Frequently Asked Questions

  • Home
  • Frequently Asked Questions
Last updated: 03.05.2020

We assume that you already know the answer to that since you are in this website 🙂. Open source technologies respect the freedoms of you, the user, which is something we take seriously here at Cloud68.co.

At the moment we are prepared to offer qualitative services in EU countries and countries in South Eastern Europe, otherwise known as the Balkan region. Time difference, complication on accepting payments from residents or legal entities in countries other than the one mentioned above and also other legal issues from countries that have policies not friendly towards internet freedom are some of the main reasons for this decision. Our goal is to offer our services worldwide, but this seems more complicated as we had initially estimated. In a few words, avoid applying for instances if you are are not based in one of these countries, but if you really like us and you still want to apply, we will do our best to support you.

The servers used to provide your services are hosted at facilities using green energy. We will post more update about this soon.

For the full list of the instances we offer please visit this page.

If your instance is open source we will probably be able to offer it to you, but keep in mind that it will take more time for us to make sure that everything will run smoothly. Which brings us to the next question...

We get this question a lot 🙂. Once you have processed with the payment you will receive an email with all the log ind details and instructions in less than 24 hours. We are working to reduce this to 12 hours. Requests during Saturdays or Sundays will be processed Monday.

For the moment we only accept Payments through Paypal, but we are planning to offer more ways for people to pay for the services we offer. This is due to limitation of banks in Tirana, the city where Collective68, our parent company, is based at the moment. We are really working hard to also add additional payment methods.

We haven't had any requests yet for payments through cryptocurrencies and to be honest we have not been prioritizing this kind of payments at the moment. If you are interested in paying with a specific cryptocurrency please contact us and we will do our best to find a solution.

Our main communication channel for support is support.cloud68.co. You can also contact our team by using support@cloud68.co, which will open automagically a support ticket for you.
Our friendly tech support team is available from Monday to Sunday 9.00 - 17.00 CET time.

Yes, but only for our enterprise clients. We use Jitsi for these video calls, which of course is open source software.

Sometimes we also answer questions on our social media channels, but it’s is not guaranteed that we will answer there as quickly as if you contacted us at our primary support channels. Just FYI our Twitter account is @Cloud68_co

Sometimes websites aren't down for everyone but just for you. You can check this by going here. If that is the case please check your internet connection and browser configuration otherwise email us here.

Phishing is defined as the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication (source here). In our case this means that someone will try to present himself/herself as a member of Cloud68 team and ask for your sensitive information. One of the ways to understand easily that someone is sending you a phishing email is that we at Cloud68 will NEVER ask you for your password in an email. If you don’t trust a link in an email sent from us, go directly to our contact us page and inform us about the suspicious activity.

2FA is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password. Then, instead of immediately gaining access, they will be required to provide another piece of information.
This second factor could come from one of the following categories:

  • Something you know: This could be a personal identification number (PIN), a password, answers to “secret questions” or a specific keystroke pattern;
  • Something you have: Typically, a user would have something in their possession, like a credit card, a smartphone, or a small hardware token;
  • Something you are: This category is a little more advanced, and might include biometric pattern of a fingerprint, an iris scan, or a voice print;
There are various types of 2FA:
  • Hardware Tokens
  • SMS Text-Message and Voice-based 2FA
  • Software Tokens (this being the most popular form)
  • Push Notification for 2FA
  • Other Forms (Biometric 2FA)
You can read more on 2FA here: What is 2fa?

Question form

Do you have any Question?