Flexible setup, no reconnects.
A full custom stack — not another wrapper around an off-the-shelf tunnel.
Everything rides a single TLS stream on the standard HTTPS port. To any network or DPI box in between, it looks exactly like a normal web server.
Two transports, picked automatically. Custom UDP with ARQ and BBR/CUBIC congestion control for 1.5–2× faster TTFB; TLS when heavy downloads benefit from kernel TCP. No tuning, no toggles.
In TUN mode, apps go through the tunnel while browsers ride a local SOCKS5 — avoiding QUIC headaches. Or flip to Browser-only when that is all you need.
Pick exactly which apps go through the tunnel. Telegram and Discord over the proxy, games direct — your call.
Three independent health detectors watch the tunnel in real time. If it drops, traffic is blocked instantly — your real IP never leaks. When the link recovers, traffic resumes on its own.
Your key pairs with your machine on first use. Nobody else can walk off with your access — even if they get the key.
Real benchmarks from the same network, same server region, same time of day.
| Metric | Proxyness | WireGuard | Outline |
|---|---|---|---|
| Ping 8.8.8.8 | 61 ms | 100 ms | — |
| DNS (avg) | 63 ms | 104 ms | — |
| TTFB github.com | 0.38 s | 0.49 s | timeout |
| TTFB telegram.org | 0.43 s | 0.70 s | timeout |
| Download | 5.0 MB/s | 2.6 MB/s | ~12 KB/s |
| Upload | 4.6 MB/s | 6.3 MB/s | — |
Outline on Shadowsocks times out on HTTPS under Russian ISPs in 2026. Proxyness uses real TLS on 443 — it looks like a web server.
No configuration files, no command line, no browser extensions required.
Grab the installer for your platform above and run it. Takes less than a minute.
Paste the key you were given. It binds to your device automatically on first connect.
That's it. Your traffic is now flowing through the tunnel. Change modes any time from the header.