Frequently Asked Questions
Answers to common questions about Stealth. If you don't find what you're looking for, check the Troubleshooting guide or contact support.
General
What is Stealth?
Stealth is a comprehensive privacy and security suite for Windows that combines VPN protection, DNS encryption, ad blocking, and system utilities in one application. It protects your online privacy through multiple layers of encryption while providing tools to maintain your system.
Do I need technical knowledge to use Stealth?
No. Stealth is designed to work out of the box with sensible defaults. Click Connect and you're protected. Advanced features are available for users who want more control, but they're not required for basic protection.
How many devices can I use with one license?
Your license allows activation on multiple devices. The exact number depends on your subscription plan. Check your account panel in Settings to see your device limit and current usage. You can share your license with family members.
How do I transfer my license to a new computer?
Install Stealth on the new computer and enter the same license key. If you've reached your device limit, either remove Stealth from an old device or contact support to reset your device registrations.
VPN & Privacy
Is my internet activity logged?
Stealth does not log your browsing activity, connection times, or traffic data. We maintain minimal logs necessary for service operation (like aggregate bandwidth for capacity planning) but nothing that could identify your individual activity.
Can my ISP see what I'm doing when VPN is on?
No. Your ISP sees only encrypted traffic going to Stealth's servers. They cannot determine which websites you visit, what data you send, or what services you use. From their perspective, all your traffic looks identical.
What's the difference between VPN and DNS encryption?
VPN encrypts all your internet traffic and hides your IP address. DNS encryption specifically protects your domain lookups (converting website names to IP addresses). Both work together. VPN protects the traffic, and DNS encryption ensures even your lookups are private.
Should I use VPN and Tor together?
You can, but it's usually unnecessary. VPN provides strong privacy for most users. Tor adds maximum anonymity at the cost of significant speed reduction. Use Tor when you need the strongest possible anonymity; use VPN alone for daily browsing.
Will VPN slow down my internet?
Minimally. Most users see less than 10% speed reduction. WireGuard, the protocol Stealth uses, is highly optimized for performance. Stealth automatically connects to the optimal server for your location to minimize latency and maximize speed.
Features
What does Stealth Block actually block?
Advertisements from major ad networks, tracking pixels, analytics services, and known malware domains. In Conservative mode, it maintains website functionality. Aggressive mode blocks more but may break some sites.
Can I use Stealth Block without VPN?
Yes. All Stealth features can be used independently. You can enable ad blocking while keeping VPN disabled, or use any combination of features.
How does StealthAI work?
StealthAI is an AI assistant that can execute real system operations through natural language. It has access to file management, system maintenance, and process control functions. It asks for confirmation before making changes to your system.
Is the password manager secure?
Stealth Vault uses AES-256 encryption with PBKDF2 key derivation. Your data is encrypted locally and never leaves your device unless you explicitly export it. Even we cannot access your stored passwords.
Technical
Does Traffic Encryption duplicate VPN encryption?
The Traffic Encryption feature has been removed from Stealth. WireGuard already provides military-grade encryption for all your traffic, making additional encryption layers redundant. Your connection is fully encrypted with ChaCha20-Poly1305 when the VPN is active.
What encryption standards does Stealth use?
VPN uses WireGuard with ChaCha20-Poly1305. File transfers use AES-256-GCM. Local storage uses AES-256-CBC with PBKDF2 key derivation (100,000 iterations). All implementations use well-audited cryptographic libraries.
Does Stealth conflict with other security software?
Stealth works alongside most security software including Windows Defender. Some corporate VPN clients may conflict. Use Split Tunneling to exclude work applications. Third-party antivirus occasionally flags VPN drivers; add exceptions if needed.
What data does Stealth collect?
Only what's necessary for license validation and basic service operation. Bug reports include system information you can review before submitting. We do not collect browsing history, connection logs, or personally identifiable activity data.
Support
How do I report a bug?
Click Settings → Report Bug, or use the Bug Report form in this documentation. Include steps to reproduce the issue and attach a screenshot if relevant.
How long does support take to respond?
Most tickets receive a response within 24-48 hours. Critical issues are prioritized. All updates are sent to the email address you provide in your ticket.
Where can I get help outside of tickets?
This documentation covers all features in detail. You can also join our Discord community for community support and discussions.