MvdV>> To me it seems needlesly complicated. But I confess I do not MvdV>> know...
KE> The tunnel is made to the server that maintains your credentials and KE> account. Spreading your credentials and guarding the limits of your KE> account is probably more complicated.
That's the meta data. Different kettle of fish.
I still don't see how one can have an IPv6 address on the end device if the "last mile" does not support IPv6, other than via a 6to4 tunnel with one of the tunnel end points on the end device.