All Your Questions Answered Here
Enjoy Reading Our Blog
What is a Mysterium Node?
Nodes are devices, such as an AVADO box, Raspberry Pi or computer, which help power and maintain our distributed network. Most of the internet you pay for goes to waste, sitting idle or completely unused. Peers within a distributed network like ours can easily share these excess internet resources with each other, such as storage, computing power, bandwidth and IP addresses. Any user of the network can pay to connect to your node, providing them with a VPN service, access to the open internet and a secure line of communication. Nodes replace the traditional role of a server.
How do I run a Mysterium Node?
Depending on what kind of device you have, you can follow the tutorials at https://docs.mysterium.network/
If you have AVADO box:
What is MystNodes.com?
This is where all the magic happens. Through your personal MystNodes.com dashboard, you can create a node runner account, connect your node to your IP address ("claim it"), access your node’s information, track your performance, and see your monthly earnings.
What is whitelisted traffic?
How can I get support as a node?
How do we protect node runners?
For those who have a greater technological understanding of how to run an exit node safely and protect the privacy of their node running activities from ISPs, this will be a viable option. Please read our guide on running an exit node: https://dvpnalliance.org/exit-node/
How can I maximize my earning potential?
1 - Don’t enable the only “whitelisted traffic option” if you’re not based in the following countries: Canada, U.S., UK, Italy, Australia, or India.
What's the criteria for my IP address?
You can run a node with dynamic IP, it does not have to be static.
What is Mysterium Network?
Mysterium Network is building a decentralised VPN and other tools that allow you to browse the internet freely, earn by sharing your connection, and build censorship-resistant applications. The network itself is made up of residential and non-residential IPs as nodes, which are run in homes, offices and cell phones across the globe.
We want to enable secure access into an open internet for everyone by building technology that makes the internet blind to borders.
How do you encrypt the network?
What can you build on Mysterium Network?
1. Unlock any service within your app
Plug into Mysterium’s pool of residential IPs with built in discovery, accounting and automation.
3. Get more security/ encryption at a better price
Built in traffic-slicing so your traffic is unblocked automagically. Pay only for what you use. Our network uses OpenVPN and WireGuard© encryption protocols.
How does MYST work in Mysterium Network?
MYST is the native utility token at the heart of Mysterium. It will power the staking mechanism within the network, and allows you to pay for peer-to-peer VPN services. Instead of paying a regular VPN service to unblock websites and apps, you can use MYST to pay people around the world when you connect to their IP address.
What is Mysterium VPN?
Mysterium Network is a privacy solution at its core. It’s technologically impossible for us to store logs centrally, as traffic is distributed across our global network of residential IPs.
Using our micropayments system, Hermes Protocol, you only pay for the gigabytes you actually use. No subscriptions, no monthly fees – just minute-by-minute payments.
Access what you want, when you want
Our network is blind to borders. Select any IP you like from our global list and get unlimited access to worldwide content. Mysterium VPN comes with an automatic free trial so you can take the app for a spin.
How is Mysterium VPN different from regular VPNs?
How much does it cost to use Mysterium VPN?
Our VPN is fully pay-as-you-go, so you only pay for the gigabytes you actually use. No subscriptions, no monthly fees – just minute-by-minute payments.
Does Mysterium VPN work in China?
Do you plan on adding multi-hop routing?
My VPN app is frozen - what should I do?
Can nodes see my traffic?
In theory, this is possible. It holds with the same potential as Tor, which is that an exit node could potentially see traffic if a user is looking at unencrypted sites (eg. A site without HTTPS). The person running the exit node would have to have a sophisticated understanding and tools in order to do this, so it’s not a huge concern for network users.