Back to home

SERVICE USAGE RULES

CredoVPN

Revision dated 11 April 2026.

These Rules set mandatory requirements for using the CredoVPN website, Telegram bots, interfaces, technical infrastructure, access configurations, and other service elements provided by Dolphin LLC (ООО «Дельфин»), INN 6633019190, OGRN 1126633001153, Russian Federation, Yekaterinburg, hereinafter the “Contractor.”

By using CredoVPN, the user confirms they have read these Rules, understand them, and will comply in full.

These Rules apply together with the Public Offer, User Agreement, Privacy Policy, Refund Policy, No-Logs Policy, Subscription Terms, and other CredoVPN documents.

1. General provisions

1.1. These Rules are binding on all CredoVPN users regardless of:

  • how they access the service;
  • whether a trial exists;
  • whether a paid subscription exists;
  • payment method;
  • country of use;
  • interface used.

1.2. The purpose of these Rules is to define permitted and prohibited use, protect the Contractor’s infrastructure, keep the service stable, and reduce abuse, illegality, and harm to others.

1.3. CredoVPN is provided for lawful use under applicable law and internal Contractor rules.

1.4. The user shall independently assess whether use is allowed in their jurisdiction, network, device, and for their purposes.

2. Supported use

2.1. CredoVPN is intended for use through the WireGuard application.

2.2. Support, instructions, and diagnostics are provided only for WireGuard-based connection unless expressly stated otherwise.

2.3. Unsupported apps, clients, protocols, and programs are used at the user’s own risk.

2.4. If the user uses an unsupported third-party app, the Contractor may:

  • decline setup support;
  • generally recommend switching to WireGuard;
  • refuse detailed diagnosis for issues caused by that app.

3. Permitted use

3.1. The user may use CredoVPN to:

  • lawfully access networks for personal or internal business use;
  • protect connections on the Internet;
  • use features within a paid period or trial;
  • receive support within limits set by the Contractor.

3.2. Permitted use assumes:

  • compliance with plan terms;
  • use of the user’s own or lawfully used device;
  • compliance with configuration, device count, access type, and other limits;
  • good faith in payment, connection, and support interactions.

4. Prohibited conduct

The user must not use CredoVPN for the purposes described below.

4.1. Unlawful activity, including violations of local law, crimes and administrative offenses, and aiding third-party illegality.

4.2. Interference with IT systems: unauthorized access, credential stuffing, vulnerability exploitation, unpermitted scanning, network attacks, DDoS, or any action harming integrity or availability of third-party systems.

4.3. Malware distribution: viruses, trojans, spyware, ransomware, malicious scripts, phishing pages and materials, or other harmful tools.

4.4. Mass abuse: spam, mass automated sending, registration abuse, artificial traffic generation, or disproportionate load on infrastructure.

4.5. Third-party rights violations: IP infringement, privacy violations, unlawful sharing of others’ data, publishing or transferring content without rights.

4.6. Circumventing service limits: multiple accounts to bypass limits, repeated trial abuse, sharing configs with third parties, multiple identities to bypass rules, fake or substituted data.

4.7. Improper commercial use: reselling access, providing access to clients or third parties, operating the service as a VPN platform, embedding access in third-party products without written consent.

5. Access and configurations

5.1. Access, configuration, QR codes, tunnel parameters, and related technical data are provided for lawful personal use within limits set by the Contractor.

5.2. The user must not:

  • share configuration with third parties;
  • publish QR codes, files, keys, or parameters;
  • use one access collectively unless the plan or agreement allows;
  • alter configuration to bypass limits or break service architecture.

5.3. The user shall take reasonable steps to protect configurations from third-party access.

5.4. If the Contractor detects shared, distributed, or misused access, it may restrict or terminate that access.

6. Load and technical limits

6.1. The user must not use the service in a way that:

  • creates excessive server load;
  • harms network stability;
  • degrades quality for other users;
  • disrupts monitoring, protection, routing, or interfaces.

6.2. The Contractor may apply technical limits, including:

  • concurrent session limits;
  • configuration change frequency limits;
  • connection count limits;
  • anti-abuse filters;
  • temporary blocks on suspicious activity.

6.3. The user shall not attempt to bypass such limits.

7. Trial use

7.1. Trial access is a limited test to evaluate the service.

7.2. The user must not:

  • obtain trials repeatedly in breach of rules;
  • create extra accounts for repeated testing;
  • use trials commercially or abusively;
  • use trials to avoid payment.

7.3. The Contractor may:

  • deny repeat trials;
  • limit trial functionality;
  • end trial access if abuse is found.

8. Support conduct

8.1. Users may contact support about:

  • service connection;
  • WireGuard use;
  • plan, subscription, payment, refunds;
  • technical issues related to CredoVPN.

8.2. Users shall:

  • provide truthful information;
  • describe issues clearly;
  • provide requested data when reasonably needed;
  • avoid flooding support;
  • not send malware or knowingly false materials.

8.3. Users must not:

  • insult staff;
  • spam, flood, threaten, or send malicious links;
  • impersonate others;
  • misrepresent payment, device, app, or issue details;
  • use support for unrelated purposes.

8.4. The Contractor may limit interaction, stop support for a ticket, or escalate internal review for Rules violations.

9. Payments and good faith

9.1. Users shall use payment methods in good faith.

9.2. Users must not:

  • use others’ payment instruments without lawful grounds;
  • submit fake receipts, false screenshots, or false transaction hashes;
  • dispute payments without grounds after actual use;
  • abuse refunds;
  • use payments fraudulently.

9.3. The Contractor may request extra payment data as needed for:

  • payment identification;
  • refund processing;
  • fraud prevention;
  • dispute resolution.

10. User-submitted content

10.1. Users may submit messages, screenshots, images, files, and other materials needed to use the service and obtain help.

10.2. Users warrant that materials:

  • are lawful;
  • contain no malware;
  • do not infringe third-party rights;
  • relate to service use or the support ticket.

10.3. Users must not submit:

  • virus-laden or malicious content;
  • knowingly forged documents or proofs;
  • unrelated materials;
  • content whose distribution is unlawful.

11. Consequences of violations

11.1. For Rules violations, the Contractor may without prior notice:

  • restrict access;
  • suspend access temporarily;
  • block a configuration or account;
  • decline support for a ticket;
  • stop trial access;
  • deny refunds tied to bad-faith use;
  • share information with authorities as permitted by law.

11.2. The measure depends on the violation’s nature, consequences, risk, and need to protect the service, others, and Contractor rights.

11.3. The Contractor is not required to disclose internal abuse-detection methods if disclosure could harm the service.

12. Unsupported scenarios

12.1. If the issue stems not from CredoVPN but from unsupported apps, third-party devices or software, the user’s local network, device settings, ISP actions, or corporate network or security policy, the Contractor may limit guidance or refer the user to the relevant vendor.

12.2. Lack of full support for unsupported scenarios is not a breach by the Contractor.

13. Changes to the Rules

13.1. The Contractor may amend these Rules at any time.

13.2. A new version takes effect upon publication unless stated otherwise.

13.3. Users shall monitor the current Rules version.

13.4. Continued use after publication means acceptance.

14. Relationship to other documents

14.1. These Rules apply together with the Public Offer, User Agreement, Privacy Policy, Refund Policy, No-Logs Policy, Subscription Terms, and other service documents.

14.2. If the same matter is governed by these Rules and other documents, they shall be read together.

14.3. In case of clear conflict, priority is:

  • mandatory law;
  • the Public Offer — for contractual terms;
  • other special documents — for matters they expressly govern.

15. Contractor contacts

Contractor: Dolphin LLC (ООО «Дельфин»).

INN: 6633019190.

OGRN: 1126633001153.

Country: Russian Federation.

City: Yekaterinburg.

Website: credovpn.ru.

Support email: support@credovpn.ru.

Support Telegram: @credovpnsupportbot.