Main Page
About Us
Why Our Services ?
Privacy & Security Articles
Public Key
Our Policies

Tri Support

For support please email us at Our response time is within 24 hours while average is within 4 hours ! We compiled a general FAQ which will be updated regularly with common questions & answers.

General Services FAQ.

Q: Do i have to provide personal details to make use of your services ?
A: Absolutely not, here are a few important advantages compared to normal internet service providers:

- No personal details required
- No automatic payments or subscriptions required
- No contracts to sign
- Anonymous payment methods supported

Q: Can I browse the web anonymously with your websurfing services ?
A: Yes, this is one of the core services we offer.

Q: What is the difference between the VPN solution and SSH Tunnel solution ?
A: In a nutshell the VPN solution is specifically easy and perfect to anonymize all your internet traffic instantly in a couple of steps. It is equally secure and since it's OpenVPN you are assured of software which is opensource, free of backdoors and secure. The SSH Tunnel solution is an advanced shell account which is usually ordered by clients who need the features like running a BNC, Eggdrop, develop linux programs and other usage while the surfing part is only secondary to them. The SSH service requires each application to be separately setup to make use of an encrypted tunnel through one of the internal proxies. The similarities of the SSH service and the VPN are only the surfing feature, the rest is totally different.

Q: Can I use SSH2 tunnels for other services too ?
A: Yes, they can be used for anything, ranging from IRC, IM, VOIP, P2P and so on. You can also chain multiple SSH accounts to tunnel to your destination using 2,3,4,5 or more hops. If you need assistance in setting up a tunnel please contact us and we'll be there for you.

Q: Do you offer VPN solutions ?
A: Yes, please check the VPN section in our services page. Our VPN solution is based on the known opensource OpenVPN project offering one of the best types of encryption and reliability. In case you wonder why we don't use the PPTP based VPN solutions this is because of its insecurities and proven weak encryption. It would be against our vision to offer such flawed service to unknowing clients while they rely on us for their privacy !

Q: Does your SSH / VPN service keep logs like many providers do ?
A: No, we don't log your surfing behaviour and, for example, which connections you make from our servers to an address. This means we do not keep a log of which sites you visit, what you do online or the contents of any transmission. We believe in the ideal that people have the right to enjoy privacy and more anonymity as they wish. Despite the harsh climate for privacy nowadays we are proud to be offering these services you can rely on. If we did keep such logs we'd feel required by our own ethics to state this to our users and process it in our policies section. There are no second chances for those who especially depend on us to protect their privacy as it could endanger their real life situation. You might ask yourself if it means that criminals can do whatever they want without consequences ? The answer is no; such person might get away the first time since we don't log but if we receive serious complaints we'll investigate realtime until we find the account responsible and take appropriate measures. We have no tolerance for criminal behaviour like for example childporn, phishing, scamming and spamming.
Q: I am a wireless user, does your SSH / VPN also protect me ?
A: Yes, because all your traffic is encrypted and passing through the tunnel. This means no matter what is captured by a malicious entity it cannot be read because of strong encryption.
Q: Can I also securely send/receive email anonymously ?
A: Yes, feel free to check our Secure eMail service which offers features like PGP encryption, encrypted file storage, removal of your real IP, TLS(SSL) secured protocols like SMTP/POP3/IMAP, TLS Webmail and much more.

Q: What are email aliases ?
A: These are email addresses which you can use to protect your real email address from spam and other malicious aims.

Your real email address is, you can create an alias like When people send email to these aliases they are automatically forwarded to your real email account. This account can be any account you wish, it doesn't need to be your secure email account but can be any external account you wish.
Q: My business has special hosting needs, can you advise ?
A: Yes, we can offer you hosting, servers in multiple jurisdictions and can advise which location is best for your specific needs. Over the years we have built good relationships with datacenters and the right people to get things done. We also offer our server clients an optional administration service taking care of security, performance checks, tuning, patch management, scaling and more.
Q: What reasons could I have to use your services ?
A: Many reasons exist, think of avoiding direct contact with malicious sites / services trying to infect or break into your computer. You can use email service features like aliases which can be thrown away when not needed anymore keeping your main email address free from spam and other malicious contents. Your provider or some entity is logging your traffic is also a good reason to use our VPN or SSH solutions. You are in a difficult situation in life and cannot afford to reveal yourself to entities looking for you. For special needs like business, travellers and others we are one of the best privacy solution providers outthere.
Q: What is Privoxy ?
A: Privoxy is a proxy which can act as a bridge between another proxy/destination and you, filtering contents for malicious code, popups,advertisements which you can encounter on websites you're visiting.
Q: What are the advantages of your Offshore Hosting Services ?
A: We offer offshore hosting in multiple jurisdictions which allows your personal / business needs to be in a country where they are allowed or do not break any law. Feel free to contact us for advise when choosing a jurisdiction for your offshore privacy requirements.

Q: What is Squid Proxy ?
A: An extended proxy which you can use just like privoxy over your ssh tunnel to access websites and other services. This is especially handy if you already have protecting software on your computer and don't want to use privoxy.
Q: What happens with my services if you guys disappear ?
A: As of this writing we are now providing the community for a decade with privacy services, in case of emergency we have a so called trust which will handle all ongoing services and projects.
Q: Can you register domain X ?
A: Yes, we can register a domain in almost all existing TLDs which is short for top level domain like COM/ORG/NET and many others including the new TLDs.
Q: What tools can I use to create SSH tunnels ?
A: All linux/unix-type distributions have a ssh client you can use to create encrypted tunnels. For windows you can use Putty and others which are free or commercial.
Q: Do you provide also extra services like consultancy and custom solutions ?

A: Yes, you can hire us for a fair price to do system administration, troubleshoot, setup, secure, solve technical issue's you might be dealing with and need professionals on your side.

Copyright © 2005-2019 Trilight Zone. All rights reserved.