V2ray, Psiphon and SSH VPN Client
NapsternetV is a V2ray and Psiphon VPN client tool to browse the internet privately, securely and circumvent internet censorship.
It supports V2ray protocols vless, vmess, shadowsocks, trojan and socks.
It also supports psiphon protocols SSH, OSSH, UNFRONTED-MEEK-OSSH, UNFRONTED-MEEK-HTTPS-OSSH, UNFRONTED-MEEK-SESSION-TICKET-OSSH, FRONTED-MEEK-OSSH, FRONTED-MEEK-HTTP-OSSH, MARIONETTE-OSSH, TAPDANCE-OSSH, CONJURE-OSSH.
The app also supports custom psiphon protocols added by us; these being; UNFRONTED-WS-OSSH, UNFRONTED-WSS-OSSH, FRONTED-WS-OSSH and FRONTED-WSS-OSSH. These new custom protocols use OSSH over websocket which can be plain or secure websocket, and can be unfronted or fronted over a CDN. These protocols are only supported by the NapsternetV app and require a custom psiphond server whose binary can be accessed at server binary works as the usual psiphond server but with additional support for our custom psiphon protocols.
Please note that Psiphon QUIC Protocols aren’t supported “yet”.
Lightning fast VPN, connect to the world in 1 second
Thunder VPN is a lightning-fast app provide free VPN service. Not need any configuration, just simply click one button, you can access the Internet securely and anonymously.
Thunder VPN encrypts your Internet connection so that third parties can’t track your online activity, making it more secure than a typical proxy, make your Internet’s safety and security, especially when you using public free Wi-Fi.
We have built a global VPN network included America, Europe and Asia, and expand to more country soon. Most servers are free to use, you can click the flag and change server as any times as you want.
Why choose Thunder VPN?
Large number of servers, high-speed bandwidth
Choose apps which using VPN (Android 5.0+ required)
Works with Wi-Fi, 5G, LTE/4G, 3G and all mobile data carriers
Strict no-logging policy
Smart choose server
Well-designed UI, a few ADs
No usage and time limit
No registration or configuration required
No additional permissions required
Tiny size with high performance
User privacy is very important to us. If you compare to other similar apps, you will find that our app has almost the fewest permission required and the smallest package size, which means that less sensitive information is collected and less uncontrollable risks from third-party code. This app is a very good choice for privacy.
Download Thunder VPN, the world’s fastest secure virtual private network, and enjoy it all!
If Thunder VPN connect failed, don’t worry, you can follow these steps to fix it:
1) Click the flag icon
2) Click the refresh button to check servers
3) Choose the fastest and most stable server to reconnect
Hoping you suggestion and good rating to keep it growing and make it better 🙂
VPN related introduction
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network.
Individual Internet users may secure their transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions.
VPNs cannot make online connections completely anonymous, but they can usually increase privacy and security. To prevent disclosure of private information, VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques.
Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points. Mobile VPNs have been widely used in public safety, where they give law enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, while they travel between different subnets of a mobile network.