Is these any vpn that actually dose not keep logs or give your information to the goverment if asked.
I read through policies of some vpn's that claim not to keep logs.
all of say that they will give details and activity of users if requisted by the authority
Forum Thread: Is There a VPN That Keeps No Log??
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
6 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
7 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
10 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Dox Anyone
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Top 10 Things to Do After Installing Kali Linux
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
Tutorial: DNS Spoofing
-
How To: Enable the New Native SSH Client on Windows 10
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Make Your Own Bad USB
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+
-
How To: Scrape Target Email Addresses with TheHarvester
5 Responses
Take a look at my guide on privacy where I go into a fair amount of detail about VPNs. Generally speaking every OS and server keeps some sort of system logs, but it is the removal of those logs that bears any meaning.
As for government orders, the only time the authorities cannot obtain private intelligence is when it is no longer present (see above).
TRT
Many VPNs claim to keep no logs. I can claim that I'm a six-foot sex god with a buff body that women find irresistible. Should you believe me? Probably not!
Having said that, a site called Torrentfreak is very interested in anonymous torrenting and asks a number of questions to various VPN providers each year. Whether or not you can trust their answers is up to you to decide. When considering this you should bear in mind whether you can open an account with a blatantly disposable email address, whether you can pay anonymously (by which I mean Ucash vouchers, cash or similar because we all know that, despite the hype, Bitcoin is not necessarily anonymous), where your VPN providers servers are located and the legal ramifications of this, etc.
I firmly believe that internet anonymity is achievable, it's just a complete ball-ache to do properly. The basics involve buying a laptop for cash, using live Kali distros, hacking numerous wi-fi access points outside of the standard public wi-fi area to avoid CCTV cameras (at least in the UK where we are all watched like like laboratory mice), avoiding login patterns to avoid physical surveillance, generating online currency to purchase additional layers of protection like VPNs, MAC spoofing, protecting against DNS leaks etc etc etc.
Please feel free to read this, but bear in mind it's the 2015 version and another will be along shortly. https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228/
I would also recommend the Jolly Roger OPSEC guide. https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/
On a final note I would refer to Nirvana; "Just because you're paranoid, don't mean they're not after you".
All very adequate points, but I would not rely on TF's analytical review of VPNs solely. As with any service provider, you adopt a contract (ToS that nobody ever reads) when you sign up for a VPN, in which it states all of the terms that you are bound to comply with.
No matter what the website's front page claims, the ToS (Terms of Service) and Privacy Policy is the first page you should be reading if you are in any way concerned about privacy.
Great reading recommendations, but I would add Layman's Guide to OpSec to the reading list. It isn't as detailed as the Jolly Roger OpSec guide, but it gives some general advice that I would personally take on board.
TRT
I recommend Private Internet Access, it's super inexpensive and you only need one account to use it on all your devices simultaneously. Most require you to purchase a separate account for each device (or disconnect one of your devises to connect it on another). Here is the torrentfreak review link: https://torrentfreak.com/review/private-internet-access-reviews/
Like TRT said however, you can't solely rely on this article. TRT was also right in that everyone must comply with the ToS which are based on applicable laws. However these laws vary from country to country and some countries aren't bound to US laws which will force the VPN company to hand over their logs to the feds. You can google for more information.
You will NEVER get a "correct" answer on which VPN to use because there will never be any consensus.
Hi,
I would like to share my researches, because finding a secure, fast and overall trustworthy VPN provider can really become a challenge,
After analyzing a lot of vpn reviews and privacy policies,
I think the less untrustworthy VPN provider is AirVPN, they encourage you to avoid communicating any personal information, accept bitcoin payment, shared IPs, they own their DNS servers, very correct speed (4Mb/s minimum allocated bandwidth), Open Source (no logs, they are piped to /dev/null every 60min from what I understood), COMPANY IS LOCATED OUTSIDE US, VPN over TOR for paranoid fellows and a lot of other features,
you people can go check it yourself here , I personally was charmed
This is of course my opinion, and it only meets my own requirements, privacy and security, for other purposes there might be better services
Share Your Thoughts