InvinOS
  • 🛡️ Invinos Documentation
  • 📌 Introduction to Invinos
  • 🌐 Why Invinos Exists
  • 🧱 System Architecture Overview
    • Core Design Layers
      • Network Layer
      • Browser Layer
      • Wallet & Asset Layer
      • Computation Layer (AI)
      • Identity Layer
      • Interface & Dashboard Layer
    • Interface & Dashboard Layer
    • Mobile-First Optimization
  • 🧠 Core App Modules
    • Stealth Browser
    • Privacy VPN
    • zkMixer
    • Ghost Wallets
    • Anonymous DEX
    • Local LLM
    • Context Lock
    • Privacy Dashboard
    • zk-Identity
    • Governance
  • 🔄 Workflow: Real User Actions
    • Private Browse Flow
    • Crosschain zkMixer Flow
    • Encrypted AI Interaction Flow
    • Full Privacy Session Example
    • Token Utility and Access Flow
  • 🔐 Who use Invinos?
    • DeFi Traders Avoiding Wallet Tracking
    • Journalists Operating Under Surveillance
    • Mobile Users Seeking Default Privacy
    • Builders and Devs Testing Encrypted Flows
    • Community Contributors Managing DAO Work Privately
  • 💸 VINOS Tokenomics
    • Supply and Distribution
    • Platform Fee Structure and Holder Tiers
    • Governance and Protocol Evolution
    • Sustainability Through Utility
  • 🧭 Invinos Roadmap 2025.
    • Foundation Layer (Q2 2025)
    • Utility Expansion (Q3 2025)
    • Ecosystem Launch (Q4 2025)
  • 🤝 Get Involved
Powered by GitBook
On this page
  1. 🧠 Core App Modules

Privacy VPN

The VPN module included in Invinos is not like commercial VPNs that depend on central servers. Instead, it is a multi-hop, decentralized relay network that encrypts and obfuscates all traffic. Every data packet leaving the device is wrapped in multiple layers of encryption and passed through a rotating set of relays, none of which can see both the source and the destination.

DNS queries are handled through encrypted resolvers to prevent exposure of Browse intent. IP masking is constantly updated to prevent location tracking, and the exit relays are dynamically selected to avoid repeated routing through any single point. The VPN activates automatically with the system and does not require manual configuration.

This means users can access public internet services without ever exposing their real IP address or physical location — not even to Invinos.

PreviousStealth BrowserNextzkMixer

Last updated 3 days ago