Glacier's cloud based immutable VPN infrastructure is launched unique for each organization. Glacier controls change across multiple system dimensions in order to increase uncertainty for attackers, reduce their window of opportunity, increase the costs of their attack efforts, and keep end user devices anonymous.
With a tap of a button, all of your data leaving your device is encrypted and exits a temporary server you control. We’ve designed the Glacier Core VPN with four major features:
Supports only IKEv2 with strong crypto (AES-GCM, SHA2, and P-256). Does not support legacy cipher suites or protocols like L2TP, IKEv1, or RSA.
Reduce your digital footprint by enabling Core VPN. Tear it down when you no longer need it.
Blocks ads, malware, and unwanted content with daily blacklist updates.
Designed on current versions of Ubuntu and StrongSwan.