Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ ∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞ Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ Ξ We've updated our CA certificate. All members need to be using the latest ones by Dec 22. See this page for more infoΞ
To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
It's what I call "secure connection layering", effectively placing one VPN connection atop another. Useful when combining CryptoStorm with a less trustworthy/more vulnerable VPN service; CS is always the first connection made. If I ever implement it, it'd be a two-box solution and heavily firewalled to close off leaks.