to bypass some restrictions.

Proxy.sh is proud to be one of the rare VPN providers to offer OpenVPN's recently developed XOR obfuscation option. It lets you alter the "look and feel" of the traffic that goes between your devices and our VPN network, making it more difficult for any external watchers such as network administrators or governmental agencies to detect you are behind a VPN.

Proxy.sh provides XOR in exclusivity with ECC. The latter allows you to make sure your traffic will be next to impossible to decipher, while XOR allows you to make sure the third party cannot detect you are using OpenVPN.

Connecting to our network using the ECC+XOR combination is made simple with Safejumper, our custom client. You can also compile your OpenVPN build that will be compatible with our network configuration.

Ready to switch to the real VPN experience?

A strongly-encrypted network, coupled with real anonymity.

Anonymous Tokens

  • You can purchase anonymous tokens with no string attached to log into our network.
  • You can convert your VPN membership to an anonymous token whenever you want.
  • An anonymous token is a simple 128-bit hash that you can use as both username and password to log into our VPN network. It is not linked to any panel account. Hence, we do not provide extra configs or customer support for them.
As Low as
$0& always will be.

Frequently Asked Questions

If ever you still have some doubts about our encryption standards.

Q. What is the full list of protocols & encryption methods provided?

We provide OpenVPN with 256-bit AES/CBC, SHA-512 and 4096-bit RSA as cipher/hash/control. We also offer SoftEther, TOR, obfsproxy, ECC and XOR.

Q. Do you plan to implement more protocols and/or encryption standards?

We offer Serpent as limited beta and we plan to implement another encryption standard soon. We do not wish yet to reveal its name or details about it.