PureVPN logs explained # Civil Liberties in the Digital World

PureVPN logs explained

Sunday 15 October 2017

Setting the Record Straight: Addressing VPN Privacy and VPN Logs.
- PureVPN Press Release - The Story Unfolds.

We have a well-documented, proactive stance on cyberstalking. Several organizations have appreciated and applauded our stance in the recent past, which is a source of pride for us. Having said that, a recent cyber stalking incident was extensively reported in leading tech publications, where a certain individual was arrested on suspicion of masterminding a cyberstalking campaign against a young woman and her family.

We would like to reiterate that we acted precisely as per our existing Terms of Service and Privacy Policy.

Despite the actions of the accused, fingers pointed towards PureVPN for all the wrong reasons. To avoid further confusion for our customers, and to prevent a skewed and false portrayal of PureVPN, we believe now is the right time to initiate communications. As a VPN provider, PureVPN was unfortunately dragged into this incident because of a lack of clarity on network logging mechanisms implemented throughout the industry.

Two Broad Logging Types.

It’s important to clarify important technical terminologies before moving forward. Doing so will help us address the terms that might come across as confusing or at times, too broad. There are two types of logs within the context of a VPN service:

  • Browsing Logs: Browsing logs are extremely personal and private to users, which are not maintained at PureVPN. Our No Log policy directly complements our commitment to the basic human right to privacy.
  • Network Logs: (Also known as Troubleshooting, Maintenance, Speed, or Connectivity Logs). Network logs, on the other hand, are created and maintained to troubleshoot and optimize a service. These logs contain no traces of browsing habits or other private user activities. These logs, among other system logs such as bandwidth consumed, contain mostly the user timestamps.

What Is A Timestamp?

When speaking of networking logs, you will often notice mention of timestamps; timestamps associate with IP address, connection initiation and disconnection from the VPN providers servers.

Do Network Logs Expose You?

The answer is no. It is such by design. They simply can’t.

If I were to say that the entire picture is a glimpse of what you were doing online, network logs maintained by PureVPN make up no picture by themselves. They are just random numbers and reveal nothing. If a user intentionally indulges in attacking, hacking, abusing, threatening or other similar unanimously unethical activities (as also detailed in our Terms of Service) the victim (any organization providing a service online) of such attacks would then identify these instances in their network logs. If someone indulges in such activities and if an official complaint is filed, authorities then reach out to us with a valid court order or subpoena (in some cases alleged victims or authorities directly themselves) providing us the counterpart network logs from the attacked service’s servers.

Just to reiterate, we absolutely, under no circumstances, monitor, collect or share information related to browser activities or browsing habits.

Still Confused?

Think of it like this: A network log is automatically generated every time a user visits a website. For the sake of this example, let’s say a user logged into their Gmail account. Every time they accessed Gmail, the email provider created a network log.

  • If you are using a VPN, Gmail’s network log would contain the IP provided by PureVPN. This is one half of the picture. Now, if someone asks Google who accessed the user’s account, Google would state that whoever was using this IP, accessed the account. If the user was connected to PureVPN, it would be a PureVPN IP.
  • The person or organization inquiring about the user’s account will then trace the IP back to data centers where the VPN provider’s servers are hosted. The data center will point them to the VPN provider and trail finally leads to the VPN provider. The inquirer would then share timestamps and network logs acquired from Google and ask them to be compared with the network logs maintained by the VPN provider.
  • Now, depending on the VPN provider’s policy, they might ask for a warrant or subpoena before sharing information with whoever is asking. The information shared by the VPN provider will be a timestamp, containing the information about when an IP connected to which server and the non-VPN IP of the user. This correlation and the comparison of two network logs, maintained by two independent organizations leads to the possible path towards confirmation.

TLDR; to confirm someone’s real IP, two different set of Network Logs are required: one from the VPN provider and the other from the server where the IP visited, browsed or downloaded something. Any one set of Network Logs on its own is pretty much useless since it contains no valuable information. The two must be compared and verified for any link to be confirmed.

PureVPN Protecting Against Surveillance Programs Like PRISM.

Unlike organizations who are legally bound to the laws of and mass surveillance programs in US, UK, Canada, Australia and similar regimes, PureVPN helps avoid jurisdictions affected by the infamous mass surveillance programs like PRISM, ECHELON, XKeyscore, Tempora and others. Keeping this in mind:

Do you think VPN Providers and other organizations based in any of those affected jurisdictions can really live upto their so-called Zero-Log policy?

In order to obtain the network logs from our end, any law enforcement agency must come to us through the consumer privacy-friendly, non-spying jurisdiction of Hong Kong. In order for the case to be considered and acted upon, any charges or allegations must be in accordance with the laws of Hong Kong. Since Hong Kong is not part of any of those infamous surveillance programs those requests will simply be blocked even before it reaches us.

Continue To Trust Us With Your Privacy, Trust Us To Make The Right Call.

  • PureVPN did not breach its Privacy Policy and certainly did not breach your trust.
  • NO browsing logs, browsing habits or anything else was, or ever will be shared.
  • Your trust is our primary consideration, and as our user, you can rely on us to continually take actions that protect you from unwanted intrusions into your privacy, regardless of where they may originate.

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server






CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Tor protects your privacy

Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Tor Project


KPFA Radio - Freedom in Catalonia

Guest: Liz Castro is an expert on the Catalan independence movement. Major protest in Catalonia: Live report back from the ground, from inside the Free Catalonia Movement. (...)

CyberGuerrilla - Cgan-Lessons listings

Mission Statement: This article has essential information for anyone associated with interest in pen-testing, security, hacking, Social Engineering or other tech topics. We (...)

Anonymous statement on recent events regarding RedHack

Greetings citizens of the world, greetings citizens of Turkey. Over the past few months, our team at @YourAnonNews went through a phase of uncertainty. At first, the main (...)

Secure your Internet Connection.

PureVPN creates a secure, encrypted tunnel to hide your real IP address and location, and makes it impossible for third-party websites and ISPs to monitor your online activities.

Heroes for the people, enemies for the state...

Jeremy Hammond
Matt DeHart
Martin Gottesfeld
Barrett Brown
Higinio Ochoa III
Ryan Ackroyd
Jake Davis
Christopher Weatherhead
Jon Cowden
John Anthony Borell III
Raynaldo Rivera
Fidel Salinas

Jeremy Hammond, Martin Gottesfeld and Matt DeHart, some of our bravest heroes and activists are now in jail and they need your help...


Submit documents to WikiLeaks

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed.

Anonymous t-shirt

T-Shirt and Hooded Jacket
T-Shirt and Hooded Jacket
Guy Fawkes
We accept donations in Bitcoin
Tails is an irreplaceable security tool as it allows anyone to use computers safely
You need PureVPN for Online Security
Virtual Private Network