Cookie
Electronic Team uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our cookie policy. Click here to learn more.

Donglify prioritizes your data security

We have designed Donglify with your security in mind. The connectivity software keeps your data safe at home, at work, and while it's traversing the network.
  • Protection and encryption
    Strong encryption

    All data transmissions are encrypted using the TLS 1.2 protocol, ensuring your information remains inaccessible to unauthorized individuals.

  • End-to-end security
    End-to-end security

    We enforce end-to-end encryption and route your data through the minimum number of channels and points to ensure its privacy and security.

  • Cloud architecture
    Cloud architecture

    Our servers are hosted in Akamai clouds for maximum flexibility, security, and resilience in case problems occur.

 alt

Donglify Architecture

Your data is routed through a secure system where account and device data are transmitted separately. Many connections don’t transmit any device data through the Donglify servers.
 alt
Component 1 of 4

Central server

The central server handles user authorization, manages the transmit server, and routes connections efficiently.
 alt
Component 2 of 4

Redirection server

This server redirects data transmission if you cannot establish a direct connection.
 alt
Component 3 of 4

Web account

Your web account manages subscription plans, tokens, nodes, team members, and more.
 alt
Component 4 of 4

STUN server

This server establishes a UDP connection if at least one of the computers is connected to the network via a NAT router.
 alt

Connection channels

Direct connectionPriority #1

A direct, point-to-point connection offers the fastest data transmission speed by eliminating go-betweens and directly transferring data between two computers.

QUICPriority #2

This connection method bypasses potential NAT issues by encapsulating data and establishing a UDP tunnel for stable connectivity.

UDPPriority #3

This method also utilizes a point-to-point connection between two computers. It is less stable than a direct connection, but can be used to establish communication when creating a direct path with TSP is not possible.

RDPPriority #4

This technique uses the Microsoft RDP channel to transfer data directly between two computers.

RedirectPriority #5

This method uses a repeater to connect any two machines with Internet access. It has a low bandwidth due to the repeater and is the only type of connection that transmits device data.

Donglify logo
Let's get started!
It only takes a few minutes to register your account.