We design, engineer, and operate networks that remain invisible to Deep Packet Inspection and withstand advanced state-level threats. Our mission is to ensure the free flow of information persists.
We exist to preserve the free flow of information. Working at the frontier of censorship research, we study how states restrict access — and build the systems that render those restrictions obsolete.
In collaboration with leading researchers and engineers in network security, we advance the state of the art in encrypted tunneling, traffic obfuscation, and censorship circumvention.
Multi-layered circumvention architectures that adapt in real-time to censorship events. Protocol-agnostic transport diversity with automatic failover across redundant paths.
Custom tunnel protocols engineered for hostile network environments. End-to-end encrypted channels that leverage commodity infrastructure to remain indistinguishable from normal traffic.
Traffic analysis countermeasures that defeat deep packet inspection through protocol-level obfuscation and traffic shaping. Empirically tested and proven against nation-state filtering systems.
Globally distributed networks across multiple providers and peering points. Self-healing architectures with dynamic configuration and capacity that scales to millions of concurrent users.