Frequently Asked Questions¶
Common questions and answers about Waveshift.
General Questions¶
What is Waveshift?¶
Waveshift is a hardware and software platform for creating resilient mesh networks and edge computing deployments with secure anonymous access to the internet via Cloudflare WARP and AWS egress locations across the world.
Key Features: - Hardware nodes for plug-and-play VPN routing - On-demand AWS-based Points of Presence (PoPs) worldwide - Optional Cloudflare WARP integration for traffic normalisation - Kasm Workspaces integration for secure browsing and persistent profiles - Private peer-to-peer networking between devices
See How Waveshift Works for detailed architecture.
What's the benefit of using Waveshift over Cloudflare WARP alone?¶
Cloudflare WARP is excellent for fast internet access, but limited to selecting an egress location near your physical location.
Waveshift advantages:
✅ Choose any AWS region for egress (not just nearby)
✅ Protect your IP from Cloudflare (they see AWS, not you)
✅ Full infrastructure control (deploy, configure, destroy)
✅ Hardware nodes for easy device integration
✅ Kasm workspaces for isolated browsing
✅ P2P networking between your devices
See Cloudflare Integration for details.
Who should use Waveshift?¶
Ideal for: - Privacy-conscious users needing anonymous internet access - Organisations requiring secure remote access - Users needing specific geographic egress points - Teams wanting private mesh networking - Anyone wanting control over their VPN infrastructure
How is Waveshift different from commercial VPNs?¶
| Feature | Waveshift | Commercial VPN |
|---|---|---|
| Infrastructure | Your own AWS resources | Shared provider servers |
| Exit IPs | Unique to you (or shared via Cloudflare) | Shared with thousands |
| Control | Full control and transparency | Trust the provider |
| Locations | Any AWS region | Provider's locations only |
| Logging | You control (none by default) | Provider's policy |
| Privacy | Multi-layer anonymisation | Single-layer |
| Hardware | Nodes for easy integration | Software-only |
VPN & Networking¶
What type of VPN does Waveshift use?¶
WireGuard - A modern, fast VPN protocol using state-of-the-art cryptography: - Curve25519 for key exchange - ChaCha20 for symmetric encryption - Poly1305 for authentication - BLAKE2s for hashing
How does Waveshift handle traffic encryption?¶
Multi-layer encryption:
- Device to Node: LAN (HTTPS/TLS)
- Node to AWS PoP: WireGuard tunnel through internet
- PoP to Cloudflare (if enabled): WireGuard to WARP
- Cloudflare to Internet: Encrypted to final destination (HTTPS/TLS)
Your data is encrypted with multiple layers of protection.
Where does Waveshift generate the encryption keys?¶
Key generation location depends on use case:
Server Keys: - Generated on the EC2 instance itself - Private key never leaves the server - Only public key shared with Control Plane
Peer Keys (QR codes/configs): - Generated on Control Plane - Both private and public keys in config - Intended for personal devices you control
Node Keys: - Generated on the node device - Private key stays on node - Only public key shared with Control Plane
Entropy sources: Drand (public randomness beacon) + local system entropy for maximum security.
When a PoP is deleted, what happens to the data?¶
Permanent Data Destruction
When you delete a PoP, all data is permanently destroyed with no possibility of recovery. This is a destructive operation that cannot be undone.
What gets destroyed:
- EC2 instance terminated - All data on the instance is erased
- IP address released - Returns to AWS pool and may be reassigned to other customers
- WireGuard configs invalidated - All keys become immediately invalid
Before deleting: Always ensure you have backups of any important data, logs, or configurations you may need later.
Is it possible to network multiple devices together?¶
Yes! Devices on the same PoP can communicate privately:
Peer-to-Peer Features: - Secure encrypted communication between peers - No internet exposure for P2P traffic - File sharing between trusted devices - Remote desktop access - Private TAK servers - Team collaboration tools
How it works: - All devices on same PoP are in same VPN subnet - WireGuard allows peer-to-peer routing - Traffic stays within VPN, never touches internet
See How Waveshift Works - P2P Networking for details.
Is it possible to use the VPN to connect to the public internet?¶
Absolutely! That's the primary use case:
- Device connects to Node (or uses QR code config)
- All internet traffic encrypted via WireGuard
- Traffic routes through AWS PoP
- Optional: Further encrypted to Cloudflare WARP
- Exits to public internet
Your ISP sees: Encrypted WireGuard traffic
Websites see: AWS IP (or Cloudflare shared IP if enabled)
Your real IP: Completely hidden
Hardware¶
What's included in the Waveshift hardware package?¶
Standard Kit includes:
- 1x Control Hub (GL.iNet Brume 2) - Control Hub router
- 5x Nodes (GL.iNet Slate AX) - User device routers
- 1x Network Switch (8+ ports) - Unmanaged
- Power adapters for all devices
- 20x Ethernet cables (Cat 6)
See Hardware Setup for complete details.
Can I use different hardware than provided?¶
Waveshift Firmware Requirements
Control Hub and Node routers require Waveshift-specific firmware and cannot be substituted with standard routers.
Hardware requirements:
- Control Hub and Nodes require Waveshift custom firmware
- Firmware is custom-built specifically for GL.iNet hardware
- Standard consumer routers cannot be flashed with Waveshift firmware
- GL.iNet devices other than those provided are not currently supported
Why this matters: The firmware includes specialised VPN management, automatic configuration, and killswitch functionality that aren't available on standard router firmware.
However, you can substitute:
- Switch can be any unmanaged switch (8+ ports)
- Bearer router can be any router providing internet
- Tablet can be any device with Ethernet adapter
- Power adapters can be substituted (check voltage/amperage)
Alternative Hardware Options
If you need different hardware than the standard kit, Blackfire Technology can help scope alternatives.
When to contact: If you need higher capacity, different form factors, or deployment-specific requirements.
Contact: support@blackfire.tech
What firmware is running on the GL.iNet devices?¶
Waveshift Custom Firmware: - Based on OpenWrt Linux distribution - Custom Waveshift modules for VPN management - Automatic configuration from Control Plane - VPN killswitch and firewall rules
Firmware updates: Released periodically through Waveshift deployment updates.
How can I get the latest firmware?¶
- Firmware updates released periodically by Blackfire Technology
- Deployed during Waveshift service updates
- Control Hub and Nodes update in coordination with Control Plane
How do I reset the Internet Bearer Router?¶
Reset procedure:
- Locate the reset button on the Bearer Router
- Hold the reset button for 10 seconds
- Release when the system begins to reboot
- Wait for full boot (approximately 4 minutes)
- Reconfigure internet settings via admin panel at
192.168.8.1
Reset Wipes Configuration
A factory reset will erase all settings including Wi-Fi credentials, internet configuration, and custom settings.
What if I need more nodes?¶
Expanding your deployment:
- Additional nodes can be purchased through Blackfire Technology
- All nodes come pre-flashed with Waveshift firmware
- Simply connect and power on following the same setup procedure
- Contact: support@blackfire.tech
Can nodes be used without Control Hub?¶
No. Nodes require the Control Hub for operation:
- Control Hub provides management network connectivity
- Configuration is pushed from Control Plane via Control Hub
- WireGuard credentials are distributed through Control Hub
- Node status monitoring requires Control Hub connection
Architecture: Nodes are designed as managed endpoints, not standalone routers.
Setup & Configuration¶
What are the default login credentials?¶
See Default Values & Credentials for complete list.
Change Default Passwords
Always change default passwords in production environments!
Can I deploy Waveshift without the hardware?¶
Yes! Two deployment options:
1. With Waveshift Nodes: - HQ style setups - Users get issued nodes to connect/network different devices
2. Cloud-Only: - Clients use QR Codes / config files provided by wveshift to fill their devices - Kasm Workspaces use only the cloud infrastructure - No Waveshift hardware required
See Quick Start Guide for cloud-only deployment.
Privacy & Security¶
Does Waveshift log my traffic?¶
Privacy by Default
Waveshift is designed with privacy as a core principle. It is a self hosted VPN service provider. Any logs that are available belong to you. Currently there is no logging of your traffic. In the future, we may add logging capabilities but these logs will belong to the client running waveshift and Blackfire Technology will ave no access to these.
What Waveshift Control Plane logs:
- ✅ Does NOT log your browsing activity
- ✅ Does NOT log websites you visit
- ✅ Does NOT log DNS queries
- ✅ Logs only: System events, infrastructure builds, and errors
What AWS logs:
- ✅ Does NOT log your traffic (unless you explicitly enable VPC Flow Logs)
- ✅ Logs only: Infrastructure metrics and API calls (via CloudTrail)
What Cloudflare logs (if WARP is enabled):
- ✅ Claims no user-identifiable logging
- ✅ Publishes regular third-party audits of their 1.1.1.1 service
- ✅ May see aggregated traffic patterns but cannot correlate them to individual users
Your privacy: With Waveshift, you control the infrastructure. Unlike commercial VPNs, you can verify there's no logging by inspecting your own servers.
Can my ISP see what I'm doing?¶
Your ISP sees: - Encrypted WireGuard traffic - Amount of data transferred - Connection timing - Destination: AWS ingress PoP IP address
Your ISP CANNOT see: - Websites you visit - Content of your traffic - Your DNS queries - Your actual destinations
What happens if the VPN disconnects?¶
Automatic Killswitch Protection
Waveshift includes built-in VPN killswitch functionality to protect against accidental exposure if your VPN connection drops.
How the killswitch works:
- Immediate blocking - Traffic is blocked the instant VPN disconnects
- No leaks - All data is prevented from using your regular internet connection
- Firewall enforcement - Node firewall rules strictly prevent non-VPN traffic
- Visual indicators - Node LEDs show VPN connection status
- Auto-reconnect - Connection automatically retries without manual intervention
Your protection: If the VPN fails for any reason, your device is protected from accidentally exposing your real IP address or unencrypted traffic.
When you'll see this: The killswitch activates automatically during network interruptions, VPN server maintenance, or any connectivity issues.
How secure are the WireGuard keys?¶
Cryptographically secure:
- High-quality entropy from Drand + local sources
- Curve25519 elliptic curve cryptography
- Perfect forward secrecy - past sessions remain secure
- Short-lived sessions reduce exposure
- Unique keys per PoP - no key reuse
See Cloudflare Integration - Entropy for technical details.
Troubleshooting¶
Devices aren't showing up in the UI?¶
Node Registration Troubleshooting
If nodes aren't appearing in the Waveshift console, work through these troubleshooting steps in order.
1. Verify physical connections:
- Node WAN port connected to Bearer Router (for internet)
- Node LAN2 port connected to Control Hub (for management)
- All Ethernet cables firmly seated
2. Confirm power status:
- All nodes powered on with LEDs lit
- Using correct power adapters (minimum 3A for nodes)
- Power outlets functional
3. Allow registration time:
- Nodes take 1-2 minutes to register after power-on
- Refresh the Nodes page in your browser
- Check if nodes appear as "Unassigned"
4. Test Control Hub access:
- Verify
http://console.waveshift.internalloads from your device connected to the control hub - Confirm Control Hub has active internet connection
Still not working? See the complete Hardware Setup Troubleshooting guide for advanced diagnostics.
PoP build is failing?¶
PoP Build Prerequisites
If your PoP build is failing, these are the most common causes. Check each before retrying.
Common failure causes:
- AWS credentials expired - For wavectl users, re-authenticate with AWS
- Regional capacity limits - Try deploying to a different AWS region
- Network connectivity issues - Ensure Control Plane has stable internet
- AWS service quotas exceeded - Check your account limits for EC2 instances
When you'll see this: During PoP creation, especially in high-demand regions or with new AWS accounts.
Next steps: See detailed solutions in Troubleshooting - Common Issues.
Can't access the Control Hub console?¶
Control Hub Console Access
If you can't access the Control Hub console at http:console.waveshift.internal, work through these troubleshooting steps.
1. Verify tablet/computer connection:
- USB-Ethernet adapter properly connected to tablet
- Ethernet cable from adapter to Control Hub LAN port (any LAN port)
2. Try different LAN port:
- Control Hub has multiple LAN ports - try each one
- Avoid the WAN port (used for internet, not management)
3. Power cycle the Control Hub:
- Unplug power adapter, wait 10 seconds
- Reconnect power and wait 60 seconds for full boot
- LEDs should illuminate during boot sequence
4. Verify power supply:
- LED indicators are lit (not dim or flickering)
- Using the provided power adapter (not a substitute)
- Power adapter firmly connected
Still stuck? The complete Hardware Setup guide has advanced diagnostics and solutions.
Kasm Workspaces¶
What is Kasm and why use it with Waveshift?¶
Kasm Workspaces Integration
Kasm Workspaces provides secure, containerized browser environments that run in isolated containers rather than on your local device.
Key benefits:
- Isolated browsing - Browser runs in a container; no traces left on your device
- Disposable sessions - Destroy the workspace when done; all data is removed, unless preserved using persistent profiles.
- Fingerprinting resistance - Consistent browser fingerprint across sessions
- Waveshift PoP routing - Route through any of your PoPs worldwide
- Multiple browsers - Chrome, Firefox, Tor Browser, and more
How it works: When you launch a Kasm workspace, it creates a fresh containerized browser instance. All browsing happens in that container, which routes through your selected Waveshift PoP. When you close the workspace, the container is destroyed completely.
When to use Kasm: Perfect for sensitive browsing where you want zero traces on your local machine, or when you need consistent browser fingerprinting.
Waveshift Integration:
- Automatically configured when building PoP
- One-click access to workspaces
- Egress through your selected PoP location
How do I access Kasm Workspaces?¶
From Waveshift Console As Non Admin User:
- Click Workspaces in left navigation
- Browser opens new tab automatically
- Select workspace (Browser, Desktop, etc.)
- Set Egress Provider to Waveshift
- Select your PoP from dropdown
- Launch workspace
All your browsing routes through the selected PoP.
Billing & Costs¶
How much does Waveshift cost to run?¶
AWS Costs: - EC2 instances (per hour) - varies by instance type and deployment location - Data transfer (per GB) - Other AWS services (minimal)
Typical monthly cost: Approximately $200-400 depending on usage and instance types.
Cloudflare WARP: Free (built into Cloudflare's 1.1.1.1 service)
How can I reduce AWS costs?¶
Minimizing AWS Costs
Waveshift uses on-demand AWS resources, so you have complete control over costs. Follow these strategies to minimize spending.
Cost-saving best practices:
- Destroy unused PoPs - Don't leave PoPs running when not in use; AWS charges by the hour
- Limit active PoPs - Only create PoPs you're actively using; you can quickly recreate them later
- Choose cost-effective regions - US regions tend to be cheaper than EU or Asia-Pacific
- Monitor with Cost Explorer - AWS Cost Explorer shows your spending patterns
When you'll save most: Destroying PoPs when not actively using them is the single biggest cost saver. A PoP running 24/7 costs much more than one you spin up for a few hours when needed.
Understanding AWS On-Demand Pricing
Waveshift uses AWS on-demand resources, which means you pay only for what you use, when you use it.
How it works:
- EC2 instances are billed per hour while running
- Data transfer is billed per gigabyte transferred
- No charges when instances are stopped or terminated
- No long-term contracts or commitments
Cost control: You have complete control over costs. Destroy PoPs when not needed, and you stop incurring charges immediately. Need a PoP again? Create it on-demand in minutes.
Example: A single PoP running 24/7 for a month might cost $3-5. The same PoP used 8 hours/day would cost $0.50-2/month.
Support¶
Where do I get help?¶
Support Channels:
📧 Email: support@blackfire.tech
📚 Documentation: https://docs.waveshift.io
🐛 Bug Reports: support@blackfire.tech
How do I report bugs?¶
Reporting Issues Effectively
Help us help you by including these details when reporting bugs or issues.
Essential information to include:
- Clear description - What's the problem in plain language?
- Reproduction steps - Exact steps that led to the issue
- Expected vs actual - What should have happened vs what did happen
- System details - Hardware models, firmware versions, wavectl version
- Log files - Any error logs or console output
- Screenshots - Visual evidence helps immensely
Where to send: Email all details to support@blackfire.tech
Response time: Blackfire Technology typically responds to support requests within 24-48 business hours.
Can I request features?¶
Yes! Feature requests are welcome.
Submit via email: support@blackfire.tech
Include: - Detailed description of desired feature - Use case / why it's needed - Any relevant examples or references
See Also¶
- How Waveshift Works - System architecture
- Getting Started - Installation guide
- Hardware Setup - Physical deployment
- Troubleshooting - Common issues
- Glossary - Terms and definitions