JavaScript is required
Official Website: https://github.com/viewturbo
safety

Protection, Encryption, Integrity

True security is built on the foundations of protection, where encryption guards our secrets and integrity ensures trust in every connection.

Research

Advanced proxy Security: Kill Switch, Device Segmentation, and Logging Controls

Research

Targeted approach to break through network censorship

Research

Manage Your Network: Network Monitoring

safety

we are use chacha20

We use ChaCha20 for encryption, which is faster and more efficient than AES-256, making it one of the most secure encryption protocols available today.
Free to use

Free to use

Every registered user enjoys a certain amount of free traffic, so quickly experience the pleasure of 8k video!

Flexible package

Flexible package

Supports time-based and traffic-based plans to meet your professional needs.

iOS special optimization

iOS special optimization

After months of hard work by our engineers, we have solved the problem that ordinary VPNs are prone to OOM on iOS.

More extreme diversion

More extreme diversion

Super-top experience, connected to AI, you can hardly feel that your network is using VPN.

More suitable for developers

More suitable for developers

Support http/https/socks5 proxy!

Full private network

Full private network

Accessing to 20000M dedicated network, ultra-low latency and performance, guaranteeing your privacy and security.

The most professional
evaluation

Adam Langley:

ChaCha20 is faster than AES in software, especially on systems without AES hardware acceleration, and at the same time, it provides the same level of security.

Nick Sullivan:

ChaCha20 is a modern encryption cipher that's secure, fast, and an excellent alternative to AES, especially on mobile devices where it performs significantly better.

RFC 7539:

ChaCha20 was selected for its high security margin, simplicity, and excellent performance in software, particularly where hardware acceleration isn't available. It is resilient to known forms of cryptanalysis and timing attacks.