Skylaski VPN Guide 0.1b

How VPN Works

The purpose behind (VPN) Virtual Private Networks, are to connect devices so they may exist together on the same logical network, even though the actual network these devices are using span multiple providers, protocols, and geographies.

VPN technologies can essentially provide an encrypted tunnel between two devices, providing privacy from any other devices that may exist on the underlying networks. This could be any network devices owned by other clients, internet or mobile service providers.

Basic client software is readily available from OpenVPN® & WireGuard® Open Source projects. Skylaski is responsible for providing and endpoint with the resources to provide a private connection to the internet.

Skylaski’s servers do not log any specifics regarding the host or destination of any connection & provides DNS services that ensure privacy in domain name resolution.

If our users have the capabilities, it is even possible for them to configure their own servers using the services Skylaski provides.

Why Use a VPN?

Unless computer security is your profession or passion, the average user doesn’t have the time or knowledge to truly discover how safe a network is before requiring internet services to pursue their own ends.

Today the user already demands HTTPS & Multi-factor Authentication as commonplace features among any popular Internet Service, be it a website or an app. VPN can unlock a level of confidence when a user’s environment is potentially hostile to freedom of speech; an idea that is commonplace among the majority of developed nations.

Especially today with users often generating more data and requiring more connectivity while they’re mobile. In fact the more mobile a user is, the greater they’re potential ‘leak’ of information into the larger networks they use.

Combined with the ongoing data-breaches among common service providers in many sectors not excluding some of the most important and fundamental, a target can easily be triangulated and identities easily stolen.

Any plain text (unencrypted) traffic could provide enough identifying information for network viruses to find their targets.

VPN technologies today with the advancements in computing & network technology has almost no impact on a user’s overall experience when using their devices.

Users are already familiar with installing antivirus software and keeping them up to date. Open Source VPN mobile apps today are extremely simple to use. Skylaski is simply a service provider.

Get A VPN Client

Skylaski supports OpenVPN® & WireGuard® VPN technologies.

OpenVPN®

OpenVPN® is supported on more devices and uses OpenSSL encryption technology, but can be slower on devices without a lot of resources.

WireGuard®

WireGuard® is a new technology that is extremely fast & uses the latest in encryption technology. However, WireGuard® is still in it’s infancy and might not be easy to use or not have the features desired by the user.

Generate Keys and Configuration File

Once a user has established a VPN plan with Skylaski they will have access to their VPN Account page where they can not only choose their VPN Technology, but also name their client something familiar, and choose what Skylaski server is closest to them.

Skylaski attempts to suggest the closest location possible.

Users can purchase plans that provide more than 1 client.

In order to acquire an encryption key & configuration for the client, users will first click the generate button for their preferred client.

Once generated, the configuration file with the private key inline will be provided to the user. Its the responsibility of the user to keep this key safe, but if they suspect its compromised, they’re welcome to revoke & regenerate.

Skylaski provides a user with the configurations files needed to enable an OpenVPN or WireGuard VPN Client to connect to our services. What a user does with these files is out of our control.

Connect to Skylaski VPN

Depending on your VPN Client, installing the configuration file & keys will be slightly different. Generally speaking however, the client software will provide the means to load a file from the devices filesystem.

Certain devices can be setup to recognize the filetype & open the right application when opened.

Verifying Connectivity

One way of validating connectivity is to visit a website that will inform you the IP Address you’re connecting to it from. https://icanhazip.com or https://ipleak.net/ will work.

This website will also verify whether or not the source of your DNS requests are being leaked as well.

Your reported IP Address should be same as the VPN server you’re connecting to.