Knowledge Base FAQ

Expert answers on protocol internals, privacy, payment logic, and the remote sandbox

⚡ Smart Protocols & Traffic Routing

Do I need to choose between Reality and Hy2 protocols?
No manual selection needed.
The client features Smart Dual-Engine architecture. The engine constantly probes network conditions and seamlessly switches between the stealthy Reality protocol and the high-burst Hysteria-2 protocol. Just hit "Connect" — the AI handles the rest.
Where are your servers located?
We operate 6 core acceleration regions spanning Asia-Pacific, North America, and Europe:

🇺🇸 USA (Oregon) · 🇰🇷 South Korea (Seoul) · 🇯🇵 Japan (Tokyo) · 🇸🇬 Singapore · 🇩🇪 Germany (Frankfurt) · 🇸🇪 Sweden (Stockholm)

Plus a dedicated 🇵🇭 Philippines native residential IP link for seamless unlocking of Netflix, GCash, and other strict risk-control services.

💡 Selection tip: Network conditions vary by time of day. Log into your dashboard and tap "Test Latency" — the system will automatically find the fastest route for you.
Why is your Reality protocol so hard to detect?
Traditional VPN obfuscation is just a thin HTTP shell. Our Reality protocol, combined with our proprietary "Smart Gateway Camouflage" technology, actually runs a fully operational enterprise web portal on the server. This withstands any shallow or deep active probing (DPI) by the GFW, giving it an extremely high survival rate.
What does "Philippines Traffic Unlock" mean in the app?
This is an advanced server-side traffic routing feature.
When enabled, our servers inject routing rules that precisely divert traffic for Netflix, GCash, and Maya through our rare Philippines native Globe home broadband exit — without changing your current node.
Is "Unlimited Data" really unlimited? Any hidden limits?
Yes, truly unlimited — zero data caps, no hidden throttling.
We impose no monthly, daily, or cumulative data quotas. You can use the service 24/7 non-stop — there is no "data exceeded" slowdown or auto-disconnect mechanism.

Unlimited devices, too. One account can be logged in on your phone, PC, tablet — any number of devices simultaneously. No cap on concurrent connections.

The only spec is a bandwidth guarantee. Each connection is maintained at 25 Mbps or above at all times. This isn't punitive throttling — it's fair resource scheduling to ensure every online user can stream 4K video, join video calls, or download large files smoothly even during peak hours. No "first come, first served" tricks.

💡 In short: Unlimited data, unlimited devices, guaranteed bandwidth, never secretly throttled.
Can I use BitTorrent (BT) through the VPN?
BT downloads are physically blocked inside the VPN tunnel.
We have dual-layer interception rules on both the server and client side. BT traffic is precisely identified and automatically bypassed to your local ISP connection — protecting server IPs from DMCA complaints and maximizing your local download speed.
Connection is slow or won't connect — what should I do?
Try these steps:

① If your current connection is Hy2: In the dashboard, enable any blocking target under "Firewall Rules", then restart the client. The system will automatically switch to the more stable VLESS protocol.

② If your current connection is VLESS: In the dashboard, remove all traffic control rules (Domain Blocking, Philippines Unlock, etc.), then restart the client. Removing the extra routing overhead will noticeably improve connection speed.

🌐 Cloud Sandbox (Remote Browser)

Can the remote browser upload and download files? NEW
Yes, fully open now.
Breaking the last barrier of cloud environment isolation. You can now not only browse in a clean environment but also download target files in the remote browser and securely transfer them to your local machine, or upload local assets to the cloud environment.
What's the difference between "Philippines Unlock" and the Remote Browser?
Philippines Unlock (VPN layer): Routes specific domains through Philippines exit. But your local GPU still renders the page, so hardware fingerprints (Canvas/WebGL) may still be exposed to risk-control systems.

Remote Browser (Physical layer): A complete cloud VM runs on our servers. All browsing computation is done in the cloud — your device only receives an encrypted video stream — achieving true 100% hardware fingerprint physical isolation.
How do I reduce remote browser mouse latency?
Click "Test Latency" in your dashboard to check all nodes and connect to the lowest-ping node (Japan/Korea/Singapore often best).
💡 Hardware Power: Our cloud servers are equipped with NVIDIA RTX 5090 for real-time hardware stream encoding (NVIDIA NVENC technology). With 60FPS adaptive quality streaming, remote rendering latency is compressed to single-digit milliseconds — delivering a crisp, smooth experience far beyond cheap CPU-based software encoding.
What is Tor mode vs. regular remote browser?
Tor Mode (Onion Network): Multi-layer encrypted routing through onion network. Traffic is forced through at least 3 random global relay nodes. Even if the server is seized, tracing back is impossible — ideal for extreme privacy scenarios.
Standard Mode: Direct high-speed overseas exit, faster response (supports smooth HD video). Privacy is based on our complete physical container isolation.
Do I need to install any plugin to use the remote browser?
Zero installation required.
This is a pure web service. Whether you're on a restricted corporate network or a borrowed public device, just open a browser, click "Wake Up", and your sandbox is instantly ready. Close the tab and all records are incinerated.

🔐 Account & Ultimate Privacy

I lost my random code — can I recover it?
No. Absolutely impossible.
Our system embodies the "burn-after-reading" philosophy. After payment and account creation, to guarantee absolute privacy, the system automatically purges all payment order records. We have no database of contact information — recovery is physically impossible.
Treat your random code like a master password — write it down and keep it safe.
Why does Xiexie recommend Monero (XMR) payment?
Monero is the only truly untraceable cryptocurrency. Unlike Bitcoin/USDT with their public ledgers, XMR cryptographically hides sender, receiver, and amount at the protocol level.

Combined with our no-email registration, XMR payment enables a complete 100% anonymous identity loop.
Does it support Kindle and E-ink devices?
Native support, perfect compatibility.
When the system detects Kindle Oasis / Boox or similar e-ink devices accessing the dashboard or browser, it auto-activates "Minimal Reading Mode": all CSS animations disabled, color gradients stripped, high-contrast pure black-and-white UI — smooth and readable even on low-refresh e-ink screens.

🛡️ Trust & Transparency

Why does a VPN service need RTX 5090 GPUs? Isn't VPN just about bandwidth?
The GPU is NOT used for VPN traffic routing.
Our core differentiator is the Cloud Sandbox (Remote Browser) — a full isolated virtual desktop running on our overseas servers. To deliver a smooth, lag-free remote desktop experience to your screen, the server must perform real-time video stream encoding via NVIDIA NVENC (the same hardware encoder used by professional live-streamers and cloud gaming platforms).

It's like asking a hospital "why do you need a CT scanner?" — because diagnosis and prescriptions are two different things. "VPN bandwidth routing" and "cloud desktop GPU rendering" are two entirely different technology layers.
Can Xiexie VPN monitor my passwords, Google account, or bank details?
Technically impossible.
In 2026, virtually 100% of sensitive websites (Google, banks, payment platforms) enforce HTTPS / TLS 1.3 end-to-end encryption. Even if a proxy node wanted to intercept your traffic, all it would see is a stream of irreversibly encrypted gibberish — no passwords, no session tokens, no plaintext of any kind.

Furthermore, our entire identity model is designed to be the opposite of a surveillance platform:
No email required — registration uses only a random code.
Monero (XMR) payment — the world's only truly untraceable cryptocurrency.
Burn-after-reading — payment records are automatically purged after account creation.

💡 In short: We don't collect your identity, we can't read your encrypted traffic, and our payment method is specifically chosen to be impossible to trace. This is the exact opposite of "monitoring."
← Back to Home