From zero to connected in 3 minutes.
No networking PhD required. But if you want the technical deep dive on why this works when everything else fails, keep scrolling.
Sign Up
Choose your plan and create your account. Payment via crypto, PayPal, or Stripe. Takes 2 minutes.
Download KookVPN
Download the custom desktop client for Windows. One installer, no dependencies, no configuration.
Click Connect
Open KookVPN, click connect. The app handles server selection, protocol config, and TUN adapter setup automatically.
You're Protected
All traffic encrypted and routed through Singapore. The GFW sees normal HTTPS to microsoft.com. Everything works.
What happens when you click connect
TUN Adapter Starts
KookVPN creates a virtual network adapter via wintun. All system traffic redirected through it.
TLS Handshake
Your device initiates what appears to be a normal HTTPS connection to microsoft.com. Standard TLS 1.3.
Reality Auth
Embedded in the TLS handshake: a session ID that authenticates you via ECDH shared secrets. Invisible to the GFW.
Tunnel Active
Encrypted traffic flows through VLESS tunnel to Singapore. Vision applies flow control to match HTTPS patterns.
The complete technology stack
Every layer purpose-built for one goal: maintaining a 100% undetectable, zero-leak connection from China.
KookVPN Desktop Client
Python + CustomTkinter + sing-boxCustom app with one-click connect, system tray, auto-reconnect. Runs sing-box v1.13.2 under the hood.
VLESS + Reality + Vision
Xray-core 26.2.6 + uTLSVLESS proxy protocol + Reality TLS mimicry + Vision flow control. Connections indistinguishable from normal HTTPS.
TUN Mode
sing-box TUN + wintun.dllVirtual network adapter captures ALL OS-level traffic. Every app, every DNS query, every API call -- encrypted.
Singapore SGP1
Ubuntu 24.04 + BBR + DoTDedicated DigitalOcean server. BBR congestion control, DNS-over-TLS, UFW + cloud firewall (ports 22, 443 only).
Why active probing can't detect us
The GFW doesn't just analyze traffic passively. It actively probes suspected VPN servers. If the server responds differently than the claimed service, it's blocked.
This kills Shadowsocks, Trojan, and most obfuscation protocols. They look like HTTPS on the surface, but probes reveal non-standard responses.
Reality's solution: unauthenticated connections (including GFW probes) are forwarded to the real destination -- microsoft.com. Probes get microsoft.com's actual response. There is literally nothing to detect.
Ready to experience the difference?
Connect in 3 minutes. 7-day money-back guarantee.