Frequently Asked Questions

See also the
"How to" video


What is SecurityKISS Tunnel?

SecurityKISS Tunnel is the program and the service that allows you access to the Internet despite censorship and local restrictions. It also makes your connection secure and prevents others from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network.

Technically SecurityKISS Tunnel is a Virtual Private Network (VPN) implementation. It creates a VPN between your computer and our security gateway so that all your internet traffic travels through an impenetrable, non-transparent tunnel.

Is it completely free?

We offer both a free and paid version. The free software allows access to the service completely free with a limited daily usage.

The paid version has a higher usage limit in the monthly cycle and additional features. See the packages for full features.

Will the service remain free, or will you charge a fee in the future?

There will be a free version of the service available all the time.

My ISP provides me the Internet link with 10 GB per month. If I use your JADEITE plan, will my montly limit increase to 50 GB ?

No. SecurityKISS is not Internet provider and we cannot add an extra Internet link to your PC. If you ISP's monthly limit is 10 GB you will not be able fully use the quota of the JADEITE plan so it makes more sense to order the cheaper OLIVINE plan with 20 GB/month instead.

Thanks to the fact that SecurityKISS is using compression before data is encrypted and transferred. it is possible that the total data sent and received may be larger by about 10 or 20 percent depending on the type of traffic. So while there is no way to increase the 10 GB limit of your ISP, you may slightly increase the amount of user data transferred (for example to 11 GB).

How can I get a free account to use your service? Do you need any personal information from me?

You don't need an account. Just download the program and use it. Your installed program is identified only by a client ID.

We respect your privacy and your time so we don't need to know your name and you don't need to waste time filling in forms.

No more usernames and passwords!

How long do I need to wait for account activation?

Customer accounts are activated immediately after we receive the payment (usually it takes a few seconds).

Which operating systems are supported?

Since March 2012 the SecurityKISS service is available for all users on all platforms that allow OpenVPN and L2TP/IPsec connections. In particular the native SecurityKISS Tunnel program works in Windows XP, Windows Vista, Windows 7, Windows 8 and Windows 8.1. We also released a customized Tunnelblock installer with SecurityKISS configuration for Mac users. iPhone and iPad users can download a ready to use configuration for GuizmOVPN.

Apart from that it is possible to connect using the built-in L2TP/IPsec software on most modern operating systems (Linux, Android, DD-WRT, Symbian).

Can I run SecurityKISS Tunnel on a 64-bit operating system?

Yes, it works on 64-bit Windows.

Does SecurityKISS work with Windows 7 and Windows 8?

Yes, both 32-bit and 64-bit versions of Windows 7 and Windows 8 are supported. We also tested SecurityKISS Tunnel successfully on Windows 8.1

Where are the VPN servers located?

While the company is based in Ireland the VPN servers (security gateways) are in the UK, US, Germany, Switzerland, Canada, Poland, Sweden and the Netherlands. We are setting up new servers in other locations.

Are you planning to offer more servers in other countries?

Yes, we will publish locations of the servers once they are available.

As this software is very good to keep the system secure, why are you providing this software free of cost?

We make the software available for free to promote the quality and reliability of our service to everyone. We also offer paid packages, however we will maintain a free version of the service all the time.

We believe in the formula:

Satisfied User = Potential Customer

Free users can still enjoy the benefits of SecurityKISS Tunnel but they need to manage their limits judiciously.

When will the usage limit be dropped? I want to run this tunnel all the time.

The usage limit will remain and may be increased in the future.

For free users it is possible to use SecurityKISS Tunnel all the time if they manage their limit carefully while we provide paid versions of the service with full support and high usage limits. You can view the paid packages here.

For free users we increased the limit to 300 MB/day

Can I connect with SecurityKISS Tunnel from many PCs and can they be online at the same time?

With one client ID (with the same instance of the program) you may connect from many PCs. The limitation is that only one client ID can be connected to the same server at the same time.

In the paid version you get more than 15 servers so you may connect from the same number of PCs.

It is said the connection speed is up to 100Mbit/s but I can't even reach half of it.

100 Mbit/s is the physical upper bandwidth limit of the external server link. This doesn't mean however, that you will be able to keep connected at maximum bandwidth indefinitely as the speed depends on many factors mentioned below.

I have looked at the status on the Tun/Tap adapter and it says it is running at only 10Mbit/s.

"The Tun/Tap adapter will run at whatever speed the hardware and network will support - the 10Mbps you see in the interface properties doesn't really mean anything - it's really just a Windows artifact from the days when ethernet interfaces were always hardware and never virtual." By James Yonan

The connection speed in the tunnel is lower than my plain internet connection.

The tunneled connection speed will never be as fast as your plain internet connection because:

To improve the tunneled speed you can:

Is there any speed difference between plans?

The primary difference is between the free GREEN plan and other plans. In the free version the bandwidth is controlled in order to prevent traffic congestion when a large number of free users connect to the service.

On the other hand, in the paid plans the connection speed is limited only by the 100Mbit bandwidth of our ethernet server, your internet bandwidth and the time needed for data to travel between your PC and the server.

The same rules apply for OLIVINE, MALACHITE, JADEITE and EMERALD plans so the speed should be the same for all paid plans; however, in the higher premium packages you receive more servers which are underloaded (since only high end plans customers can use them) so most of the bandwidth is available to you.

How can I upgrade my current plan?

If you bought 1 month plan and exceeded your monthly data allowance before expiry date, just buy another package and your account will be upgraded immediately. In order to upgrade your existing 3 month, 6 month or 12 month plan please contact Support


How to find my client ID?

You will find instructions here.

How does the SecurityKISS usage meter work?

You will find instructions here.

Can I change servers that I am connecting to?

Yes. SecurityKISS has servers in many locations and you can change server at any moment. If you don't select a server from the list before connection the program will connect to a random one.

When you need a server in a particular location you can select the server manually from the list.

Where is the server list?

The server list opens in a dedicated dialog window. You may get there from the menu bar or by clicking the bottom panel button. See screenshots.

How do I change server?

Once you open the server list, select the server you want to connect to and click 'Apply'. If you are connected via tunnel, disconnect and connect again. After clicking 'Disconnect' wait a few seconds before reconnecting to let your operating system return to a stable state.

After a successful connection the bottom panel should display the new IP address and corresponding country flag.

See the full instructions here.

What does the 'Customer Only' column mean in the server list?

Customer only servers are not used by free users so they are not overloaded, their IP addresses are not publicly known to everyone and have a better reputation on most websites that use IP monitoring or filtering.

I had to reinstall my Windows. The SecurityKISS Tunnel link from the activation email does not work anymore. How can I install SecurityKISS on the new system?

If you lost your SecurityKISS Tunnel installer or you want to install it on a new PC, you can download individually generated software from the client area panel at any time:


Please go to the Download tab and your operating system subtab. Generating the software usually takes up to 30 seconds and it includes security certificate and up to date server list for your client ID.

How do I use the Client Area Panel?

You will find instructions here.


Does this software contain a keylogger, virus, malware or spyware? When I try to install this software the system shows a warning.

No, the software is completely safe. The software is a property of SecurityKISS.com and it was written with the use of open source technologies. It means that it does not contain any third party component that would be malicious code or could present a potential risk.

The warning is triggered by TUN/TAP driver installation. It simulates an Ethernet device and because it is quite a low level operation your operating system displays the warning. The TUN/TAP driver code is a part of OpenVPN project and is entirely safe, tested and used by millions of users.

SecurityKISS Tunnel has been certified by Softpedia as '100% CLEAN'.

Below is the original note from Softpedia:

'SecurityKISS Tunnel has been tested in the Softpedia labs using several industry-leading security solutions and found to be completely clean of adware/spyware components. We are impressed with the quality of your product and encourage you to keep these high standards in the future.'
Read more. Softpedia

My anti-malware software reports a virus in your program. What does that mean?

It may mean that:

First, please make sure that you downloaded SecurityKISS Tunnel directly from our website.

There is a marginal probability of the 'man in the middle' attack i.e. someone between your computer and our website replaced the stream of data so that you received an infected file. This may be especially true if you are using anonymous proxy services.

Most likely it is a third possibility, but just in case please check the file with a different antivirus program.

Some antivirus programs are known for many 'false positives' (AVIRA and EMSISOFT are infamous examples). A false positive is a situation where an antivirus program reports legitimate and normal files as a virus. You can find more information on Wikipedia: Wikipedia: False Positives.

SecurityKISS Tunnel may be wrongly classified probably because it contains the code to connect to www.securityKiss.com to get the welcome message and the current list of Security Gateway addresses (VPN servers).

This problem is caused by some anti-malware products that tend to appeal to a user's way of thinking 'The more threats antivirus detects, the better' which is a spurious conclusion.

You can scan SecurityKISS Tunnel files by uploading them to online services that use several anti-virus programs.

We recommend the services below because they do not require installation of any software on your computer:


The scan reports include results from about 40 different antivirus engines.

As a shortcut, please see the report from Virus Total on a SecurityKISS scan:

SecurityKISS Tunnel scan report on www.virustotal.com

Of course to double check you can use other antivirus services of this kind.

My outgoing traffic is very sensitive. My fear is that a SecurityKISS VPN connection may suddenly drop the line and my PC will continue sending information using a standard unencrypted connection.
How can I automatically block the traffic? Do you have a solution for this?

The solution is Exclusive Tunneling. It boils down to blocking the default route for underlying traffic so that no data can be sent outside of the tunnel.

Why am I always assigned the same IP address from a particular server? Is it based on my client ID? This would seem to have the potential to compromise my security.

Assigning the same IP is an OpenVPN feature - it is the underlying technology that SecurityKISS Tunnel uses. It is based on the client ID and not an external IP address. The mapping is only stored internally on our server.

The 'static IP' is an option in OpenVPN but it is a default option and there is no reason to change it as it is fully secure.

The local IP you can see in the SecurityKISS application is the IP address of a virtual network created inside the tunnel so it is completely opaque for third parties. This IP does not appear outside of the tunnel as it makes no sense to the external world (it is in a non-routeable address pool).

When I'm connected via SecurityKISS Tunnel and testing the connection using internet vulnerability tools like Shields Up I can see that the following ports are open: 22, 80, 443. Isn't it a security threat?

When connected to SecurityKISS Tunnel, the server you are connected to is scanned instead of your PC.

Port scanning tools like the one from Shields Up are designed to test open ports on an internet users' PC and it generally makes no sense to run port scan tools for the server because it is normal for a server to open these ports to 'serve' the content as part of its nature.

It is a general principle of the client - server architecture that the server side must open a port to make communication possible. An average internet user works as a client so usually they don't need to open any ports, that's why the negative Shields Up scan test result may be an indication of some vulnerability. However, testing the server in the same way is like trying to apply the same standards to a completely different network entity. What is good for the goose is NOT good for the gander here. While for a PC workstation, exposing open ports is not very common, for the server it's perfectly normal to have many ports open.

To explain why the mentioned ports are open:
port 22 is an SSH console for administration, port 80 has many applications, port 443 is part of the VPN server software.

None of these open ports are a security threat. Additionally, they are protected against attacks with adaptive firewall rules.

Can I be absolutely sure that data uploaded/downloaded is completely secure?

The tunneled connection is very secure - it is even resistant to 'man in the middle' type of attacks.

The thing that can make the whole solution less secure is the end of the tunnel, especially on the user's side.

Using SecurityKISS Tunnel your data is very well protected once it leaves your PC but if your PC is infected with a virus, or the internet browser sends too much information then SecurityKISS Tunnel will not help much. That's why having a good antivirus program in addition to SecurityKISS is so important.


How do I start the program in troubleshooting mode?

You'll find instructions here.

I installed SecurityKISS Tunnel but cannot connect.

Make sure you have downloaded SecurityKISS Tunnel from our website. Do not use a program downloaded from other websites. It will not work. The copy of the program you got from your friend will not work either.

Check your firewall settings to see if connection is allowed for SecurityKISS Tunnel (TCP 80, 443 and UDP 123).

You may also check that the DHCP client is running. You'll find instructions here.

I can establish the tunnel but connection is slow and hangs up often.

Please check your firewall for some advanced options that may cause problems with tunneled connections.

For example the Comodo firewall has a 'Block Fragmented IP Datagrams' option which is turned on by default (Comodo -> Firewall Behavior Settings -> Advanced).

Since tunneling is about wrapping packets together, some of them may be fragmented and blocked by the firewall because of that.

Issues of this kind are particularly difficult to track down so in case of an unstable connection it is recommended to turn off the firewall for a short time and observe if there is any difference.

When in the tunnel my mail client program cannot connect to receive or send email.

In the free version sending and receiving emails directly from mail programs like Thunderbird or Outlook is blocked in our service to prevent sending spam and other abuse. Please also see our offer which explains it in more detail.

When SecurityKISS Tunnel installation completes and I'm trying to run it I get another dialog from AVG anti-malware software saying that a threat was detected. After selecting 'Ignore the threat' I still don't have access to the program.

When AVG software complains about the SecurityKISSTunnel.exe file you actually need to select the AVG dialog box option to 'Ignore the threat' but it is not enough.

You can find additional info on the 'Ignore the threat' AVG dialog box, which says that the program can still be blocked by AVG Resident Shield. It means that Resident Shield does not respond to the 'Ignore the threat' command.

To fully enable the program you need to configure AVG manually: in the AVG application open Tools; Advanced Settings, find the Anti-Virus; Resident Shield; Exceptions form, and add SecurityKISSTunnel.exe into the list of exceptions for Resident Shield. (Thanks to Bill Rodgers).

I can't connect from Android or iPhone/iPad


Are internet providers (ISP) aware of exact downloads/uploads or only their size?

Your ISP is only aware of one connection to SecurityKISS gateway and its volume. Neither type nor protocol of encapsulated traffic is visible to any third party.

Do you keep logs of traffic through your tunnel?

For security and billing purpose we collect information about a user's IP address and connection time. Please read more in our Privacy Policy

What information is kept in logs and how long are the logs stored?

We store logs containing connection/disconnection time, user's real IP address and also traffic volume to control usage for every user. We don't store information about connection type or websites the user has visited.

Logs are automatically deleted after 10 days and the only information that is kept for a long time is the total data volume transferred per user.

I am concerned about the amount of information stored about the users using your VPN. What information do you keep? Websites visited, usernames, passwords, etc?

As stated in a previous response - we do not store logs with information about traffic type, content or destination IP addresses. Your data is decrypted and sent directly to its destination.

I am still worried about the security of my personal information because you store my IP address and connection time.

This is the minimum amount of information that we must store in order to keep the service running.

Please note that compared to the amount of information captured by an average website it is a small drop in the ocean. Normally every website can store a visitor's IP address and register a user's activity, guess their preferences based on the time spent on a particular page and even the order of clicks (needless to mention cookies).

We do not require registration from free users - there are no login names or passwords so they cannot be associated with your IP address. Such a design primarily has a user's privacy in mind.
This is a very important point of our philosophy - we protect you from the third parties but we also want to protect you from ourselves.

We don't want to be another Big Brother Google who knows your next step before you even think of it. We are here to come to grips with this Orwellian dystopia that becomes a reality nowadays.

I'm connecting from Italy to a SecurityKISS server in Chicago. When i use Firefox and surf to the Google homepage I can see the Italian version! Is this correct? I would expect an English version for the United States.

If you had connected to the Google website before using SecurityKISS Tunnel, Google is able to recognize you as an existing user and display an Italian language version instead of the US version. It is possible because Firefox (and any other internet browser) is storing a small piece of information locally on your PC when connecting to a website for the first time. This piece of information is called a cookie. Cookies can be turned off in your browser settings but it may limit functionality of many websites. Every time you open the website, the browser sends a cookie back to that website to identify you as a returning visitor. Thanks to that the website can also display the language version which was saved when you first connected.

There is also another phenomenon possible. Google tries to assign default language settings to the IP address the user is connecting from. This assignment is based on the language in which the search queries are submitted. It may happen that many Italian users connect via SecurityKISS Tunnel to Google and submit search queries in Italian so the Google algorithm identifies the SecurityKISS server as Italy based and an Italian version is displayed by default regardless of the real server location. We have experienced similar issues with our Manchester server where Hong Kong's Google version was displayed by default because there were many SecurityKISS users connecting from that part of the world.

Finally it is possible that IP geolocation is wrong. Websites are trying to guess which part of the world you are connecting from. Based on tbe IP address, they try to match the country; however, there is no such thing as an official IP-country matching central service. All these guesses come from approximate databases built on empirical data and often they are wrong in some cases. It has already happened that the most popular geolocation databases were identifying one of our UK servers as located in Ireland and a German server as located in Italy.

Would your software cause my computer to not have full access to various sites like ebay.com or youtube.com or amazon.com, etc.?

No, website providers do not block outgoing traffic from our security gateways. Remember however that SecurityKISS Tunnel does not prevent sending cookies from your browser to websites. This is potential opportunity to block users by website providers.


In the paid version I tried to use VoIP (2 different providers: Fastvoip and Voipalot) both using SIP protocol but I couldn't establish a call. Why are you blocking VoIP/SIP traffic?

We don't block VoIP/SIP traffic for our customers. We have tested Fastvoip and Voipalot services and experienced many connection problems even on raw (non-tunneled) connection. When starting Voipalot in Ireland the program is failing when trying to find voipalot.com server.

Our conclusion is that those services are not reliable enough and also they may find it difficult to traverse NAT (Network Address Translation) which is an inherent part of local home networks and VPN services such as SecurityKISS.

It may be worth to look for other VoIP alternatives. Although we do not recommend using non-transparent technologies like Skype we have tested it with our service and it works well with SecurityKISS Tunnel.

Is there an option to set up forwarding ports, to fully set up something like emule to work as efficiently as possible?

No, we do not support port forwarding. It is not technically possible on a shared server IP.


Why does your geolocation data differ from the WHOIS data?

There is a different purpose and meaning of WHOIS data and geolocation service.

When you check a server or your computer IP address on our geolocation service you are getting the best estimate of actual location of the device with this IP address. The estimate is based on traffic analysis and information from users.

WHOIS query identifies the person or company to which the address has been delegated. Usually it shows the address where the ISP is registered on. Additionally large ISPs tend to cover wide geographic areas and in WHOIS database they are allocated to the same city and country.

Is your VPN using OpenVPN, PPTP or L2TP?

SecurityKISS Tunnel software (Windows only) is using OpenVPN while there is also L2TP/IPsec option available. PPTP was discontinued on 2014/12/17

What is the difference between OpenVPN and PPTP?

It is explained in this article.

What is the encryption strength of your tunnel?

We use 128-bit Blowfish algorithm for session encryption. For the session keys exchange we employ 1024-bit RSA certificates. Session keys are renegotiated once per user per hour.

Why SecurityKISS Tunnel is more secure than other VPN providers?

Each SecurityKISS Tunnel program downloaded from our website is different. Every user receives an unique individually generated application with secretly generated 1024-bit pair of signed keys: public and private.

The idea is that the private key should be known only to you and we destroy client's RSA private key soon after downloading the program. We don't store the private key as it should be known only to you and it is not needed for the server to establish a secure tunnel. Since every user has a different private key they are really secret and the established tunnel is resistant to all known types of attacks including 'Man in the Middle' attack (providing that you do not disclose the private key).
Because every user has a different key there is also one more advantage - we don't need user names and passwords to identify users.

Other VPN providers provide only one instance of VPN program which has the same pair of RSA keys for all users.
It means that the allegedly private key is publicly known!

Those VPN providers identify users by user name and password which means that the entire security is based on the password which becomes the real key in the communication channel. Effectively 1024-bit or 2048-bit RSA key or even a single session 128-bit security is reduced to 8 - 40 bit security depending on password strength.

What is the technical difference between Pause and Disconnect? Which one is better and for what?

Disconnect turns down the tunneled connection, so in order to restore the complete connection establishment with authentication and other security procedures must be performed.

Pause changes only the routing table on the user's machine, so the tunnel is alive but user traffic is not redirected to it so it sits idle.

From practical point of view Pause is for fast on/off switching.

I don't want my DNS queries to be resolved by Internet Service Provider's (ISP) servers, which may result in the ISP being able to log data. Does SecurityKISS offer anonymous DNS servers?

Yes, by default every SecurityKISS server has its own DNS software server which resolves users' DNS queries when they are connected in the tunnel. These DNS servers operate on the local tunneled network 10.x.x.x and are not accessible from outside. All DNS queries travel encrypted inside the tunnel. We don't log DNS traffic.

When using SecurityKISS Tunnel, is DNS still done the 'regular' way outside the tunnel, or does SecurityKISS do it for me?

When connected with SecurityKISS Tunnel, the DNS queries and responses are sent inside the tunnel.

It means that DNS info is protected in the same way as every other data transmitted in the tunnel - completely opaque to a third party.

I went to the website dnsleaktest.com and did a test. The test concluded that SecurityKISS DNS servers were leaking. Can you explain?

There is a lot of misunderstanding about DNS leaks so let's clarify the basics first.

DNS leaks may happen on Windows and it is related to the known Windows vulnerability (no global DNS settings + closed source => hard to predict how DNS queries are routed). This is not 100% fixable by the third party software like SecurityKISS. It is just a design and implementation flaw in Windows. The best advice we can give to users experiencing this is "Please use a decent operating system instead".

Many SecurityKISS users reported DNS leaks after visiting the dnsleaktest.com website. They were concerned that the test shows various DNS server locations so we investigated these cases.

Fortunately all the reported incidents to SecurityKISS were not actual DNS leaks but only the "smoke and mirror" alarming results from such websites like dnsleaktest.com and ipleak.net. The DNS servers displayed on dnsleaktest.com are the servers in the DNS hierarchy that are trying to resolve the domain. This is how DNS system works and there is nothing wrong with it. Normally these servers don't know your real IP address. Queries are proxied by VPN server so they are anonymized like the rest of the traffic.

Only if dnsleaktest.com shows your real location, it might be worrying and deserve investigation.

In most cases there is nothing to worry about but it's confusing to users and the DNS leak websites incite fear and draw wrong conclusions.

Even if it is not the real problem we had to address this issue because users don't know whom to trust and it is quite complicated matter to be explained in one sentence. We updated our servers so that certain DNS queries are not forwarded upstream to external DNS servers. It should prevent displaying confusing results on dns leak testing websites.

Can you briefly explain the difference between using TCP vs UDP servers?

SecurityKISS Tunnel can use TCP or UDP protocol to connect to the servers.

TCP was designed as a stateful, reliable protocol with error checking, retransmissions, connection and congestion control.
UDP is lightweight, connectionless (each packet is handled individually) and faster.

SecurityKISS Tunnel supports both methods to give users option if one of the protocols is blocked in their network however, it is recommended to use UDP because it is faster.
It may happen that UDP is blocked on Internet Provider firewall so then TCP is the alternative option. Usually TCP's performance penalty is low and connection speed is almost the same as in UDP.

What are the advantages and disadvantages of using TCP 443, UDP 123, UDP 5000 or UDP 5353?

In most cases it does not matter. Multple options are given in order to enable users who are behind restrictive firewalls and some protocol (UDP/TCP) and port (443, 123, 5353, 5000) combinations are blocked. If randomly selected option works there is no need to worry about. Otherwise it's worth to check a different combination.

Should I compress the data before sending in the tunnel?

No. It will give you no advantage in speed because we use compression anyway.

The compression factor depends on the type of data you are sending and whether you use our OpenVPN client or L2TP.

Can you provide tls-auth file for OpenVPN configuration?

We don't use tls-auth. The tls-auth option uses a static pre-shared key (PSK) which is shared between users and the server.

It is often used if two peers connect over VPN as an additional line of defense. In the commercial VPN multi-user setup it makes no sense because the key is no longer secret. It is shared among users, everyone knows it so it does not offer any security (although it may mitigate some Denial-Of-Service attempts against server).


May I distribute your software?

There is no point in doing it since every downloaded instance of SecurityKISS Tunnel is a different binary.

Please do not share copies of downloaded binaries nor make them available on sharing websites. The shared binary is not going to work. Moreover it is in your interest not to share downloaded program because it will stop working for you. If you want to recommend it to someone - share the news and redirect people to our download website where they can get software for free.

Your software is one of the best ideas I've ever seen. Excellent work.

Thank you. You can help to improve it by sending suggestions and issues you found. Also any suggestions related to the website and its content are welcome.

We are going to expand the Articles section so if you have any ideas or texts you would like to publish - let us know!

Especially we are interested in making it as intelligible as possible since we want to reach a wide audience.