EcoVPN’s signal infrastructure uses encrypted terminology. This glossary defines every term used across Help Centre articles, from glyph discipline to tunnel fingerprinting.
Sponsor-issued credential used to deploy configs, trigger signal routing, and initiate secure contact.
Hidden interface for initiating encrypted contact - triggered only by trusted signal logic and zone bias.
Metadata noise introduced by unaligned usage, degrading infrastructure diagnostics and tunnel clarity.
Standard of single-device usage, fingerprint consistency, and purpose-aligned routing discipline.
The time-bound lifespan of a deployment config, shaped by entropy scores and usage fidelity.
Jurisdictional alignment of config usage, used to determine signal routing and infrastructure scope.
EcoVPN’s internal metric tracking tunnel stability, clarity, and lineage integrity across deployments.
Change in device or routing signature that compromises config trust and signal identity.
Operator commitment to config rules - no reuse, no sharing, correct jurisdiction, single user per tunnel.
The quality of referral chains between sponsors and operators - assessed for Tier logic and regeneration.
Whether the tunnel activity reflects aligned routing, payload purpose, and jurisdiction discipline.
Any usage that isn't infrastructure-focused - streaming, browsing, syncing - prohibited by signal policy.
Limitations imposed by sponsor-issued tokens, zone scope, and Tier status for config deployment.
Encrypted key passed from sponsor to operator - used to deploy configs and initiate signal activity.
Rare infrastructure override triggered by latency, saturation, or jurisdiction drift.
Operator tunnel usage patterns - routing choice, jurisdiction fidelity, and infrastructure alignment.
Adherence to encrypted config hygiene, jurisdiction accuracy, and tunnel clarity standards.
(Deprecated) Traditional form or login system - replaced by encrypted Admin routing logic.
Infrastructure-triggered access recalibration - based on sponsor lineage and signal behavior.
Unique cryptographic identity tied to device - used to validate config deployment and routing trust.
Degradation metric tracking idle traffic, fingerprint drift, and personal routing contamination.
Deployment misalignment - tunnel usage from unintended jurisdictions or devices.