AnonymousVideo

PureVPN logs explained # Civil Liberties in the Digital World

PureVPN logs explained

Sunday 15 October 2017

Setting the Record Straight: Addressing VPN Privacy and VPN Logs.
- PureVPN Press Release - The Story Unfolds.

We have a well-documented, proactive stance on cyberstalking. Several organizations have appreciated and applauded our stance in the recent past, which is a source of pride for us. Having said that, a recent cyber stalking incident was extensively reported in leading tech publications, where a certain individual was arrested on suspicion of masterminding a cyberstalking campaign against a young woman and her family.

We would like to reiterate that we acted precisely as per our existing Terms of Service and Privacy Policy.

Despite the actions of the accused, fingers pointed towards PureVPN for all the wrong reasons. To avoid further confusion for our customers, and to prevent a skewed and false portrayal of PureVPN, we believe now is the right time to initiate communications. As a VPN provider, PureVPN was unfortunately dragged into this incident because of a lack of clarity on network logging mechanisms implemented throughout the industry.

Two Broad Logging Types.

It’s important to clarify important technical terminologies before moving forward. Doing so will help us address the terms that might come across as confusing or at times, too broad. There are two types of logs within the context of a VPN service:

  • Browsing Logs: Browsing logs are extremely personal and private to users, which are not maintained at PureVPN. Our No Log policy directly complements our commitment to the basic human right to privacy.
  • Network Logs: (Also known as Troubleshooting, Maintenance, Speed, or Connectivity Logs). Network logs, on the other hand, are created and maintained to troubleshoot and optimize a service. These logs contain no traces of browsing habits or other private user activities. These logs, among other system logs such as bandwidth consumed, contain mostly the user timestamps.

What Is A Timestamp?

When speaking of networking logs, you will often notice mention of timestamps; timestamps associate with IP address, connection initiation and disconnection from the VPN providers servers.

Do Network Logs Expose You?

The answer is no. It is such by design. They simply can’t.

If I were to say that the entire picture is a glimpse of what you were doing online, network logs maintained by PureVPN make up no picture by themselves. They are just random numbers and reveal nothing. If a user intentionally indulges in attacking, hacking, abusing, threatening or other similar unanimously unethical activities (as also detailed in our Terms of Service) the victim (any organization providing a service online) of such attacks would then identify these instances in their network logs. If someone indulges in such activities and if an official complaint is filed, authorities then reach out to us with a valid court order or subpoena (in some cases alleged victims or authorities directly themselves) providing us the counterpart network logs from the attacked service’s servers.

Just to reiterate, we absolutely, under no circumstances, monitor, collect or share information related to browser activities or browsing habits.

Still Confused?

Think of it like this: A network log is automatically generated every time a user visits a website. For the sake of this example, let’s say a user logged into their Gmail account. Every time they accessed Gmail, the email provider created a network log.

  • If you are using a VPN, Gmail’s network log would contain the IP provided by PureVPN. This is one half of the picture. Now, if someone asks Google who accessed the user’s account, Google would state that whoever was using this IP, accessed the account. If the user was connected to PureVPN, it would be a PureVPN IP.
  • The person or organization inquiring about the user’s account will then trace the IP back to data centers where the VPN provider’s servers are hosted. The data center will point them to the VPN provider and trail finally leads to the VPN provider. The inquirer would then share timestamps and network logs acquired from Google and ask them to be compared with the network logs maintained by the VPN provider.
  • Now, depending on the VPN provider’s policy, they might ask for a warrant or subpoena before sharing information with whoever is asking. The information shared by the VPN provider will be a timestamp, containing the information about when an IP connected to which server and the non-VPN IP of the user. This correlation and the comparison of two network logs, maintained by two independent organizations leads to the possible path towards confirmation.

TLDR; to confirm someone’s real IP, two different set of Network Logs are required: one from the VPN provider and the other from the server where the IP visited, browsed or downloaded something. Any one set of Network Logs on its own is pretty much useless since it contains no valuable information. The two must be compared and verified for any link to be confirmed.

PureVPN Protecting Against Surveillance Programs Like PRISM.

Unlike organizations who are legally bound to the laws of and mass surveillance programs in US, UK, Canada, Australia and similar regimes, PureVPN helps avoid jurisdictions affected by the infamous mass surveillance programs like PRISM, ECHELON, XKeyscore, Tempora and others. Keeping this in mind:

Do you think VPN Providers and other organizations based in any of those affected jurisdictions can really live upto their so-called Zero-Log policy?

In order to obtain the network logs from our end, any law enforcement agency must come to us through the consumer privacy-friendly, non-spying jurisdiction of Hong Kong. In order for the case to be considered and acted upon, any charges or allegations must be in accordance with the laws of Hong Kong. Since Hong Kong is not part of any of those infamous surveillance programs those requests will simply be blocked even before it reaches us.

Continue To Trust Us With Your Privacy, Trust Us To Make The Right Call.

  • PureVPN did not breach its Privacy Policy and certainly did not breach your trust.
  • NO browsing logs, browsing habits or anything else was, or ever will be shared.
  • Your trust is our primary consideration, and as our user, you can rely on us to continually take actions that protect you from unwanted intrusions into your privacy, regardless of where they may originate.

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server

Tor

Socks5

Hostname

Port

SSL

CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Tor Guide - Freedom & Privacy Online

Tor Powering Digital Resistance. “The Onion Router” protects your privacy. Tor is an invaluable tool for protecting online freedom and guarding against state surveillance and censorship (...)

Tor Project

Translation

eelo - mobile OS and associated web-services

eelo - mobile OS and associated web-services

Your data is YOUR data! eelo in short. eelo recognises the need shared by everyone for better data privacy. The eelo project will provide an alternative mobile operating (...)


A secret British spy unit has waged war on the hacktivists

34c3 - Ethics, Society & Politics - Chaos Computer Club.Uncovering British spies’ web of sockpuppet social media personas. A secret British spy unit created to mount cyber (...)


With Love and Hope, The Riseup Collective

With Love and Hope, The Riseup Collective

There is a war being fought over your communication. One side wants control, so they can profit from and watch everything you say and do online. They want to sell you stuff, (...)


Tor Guide - Freedom & Privacy Online

Tor Powering Digital Resistance. Tor “The Onion Router” protects your privacy. The landscape of the Internet is in a constant state of change, and trends in law, policy, and (...)


Give Love a chance

High Court rejects Lauri extradition


Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Guy Fawkes
We accept donations in Bitcoin
1C4eHds1wUHwgYHYyQGCaonAhPwgZS8haP
Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely
PureVPN
PureVPN
Virtual Private Network