VPN
The VPN creates an encrypted tunnel between your device and Stealth's servers, protecting all your internet traffic from surveillance and interception. Once connected, your real IP address is hidden and replaced with one from our server network.
Connecting to VPN
To establish a VPN connection:
- Open Stealth from your Start menu or system tray
- Click the Connect button in the main window
- Wait for the status to change to "Invisible"
Once connected, the shield icon turns purple. Your new VPN IP address is displayed below if you have "Show IP Address" enabled in settings.
Server Selection
Stealth automatically connects to the optimal server based on your location. The VPN service automatically selects the best server for your connection, providing the optimal balance of speed and reliability.
Understanding the Connection
When VPN is active, all internet traffic from your device is:
- Encrypted using ChaCha20-Poly1305 before leaving your device
- Tunneled through the WireGuard protocol to our servers
- Decrypted at the server and forwarded to its destination
- Returned through the same encrypted path
This means your ISP sees only encrypted traffic going to a single destination. They cannot determine which websites you visit, what data you send, or what services you use.
Performance Considerations
VPN encryption adds minimal overhead to your connection. Most users experience less than 10% reduction in speed compared to their base internet connection. Factors that affect VPN performance include:
| Server Distance | Servers closer to your physical location provide lower latency |
| Server Load | Less crowded servers offer better speeds |
| Base Connection | Faster internet connections see less proportional impact |
| Encryption | WireGuard is optimized for speed with minimal CPU usage |
When to Use VPN
VPN protection is recommended whenever you're online, but is especially important when:
Using public Wi-Fi - Coffee shops, hotels, and airports are common targets for network attacks. VPN encrypts your traffic even on compromised networks.
Accessing sensitive accounts - Banking, email, and work applications benefit from the additional security layer.
Avoiding ISP tracking - Many ISPs log and sell browsing data. VPN prevents this surveillance.
Bypassing restrictions - Access content that may be blocked on your network or in your region.
Troubleshooting
If you're having trouble connecting, try these steps in order:
- Verify your internet connection works without VPN
- Restart the Stealth application
- Check if your firewall is blocking Stealth
- Restart your computer
If problems persist, submit a support ticket with details about your connection issue.