Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ ∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞ Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ
To stay ahead of new and evolving threats, cryptostorm has always looked out past standard network security tools. Here, we discuss and fine-tune our work in bringing newly-created capabilities and newly-discovered knowledge to bear as we keep cryptostorm in the forefront of tomorrow's network security landscape.
It's what I call "secure connection layering", effectively placing one VPN connection atop another. Useful when combining CryptoStorm with a less trustworthy/more vulnerable VPN service; CS is always the first connection made. If I ever implement it, it'd be a two-box solution and heavily firewalled to close off leaks.