A lot of customers asked us in the past how we can do this so we thought it will be helpful just to explain it by a simple chart with no buzz words and the least amount of technical information.
The above charts illustrates how the following steps work:
1- Running our software will check with our servers to find the fastest connection
2- Once a connection is established, a different a unique address is assigned to your computer ( which keeps anonymity )
3- Any internet traffic sent by your computer such as voice call is encrypted.
4- Our server analyze the address that the traffic is coming from, decrypts the traffic and forwards it to the destination for the rest of the processing