Once you purchase an account, you will be given a text file containing your sublink. If you are not familiar with this type of VPN, in short, sublinks are links to automatically updated, dynamically generated configuration files. In the world of censhorship circumvention, being up-to-date and using latest technology are of paramount importance.
You can run this in two modes: proxy mode and full tunnel (VPN mode).
To use the proxy mode, many apps such as v2rayN allow setting system proxy. But for better control, we advise you to install ZeroOmega extension for your browser. Create a new profile like the following image:
For other applications that support a socks proxy, set them to socks5 address 127.0.0.1 and port 10808.
Some software and mainly mobile apps allow different routing in VPN mode, however, it causes DNS leak which affects your privacy. Our own Windows software package doesn't produce any leak in VPN mode.
Download V2rayNG app from Google Play store , or directly from their project github.
Copy your sublink from inside the text file, tap on "+" and select "Import config from Clipboard".
While you can use software like V2rayN, we strongly recommend using our own solution. It is based on open-source software and has great advantages such as:
Depending on whether you want a proxy endpoint or a full tunnel, run GorzProxy.bat or GorzVPN.bat
You may use V2rayN which is popular but we recommend GorzRay as it aligns with our goals much better and provides a truly zero DNS-leak VPN experience.
All of our accounts are configured to resolve DNS on our servers, and DNS queries are always handled via DNS over HTTPS. This means that all your requests to our servers and out of them are encrypted.
Once you are connected via GorzVPN, you can test the security of your connection. On all of the platfroms your traffic will be 100% encrypted and disguised. Also your name lookups will be protected by DNSSEC. To test the name protection visit a resolver test.
To check if you have any DNS leak, visit an online test tool like dnsleaktest.org or browserleaks.com. The result should show only 1 place (one IPv4 and/or one IPv6) like the image below:
Unfortunately, current mobile apps in VPN mode might not completely prevent from DNS leak unless you explicitly set a DNS over HTTPS in your browser or system settings. This means that your connection queries might be handled by public servers such as Google and even your local ISP. Our own Windows software package (and hopefully Linux/Mac, and our own mobile app soon) does not have this problem.
Use a browser that can strictly set a custom DoH, like Firefox. In Firefox settings, in section "Privacy & Security" set "Enable DNS over HTTPS using:" to "Max Protection". Set the provider to custom and put the link of your purchased DNS instance in the field, like the image below.
Unfortunately Android does not allow setting a DNS over HTTPS instance globally with a custom path. To use our DoH on Android, install Firefox Nightly since the main Firefox app doesn't allow editing extra configuration settings either. Open "about:config" via the address bar, and then search and set these parameters:
You can enable DNS over HTTPS globally through installing a .mobileconfig file. Open a text editor and paste the following, changing the server URL to the one you purchased. Save it as GorzVPN.mobileconfig and install it by opening/tapping on it.