Simple · Seamless · Secure
A privacy-first VPN that anyone can use.
Sign in. Pick a region. You’re connected. No manual configs, no key management, no noise — and no logs of where you go.
Open architecture · WireGuard tunnel · TLS 1.3 control plane
Built around the boring stuff.
Speed, privacy, and reliability come from disciplined engineering — not marketing. Here’s what we got right.
One-click connect
Authenticate, pick a region, and you're tunnelled. Complexity lives in the service, not on your device.
WireGuard under the hood
Modern, audited cryptography. Ephemeral keys per session. No legacy ciphers, no plaintext fallback.
Multi-cloud regions
Servers come up on demand across Azure, Hetzner and more. If a region's busy, the next one steps in automatically.
Zero-trust by default
Tokens validated end-to-end against your identity provider. Strict CSP, audience-pinned JWTs, and no shared secrets in code.
Open architecture
Source-available code. Documented infrastructure. You can read what we ship before you trust it with your traffic.
No traffic logs
We never log destinations, packets, DNS queries or identifiable metadata. There is nothing to hand over because there is nothing to keep.
Privacy posture
The privacy story isn’t a marketing line.
It’s a set of engineering rules we wrote down and check against on every code change. The full architecture and threat model live alongside the code, in the open.
If a feature would weaken privacy, it doesn’t ship. That’s the deal.
We do not log traffic.
No destinations, no DNS queries, no packet contents, no per-user metadata. Operational telemetry is aggregated and ephemeral.
Keys are ephemeral.
WireGuard keypairs are generated per session and destroyed when the session ends. There is no long-lived material to leak.
Tokens stay where they belong.
Browser sessions hold OIDC tokens in memory only. Admin actions go through a Backend-for-Frontend; the browser never sees the API access token.
We treat ourselves as a threat.
Destructive admin actions require step-up MFA, are CSRF-locked, are idempotency-keyed, and write to an immutable audit log before the action is acknowledged.
Frequently asked questions
What does BlackFoxVPN actually do?
It tunnels your internet traffic through a server in a region you pick. The server is yours for the session and is torn down when you disconnect. No shared box, no shared keys.Where can I run it?
v1 is a Firefox extension and is in active development. A cross-platform desktop client and an authenticated web portal are on the roadmap.Do you log my traffic?
No. We do not log destinations, DNS queries, packet contents or identifiable per-user metadata. Operational telemetry is aggregated. There is nothing to hand over because there is nothing to keep.How is this different from a free VPN?
Most free VPNs make money by logging or injecting. We don't. Servers are your own session-scoped instances, not a shared pool, so the failure modes are obvious and limited.Is it open source?
The architecture, threat model, and infrastructure are open and documented. The implementation is source-available so you can audit what you trust.What happens if your service goes down?
You disconnect — that's it. The client fails closed: no traffic leaks out the bottom in clear text. Your machine is exactly where it was before you connected.