Terms of Use and Privacy Policy

Welcome to our service. By using this service, you agree to the following terms:

1. Use of Service

You agree to use this service solely for lawful purposes and in compliance with all applicable laws and regulations. You are prohibited from using this service for any illegal activities or activities that infringe upon the rights of others.

Furthermore, you acknowledge and agree that we may place advertisements in hidden areas on this website. This is to help us cover the costs of our server and domain through advertisements that you may inadvertently click on.

2. User Accounts

You are responsible for maintaining the confidentiality of your account information, including your password. You agree to notify us immediately of any unauthorized use of your account or any other breach of security.

3. Content

You are responsible for all content that you upload, post, or share through this service. You warrant that you have the necessary rights or permissions to use and distribute such content.

4. Privacy

We value your privacy. Your personal information will be processed in accordance with our Privacy Policy. By using this service, you consent to the collection and use of your information as described in our Privacy Policy.

5. Intellectual Property

All content and materials provided through this service, including but not limited to text, graphics, logos, icons, images, audio clips, digital downloads, and data compilations, are the property of us or our licensors and are protected by copyright laws.

6. Limitation of Liability

We shall not be liable for any direct, indirect, incidental, special, or consequential damages arising from the use or inability to use this service.

7. Changes to Terms

We reserve the right to modify these terms at any time. Changes will take effect immediately upon being posted on our website. Continued use of our service after such changes constitutes your acceptance of the revised terms.

8. Governing Law

These terms shall be governed by and construed in accordance with the laws of Indonesia, without regard to its conflict of law provisions.

By clicking 'I Agree', you acknowledge that you have read, understood, and agree to all the terms outlined above.

Advanced Security

We encrypt your data to protect your Internet connection so you may surf the web safely at home, at work, or in public.

Digital Privacy

Surf the internet anonymously by masking your IP address. Stop your internet service provider from spying on you and keep your location private.

Liberty

Avoid censorship and safely access any website, app, or channel. Get around any restrictions and use the internet for free.

Tips

To get the maximum speed of connection choose the location nearest to your country.

What is Shadowsocks?

Shadowsocks is a free, open-source encrypted proxy protocol originally developed in China to help users bypass the Great Firewall. Unlike a traditional VPN, Shadowsocks does not create a full encrypted tunnel — instead, it acts as a SOCKS5 proxy that encrypts only the traffic routed through it, making it extremely fast and lightweight.

The key innovation behind Shadowsocks is traffic obfuscation. When you connect through a Shadowsocks server, your traffic is designed to look like ordinary HTTPS web traffic to any observer. This means deep packet inspection (DPI) systems — used by ISPs and governments to detect and block proxies — see nothing suspicious in your connection.


Why choose Shadowsocks?

Shadowsocks was built with one primary goal: to survive in environments where even VPN traffic gets blocked. It achieves this by randomizing its traffic patterns so that automated censorship systems cannot recognize it as proxy traffic. In contrast to OpenVPN or WireGuard, whose traffic signatures are well-known and frequently targeted by blocking systems, Shadowsocks offers a much lower detection profile.

Performance is another major advantage. Because Shadowsocks does not add the overhead of a full VPN tunnel, it is significantly lighter on CPU and memory usage. This translates to lower latency, higher throughput, and longer battery life on mobile devices — making it an excellent choice for smartphones and tablets.

Shadowsocks is fully open-source and community-maintained. It supports multiple encryption ciphers including AES-256-GCM and ChaCha20-IETF-Poly1305, and it runs on all major platforms including Windows, macOS, Linux, iOS, and Android.


How to use your Shadowsocks account

After creating your account, you will receive a server address, port, password, and encryption method. These details can be entered manually into any Shadowsocks-compatible client, or imported via a ss:// URI or QR code.

Recommended clients: Shadowsocks for Windows, ShadowsocksX-NG for macOS, Shadowsocks for Android (available on Play Store), and Shadowrocket or Potatso Lite for iOS. Once connected, your internet traffic is routed through the encrypted proxy and your real IP address is hidden from every website you visit.

Why Shadowsocks works where VPNs fail

Originally built to bypass China's Great Firewall, Shadowsocks was engineered from the ground up to be stealthy, lightweight, and fast — even on the most hostile networks.

  • DPI-resistant obfuscation — traffic randomization prevents automated censorship systems from identifying it as a proxy
  • Works in the most restricted networks — battle-tested in China, Iran, Russia, and other heavily censored countries
  • Ultra-lightweight — minimal CPU load and battery usage compared to a full VPN tunnel
  • AES-256-GCM & ChaCha20-IETF-Poly1305 — strong modern encryption for all traffic passing through the proxy
  • Plugin extensible — add simple-obfs or v2ray-plugin on top for additional stealth when needed
  • Open source — community maintained with broad client support across all major platforms
Shadowsocks Proxy Illustration
Update cookies preferences