We support multiple VPN protocols types to make Traceless as powerful, secure and adaptable as possible.
Get a VPN now
On this page you can find details and tips about every protocol which our service provides.
VPN protocols are used for securing the transport of
data traffic over a network infrastructure.
One of the most important criteria when selecting VPN provider should be protocols they have in their offer. Why it is important? Because, first of all, not all VPN protocols are the same and some are more secure than others. Each protocol varies in the way that data is kept secure. For example some protocols are using 128-bit encryption and it’s good enough for most users, while some are using 256-bit (the same level of security that banks and credit card websites use). That also means that they may not perform as well as the less secure protocols. We at Traceless VPN are always keeping up with the latest standards in industry and offering all of the proven protocols.
PPTP (Point-to-Point Tunnelling Protocol) VPN protocol
PPTP is available as standard on almost every platform and device which is supporting VPN connection, thus it is very easy to set up without the need to install additional software. It is used widely and typically on older operating systems and mobile devices. Although it is securing connection with 128-bit encryption, it does have well known security vulnerabilities. Because of that, it is recommended only when any other protocol is not available and for low-risk speed-intensive browsing, like streaming video, avoiding geo-restrictions and to the users who value more speed over security.
L2TP/IPSec (Layer 2 Tunnelling Protocol) VPN protocol
L2TP is usually implemented with the IPSec encryption suite to provide security and privacy. It is built into most desktops and mobile devices. While we are providing 256-bit encryption method, L2TP is more secured than PPTP, but may result in slower speeds. It is easy to set up with PSK (Pre-Shared Key). For extra layer of security, L2TP can also be used with certificates, which is recommended for advanced users since certificates need to be imported first. L2TP is a good choice when other VPN protocols such as OpenVPN and IKEv2 are not available or supported by your device and security is priority.
OpenVPN is considered to have highest performance and security level overall. It is recommended for all platforms. Setting it up requires installing official OpenVPN Client software (it is available on all mostly used desktop and mobile devices), so set up is not so straight forward as PPTP or L2TP, but it is not difficult either. OpenVPN is an open source VPN solution that uses various technologies, it’s highly configurable and can be set to run on any port, although it runs best on a UDP port. We use 256-bit encryption and support 128-bit encryption.
IKEv2 (Internet Key Exchange version 2) VPN protocol
IKEv2 is one of the newest VPN protocols and based on IPSec tunnelling protocol. It comes as a standard in operating system Windows 7 and above and it is supported by iOS and Linux as well. It is supported by mobile devices as well, but you may need third party Client software to install (for Android we are recommending strongSwan software). It is very stable and secure protocol (256-bit encryption) and considered as fastest protocol. It is recommended especially when you need strong security on mobile devices over mobile data (3G) network, because of its speed.
SSTP (Secure Socket Tunnelling Protocol) VPN Protocol
SSTP is a protocol invented by Microsoft, thus it is fully integrated into the Windows operating system which makes setup easy. It uses 256-bit encryption through the SSL channel, so it is more censorship resistant due to running on Port 443. An advantage of SSTP VPN is that the protocol is difficult for many ISPs to detect and block. So, if your ISP or country blocks PPTP or L2TP VPN, this could be another option.
SoftEther VPN Protocol
SoftEther is one of the most powerful and open source encryption solution available for Windows, Mac, Linux and other popular Operating systems. This VPN protocol is an excellent solution because it combines the strengths of both, IPsec and OpenVPN protocols. SoftEther is based on powerful SSL-VPN protocol that is able to bypass firewally by tunneling the VPN traffic over HTTPS or over UDP for higher speeds (similar to IPSec). The strongest cryptographic algorithms are guaranteeing security of theVPN tunnel. Features like automatic reconnects and a variety of tunneling methods are in charge of keeping the VPN connection stable and fast at all times. Since it is a newer protocol on the scene, it may not have full technical support that can be found online.