VPN Protocols There are no limitations regarding the use of VPN protocols. If your connection requires certificates or one-time passcode tokens, such as RSA SecurID, our VPN client for Mac provides the necessary toolset through Extended Authentication (XAUTH). Likewise, passwords are often not sufficient to introduce security to a system. Additionally, secure cryptographic key exchange over insecure or public channels is enabled using the Diffie-Hellman (D-H) method. As a consequence, our hash algorithms include SHA-2, the latest set of cryptographic hash functions. But encryption is only as strong as its weakest link. Shimo provides encryption technology such as AES-256 which is even certified by governmental organizations, global enterprises and the military. We make no compromises when it comes to security standards. Your privacy and the security of your data is protected when using Shimo to establish network connections. Shimo is based on the latest security technology available. Highest Security Standards Cutting-edge technology ensures that your connections are secure and your data is safe.