PureVPN logs explained # Civil Liberties in the Digital World

PureVPN logs explained

Sunday 30 April 2017

Setting the Record Straight: Addressing VPN Privacy and VPN Logs.
- PureVPN Press Release - The Story Unfolds.

We have a well-documented, proactive stance on cyberstalking. Several organizations have appreciated and applauded our stance in the recent past, which is a source of pride for us. Having said that, a recent cyber stalking incident was extensively reported in leading tech publications, where a certain individual was arrested on suspicion of masterminding a cyberstalking campaign against a young woman and her family.

We would like to reiterate that we acted precisely as per our existing Terms of Service and Privacy Policy.

Despite the actions of the accused, fingers pointed towards PureVPN for all the wrong reasons. To avoid further confusion for our customers, and to prevent a skewed and false portrayal of PureVPN, we believe now is the right time to initiate communications. As a VPN provider, PureVPN was unfortunately dragged into this incident because of a lack of clarity on network logging mechanisms implemented throughout the industry.

Two Broad Logging Types.

It’s important to clarify important technical terminologies before moving forward. Doing so will help us address the terms that might come across as confusing or at times, too broad. There are two types of logs within the context of a VPN service:

  • Browsing Logs: Browsing logs are extremely personal and private to users, which are not maintained at PureVPN. Our No Log policy directly complements our commitment to the basic human right to privacy.
  • Network Logs: (Also known as Troubleshooting, Maintenance, Speed, or Connectivity Logs). Network logs, on the other hand, are created and maintained to troubleshoot and optimize a service. These logs contain no traces of browsing habits or other private user activities. These logs, among other system logs such as bandwidth consumed, contain mostly the user timestamps.

What Is A Timestamp?

When speaking of networking logs, you will often notice mention of timestamps; timestamps associate with IP address, connection initiation and disconnection from the VPN providers servers.

Do Network Logs Expose You?

The answer is no. It is such by design. They simply can’t.

If I were to say that the entire picture is a glimpse of what you were doing online, network logs maintained by PureVPN make up no picture by themselves. They are just random numbers and reveal nothing. If a user intentionally indulges in attacking, hacking, abusing, threatening or other similar unanimously unethical activities (as also detailed in our Terms of Service) the victim (any organization providing a service online) of such attacks would then identify these instances in their network logs. If someone indulges in such activities and if an official complaint is filed, authorities then reach out to us with a valid court order or subpoena (in some cases alleged victims or authorities directly themselves) providing us the counterpart network logs from the attacked service’s servers.

Just to reiterate, we absolutely, under no circumstances, monitor, collect or share information related to browser activities or browsing habits.

Still Confused?

Think of it like this: A network log is automatically generated every time a user visits a website. For the sake of this example, let’s say a user logged into their Gmail account. Every time they accessed Gmail, the email provider created a network log.

  • If you are using a VPN, Gmail’s network log would contain the IP provided by PureVPN. This is one half of the picture. Now, if someone asks Google who accessed the user’s account, Google would state that whoever was using this IP, accessed the account. If the user was connected to PureVPN, it would be a PureVPN IP.
  • The person or organization inquiring about the user’s account will then trace the IP back to data centers where the VPN provider’s servers are hosted. The data center will point them to the VPN provider and trail finally leads to the VPN provider. The inquirer would then share timestamps and network logs acquired from Google and ask them to be compared with the network logs maintained by the VPN provider.
  • Now, depending on the VPN provider’s policy, they might ask for a warrant or subpoena before sharing information with whoever is asking. The information shared by the VPN provider will be a timestamp, containing the information about when an IP connected to which server and the non-VPN IP of the user. This correlation and the comparison of two network logs, maintained by two independent organizations leads to the possible path towards confirmation.

TLDR; to confirm someone’s real IP, two different set of Network Logs are required: one from the VPN provider and the other from the server where the IP visited, browsed or downloaded something. Any one set of Network Logs on its own is pretty much useless since it contains no valuable information. The two must be compared and verified for any link to be confirmed.

PureVPN Protecting Against Surveillance Programs Like PRISM.

Unlike organizations who are legally bound to the laws of and mass surveillance programs in US, UK, Canada, Australia and similar regimes, PureVPN helps avoid jurisdictions affected by the infamous mass surveillance programs like PRISM, ECHELON, XKeyscore, Tempora and others. Keeping this in mind:

Do you think VPN Providers and other organizations based in any of those affected jurisdictions can really live upto their so-called Zero-Log policy?

In order to obtain the network logs from our end, any law enforcement agency must come to us through the consumer privacy-friendly, non-spying jurisdiction of Hong Kong. In order for the case to be considered and acted upon, any charges or allegations must be in accordance with the laws of Hong Kong. Since Hong Kong is not part of any of those infamous surveillance programs those requests will simply be blocked even before it reaches us.

Continue To Trust Us With Your Privacy, Trust Us To Make The Right Call.

  • PureVPN did not breach its Privacy Policy and certainly did not breach your trust.
  • NO browsing logs, browsing habits or anything else was, or ever will be shared.
  • Your trust is our primary consideration, and as our user, you can rely on us to continually take actions that protect you from unwanted intrusions into your privacy, regardless of where they may originate.

Tor hidden-service - Onion.IRC #CgAn - Free speech servers

Anonymous Server

Tor

Socks5

Hostname

Port

SSL

CyberGuerrilla 9050 6dvj6v5imhny3anf.onion 6697

Translation

Tails - donation campaign for 2019

Tails - donation campaign for 2019

Tails-news: donation campaign for 2019 begins today. Every day, Tails helps thousands of people to safely use their computers online and offline. Tails is available for (...)


NordVPN is an excellent VPN for online privacy

NordVPN is an excellent VPN for online privacy

Warning – Numerous VPN service providers assure not to keep users’ log files of their connections and it is generally false! Many VPN services that promise anonymity for (...)


eelo - mobile OS and associated web-services

eelo - mobile OS and associated web-services

Your data is YOUR data! eelo in short. eelo recognises the need shared by everyone for better data privacy. The eelo project will provide an alternative mobile operating (...)


A secret British spy unit has waged war on the hacktivists

A secret British spy unit has waged war on the hacktivists

34c3 - Ethics, Society & Politics - Chaos Computer Club.Uncovering British spies’ web of sockpuppet social media personas. A secret British spy unit created to mount cyber (...)


Join the resistance

Tor hidden-service - IRC.CyberGuerrilla

Tor Socks5: 9050 - Host: 6dvj6v5imhny3anf.onion - Port: 6697 - SSL
Webchat #OpNewBlood
Tor protects your privacy - Tor Browser is an easy-to-use, portable package of Tor. By downloading and using Tor, you can protect the people who need anonymity, like activists, journalists and bloggers...

Anonymous t-shirt

Anonymous T-Shirts
T-Shirt and Hooded Jacket
Tails
Tails is an irreplaceable security tool as it allows anyone to use computers safely
Tor Browser
Tor Browser
Tor protects your privacy
NordVPN
NordVPN
Fast VPN Speeds