Cloak VPN Get Cloak Pro
Post-quantum cryptography on every connection

The VPN built for the next decade of threats.

Every WireGuard tunnel is protected by a post-quantum pre-shared key rotated every ~120 seconds via Rosenpass, the academically peer-reviewed post-quantum key exchange. No connection logs. System journals wiped on every reboot.

Start for $4.99/month See how the crypto works

7-day money-back guarantee. Cancel anytime. Pay with card.

Why Cloak

Most VPNs are a tunnel. Cloak is a tunnel plus three things that matter when privacy is the job, not the checkbox.

PQ

Post-quantum from day one

Every tunnel mixes a post-quantum-derived pre-shared key into WireGuard via Rosenpass (Classic McEliece + ML-KEM). Recorded today, still safe tomorrow.

Academically peer-reviewed

The Rosenpass protocol has published formal proofs and peer-reviewed papers. We don't invent our own crypto — we use what's already been verified.

0

Nothing to hand over

No connection logs. No traffic logs. System journals live in RAM and are wiped on every reboot. The only data we hold per user is one row — see our privacy policy.

What "post-quantum" actually means here

A future quantum computer could break the classical Curve25519 key exchange that most VPNs rely on. An attacker could record your encrypted traffic today and decrypt it years from now. That's called harvest-now-decrypt-later, and it's already a real concern.

Cloak mixes a post-quantum-derived pre-shared key into every WireGuard handshake using Rosenpass. The PSK rotates every two minutes. Even if Curve25519 is broken in 2035, the traffic we protect today stays private.

Our control plane (signup, account, config delivery) runs on TLS 1.3 with the X25519MLKEM768 hybrid group — the same post-quantum key exchange Cloudflare, Apple, and Google shipped across their networks in 2024–2025.

┌─── Client ────────────┐         ┌─── Cloak server ──────┐
│ rosenpass (on-device) │  PQ KE  │ rosenpass (daemon)    │
│         │             │────────►│         │             │
│         ▼ 32B PSK     │  every  │         ▼ 32B PSK     │
│  WireGuard tunnel     │  ~120s  │  WireGuard tunnel     │
│  (Noise IKpsk2)       │◄───────►│  (Noise IKpsk2)       │
└───────────────────────┘         └───────────────────────┘
         ▲                                 ▲
         │                                 │
     ChaCha20-Poly1305     +         PSK-mixed transcript
         │                                 │
         └─── even a quantum attacker ─────┘
              with recorded traffic can't
              decrypt it retroactively.
0
connection logs
0
traffic logs
~120s
PQ key rotation interval
2
EU regions (FI, DE)

How you connect today

Native Cloak apps for iOS and Android are in development. Until they ship, you connect using the official WireGuard app — free, open-source, audited, and the same underlying data-plane our native clients will use. You'll get a config file by email after subscribing; import it into WireGuard and you're on a post-quantum-protected tunnel.

When our native apps launch, this section will be replaced with App Store and Play Store download buttons and you can migrate on your own schedule.

Ready for the next decade?

Pick a plan, get a WireGuard config by email, and connect in under five minutes. 7-day money-back guarantee.

See plans