
Psiphon technology was built to bypass filtering at any level – whether ISP, institutions, international gateway, and more – and censorship.

What Are The Most Significant Features Of Psiphon 3? 1. Now that you have learned the overview about what Psiphon 3 is, let us head over to its features. However, this VPN makes it possible for you to browse more privately by adding that extra layer of defense. Only the browser history is deleted, and everything else is still accessible. Once the feedback reaches our servers it is decrypted, stored for a limited amount of time and then deleted.If you think browsing through the Incognito mode will keep you safe, then you should think again. The encrypted feedback is uploaded over TLS. This ensures that only our feedback servers can decrypt and read the contents of a user’s feedback once it is sent out over the internet. When a user submits a feedback it is encrypted with a public key, which is paired with a private key that we own and keep secret. Provided that the user did not opt-out of including diagnostic information with their feedback. Once logged, the metadata could be included in a feedback submitted by the user through the in-app feedback form.

On July 21st, 2020 it came to our attention that the destination hostname, or IP address, of the first network request which triggered Psiphon to be started after a device reboot, or crash in the VPN process, was included in this metadata. We chose to log this metadata because in testing it included non-sensitive information such as whether the VPN was started by the OS due to “VPN On Demand” rules or the user starting the VPN from Psiphon’s UI.

On June 25th, 2020 we released a change which logged metadata provided by the OS when the VPN was started.
