# Protocols

We offer a variety of protocols: OpenVPN, WireGuard, Shadowsocks, VLESS, VMess, Trojan. Each of them has its own advantages, which you can use to suit your needs.

Buy and download configuration file from website or Telegram bot
Feel free to contact our support in case you need assistance with importing configuration file - [email protected]

## OpenVPN

Install application
Import configuration file and connect

Choose downloaded configuration file or copy file content and connect

This is the 'gold standard' and a veteran in the VPN world. A very reliable, flexible and time-tested protocol with open source code.
Maximum flexibility and customizability. Allows you to successfully bypass many simple corporate and government firewalls.
This is the most supported protocol. It works on all conceivable platforms (Windows, macOS, Linux, Android, iOS) and is built into the firmware of most routers.
When to use: When reliability, compatibility and security are the most important factors, not maximum speed.

## WireGuard

Install application
Import configuration file and connect

Choose downloaded configuration file or copy file content and connect

A modern, fast and minimalistic VPN protocol. It was designed to be significantly simpler and more productive than OpenVPN and IPsec. Its code base is hundreds of times smaller, which simplifies security auditing.
Highest performance. WireGuard is faster than OpenVPN, shows lower ping and establishes a connection faster.
Simplicity and minimalism. Less code means fewer potential vulnerabilities.
When to use: When speed and low latency are a top priority. Ideal for gaming, video streaming, torrents and for use on mobile devices, as it consumes less battery.

## Shadowsocks

Install application
Import configuration file and connect

Choose downloaded configuration file or copy file content and connect

Unlike traditional VPNs, which create a full-fledged encrypted tunnel for your entire internet connection, Shadowsocks acts more as an intermediary for specific applications or websites you want to visit. If your primary goal is maximum security, complete anonymity, and encryption of absolutely all internet traffic (for example, when using public Wi-Fi), it's better to choose other VPN protocols. A VPN operates at a lower, networking level within the operating system, creating a virtual network adapter and routing all traffic through it. This creates a sealed and secure tunnel. Shadowsocks operates at a higher level as a SOCKS5 proxy.

## VLESS

Install application
Import configuration file and connect

Choose downloaded configuration file or copy file content and connect

Nekoray: Copy configuration file contents. Right click -> 'Add profile from clipboard'. Right click on profile -> 'Start'. Click 'System Proxy' in top right corner. - [email protected]
О протоколе:
Xray's main goal is to make your traffic virtually indistinguishable from regular traffic. It's a lightweight and more modern version of VMESS. It's faster and simpler, removing its own encryption layer and relying on a more reliable and standard security method (TLS), like Trojan. VLESS is highly flexible and powerful, making it one of the most popular choices today.

## VMess

Install application
Import configuration file and connect

Choose downloaded configuration file or copy file content and connect

Nekoray: Copy configuration file contents. Right click -> 'Add profile from clipboard'. Right click on profile -> 'Start'. Click 'System Proxy' in top right corner. - [email protected]
Xray's main goal is to make your traffic virtually indistinguishable from regular traffic. VMess uses its own encryption and obfuscation capabilities, but its complexity can make it slower.

## Trojan

Install application
Import configuration file and connect

Choose downloaded configuration file or copy file content and connect

Nekoray: Copy configuration file contents. Right click -> 'Add profile from clipboard'. Right click on profile -> 'Start'. Click 'System Proxy' in top right corner. - [email protected]
Xray's main goal is to make your traffic virtually indistinguishable from regular traffic. This Trojan is the most straightforward and effective at disguising itself. It completely mimics regular secure web traffic (HTTPS), as if you were simply visiting a website. To the outside world, you appear to be a regular user browsing the web. It's difficult to detect because it blends in with the rest of the internet traffic.
# Payment

## Monero XMR

You can top up your balance using your personal XMR address. The amount will be credited to your account balance in USD at the current exchange rate.The funds are credited within 5 minutes. We recommend saving the transaction hash in case of possible problems.

Minimum commission upon payment. Monero (XMR) is a privacy-focused cryptocurrency that aims to provide users with enhanced anonymity and security in their financial transactions. It was launched in April 2014 as a fork of the Bytecoin cryptocurrency. Monero is built on the principles of privacy, decentralization, and fungibility.

## CryptoCloud

You can top up your balance using cryptocurrency via Cryptocloud. If you do not have a cryptocurrency, you can exchange it there or anywhere else. The amount will be credited to your account balance in US dollars at the current exchange rate.Funds are credited within 5 minutes. It is recommended to save your payment information in case of trouble with payment.

We will add your balance in USD as soon as we receive confirmation from CryptoCloud. We recommend that you save the payment link in case of possible problems. CryptoCloud supports a wide range of currencies, giving you the freedom to transact globally without the hassle of currency conversions. Whether you're a seasoned crypto enthusiast or a newcomer, that platform makes it easy for you to make payments with confidence.

## Moneyback

Money-Back Policy

We strive to provide quality services and ensure your satisfaction. This Money-Back Policy outlines the terms and conditions under which we offer refunds. To be eligible for a refund, you must meet the criteria specified in the respective product or service's terms and conditions:

Timeframe: Refund requests must be submitted within 3 days from the date of purchase or service initiation.

Operability: The purchased service must be in an inoperable state (i.e. without the ability to establish a VPN connection)

Refunds are subject to approval by our team. We reserve the right to deny a refund request if it does not meet the specified eligibility criteria.

We are not responsible for every protocol working in you location. If certain protocols are blocked in your location, we recommend to choose the appropriate protocol.

Refunds are made only through Monero XMR.

To request a refund, please contact our customer support team at [email protected] with the detailed reason explanation of the refund request.

# Rules

The use of the service is regulated by the corresponding Terms of Use and Privacy Policy.

## Terms of Service

By using the Service, you acknowledge that you have read, understood, and agree to be bound by these Terms and Conditions.

In case of repeated, systematic violation of these Rules, we reserve the right to completely suspend the provision of services.

# Privacy Policy

Privacy Policy

Last updated: January 1, 2024

This privacy policy for PonVPN describes how and why we might collect, store and process your information when you use our services, such as when you:

If you do not agree with our policies and practices, do not use our services. If you still have any questions or concerns, contact us at [email protected]

Interpretation and Definitions

Interpretation

The following definitions shall have the same meaning regardless of whether they appear in singular or in plural.

Definitions

For the purposes of this Privacy Policy:

Collecting and Using Your Personal Data

Types of Data Collected

Personal Data

While using Our Service, We may ask You to provide Us with certain personally identifiable information that can be used to contact or identify You. Personally identifiable information is limited to:

Usage Data

Usage Data is collected automatically when using the Service.

Usage Data is information such as:

We dont collect the type of device You use, Your device unique ID, Your operating system, the type of Internet browser You use, unique device identifiers and other diagnostic data.

Cookies

We use Cookies to store certain information. This information is limited to:

Use of Your Personal Data

The PonVPN may use Personal Data for the following purposes only:

Retention of Your Personal Data

The Company will retain Your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use Your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies.

Delete Your Personal Data

You have the right to request that We assist in deleting the Personal Data that We have collected about You.

You may update, amend, or delete Your information at any time by signing in to Your Account, if you have one, and visiting the account settings section that allows you to manage Your personal information. You may also contact Us to request access to, correct, or delete any personal information that You have provided to Us.

Please note, however, that We may need to retain certain information when we have a legal obligation or lawful basis to do so.

Transfer and Disclosure of Your Personal Data

Law enforcement

We can transfer or disclosure your personal data only if the Company is required to do so by law enforcement or in response to valid requests by public authorities (e.g. a court or a government agency).

Security of Your Personal Data

The security of Your Personal Data is important to Us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While We strive to use commercially acceptable means to protect Your Personal Data, We cannot guarantee its absolute security.

Children's Privacy

Our Service does not address anyone under the age of 18. We do not knowingly collect personally identifiable information from anyone under the age of 18. If You are a parent or guardian and You are aware that Your child has provided Us with Personal Data, please contact Us. If We become aware that We have collected Personal Data from anyone under the age of 18 without verification of parental consent, We take steps to remove that information from Our servers.

Links to Other Websites

Our Service may contain links to other websites that are not operated by Us. If You click on a third party link, You will be directed to that third party's site. We strongly advise You to review the Privacy Policy of every site You visit.

We have no control over and assume no responsibility for the content, privacy policies or practices of any third party sites or services.

Changes to this Privacy Policy

We may update Our Privacy Policy from time to time. We will notify You of any changes by posting the new Privacy Policy on this page.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

Contact Us

If you have any questions about this Privacy Policy, You can contact us:

# Contacts
We are aimed to provide excellent service and want always stay in touch. If you have any questions, comments, suggestions or complaints, you can always contact us using one of the emails below. Contact us via:
[email protected] - customer support
[email protected] - complaints
[email protected] - interaction and cooperation
[email protected] - feedback
Please use English or Russian language when contacting us by email.