Terms of Use and Privacy Policy

Welcome to our service. By using this service, you agree to the following terms:

1. Use of Service

You agree to use this service solely for lawful purposes and in compliance with all applicable laws and regulations. You are prohibited from using this service for any illegal activities or activities that infringe upon the rights of others.

Furthermore, you acknowledge and agree that we may place advertisements in hidden areas on this website. This is to help us cover the costs of our server and domain through advertisements that you may inadvertently click on.

2. User Accounts

You are responsible for maintaining the confidentiality of your account information, including your password. You agree to notify us immediately of any unauthorized use of your account or any other breach of security.

3. Content

You are responsible for all content that you upload, post, or share through this service. You warrant that you have the necessary rights or permissions to use and distribute such content.

4. Privacy

We value your privacy. Your personal information will be processed in accordance with our Privacy Policy. By using this service, you consent to the collection and use of your information as described in our Privacy Policy.

5. Intellectual Property

All content and materials provided through this service, including but not limited to text, graphics, logos, icons, images, audio clips, digital downloads, and data compilations, are the property of us or our licensors and are protected by copyright laws.

6. Limitation of Liability

We shall not be liable for any direct, indirect, incidental, special, or consequential damages arising from the use or inability to use this service.

7. Changes to Terms

We reserve the right to modify these terms at any time. Changes will take effect immediately upon being posted on our website. Continued use of our service after such changes constitutes your acceptance of the revised terms.

8. Governing Law

These terms shall be governed by and construed in accordance with the laws of Indonesia, without regard to its conflict of law provisions.

By clicking 'I Agree', you acknowledge that you have read, understood, and agree to all the terms outlined above.

Advanced Security

We encrypt your data to protect your Internet connection so you may surf the web safely at home, at work, or in public.

Digital Privacy

Surf the internet anonymously by masking your IP address. Stop your internet service provider from spying on you and keep your location private.

Liberty

Avoid censorship and safely access any website, app, or channel. Get around any restrictions and use the internet for free.

Tips

To get the maximum speed of connection choose the location nearest to your country.

What is SSH Tunneling?

SSH (Secure Shell) is a cryptographic network protocol that creates an encrypted tunnel between your device and a remote server. Originally designed for secure server administration, SSH tunneling has become one of the most effective tools for protecting internet traffic, bypassing censorship, and maintaining privacy online.

When you connect through an SSH tunnel, all of your internet traffic is routed through the encrypted connection. Anyone trying to intercept your data — whether it's your ISP, a government agency, or a hacker on the same network — will only see scrambled, unreadable data. The actual content of your browsing, messages, and downloads remains completely private.


Why use an SSH tunnel?

There are many reasons why developers, privacy-conscious users, and everyday internet users choose SSH tunneling over other solutions. The most important reason is security: SSH uses AES-256 encryption — the same standard used by banks and militaries worldwide. Your data is protected from the moment it leaves your device until it reaches its destination.

SSH tunneling also gives you the ability to bypass firewalls and deep packet inspection (DPI). Many ISPs and governments use DPI to monitor and block certain types of internet traffic. Because SSH traffic looks like standard encrypted traffic, it is far harder to detect and block compared to traditional VPN protocols.

Additionally, SSH tunneling hides your real IP address. Websites and online services only see the IP address of the SSH server — not yours. This protects your identity and allows you to access content that may be restricted in your location.


How to connect using HTTP Injector

This site uses SSH tunneling through HTTP Injector — a popular Android app that lets you connect to an SSH server and route your internet traffic through it with a single tap. No terminal, no technical setup required.

Android (HTTP Injector)

  1. Install HTTP Injector from Play Store
  2. Open the app → tap SSH tab
  3. Enter Host, Port, Username & Password from your account above
  4. Tap Connect — you are online

Windows / PC

  1. Download Bitvise SSH Client or PuTTY
  2. Enter the Host, Port, and your credentials
  3. Enable SOCKS5 proxy on port 1080
  4. Set your browser proxy to 127.0.0.1:1080

You can also use HTTP Custom or HTTP Injector with a pre-made .ehi config file — many servers on this site provide a downloadable config so you can connect in seconds without entering anything manually.

Why SSH is one of the most trusted security protocols

SSH has been the backbone of secure server communication since 1995. Here is why millions of developers and privacy users rely on it every day.

  • AES-256 encryption — the same standard used by governments and financial institutions worldwide
  • In active use since 1995 — decades of independent security research and real-world hardening
  • Public-key authentication — your credentials cannot be intercepted even on hostile networks
  • ISP-invisible traffic — your ISP sees only an encrypted connection, not the contents or destinations
  • Dynamic port forwarding — routes all browser traffic through the encrypted tunnel with a single command
  • Cross-platform — works on Windows (PuTTY), macOS, Linux (OpenSSH), and Android (HTTP Injector)
SSH Security Illustration
Update cookies preferences