How It Works
Understanding the data flow through Bethrou's P2P proxy network
Real-World Use Cases
See how Bethrou solves networking challenges across different scenarios
Privacy & Control
Route through your own infrastructure
Direct your internet traffic through servers you control. Eliminate third-party visibility into your network activity.
Global Testing
Multi-region application testing
Deploy exit nodes across geographic regions to test application behavior from different locations without VPN infrastructure.
Network Isolation
Private networks for teams
Create completely isolated networks accessible only to authorized peers. Perfect for development teams needing private infrastructure.
NAT Traversal
Bypass restrictive firewalls
Automatically relay traffic through intermediary nodes when direct connections fail. Connect from anywhere behind any firewall.
Secure Tunneling
End-to-end encrypted connections
All traffic is encrypted with libp2p noise protocol. No exit node can see your traffic, only your application data.
Distributed Networks
P2P without central servers
Build decentralized networks where every node is equal. No single point of failure, no central authority needed.
Get Started in 6 Steps
Set up your first private proxy network in minutes
echo "/key/swarm/psk/1.0.0/" > network.key
echo "/base16/" >> network.key
openssl rand -hex 32 >> network.key
What's Next?
Explore Advanced Config
Learn about custom routing rules, multiple exit nodes, and performance tuning
Deploy to Production
Use Docker for easy deployment or run on your own servers
Contribute to Project
Help improve Bethrou by contributing features, fixes, and documentation on GitHub