Fexyn
Fexyn

Built for privacy in hostile networks

Fexyn is a multi-protocol VPN that works in countries where VPNs are actively blocked. We combine WireGuard, VLESS Reality, and OpenVPN into a single client that picks the right protocol for your network automatically.

Why Fexyn exists

Internet censorship is getting better at its job. Governments don’t just block websites anymore. They inspect traffic at the packet level, identify VPN protocols by their signatures, and throttle or drop the connections entirely.

China’s Great Firewall does this. Iran’s filtering system does this. Russia’s TSPU does this. They use deep packet inspection to fingerprint WireGuard traffic, OpenVPN handshakes, and even obfuscated protocols that were designed to dodge exactly this kind of detection.

We built Fexyn because the VPNs we tried kept failing in these environments. They’d work for a week, then stop. The protocol would get fingerprinted, the IP range would get blocked, and you’d be back to square one.

The fix isn’t a better version of the same approach. It’s a different approach entirely. VLESS Reality doesn’t try to hide VPN traffic. It makes VPN traffic look identical to a normal HTTPS connection to microsoft.com. A DPI system inspecting the TLS handshake sees a valid Server Name Indication, a real TLS 1.3 certificate chain, and traffic patterns that match a legitimate website visit. There’s nothing to flag.

That’s the core of what Fexyn does. Not just encryption — indistinguishability.

How we’re different

These aren’t marketing slogans. They’re architectural decisions that affect how the software actually works.

Three protocols, auto-rotating

WireGuard for speed. VLESS Reality for censorship resistance. OpenVPN for compatibility. The client tries them in order and switches automatically if one is blocked.

Most VPNs offer multiple protocols as a manual toggle in settings. You pick one, and if it stops working, you go back to settings and try another. Fexyn handles this without you touching anything. The rotation engine detects failures, classifies the cause, and selects the next protocol in under a second.

Short-lived certificates

Our OpenVPN implementation uses 24-hour certificates issued by a Vault PKI. Every certificate expires within a day of creation.

If a certificate is compromised, the window of exposure is 24 hours or less. Compare that to most VPN providers who use static certificates valid for months or years. A stolen long-lived cert gives an attacker persistent access. A stolen short-lived cert gives them a day at most — and that’s only if they can intercept and replay the traffic before expiry.

Split-privilege architecture

The Fexyn VPN client never asks for admin permissions. Zero UAC prompts, ever.

A SYSTEM-level helper service handles everything that requires elevated privileges: creating tunnel interfaces, modifying routes, managing the kill switch. The user-facing app is completely unprivileged. It sends commands to the helper service over a local IPC channel with caller verification.

This eliminates an entire class of privilege escalation attacks. Even if someone finds a vulnerability in the UI process, they can’t use it to gain system access because the UI process doesn’t have system access.

WFP-based kill switch

Our kill switch runs at the Windows Filtering Platform level — the same layer the Windows firewall operates on. It’s not a software toggle that fails when the app crashes.

If the VPN process dies, the WFP filters stay active. Your traffic remains blocked until the connection is restored. This holds during application crashes, service restarts, protocol switches, and even blue screens. The filters are persistent — they survive reboots in reconnect mode.

A kill switch that only works when the VPN app is running isn’t a kill switch. It’s a suggestion.

The company

Fexyn LLC is registered in Wyoming, United States. We’re an engineer-led company. No board of directors pushing for growth metrics. No venture capital money attached to ad-revenue targets. Every dollar goes into the product — faster servers, better protocols, tighter security.

We don’t have a 50-person marketing department or a multimillion-dollar ad budget. We have a product that works in places where the well-funded alternatives don’t. That’s the growth strategy.

Wyoming was chosen for its strong privacy laws and minimal reporting requirements. We don’t collect data we don’t need, and we operate in a jurisdiction that doesn’t force us to.

Transparency

Trust in a VPN company comes from what you can verify, not what they claim. We publish everything we can about how Fexyn works and how we operate.

Our warrant canary is updated monthly. If it goes stale, assume something changed. Our privacy policy explains exactly what data we collect and why — it’s short because we don’t collect much. Our security page documents the technical protections we implement at every layer.

We also publish a data processing agreement for enterprise customers who need to satisfy their own compliance requirements. These aren’t just legal documents we were forced to write. They’re how we show our work.

Contact

About Fexyn VPN — Our Mission & Security Philosophy | Fexyn VPN