- A new VPN service was launched on July 27, 2025 and trying to solve problems with the providers’ trust
- VP.net uses Intel SGX -hardware to allegedly deliver “cryptographically verifiable privacy”
- Researchers revealed some vulnerabilities with Intel SGX systems in the past
A new VPN service has just landed on the market and promises to take a completely different technical approach to users’ privacy.
Shortly after verified privacy, VP.net claims to be built in a way that physically separates users’ identities from their browsing activity at the hardware level. Thus, the provider seeks to solve problems associated with Virtual Private Network (VPN) provider’s trust. So forget about VPN policies and welcome “Cryptographically verifiable privacy.”
The provider launched the app on June 27, 2025 across all major platforms, namely Windows, MacOS, Linux, Android and iOS, and now strive to become VPN for the future. Yet, not without any controversy.
The problem of policies without log
All the best VPN services currently offer strict policies without log. These guarantee that the provider never stores any of your identifiable data and is regularly checked with independent non-log audits.
The problem is that even third-party VPN revisions require a dose of trust.
“A revision only proves that something was true at the time. This is why we bring math and verifiable cryptography back in the mixture, so when we say you’re private, you’re actually private,” one of VP.net’s founders, Andrew Lee, told Techradar.
The founder of Private Internet Access (PIA), a popular no-log VPN provider, Lee later realized that many users now need a level of privacy that is not based on trust. Then he collaborated with other privacy insurance developers to build a new type of VPN service.
That said, it is worth noting that Pia is among the companies that have proven their demands for non-log in real life over the years do not once, but twice in court. Another example is Mullvad, who left a police attack empty in Sweden back in 2023.
What vp.net is doing differently
The big news with VP.net lies in its technique. The company uses Intel SGX hardware that promises to deliver “cryptographically verifiable privacy.”
For the smaller techie out there, all you need to know is that all the sensitive operations, those who could somehow reveal your identity, occur in some so -called encrypted enclaves. This is secure and isolated rooms within the software infrastructure that physically prevent the VPN provider from accessing the activities that are done.
In short, this mechanism should make it “technically impossible to link your identity to what you do online,” the provider explains.
Not just encryption; The system also claims to use SGX certificate. This is a security mechanism that ensures that the encrypted enclaves act as they should, which prevents the provider or any other third party from accessing the activities that occur inside. This is “verifiable by clients using Intel’s certification services,” the provider said. You can see all of the VP.Net’s technical details here.
Of crucial importance, VP.net also offers some protection against the tracking of metadata, which means all the details that are not the content. When you repeat what Nymvpn’s Innovative MixNet Network and Mullvad’s DAITA tools do, VP.net also uses some techniques to prevent traffic analysis and unclear actual usage patterns.

In addition to the new infrastructure, VP.net also includes all the classic features you would expect from a VPN.
These include support for the secure and fast Wireguard protocol along with security features such as a killing contact and DNS leakage protection. Adding post-quantum encryption support is also in pipeline.
All apps are also completely open source, so anyone with technical knowledge can control the code to see if the software is behaving properly. You can look at the provider’s public storage sites by going to VP.net Giftthub side.
Is it really bulletproof?
Despite the good premises on paper, Intel SGX Tech is certainly not without shortcomings.
In 2019, for example, a team of researchers discovered a way to run and hide malware on Intel Systems. Worse is that this malicious software could not be detected by antivirus tools at that time.
This may be among the reasons why Intel patched several security holes in 2023 and addressed many existing shortcomings and vulnerabilities.
Such a security fix certainly does not fully convince everyone in the industry, including the CEO of NymVPN, which is another VPN provider seeking to challenge problems with VPN provider’s confidence. “I prefer decentralization and advanced cryptography rather than thinking Intel has produced a silver ball,” Nymvpn’s CEO Harry Halpin told Techradar.
Another contentious point lies behind the VP.NET team. Well-known names from the Bitcoin world have both Roger Ver and Mark Karpelès had some legal problems in the past.
Comment of the latter point told Karpelès Techradar: “For way we build the system, there is no need to trust the team behind VP.net. We supply independent systems that are confirmed by themselves, as a connection if everything is safe. So even though I wanted to connect or do something similar, there’s no way I could do anything. “



