Pango Platform
HomeConsole
  • What is Pango Developer Platform
  • Getting started
    • Sign up on the Management Console
    • Create a new project
    • Switch projects
    • Change console settings
    • Edit your profile
    • Try out the demo app
    • Keep exploring
    • Deprecation and Sunset
  • Console details
    • Dashboard
      • General
      • Location loading
    • Users
      • User page
    • Active sessions
    • Network
      • Countries
      • Locations
      • Pools
        • Optimal location
        • Location rules
    • Settings
      • General
        • Project config description (JSON format)
          • Server selector (JSON format)
          • Request selector (JSON format)
      • Authentication methods
        • Auth Plugin requirements
      • VPN
        • General
        • VPN Bypass list
        • Client Networks
      • Member
    • Export Data
    • Log
  • SDK
    • Unified VPN SDK
      • Features
        • Personal Bridge
      • Tunnel Vision and Tunnel Crack Prevention
      • Unified VPN SDK Feature Comparison By Platform
    • Unified VPN SDK for Android
      • Setup
        • Application Setup
        • Proguard Rules, Notification, and Analytics Configurations
        • Backend URL Configuration
      • Usage
        • Initialization
        • VPN Interface
        • Backend interface
      • Features
        • Hydra Protocol
          • Location profile (Hydra only)
        • Custom sdk dependencies
        • Deferred VPN Service Initialization
        • Authentication
        • Client Network List (CNL)
        • OpenVPN transport
        • Wireguard Transport
        • Reconnection strategy
        • Single Protocol SDK
        • Killswitch
        • Domain route via VPN
        • Process route via VPN
        • Process Bypass
        • Domain Bypass
        • Traffic rules
        • VPN Node DNS Configuration
        • Multihop
          • Optimal Location
      • Exceptions
      • Version migration
      • Changelog
    • Unified VPN SDK for Apple
      • Setup
        • Application Setup
        • Network Extension Setup
          • Network Extension Setup for tvOS
        • Backend URL Configuration
      • Usage
        • Single Protocol SDK
        • Unified SDK
        • Logging
        • Decoding Encoded VPN SDK Logs
        • Analytics Configuration
      • Features
        • Deferred VPN Service Initialization
        • Authentication
        • Wireguard Transport
        • Reconnection strategy
        • Killswitch
        • Domain Bypass
        • Multihop
          • Optimal Location
        • Client Network List (CNL)
        • Domain route via VPN
      • Changelog
      • API Reference
    • IPSEC VPN SDK for Apple
    • Unified VPN SDK for Windows
      • Setup
        • Backend URL Configuration
        • Service command line arguments
        • ARM Platform Support
      • Usage
        • CoreAPI
        • Events
        • Generating a Unique Device Identifier
        • Error processing
        • Pipe Messaging
      • Features
        • Traffic protection
          • Killswitch
          • Prevent IP Leaks
          • Block Local Networks
        • Other
          • Firewall
            • DNS Monitor
            • Process Bypass
            • Domain Bypass
            • Process route via VPN
            • Domain route via VPN
          • Throttling
          • Optimal Location
          • Common issues
        • Hydra Protocol
          • CustomDNS, UserDNS, MultiHop, VpnProfiles
        • OpenVPN Protocol
        • Wireguard Protocol
        • IPSec Protocol
      • Collecting Debug Logs
      • Changelog
    • Unified VPN SDK for Routers
      • SDK. Shared library.
      • Configuration Interface (CI)
        • Unix Domain Sockets CI
        • REST API CI
  • REST API
    • Partner API
  • Sample applications
    • Unified VPN SDK demo for Windows
    • Hydra VPN SDK demo for iOS
    • IPSEC VPN SDK demo for iOS
    • Unified VPN SDK demo for Android
    • Hydra VPN SDK demo for OpenWRT
    • OpenVPN configuration file
  • Resources
    • Use cases
      • Public VPN
      • Business VPN
        • Creating a Business VPN Project
        • Wi-Fi Security for Business
      • Application anti-blocking
    • How-to
      • Create a Firebase project for User Authentication
      • AWS CloudFront Distribution of the Platform URL
      • How can I get Shared Secret key from iTunes Connect for In-App Purchase
  • FAQ
    • General
      • VPN Platform Flow
      • What data is collected by the Platform?
      • What analytic data is collected by your SDK?
      • How the Platform restricts access to our data?
      • Why DNS Leak tests often indicate positive result?
      • Do we need to perform endpoint health checks?
      • How is the VPN exit node found?
      • How are streams re-marked if VPN is enabled/disabled on an active flow?
      • Is there a maximum number of supported devices?
      • Are both IPv4 and IPv6 supported?
      • What is the MTU of the tunnel?
      • Are any redundancy measures in terms of reliability provided?
      • Is there any load balancing?
      • Do you block broadcast and multicast to/from the VPN?
    • List of Open Source libs
Powered by GitBook
On this page

Was this helpful?

  1. Resources
  2. Use cases

Public VPN

Learn about VPN and a way of providing unlimited number of users with secure, fast, anonymous and unrestricted access to any website. You can create your own application and upload it anywhere.

PreviousUse casesNextBusiness VPN

Last updated 4 months ago

Was this helpful?

VPN stands for Virtual Private Network. A VPN connects your device to the Internet through another computer. You’re connecting to the Internet through another computer’s Internet connection, rather than directly through your own. Aside from that, the VPN also encrypts the data you send, so that it’s kept secure.

A simple analogy would be sending a postcard with and without an envelope (via VPN and without it, respectively). If you send your postcard without an envelope, somebody (an Internet Service Provider or even a hacker) can easily read its contents. On the other hand, if you use an envelope, the postcards contents will remain much harder to read, thus preserving your privacy. It is as simple as that!

VPN protocols determine exactly how data is routed through a connection. These protocols have different specifications based on the benefits and desired circumstances; for example, some VPN protocols prioritize data throughput speed while others focus on masking or data packets for privacy and security. We offer SDKs using 3 different VPN protocols: IPSEC, OpenVPN and proprietary Hydra protocol.

  • IPSEC/L2TP: Layer 2 Tunnel Protocol is a replacement of the PPTP VPN protocol. This protocol does not provide any encryption or privacy out-of-the-box and is frequently paired with security protocol IPSEC. Once implemented, L2TP/IPSEC is extremely secure and has no known vulnerabilities. Keywords: widely used, good speeds, easily blocked due to reliance of UDP on single port.

  • OpenVPN: OpenVPN is an open source protocol that allows developers access to its underlying code. This protocol has grown in popularity due to its use of (virtually unbreakable) AES-256 bit key encryption with 2048-bit RSA authentication and a 160-bit SHA1 hash algorithm. Keywords: open source, strongest encryption, slower speeds.

Public VPN is the product we developed so you can let anyone use fast, secure and safe VPN with access to 30+ locations with 1000+ servers. You can either use a sample designed/developed application or build your own app from scratch using provided SDKs and publish it on a corresponding platform. A user just presses 'Connect' and receives all the benefits of a secure network. The application creates a VPN tunnel that connects the user to the Internet.

The main features of Public VPN are:

  • Security. All the traffic from your computer to the node is encrypted, even if you are using a public network, so a potential hacker is much less likely to intercept it. Also, the government, corporations and your Internet Service Provider (ISP) cannot collect and process your traffic, making your browsing history more private (see figure above);

  • Anonimity. Your real IP address is concealed, so it allows you to maintain your online privacy and search the web anonymously. Whatever node you choose, thousands of people are using it day and night, thus it is much harder for other people to access your search history;

  • Content unblocking. By connecting to a server in a different country, you can change your geographical location. Access any website in countries that have restricted connection to those sites.

To create an application for users, we provide SDKs for different platforms and with different VPN protocols:

If you are looking for a sample application, you do not have to go elsewhere, we got them right here:

When using a sample application, you just have to set a server to connect to and you are good to go.

Hydra: to learn about this protocol, please refer to the .

(supports Hydra and OpenVPN protocols)

FAQ
HydraVPN SDK for Routers
encrypting
VPN SDK for Android
Hydra VPN SDK for iOS/macOS
IPSEC VPN SDK for iOS/macOS
Hydra SDK for Windows
Hydra VPN SDK demo for iOS
IPSEC VPN SDK demo for iOS
Hydra VPN SDK demo for Android
Hydra VPN SDK demo for Windows
OpenVPN SDK for Windows