Kundalini-Router


Kundalini-Router uses Riseup's servers for the following reasons -> Riseup's servers are highly encrypted, secure, don't collect data, and we're talking about physical servers here, not virtual servers. This is one of the most important points.

Kundalini-Router routes your network traffic over OpenVPN, heavily encrypted, to a heavily encrypted server on the Riseup servers. So it uses RiseupVPN over OpenVPN. It changes your IP address, secures and encrypts the traffic, etc.

I chose Riseup because I consider them the most secure, and therefore Kundalini-Router uses Riseup servers -> for security and encryption.

I also added several security features. By default, when using Kundalini-Router, you get a secure DNS, so DNS queries are not made through the DNS generated by the ISP. It doesn't just include RiseupVPN, but much more.

The OpenVPN configuration file created by BarbossHack

When you connect to Riseup using the Kundalini-Router, the connection is strongly encrypted, just like Riseup's servers. This is currently one of the most secure ways to use a VPN. You can make it even more secure, but more on that later.

You can use all the programs in Kundalini-Tool [Not Torify, because it serves a completely different purpose and conflicts completely with Kundalini-Router]. I also plan to write a feature that integrates with Obfs4 or Snowflake. Also, there are several iptables commands for your security.

Kundalini-Router is a cool program for Riseup and Tor. You can install RiseupVPN on Debian, or even some other Distros, but not all of them. Kundalini-Router offers the same [even higher] security for all Distros, and works purely from the command line.

Kundalini-Router redirects traffic to Riseup or Tor, whichever you prefer. [There is also an I2P configuration planned, but that will come later - I don't think anyone in SS uses I2P much].

The Kundalini-Project is fully supportive of the Riseup project, the GNU project, and anything that has human liberties in mind. If you want to support the Kundalini-Router, you may want to support RiseupVPN, since the Kundalini-Router connects to Riseup's servers.

Donate To Riseup

You can use Kundalini-Router with Tor. If you've used Kundalini-Tool before, you know how Torify works -> your network traffic connects to the Tor network, encrypted and anonymized, configured with Tor DNS to avoid leaks.

The Kundalini-Router is purely CLI, so it works via commands [don't worry, it's simple]. To start the VPN, you just need to do the following -> "sudo kundalini-router --start-vpn" and you're done. This command will do everything I mentioned above.

For Tor -> "sudo kundalini-router --start-tor" and you're done.

IP addresses and DNS servers can be in completely different locations. For example, when using Kundalini-Router, your IP address is in France, but your DNS address is in the Netherlands or America. No DNS leakage occurs when using Kundalini-Router.

!!! Make sure that WebRTC is disabled in your browser. You can do this by using the plugins [Disable WebRTC for Firefox or WebRTC Control for Ungoogled Chromium] !!!

I will probably systematically update this project, regarding Riseup, not to mention certificates. I will report back when this is needed. There will be no need to re-download the Kundalini-Router. I have created a file called "certs.c" which will automatically update what is needed. Do not update yourself, just when I say.

Once you connect to Riseup, your DNS address will change and you can set firewall rules. This further increases security. The program has all the information you need to use it [not complicated].

Once you have started the VPN, you will notice that you need a Terminal window. This is OpenVPN, so it will run OpenVPN in a Terminal window and when you exit it, it will tell you that the connection has been lost.

Open a new Terminal window and type -> , this will add more security to your network [blocking, dropping, etc]. And you can move the other window where OpenVPN is running to another session so it doesn't bother you.

!!! Always run the "sudo kundalini-router --start-wall" command after starting the VPN ["sudo kundalini-router --start-vpn"]! This will configure several things for even more security. To turn off the VPN, in the OpenVPN terminal window, "CTRL + C" and then in another window run -> .

Don't forget these! If you don't have a problem changing the firewall and Dns Address, you can skip this. But if you don't know what you're doing, ask! !!!

With Kundalini-Router and Kundalini-Guard you can monumentally guarantee your online security. If you want even more security, read one of my previous post:

https://www.ancient-forums.com/index.php?threads/monumental-security-reviews-browsers-add-ons-vpns-linux-distros-darknets-i2p-veracrypt-keepassxc.87264/

In Kundalini-Router, Kundalini-Guard is integrated and starts automatically as soon as you start the VPN. If you want even more security, use Kundalini-Tool [With Timezone, Hostname & Mac-Changer] alongside it.

Return To Homepage