1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, what information and for how long?
2. What is the registered name of the company and under what jurisdiction(s) does it operate?
3. Do you use any external visitor tracking, email providers or support tools that hold information of your users / visitors?
4. In the event you receive a takedown notice (DMCA or other), how are these handled?
5. What steps are taken when a valid court order or subpoena requires your company to identify an active user of your service? Has this ever happened?
6. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why?
7. Which payment systems do you use and how are these linked to individual user accounts?
8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? Do you provide tools such as “kill switches” if a connection drops and DNS leak protection?
9. Do you offer a custom VPN application to your users? If so, for which platforms?
10. Do you use your own DNS servers?
11. Do you have physical control over your VPN servers and network or are they hosted by/accessible to a third party?
12. What countries are your servers located in?
1. StrongVPN does not log connection data, including connecting IP, sites visited, and session duration.
2. Strong Technology LLC – California
3. Adsense cookies are used to retarget site visitors and Analytics is used for site tracking. This tracking does not provide StrongVPN with identifiable information for the visitor. Google uses anonymous advertising IDs that can be reset. Kayako is the support ticket system. Zopim is used for live chat. Both tools provide industry standard privacy policies.
4. Complainants are informed connection information is not stored per current data retention laws. As a result, we are not able to identify the user who allegedly infringed.
5. The validity of the request is verified by our legal department. If the request is valid, the agency is informed that no user information is available as we do not keep logs.
7. All major credit cards and PayPal are accepted. Payment details are stored with encryption in the billing system.
8. 2048 bit encryption with OpenVPN is the highest recommended level. A kill switch is planned for this year. Currently, a text warning advises the user when they are not connected.
9. Apps are available for Windows, Mac, iOS, and Android devices. Comprehensive setup guides are offered for other mainstream systems.
11. Yes, StrongVPN owns and operates its network.
12. StrongVPN has 400+ servers in 20 different countries. The following countries have servers: USA, UK , Canada, Switzerland, Czech, Germany, Hong Kong, Israel, Italy, Japan, Latvia, Mexico, Malaysia, Netherlands, Norway, Romania, Russia, Singapore, Sweden, Turkey.
1. No, we don’t! No traffic logs are recorded. We monitor only the number of simultaneous user connections on our network as a whole, and do not link the user to a particular server. This helps us avoid infinite simultaneous connections from a single user.
2.We’re registered and operate in Romania, inside the European Union under the name “HEXVIILLE SRL”
3. For our site analytics, we rely on Google Analytics. Other than that, all our systems and support belong to us.
4. None of our users ever received a DMCA notice while connected to our service, being unable to detect the source user, due to our no traffic logging policy. On our end, we have an internal procedure of dealing with the DMCA claim that goes unnoticed to our users.
5. No subpoena have been received by our company. If it will happen, we’ll be sure to assist as much as we’re legally obliged. Keep in mind that we don’t have any information stored about our users, except their login credentials and a few support tickets, stored in our client management platform.
6. Yes, it is allowed. We don’t restrict traffic in any way.
7. We use Bitcoins, PayPal and Credit Cards (processed by Braintree). The lack of traffic logs does not allow any linkage between the individual accounts.
8. We take security very serious at VPNBaron. We ONLY use OpenVPN protocol, one of the most secure and hard to crack protocols, with AES-256-CBC cipher, TLSv1/SSLv3 DHE-RSA-AES512-SHA, 2048 bit RSA. On top of the OpenVPN, you can also chose one of the two anti DPI (Deep Package Inspection) protocols TOR’s OBFSPROXY Scamblesuit and SSL that mask your VPN connection from your ISP. These protocols come handy in places that actively block VPN connections, like China, Egypt or university campuses.
Yes, have both a Kill Switch and a double DNS Leak Protection mechanism – one included in the OpenVPN protocol and the other in our own windows client.
9. Yes, we have a custom windows client that is easy to install and easy to use. On OSX, we rely on Tunnelblick. But with our install scripts, even your not so tech savvy grandma will set it up in a couple of minutes.
10. We use OpenDNS and Google DNS. It’s fast, secure and google does a great job keeping it safe against any type of attacks. There is a huge list of Security Benefits on their page that might be of interest to anyone who’d like to find out more.
11. We use servers which are hosted in 3rd party data centers. This allows us to offer locations from all over the world.
12. At the moment we have servers in France, Germany, Portugal, United Kingdom, United States, Canada, Singapore, Japan, Honk Kong, Australia and Czech Republic.
New locations are regularly added and tested. If our users like them, they stay.
1. We don’t keep Internet activity logs of our users. We only screen orders and filter fraudulent transactions.
2. VPNLand Inc. We operate under Canadian jurisdiction
3. Yes, we do. Google Analytics, we also create reports from logs of the webservers. For online chat we use Zopim, for support WHMCS
4. We are OK with DMCAs if they are received outside of the US. Unfortunately, no torrents are allowed on our American servers. Other (non US) servers are OK for P2P.
5. Since last interview (2015) we haven’t received any court orders.
6. American servers are not good for torrents (we block P2P). On other (non US) servers P2P is not blocked.
7. We accept credit cards, PayPal, PaymentWall, Webmoney and cash transfers. Each customer can select preferred payment method in his/her Client Area.
8. We recommend to use OpenVPN with certificate authentication and 256-bit encryption keys. We are working on a “kill switch” feature and updated apps will be released very soon. We have our own DNS servers and recommend customers to use them.
9. We have a Windows VPN app. MAC OSX, Android and iOS apps are in development stage. Our app does not store connection logs on customers’ computers.
10. Yes, we have our own DNS servers and recommend our clients to use them.
11. Our Toronto servers are owned by us and only we have physical access to these servers. Hosted servers (i.e. dedicated servers) are accessible remotely, but can be accessed physically by the hosting provider staff. All VPN servers have minimal configs and don’t store anything critical.
12. USA, UK, Canada, Netherlands, Germany, France, Italy, Singapore, Russian Federation, Sweden, Turkey, Japan and South Korea.
1. We do not log. We respect their privacy. We do not store any personal or billing information on VPN servers. IP’s are shared amongst users and our configuration makes it extremely difficult to single out any user.
2. We are registered in USA and operate as Acevpn.com
3. We use Google Analytics on www.acevpn.com (marketing site). We do not have any tracking on proxied pages. We use Google cloud for email. Emails are deleted regularly.
4. If we receive DMCA takedown, we block the port mentioned in the complaint. IP’s are shared by other users and our configuration makes it extremely difficult to single out any user. We do not share any information with 3rd parties.
5. Till date we have not received court order. We only store billing information which the payment processor or bank or credit card issuer has.
6. We have special servers for P2P and are in datacenters that allow such traffic. These servers also have additional security to protect privacy when p2p programs are running.
7. We accept Paypal, Bitcons and Credit cards for payments. We store billing information on a secure server separate from VPN servers and do not store any financial information.
8. For high security needs we suggest using our IPSEC IKEv2 VPN. Our IPSEC IKEv2 VPN servers use Suite B cryptographic algorithms suitable for top secret communication.
Yes, we do provide kill switches if a connection drops. Our servers are tested for DNS leak. Encryption varies depending on VPN protocol. We support the following protocols and encryption:
IPSEC IKEv2 – 384 bits ECC (Equivalent to RSA 7680 bits) and AES 256
OpenVPN – We have servers running on port 53, 80, 443, 1194, 8292. RSA
4096 bit and AES 256 bit encryption supported.
L2TP VPN – AES 256 bit encryption.
Stealth VPN – RSA 2048 bit and AES 256bit encryption. Makes VPN
traffic look like https traffic.
PPTP VPN – Avoid if you can!
9. We use unmodified OpenVPN client applications that are signed by the developer / vendor themselves. We do not offer custom application at this time however any openvpn program can be used with our service.
10. We operate our own DNS servers (Smart DNS) for streaming videos. For VPN, we use Google and Level3 DNS.
11. We have full control over our servers. Servers are housed in reputed datacenters. Many of them are ISO certified and are designed to the highest specifications for performance, reliability and security.
12. We have servers in 24+ countries and over 45+ locations / datacenters. USA, Canada, Mexico, Denmark, France, Germany, Ireland, Italy, Latvia, Luxembourg, Netherlands, Norway, Romania, Russia, Spain, Sweden, Switzerland, UK, Hong Kong, Singapore, South Korea, Australia, Egypt and South Africa.
1. No. We cannot locate an individual user by IP address and timestamp. There are no logs written to disk on our gateways. The gateway servers keep the currently authenticated customers in the server’s RAM so they can properly connect and route incoming traffic to those customers. Once powered down, the RAM contents are lost.
2. OctaneVPN. We operate two independent companies with different ownership structures – a network operations company and a marketing company. The network operations company operates out of a privacy friendly foreign country. The marketing company operates under US jurisdiction and manages the website, customer accounts and support. The US company has no access to network operations information and the network operations company has no customer account data.
3. No. We do use a service to send generic emails. We intermittently use site optimization tools such A/B testing and Google Analytics but these have no user specific information.
4. Due to the split structure of our network operations company, it is unusual that we would receive a notice. There should be no cause for the marketing company to receive a notice.
If we receive a DMCA notice or its equivalent based on activity that occurred in the past, we respond that we do not host any content and have no logs. If we receive a DMCA notice based on very recent activity and the customer’s current VPN session during which it was generated is still active on the gateway, we may put the account on hold temporarily and notify the customer. No customer data would be used to respond to DMCA notices.
5. Our customers’ privacy is a top priority for us. We would proceed with a court order with complete transparency.
A court order would likely be based on an issue traced to a gateway server IP address and would, therefore, be received by our our network operations company which is foreign based in a country that values privacy. The validity of court orders from other countries would be difficult to enforce. The network company has no customer data. Our marketing company is US-based and would respond to an order issued by a court of competent jurisdiction. The marketing company does not have access to any data related to network operations or user activity, so there is not much information that a court order could reveal.
This has not happened.
6. Yes. We operate with network neutrality except for outgoing SMTP.
7. Bitcoin and other cryptocurriences such as Darkcoin, Credit/Debit Card, and PayPal.
If complete payment anonymity is desired, we suggest using Bitcoin, DashCoin, or a gift/disposable credit card. Methods such as PayPal or Credit/Debit card are connected to an account token so that future renewal payments can be properly processed and credited. We allow customers to edit their account information. With our US/foreign operating structure, customer payment systems information is separate from network operations.
8. We recommend using the AES-256-CBC cipher with OpenVPN, which is used with our client. IPSec is available for native Apple device support and PPTP is offered for other legacy devices. OpenVPN offers the best security and speed and is our recommended protocol.
We provide both DNS and IP leak protection in our Windows and Mac OctaneVPN client. Our OpenVPN based client’s IP leak protection works by removing all routes except the VPN route from the device when the client has an active VPN connection. This a better option than a ‘kill switch’ because our client ensures the VPN is active before it allows any data to leave the device. A ‘kill switch’ usually operates by monitoring the connection periodically, and, if it detects a drop in the VPN connection, reacts. With a ‘kill switch’, data sent during the time between checks is potentially vulnerable to a dropped connection. Our system is proactive vs a reactive kill switch.
9. Yes. We offer our OctaneVPN client which is based on OpenVPN technology. It is available for Windows and Mac OS X. In addition, we have guides for setting up devices on iOS, Android and Linux along with guides for using VPN with routers and NAS devices. Our client can create a log on the customer’s local PC for tech support/troubleshooting. Logging is off by default on recent releases of our client.
10. Yes and we physically control them. You can choose others if you prefer.
11. In our more active gateway locations, we colocate. In locations with lower utilization, we normally host with third parties until volume at that location justifies a physical investment there. The hosted locations may have different providers based on geography. We operate gateways in over 46 countries and 95 cities. Upon booting, all our gateways load over our encrypted network from a master node and operate from encrypted ramdisk. If an entity took physical control of a gateway server, the ramdisk is encrypted and would vanish upon powering down.
2. We are known as VPNAUS Ltd Pty. We are located in Australia, and are one of the very few true aussie based virtual service providers. We run under Australian jurisdiction.
3. Google is the only external based system we use. We make standard use of Google Apps and Google Analytics. All other support tools are kept internal for our users and visitors.
4. As we do not keep any records of activities, nor do we host and content. As such we are unable to remove content that does not exist. In the event that a DMCA notice is received by our abuse team, it is processed accordingly, however no forwarding of user details has ever occurred.
5. All notices are carefully examined when received. We have never passed any customer related information across to a third party, as we simply do not store records of activity. Our systems use shared IP addresses which means we are unable to identify individual traffic. We have also not received any valid court orders.
6. All web activity, including BitTorrent and P2P is allow by all our servers by default. We do not limit or block any traffic across any of our servers.
7. We currently accept all forms of credit card payments through the payment gateway Stripe. PayPal is also an alternative method. We keep billing independent from our system, it is handled with only a basic reference of whether our customers have paid or not using reference codes. We do not store any billing information such as credit cards or addresses.
8. We run multiple encryption methods, including PPTP, L2TP, as well as OpenVPN. We recommend using OpenVPN as it’s the most secure. We currently run up to AES-256 encryption. We plan to add DNS leak and kill switches directly into our custom app soon.
9. Yes we have a custom VPN application. At this point in time, we support the Windows platform, however mobile and other OS platforms will be added in the future to allow ease of use and access for any user on any device or platform.
10. We have local VPN server DNS, as well as the ability to proxy your DNS through third parties for such as Google DNS, which is fast stable and impossible to track.
11. Our VPN servers are virtual, and also hosted by a diverse range of third party providers. We ensure that no logs and no credentials are stored. We have direct access to each system and we ensure that only hashes on servers.
12. Rather than having a large number of systems, we have a limited number of locations to ensure quality over quantity. We currently provide the following service locations: Australia (Perth), Japan (Tokyo), United States (West), United Kingdom (London). We also still expanding our locations, and plan to have a VPN system in every state of Australia, as well as all the major countries, and we expand based on customer demand.
1. No, we do not keep ANY logs.
2. Our team is from CIS countries. At this time we are out of any jurisdiction, and nowadays we are in progress to research a good place to register the company.
4. Usually this notice is outdated, so there is no any activity related to that notice at the time we receive it. Sometimes we could block any outgoing packets from the server.
7. Bitcoin, Perfect Money, PayPal, WebMoney, QIWI, Yandex.Money, OKPay, LiqPay, Paysafecard, VISA/Mastercard, Mint. Payment systems are not linked to individual user accounts. Payment transactions have only payment system’s name, no any other payment system’s data related to user.
8. We recommend to combine Tor + VPN chains + SSH and not only one VPN provider. Yes, you can see guides about “kill switches” and DNS leak protection.
11. Not in every country. Usually it’s hosted in different datacenters by different hosting companies.
12. Austria, Australia, Belgium, Bulgaria, Canada, Switzerland, Chile, Czech Republic, Germany, Denmark, Estonia, Spain, Finland, France, Hong Kong, Hungary, Ireland, Isle of Man, India, Iceland, Italy, Japan, South Korea, Kazakhstan, Israel, Lithuania, Luxemburg, Latvia, Moldova, Malaysia, Netherlands, Norway, New Zealand, Panama, Poland, Portugal, Romania, Serbia, Russia, Saudi Arabia, Sweden, Singapore, Thailand, Turkey, Ukraine, UK, USA, Vietnam, South Africa.
1. We have developed our system with an eye on our customer’s privacy, so we created a distributed VPN cluster with independent public nodes that do not store any customer data or logs at all. We have also been audited by one of the finest security experts, Leon Juranic, who has certified us to be completely log free.
2. Hide.me VPN is operated by eVenture Limited and based in Malaysia with no legal obligation to store any user logs at all.
3. Our landing pages which are solely used for advertising purposes include third-party tracking scripts. However no personal information that could be linked with the VPN usage is shared with these providers. We do not send information that could compromise someone’s security over email.
4. Since we don’t store any logs and/or host copyright infringing material on our services, we’ll reply to these notices accordingly.
5. It has never happened but in such a scenario we won’t be able to entertain the court orders because our infrastructure is built in a way that it does not store any logs and there is no way we could link any particular cyber activity to any particular user. In case we are forced to do so, we would prefer to close down rather than putting our users at stake who have put their trust in us.
6. There is no effective way of blocking file-sharing traffic without monitoring our customers which is against our principles and would be even illegal. Usually we only recommend our customers
to avoid the US & UK locations for file-sharing but it is on a self-regulatory basis since these countries have strong anti-copyright laws in place.
7. We support over 200+ international payment methods, including Bitcoin, PayPal, Credit Cards, Bank transfer and UKash. All payments are handled by external payment providers and are linked to a temporary payment ID. This temporary payment ID can not be connected to the user’s VPN account/activity. After the payment is completed, the temporary payment ID will be permanently removed from the database.
8. Our Windows client has the features such as kill switch, Auto Connect, Auto Reconnect etc which makes sure that the user is always encrypted and anonymous. Even though if one of our customer decides not to use the client, in our community there is a big variety of tutorials to help our customers to protect themselves against any sort of leaks.
Above all, we have put in some additional layers of security which include default protection against IP and DNS leaks. To ensure IP leak protection, As soon as the VPN connection is established, our application deletes the default gateway of the users’ Internet Connection so their local network becomes inaccessible. In such an instance you enforce the VPN usage adding another layer of security making IP leaks impossible and that’s not it. Our Windows app also blocks outgoing IPv6 connections automatically to prevent IP leaks. To guarantee DNS leak protection our Windows app helps users to set a public DNS to the main network interface so all DNS requests originating from a user’s computer are routed through Hide.me’s VPN network.
Above all, modern VPN protocols that we all support like IKEv2, OpenVPN and SSTP, are considered secure even after the NSA leaks. We follow cryptographic standards and configured our VPN servers accordingly in order to support a secure key exchange with 8192bit keys and a strong symmetric encryption (AES256) for the data transfer.
9. We have our own VPN application for Windows, Android and iOS. Furthermore an OS X client will be introduced within the next few months.
10. We operate our own non-logging DNSservers to protect our customers from DNS hijacking and similar attacks.
11. We operate 29 server locations in 21 different countries. However we do not own physical hardware, there is intrusion detection and other various security measures in place to ensure
the integrity and security of all our single servers. Furthermore we choose all third party hosting providers very carefully, so we can assure that there are certain security standards in place (ISO 27001) and no unauthorized person could access our servers. Among our reputable partners are Leaseweb, NFOrce, Equinix and Softlayer.
12. Our servers are located in countries all over the world: Brazil, Canada, Mexico, USA, Austria, France, Germany, Iceland, Italy, Lithuania, Luxembourg, Netherlands, Poland, Romania, Sweden, Switzerland, Turkey, UK, Australia, Hong Kong, Japan, Morocco and Singapore.
2. The company is registered in Italy with name “Air”.
3. No, we don’t.
4. They are ignored, except when they refer to web sites running behind our VPN servers. Due to our service features, it is perfectly possible to run web sites from behind our servers: we also provide DDNS for free to our customers. For these specific cases, we can act similarly to a hosting provider and we verify that the web site is compliant to our Terms of Service. We have had web sites spreading viruses and other malware (verified without any doubt) and we intervened to quickly stop them when we were warned about the issue.
5. Since we can’t provide information that we don’t have, an “ex-post” investigation is the only solution, if and when applicable. So far we have had no court orders of this kind.
6. Yes, it’s allowed on every and each server. We do not discriminate against any protocol or application and we do not monitor traffic or traffic type.
7. We accept Bitcoin, a wide range of cryptocoins, PayPal and major credit cards. About PayPal and credit cards, the usual information pertaining to the transaction and account/credit card holder are retained by the financial institutions, and it is possible to correlate a payment to a user (which is good for refund purposes when required). When this is unacceptable for security reasons, then Bitcoin or some other cryptocoin should be used. Bitcoin can also be provided with a strong anonymity layer simply by running the Bitcoin client behind Tor.
8. We would recommend our setup which includes Perfect Forward Secrecy, 4096 bit RSA keys, 4096 bit Diffie-Hellman keys and authentication on both sides not based on username/password. Our free and open source client Eddie (under GPLv3) for GNU/Linux, Windows and OS X, implements features which prevent the typical DNS leaks in Windows and any other leak (for example in case of unexpected VPN disconnection). Leaks prevention, called “Network Lock”, is not a trivial kill-switch, but it prevents various leaks that a classical kill switch can’t block: leaks caused by WebRTC, by programs binding to all interfaces on a misconfigured system and by malevolent software which tries to determine the “real” IP address.
We provide guides, based on firewalls and not, to prevent leaks on various systems for all those persons who can’t or don’t wish to use our client Eddie. Our service setup, based on OpenVPN, is the following:
DATA CHANNEL CIPHERS
AES-256-CBC with HMAC-SHA1 for authentication
CONTROL CHANNEL CIPHERS
AES-256-GCM with HMAC-SHA384 for authentication
AES-256-CBC with HMAC-SHA1 for authentication
4096 bit RSA keys size
4096 bit Diffie-Hellman keys size
TLS Ciphers (IANA names): TLS-DHE-RSA-WITH-AES-256-CBC-SHA, TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
TLS additional authorization layer key: 2048 bit
Perfect Forward Secrecy through Diffie-Hellman key exchange DHE. After the initial key negotiation, re-keying is performed every 60 minutes (this value can be lowered unilaterally by the client)
9.Yes, we provide a free and open source application, “Eddie”, released under GPLv3 for GNU/Linux, Windows and OS X. Source code is published on GitHub. This application does not retain connection logs, unless the customer explicitly configures it (for diagnostic purposes for example) to store logs in files.
10. Yes, we use our own DNS servers, thanks to which we provide additional services, such as ICE/ICANN censorship bypass as well as OpenNIC and NameCoin integrated names resolution. Unless a customer explicitly picks third-party DNS servers, the client queries never need to get out of the virtual network, with significant privacy enhancement and performance improvement in names resolutions.
11. Our servers are housed in datacenters which we have physical access to, provided that the access is arranged in advance for security reasons. Datacenters must comply with some technical and privacy requirements. With rare exceptions, a datacenter must have a PoP to at least one tier1 provider. Without exceptions, datacenter must be network neutral, must provide bandwidth redundancy, minimum uptime of 99.8% and our servers must have a dedicated port and a guaranteed bandwidth.
12. We have servers located in Canada, Czech Republic, France, Germany, Hong Kong, Latvia, Lithuania, Netherlands, Portugal, Romania, Singapore, Spain, Sweden, Switzerland, United Kingdom, USA. We only rent lines with guaranteed bandwidth and we have dedicated servers only. They are connected to ports which are adequate to the line bandwidth.
2. Registered name of the company is Server Management LLC and we operate under US jurisdiction.
3. We use live chat provided by WHMCS and Google Apps for incoming email. For outgoing email we use our own SMTP server. And we use Google Analytics to track visitors.
4. Since no information is stored on any of our servers there is nothing that we can take down. We reply to the data center or copyright holder that we do not log our users traffic and we use shared IP-addresses, which make impossible to track who downloaded any data from the internet using our VPN.
5. HideIPVPN may disclose information, including but not limited to, information concerning a client, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request. But due to the fact that we have a no-logs policy and we use Shared IPs there won’t be anything to disclose. This has never happened before.
6. This type of traffic is welcomed on our German (DE VPN) and Dutch (NL VPN) servers. It is not allowed on US, UK, Canada, Poland and French servers as stated in our TOS – reason for this is our agreements with data centers. We also have a specific VPN plan for torrents.
7. Currently HideIPVPN accepts the following methods: PayPal, Bitcoin, Credit & Debit cards, AliPay, Web Money, Yandex Money, Boleto Bancario, Qiwi. All our clients billing details are stored in WHMCS billing system.
8. We would say SoftEther VPN protocol looks very promising and secure. Users can currently use our VPN applications on Windows and OSX systems. Both versions have a “kill switch” feature in case connection drops. Our apps are able to re-establish VPN connection and once active restart closed applications. Also the app has the option to enable DNS leak protection.
9. Yes, we recommend to our customers to use our free VPN applications for an easier, faster and better connection. We have VPN applications for Windows, Mac OS X, iOS and Android.
10. For VPN we use Google DNS servers, and for SmartDNS we use our own DNS servers.
11. We don’t have physical control on our VPN servers. Servers are outsourced in premium data-center with high quality tire1 networks.
12. At the moment we have 29 servers located in 7 countries – US, UK, Netherlands, Germany, Canada, Poland and France.
1. Our entire infrastructure and VPN service is built to ensure that no logs whatsoever can be stored – anywhere. Our servers are locked in cabinets we only have access to, and operate without any hard drives. We use a tailored version of Debian, which doesn’t support SATA controllers, USB ports etc. We also use TRESOR and grsecurity to be resistant against cold boot attacks.
2. OVPN Integritet AB (Org no. 556999-4469). We operate under Swedish jurisdiction.
3. For website insights, we use Piwik, an Open Source solution that we host ourselves. The last two bytes of visitors’ IP addresses are anonymized. We use osTicket to handle support requests. Mail server is hosted by Glesys, a trusted provider in Sweden. Automatic emails from the website are sent using Mailgun, but we never send any sensitive information via email. Zopim is used for live chat, which we will eventually migrate from when we’ve built a satisfactory in-house solution.
4. We have yet to receive any takedown notices, but even if we did we have no information to provide. We also have an insurance that covers trial expenses making it possible for us to take requests to court.
5. We have never received any court orders or subpoenas. If we receive one in the future, we’ll respond saying that we have no information to provide since our servers run without hard drives. Additionally, since Sweden doesn’t require VPN providers to log, we doubt any any valid court orders could be received, but we do have an insurance that covers trial expenses enabling us to fight any potential requests.
7. Bitcoin, Braintree for credit cards, PayPal & cash payments via postal mail. There’s a connection between payments and accounts, which is required in order to know who bought what. We recommend all users to pay anonymously.
8. We only provide OpenVPN and utilize AES-256-CBC, and a 2048-bit Diffie–Hellman key along with a 1024-bit TLS key to ensure that the key exchange can be done safely during the authentication phase.
Our custom VPN client contains functionality to prevent DNS leaks as well as a kill switch. We also include DNScrypt in the client, which means that our customers automatically use DNScrypt to ensure secure DNS requests.
9. Yes, we offer a custom VPN client for Windows, OS X and Ubuntu. We’ve also developed and manufactured a router with extensive functionality and security precautions, named OVPNbox. The OVPNbox is able to encrypt data up to 40 times faster than an average router. https://www.ovpn.se/en/box
10. Yes. Our DNS servers also support DNScrypt.
11. All our servers are locked in separate racks. We own all hardware and we’ve personally installed the hardware in all locations. Our servers run without any hard drives, which means that the operating system only exists in RAM. Additionally, we use a trimmed-down version of Debian in which we’ve removed about 80% of all packages, minimizing the risk of vulnerabilities.
Our servers also use the latest version of Tresor and grsecurity. Tresor stores the secret key inside the CPU register, making sure that no AES states ever touches the RAM memory. This means that it’s impossible for anyone to access sensitive data in the case of a Cold Boot Attack.
12. OVPN has servers in Germany and Sweden. Our goal for 2016 is to place servers in two more countries. As we are obtaining all the hardware needed ourselves, as well as making sure that the data centers and Internet service providers maintain a satisfying level of security, each new datacenter results in a high investment cost.
In order to deliver the physical security and the performance that we are known for, the initial investment per datacenter is roughly €20,000. For us, it is more important to have a high level of security and performance than to have a single server in every country, which is something that other VPN providers don’t seem to agree on. We focus on ensuring security, not circumventing geographical restrictions for streaming purposes.
1. We do not log or store any traffic, IP addresses or any other kind of data that would allow identification of our users or their activities. The anonymity and privacy of our users is our highest priority and the Perfect Privacy infrastructure was built with this in mind.
2. Perfect Privacy is registered in Zug, Switzerland.
3. All email and support tools are developed and hosted in-house under our control. We do use Google Analytics for website optimization and better market reach, but with the anonymizeIp parameter set. However, Perfect Privacy users are exempted from any tracking by Google Analytics.
4. Because we do not host any data, DMCA notices do not directly affect us. However, we do receive copyright violation notices for file-sharing in which case we truthfully reply that we have no data that would allow us to identify the party responsible.
5. The only step on our side is to inform the contacting party that we do not have any data that would allow the identification of a user. There had been incidents in the past where Perfect Privacy servers have been seized but never was any user information compromised that way. Since no logs are stored in the first place and additionally all our services are running within ramdisks, a server seizure will never compromise our customers.
6. Yes, BitTorrent and other file sharing is generally allowed. However, at certain locations that are known to treat copyright violations rather harshly (very quick termination of servers) we block the most popular torrent trackers to reduce the impact of this problem. Currently this is the case for servers located in the United States and France.
7. We offer a variety of payment options ranging from anonymous methods such as sending cash, or Bitcoin. However, we also offer payment with PayPal and credit cards for users who prefer these options. We keep no data about the payment except for when the payment was received which is linked only to an anonymous account number.
8. While we offer a range of connection possibilities we would recommend using OpenVPN with 256 bit AES encryption. Additional security can be established by using a cascaded connection: The Perfect Privacy VPN Manager allows to cascade your OpenVPN connection over up to four freely selectable servers.
9. Yes, we offer custom clients for Windows, Linux, MacOS X and Android at the moment. At the time of this article the Linux, Mac and Android clients are still in open beta. More functionality will be added to these clients in the near future. None of our clients store any kind of connection or traffic data.
10. Yes. All Perfect Privacy servers run a Domain Name Server for the exclusive use of our customers. Users can choose to either use a randomly assigned DNS from our pool or choose a specific one.
11. Our VPN servers run in various data centers around the world. While we have no physical access to the servers, they all are running within RAM disks only and are fully encrypted.
12. Currently we offer servers in 23 countries. For full details about all servers locations please check our server status site as we are constantly adding new servers.
1. No, we do not keep any logs whatsoever. We even hacked our billing platform to remove the IP recording features from it. All the scripts and the software we use is set to record nothing.
2. We are a non-for-profit operation part of Three Monkeys International Inc. company. The latter is a VC and incubator firm based in the Republic of Seychelles. It hosts both commercial (in early stages) and not-for-profit ventures.
3. We only use Google Translate and Mandrill. We configured them in a way that does not track users: the former is on-demand, and the later does not convey credentials outside the proxy.sh domain. Everything else is absolutely in-house, and we ditched Google Analytics some time ago following our users’ feedback.
4. We take a transparent and innovative approach. We publish everything we do about each of them at https://proxy.sh/report. Generally speaking, we state the abuse, block the concerning port, and respond that this is the only action we can take, especially as we cannot find out about users activity.
5. As well as with any notice, we will publish them to our transparency report. We will openly state that we keep the node alive and opened for investigations, or that we have decided to shut it down. In the event we are not allowed to state anything, we will use the right to modify our warrant canary accordingly. No valid court order has yet reached our company.
6. There is no restriction of activity or whatsoever across our services. The only issue that may occur is that a port is blocked or cannot be forwarded due to an earlier abuse or at the discretion of an upstream provider.
7. We use Paymentwall for fiat currencies (credit cards, PayPal, SMS/phone, prepaid card and so forth), Coinbase for Bitcoin and eDigiCash for alternative crypto-coins. We tie these payment gateways only to invoice numbers, but not to individual user accounts. We also have an option to purchase anonymous tokens that have no relation to a panel account whatsoever, and the latter may even be sold or exchanged at third-party, further increasing anonymity around the way you can gain access to our network.
8. We recommend connecting through OpenVPN with our 4096-bit DH key along with ECDH curve secp384r1. Our full control channel is made of TLSv1.2, cipher TLSv1/SSLv3 ECDHE-ECDSA-AES256-GCM-SHA384 while the associated cipher is AES-256-CBC and the auth SHA512, making the whole combination one of the strongest known to the cryptographic research field. We provide this ECC environment on port 465 (both UDP and TCP). And you can couple it with OpenVPN’s XOR scrambling method, or use TOR’s obfsproxy in addition to that. The whole combination is a charm. And of course, we provide both kill switches and DNS leak protection, among other leak identification and protection methods.
9. We provide Safejumper, a lightweight and custom OpenVPN client. It is available for Windows, Mac, Linux, Android and iOS and it is fully open source. The software only logs your current connection for immediate troubleshooting, but the software overwrites this log each time.
10. We provide our users with our own OpenNIC and DNSCrypt servers.
11. We use a mix of collocation (Cogent et. al.), rented dedicated servers (SoftLayer et. al.) and virtual private servers (OVH et. al.) to sustain our network. The servers that we rent are only running VPN nodes, the core of our network and our databases are hosted in a collocation (we own the servers hardware).
12. We provide VPN nodes in more than 52 countries and across more than 300 locations. Our latest additions are Serbia and Kyrgyzstan, and we have the ambition to establish in a new country once every month or two.
1: Zero Logging VPN Service. We do not keep any logs (we previously kept connection logs for a period of 24 hours for troubleshooting purposes – however this has been phased out across all servers). Zero-logging is inclusive of all services including Proxy/DNS/SSH/VPN connections.
2: VPNSecure Trust, registered in Australia – We are currently not required to log data under the Australian meta data retention scheme – If the law changes in future we will move jurisdictions.
3: We use Google Analytics and Zopim (Live chat). Email servers and support system is hosted in-house.
4: In-short we respond to DMCA complaints advising that no content is stored on the server and due to the nature of our VPN service and no logging policy we are unable to identify any particular user and therefore cannot validate the claim.
5: We have not been issued with a Court Order to date. If a Court Order has been issued we will be unable to provide any information due to our strict zero-logging policy.
6: BitTorrent is allowed across 90% of our servers.
7: We use Bitcoin, Perfect Money, Credit Card, PayPal, Paymentwall (Multiple Payment methods available, Bank Transfer, Cash, Webmoney etc) – Transaction ID is encrypted in the database, attached with the user id, therefore the only way to link a particular transaction to an account would be with our decryption keys.
8: We recommend using OpenVPN, 2048bit encrypted keys which are unique per account, our custom built VPN client includes a “Kill” switch, along with DNS Leak protection and in-bound UDP attack protection which protects users on torrent clients using unique random port attack scans if the torrent client is not bound to the VPN interface. IPv6 Leak protection by default when using our Internal DNS.
9: We have custom built VPN client for, Windows, OSX, Linux, Android, IOS.
10: Internal DNS.
11: VPNSecure’s main infrastructure is colocated within a 42RU rack with 24/7 physical access to our equipment available to approved internal staff. VPN endpoints are hosted at dedicated server providers in 40+ countries around the world and are configured with encrypted folders meaning any third-party that tried to access the server would be unable to access any VPN specific information, VPNSecure looks after all infrastructure and VPN endpoints internally, we do not out-source this.
12. Australia, Austria, Brazil, Canada, Chile, China, Costa Rica, Czech, Denmark Egypt, Finland, France, Germany, Hong Kong, Iceland, India, Ireland, Isle of Man, Israel, Italy, Japan, Latvia, Lithuania, Luxembourg, Mexico, Moldova, Netherlands, New Zealand, Panama, Poland, Portugal, Romania, Russia, Singapore, South Africa, Spain, Sweden, Switzerland, Taiwan, Turkey, Ukraine, United Kingdom, United States.
1. We don’t log any individually identifying information. The privacy of our customers is our top priority.
2. Our service is operated by autonomous privacy activists. Each server is handled with the jurisdiction at the server’s location.
3. Our website has been developed by ourselves and we don’t use any external service providers.
4. We reply to takedown notices but we cannot be forced to hand out information because of our non logging policy.
5. This hasn’t happened yet but if we were forced to identify our customers at a specific server location we would drop this location immediately. Under no circumstances are we going to log, monitor or share any information about our customers.
6. Yes, it is allowed on all servers.
7. We offer a wide range of anonymous payment methods like Paysafecard, Bitcoin, Litecoin, Worldcoin and Perfect Money. No external payment processor receives any information because all payments are processed by our own payment interface.
8. We would recommend OpenVPN, available in UDP and TCP mode. We are using AES-256-CBC for traffic encryption, 4096 bit RSA keys for the key exchange and SHA-512 as HMAC. These settings offer you the highest grade of security available. We also offer a homemade VPN Client which provides advanced security features like a Kill Switch, DNS Leak Protection, IP Leak Protection, IPv6 Leak Protection, WebRTC Leak Protection and many more.
9. Our VPN Client is available for Windows and doesn’t store any logs. We are planning a version for Linux, Mac and mobile devices.
10. At the moment we are using the nameservers of UltraDNS. We will offer our own DNS soon.
11. We rent 34 servers in 22 countries and are continuously expanding our server park. It is impossible to have physical control over all widespread servers but we have taken security measures to prevent unintended server access.
12. Our server locations are France, Germany, Netherlands, Switzerland, Canada, USA, Bulgaria, Costa Rica, Finland, Hungary, Hong Kong, Kosovo, Latvia, Lithuania, Moldova, Romania, Russia, Spain, Singapore, Sweden, Ukraine and United Kingdom.
1. Trust.Zone doesn’t store any logs. Everything we need from users – just email to sign up. No names, no personal info, no tracking.
2. Trust.Zone is under Seychelles jurisdiction and we operate according to law in Seychelles. There is no mandatory data retention law in Seychelles. In our jurisdiction a court order would not be enforceable and since we don’t store any logs – there is nothing to be taken from our servers. The company is operated by Extra Solutions Ltd.
3. Trust.Zone does not use any third-party support tools or live chats that hold user information. Our company is using self-made tools only developed by our programmers.
4. If we receive any types of DMCA requests or Copyright Infringement Notices – we ignore them. Why? Trust.Zone is under Seychelles offshore jurisdiction. There is no mandatory data retention law in Seychelles. The laws of Seychelles are very friendly to Internet users. Under Seychelles jurisdiction a court order would not be enforceable and since we don’t store any logs – there is nothing to be had from our servers.
5. A court order would not be enforceable because we do not log information and therefore there is nothing to be had from our servers. Moreover, we located in Seychelles offshore and we are under Seychelles jurisdiction which is very friendly to Internet users.
6. No any restrictions for any king of traffic. Trust.Zone does not throttle or block any protocols, ip addresses, servers or any type of traffic whatsoever. In 2015, ExtraTorrent, the second biggest BitTorrent website in the World (according to TorrentFreak), recommended Trust.Zone as the best vpn for torrenting.
7. All major credit cards are accepted. Besides, Bitcoin, PayPal, Webmoney, Alipay, wire transfer and many other types of payments are available.
To stay completely anonymous, we highly recommend using anonymous payments via Bitcoin. No logs, no names, offshore jurisdiction, anonymous payments – we’re trying to do all the best for our users to get their freedom on the Internet back.
8. Trust.Zone uses the highest level of data encryption. We use protocol which is faster than OpenVPN and also includes Perfect Forward Secrecy (PFS). The most unique feature of Trust.Zone VPN – you can forward your VPN traffic via ports – 21 (SCP, SFTP), 22 (FTP), 80 (HTTP), 443 (HTTPS) or 1194 (OpenVPN), most of them can’t be blocked by your ISP.
Besides, we provide all VPN protocols on all our servers. OpenVPN solution uses AES-256 Encryption by default. We also offer L2TP Over IPsec which also uses 256bit AES Encryption.
If your VPN connection drops by any reason, the IP address leak will never happen. In this case, the Kill Switch feature by Trust.Zone VPN will block your computer from connecting to the internet until the VPN connection is active again. This feature is extremely important for BitTorrent downloaders and file sharers because BitTorrent users don’t want their identity and IP address exposed to their ISP or government agencies.
9. Trust.Zone provides users with one-click, easy-to-use application for Windows. Trust.Zone supports all major OS and devices – Windows, iOS, Android, Linux, Windows Mobile, Mac. Trust.Zone VPN applications don’t store any logs.
10. It depends on the platform, but for most users DNS queries go through our own DNS servers. We also may use Google DNS.
11. We have a mixed infrastructure. Trust.Zone owns some physical servers and we have access to them physically. In locations with lower utilization we normally host with third parties. But the most important point – we use dedicated servers in this case only – with a full control by our network administrators.
12. We are operating with 43 servers in 20+ countries and still growing. Australia, New Zealand, United States, Canada, The UK, Russia, Brazil, South Africa, India, Hong Kong, Indonesia, Singapore, Malaysia, France, Ukraine, Bulgaria, Latvia, Netherlands, Germany and other. The full map of the server locations is available here. Our network is permanently expanding.
1. Zero, zip, zilch, nada. For realsies, /dev/null 2>&1. We have nothing to share with authorities, even if we felt compelled to.
2. We’re incorporated as Doublehop GmbH in the Seychelles. We operate as Doublehop.me, Doublehop, and Doublehop VPN.
3. We do not use any external visitor tracking services such as AdSense. We use Mandrill to deliver email automatically when orders are placed. In the interest of full disclosure, please be advised that Mandrill provides analytical statistics relating to email (e.g., open rates and clicks). We disable these features unless we are doing web development and need to confirm that changes do not impact email delivery.
We also permit registration via Telegram Messenger as a more secure alternative to email. A Telegram message is automatically sent to confirm an order and payment. We use Amazon S3 to provide access to client certificates. Files are protected in transit by SSL and at rest by server-side encryption.
4. Not applicable. To quell overofficious legal demands, all legal complaints and requests (DMCA, Trademark, Defamation, Court Order, Law Enforcement, Private Information, Data Protection, Government, etc) are forwarded to Lumen.
5. We’ll respond with one-liners from Fifty Shades :D We have nothing to share with authorities, even if we felt compelled to. If we run into trouble, we’ll stop updating our Warrant Canary.
6. Yes, P2P is permitted on all Doublehop VPN servers, although we encourage our users to avoid using USA-based exit nodes for such traffic. For example, it’s better to connect to USA as a Doublehop VPN entry node, and exit Netherlands than it is to connect to Netherlands as an entry node, exiting USA.
7. Doublehop’s only accepted payment method is Bitcoin. Since we do not require our clients to reveal their identity to use our services, paying with Bitcoin offers privacy when used properly. A new Bitcoin address is generated for each order, and monitored for 72 hours before being scrubbed from the order details.
8. Our users VPN to Country_A, and we route them over an encrypted interconnection to another datacenter; the traffic then exits Country_B. We use a modern cipher (AES-256-CBC) between clients and nodes, with RSA-4096 for key exchange/certs, and force client use of TLS >=1.2 with the tls-version-min OpenVPN directive. We have h/w crypto acceleration on all our boxes. Our VPN clients see: Cipher ‘AES-256-CBC’ initialized with 256 bit key. TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
We don’t provide custom tools for good reason. DNS leak protection is best handled by the hosts file or by pushing OpenVPN options to clients. See Q.#9 for more info.
9. No, the standard OpenVPN client is more transparent and open to peer review. Some VPN providers offer custom software that can introduce security issues or store connection logs. We provide configs for Linux, Android, iOS, Mac OS X (Viscosity), and Windows VIsta+.
10. Our clients are permitted to use whichever DNS they’re most comfortable with. By default, we use Google DNS to ensure that users receive localized content from the exit node chosen. This is especially important when it comes to streaming (e.g., Netflix, Pandora) from a USA exit node. Although we’d love to favor uncensored resolvers such as DNS.watch or Censurfri, we determined that they are 12-20% slower to resolve and, being located in Germany/Denmark, create access issues for localized content. We’re looking to add a SmartDNS and DNSCrypt server in the near future, to provide additional options for our clients.
11. We use dedicated servers that employ RAM disks, software based full disk encryption, or hardware based full disk encryption, depending on their role and specifications. This ensures that any intervention from a provider won’t assist in any investigation. Traffic between nodes is multiplexed, defeating passive correlation. And furthermore, Doublehop VPN doubles security and privacy with double hops across multiple legal jurisdictions, to disrupt potential investigations.
12. Netherlands, Spain, Finland, Canada, and USA, all configured as Doublehop VPN pairs.
1. NordVPN is continuously committed to our zero log policy, which means we do not log any of our users’ activity, nor the IP addresses or timestamps.
2. NordVPN is registered under the company “Tefincom co S.A.”. We operate in the jurisdiction of Panama.
3. We use Google analytics and a third-party ticket/live chat tool. Google analytics is used to improve our website so our users would have the most relevant information at their reach. Ticket/live chat tool is used to provide the best support in the industry (24/365), but not tracking our users by any means.
4. Nothing has changed from last year. Still, all the notices are ignored because they have no legal bearing to us as we only need to comply with Panamanian law.
5. If we do receive a valid court order, firstly it would have to comply with the laws of Panama. In that case, the court settlement should happen in Panama first, however were this to happen, we would not be able to provide any information, because we keep exactly nothing about our users.
6. We do not restrict file-sharing on the majority of our servers. Some servers are optimized for file-sharing practice, while others are optimized for other VPN uses (i.e. streaming).
7. We accept payments via Bitcoin, Credit Card and PayPal. Bitcoin is the best payment option to maintain your anonymity, as it has only the paid amount linked to the client. Users who purchase services via PayPal or credit card are linked with the usual information the seller can see about the buyer. Please note, that users’ account is only linked with the payment but not the online activity.
8. We take pride in our top notch anonymity solutions, which we would like to recommend to everyone seeking real privacy. One of them is Double VPN, where the traffic is routed through at least two hoops before it reaches the Internet. The connection is encrypted within two layers of cipher AES-256-CBC encryption. Another security solution – Tor over VPN. Firstly, the traffic is encrypted within NordVPN layer and later sent to the Tor network and exits to the Internet through one of the Tor exit relays. Both of these security solutions provide a great encryption and anonymity combination. The benefit of using these solutions is that the chances of being tracked are eliminated. In addition, you are able to access .onion websites when connected to Tor over VPN. Furthermore, our regular servers have a strong encryption which is 2048bit SSL for OpenVPN protocol, AES-256bit for L2TP.
In addition to that, we have advanced security solutions, such as the “kill switch” and DNS leak protection which provide the maximum possible security level for our customers.
9. We do have custom applications for Windows, Mac OS X, iPhone, iPad and Android devices. Our applications store only connection logs which are used for troubleshooting when the user provides them to us. Traffic logs are not stored there.
10. We do have our own DNS servers and all DNS requests go through those servers.
11. We have physical control over a number of VPN servers.
12. At the moment we have 482+ servers in 42 countries. These include servers in: Australia, Austria, Brazil, Canada, France, Germany, Hong Kong, Iceland, Israel, Italy, Japan, Lithuania, Luxembourg, Netherlands, New Zealand, Norway, Poland, Romania, Russia, Singapore, South Africa, Spain, Sweden, Switzerland, United Kingdom, United States, Latvia, Taiwan, Finland, Turkey, Moldova, Estonia, Slovakia, Hungary, Czech Republic, Ukraine, Bulgaria, Denmark, Ireland, Belgium, Portugal, India.
1. No. This would go against everything we believe in.
2. Viking Connections LLC. U.S.
4. We fire a copy of our DMCA policy over to the issuer of the notice. This shuts them up pretty quickly. We haven’t ever received a VALID DMCA notice.
5. It has not ever happened. If it did, we would be unable to provide any data to the court because we haven’t collected any data. Additionally, we have two warrant canary systems in place.
6. Yes, BitTorrent etc. is allowed. We don’t restrict what our users can do. We believe in Net Neutrality.
7. TSYS. The payment is associated to whatever email addy the user uses when signing up. We recommend utilizing a pre-paid credit card that isn’t linked to the user to sign up, and a disposable email account.
8. We strongly recommend avoiding any provider that allows PPTP VPN access, as it provides no real protection and is trivially broken. IPsec VPNs have a number of known bad implementations that also have security problems. For these reasons, we support OpenVPN alone.
For ciphers, we would advise that along with using OpenVPN exclusively, that the TLS_AUTH directive be enabled, as it is strongly recommended by the OpenVPN developers to harden the VPN connection against man in the middle attacks. Finally we recommend AES-256-CBC (or GCM) with SHA1 authentication or higher, and a 4096-bit handshake or higher (512bit or larger for elliptic curves). All sessions must be encrypted ephemerally to prevent a total loss of privacy should the VPN provider lose control of its keys.
VikingVPN uses RSA4096, AES-256-CBC, SHA1, and 2048-bit HMAC via TLS_AUTH, and our keys are ephemeral and rotated hourly for perfect forward secrecy. VikingVPN OpenVPN Configurations automatically have a “kill switch” enabled. Every VPN Service Provider should have DNS Leak Protection at this point, as OpenVPN itself now supports it. Although this doesn’t mean that they’ve patched to use this functionality.
9. We haven’t until recently. We just launched our Windows app. It’s basically just a wrapper for OpenVPN. It’s open-source, so anyone can audit it for security if they wish. The Windows App doesn’t collect or store any user info.
10. Throughout last year we were using DNS servers hosted by the OpenNIC project, but found them to be too unreliable. We have since moved back to our old model with OpenDNS in the US and FreeDNS in the EU.
11. Like all VPN providers, we have servers in data-centers across the world. We have security measures in place to ensure that we’re the only entity that can access or make changes to the servers.
12. U.S., Netherlands and Romania.
1. ShadeYou VPN does not keep any logs. The highest level of privacy is a main mission of ShadeYou VPN. To use our service only a username and e-mail are required. No personal or real data is required.
2. Currently ShadeYou VPN company is working under jurisdiction of Netherlands.
3. We are using Google Analytics as a tool which allow us to improve our website and bring our users better experience. Also we are using SiteHeart online suppport. But none of these tools track / hold personal information.
5. Sharing any personal data of our users is absolutely impossible since we do not store it and do not keep any logs. Yes such kind of situation has happened but there is not even one existing case when we have shared any information about our users with any 3rd parties.
6. BitTorrent and any other file-sharing traffic is allowed mostly on all our servers. There’s only a few exceptions (such as when traffic is limited on the servers).
7. ShadeYou VPN uses payment systems including PayPal, Perfect Money, Webmoney, Qiwi, Yandex Money, Easy Pay, Ligpay, UnionPay, AliPay, MINT, CashU, Ukash also accept payments via Visa, Master Card, Maestro and Discover. Ofcourse Bitcoin is available.
8. We strongly recommend to use OpenVPN since it is the most safe and uses the strongest encryption (TLS Protocol with 2048-bit key length and AES-256-CBC crypto-algorithm). We support “Kill switches” and DNS leak protection using our desktop client.
9. Yes, we offer our own application which is available on the Windows OS. There is default OpenVPN system journal inside client. It show connection progress only and removed after VPN session is ended.
10. Yes, we are using our own DNS servers.
11. All our servers are collocated around the world in DC’s of different leading hosting companies.
12. Our VPN network cover next locations: USA, United Kingdom, Sweden, Ukraine, Netherlands, Russia, Spain, Hong Kong, Germany, France, Canada and Bulgaria.
1. Ghost Path has no logging whatsoever, so we are unable to match IPs to user sessions.
2. We are Ghost Path, Inc. and operate from the United States. Ghost Path is the marketing company for our business, while our network operations are held by a separate company based out of Nevis.
3. We utilize Google Analytics to gather high-level information about our visitors, but there is never any personally identifiable information there. We do utilize Sendgrid for transactional emails and Mailchimp for newsletters. We use Zendesk for customer support, but do not send sensitive information there.
4. If we receive a valid DMCA notice we can only take action if the connection is still active. If the session is still active we can notify the user and stop the session. Once the connection is closed we have no way to identify the user.
5. We have never received any court orders or subpoenas. Should we receive a valid court order or subpoena we would be required to comply. However, since we do not log user data there would be nothing for us to provide.
6. We allow all types of traffic.
7. We use Stripe for credit card payments, PayPal, and Bitcoin. We do not have any way to associate user activity to payment accounts since we do not have logs. We also offer customers the ability to completely remove any account information from our systems at any time.
8. We utilize the OpenVPN protocol and the AES-256-CBC algorithm for encryption. Our VPN client includes IP and DNS leak protection that actively works to keep your data and IP/DNS from leaking.
9. Yes. The Ghost Path app works on Windows and Mac. All logging is disabled by default in our app. We do allow the option for customers to turn on logging for support and troubleshooting issues.
11. We have a mix of server arrangements. We have physical control over gateways that have heavier traffic loads. In new locations or locations with lower utilization we host with third parties. All of our network nodes are operated from encrypted ramdisk and are rebooted regularly, making it useless should anyone try to take physical control of the hardware.
12. We have VPN gateways physically located in 47 countries at the time of this article. Our VPN gateways are actually located in the countries that we advertise, not manipulated through IP and DNS tricks.
Below is a list of all VPN service providers in this review:
VPN providers Without Logs
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers With Some Logs (max 7 days)
VPN providers who think they deserve a listing in this overview are welcome to get in touch.
Note: several of the providers listed in this article are TorrentFreak sponsors.