✅ A VPN does: - Encrypts your connection between your device and the VPN server - Hides your IP address from many websites and services - Helps reduce exposure on public networks
❌ A VPN doesn't: - Make you anonymous - Guarantee that your provider isn't logging (without an independent audit) - Protect you if the provider stores data that can later be requested by authorities
"We have a strict no-logs policy."
You see this claim on nearly every VPN website. But what does it actually mean? And more importantly—how do you verify it?
A "no-logs" policy should mean the VPN provider doesn't keep records of what you do online. No browsing history, no connection timestamps, no linking of activity to your account. But the reality is more nuanced. Some providers claim "no-logs" while still collecting connection metadata. Others make the claim without any independent verification.
This guide explains what logs exist, what to look for in a no-logs policy, and how we design our systems to minimize data collection.
Not all logs are the same. Here is what VPN providers could collect—and what "no-logs" should actually mean.
What it is: Records of which websites you visit, when you visit them, and what you do there.
Example data: - Domain names (example.com, news-site.org) - Full URLs (example.com/page-123) - Timestamps for each request - Data transferred per session
Why it matters: This is the most invasive type of logging. If a VPN keeps activity logs, they can hand over your entire browsing history to authorities, advertisers, or anyone else requesting it.
No-logs policy should say: "We do not log browsing activity, DNS queries, or destination IP addresses."
What it is: Records of when you connect, how long you stay connected, and which server you use—but not what you do during the session.
Example data: - Your real IP address - VPN server you connected to - Connection timestamp (start/end time) - Session duration - Total bandwidth used
Why it matters: Even if a provider doesn't log what you browse, connection logs can still link you to a VPN session. If authorities request data, the provider can confirm "User X was connected to Server Y at Time Z." This is enough to narrow down suspects or correlate activity with other data sources.
No-logs policy should say: "We do not log connection timestamps, session duration, or originating IP addresses."
What it is: Statistical data used for performance monitoring, server load balancing, or debugging—without identifying individual users.
Example data: - Total bandwidth used across all servers (not per user) - Server uptime and performance metrics - Anonymized error reports
Why it matters: This type of logging is generally safe if it is truly anonymized. However, "anonymized" data can sometimes be re-identified if combined with other data sources.
No-logs policy should clarify: "We collect anonymized performance data that cannot be linked to individual users."
What it is: Information required to create an account and process payments.
Example data: - Email address (if required for account creation) - Payment method (credit card, PayPal, cryptocurrency) - Account creation date - Subscription status
Why it matters: Even a true "no-logs" VPN has to store some data to maintain accounts. The key question is: can this account data be linked to browsing activity? If the provider doesn't log connections, there is no way to link account data to specific browsing sessions.
No-logs policy should clarify: "We store account data necessary for service operation, but this data is not linked to browsing activity."
❌ Vague language "We respect your privacy." "We don't log sensitive data." What does "sensitive" mean? If it is not specific, assume they log everything.
❌ No privacy policy link If a VPN doesn't publish a clear, public privacy policy, assume the worst.
❌ Conflicting claims Marketing page says "no-logs." Privacy policy says "we may log connection metadata for troubleshooting." They are logging.
❌ Jurisdiction in surveillance-heavy countries If the VPN is based in a country with mandatory data retention laws, their "no-logs" claim may be legally unenforceable.
❌ Free VPNs If you are not paying, how does the service make money? Often by selling data or injecting ads.
Learn more: Free vs paid VPNs: privacy, security, and the hidden tradeoffs
❌ No third-party audits Anyone can claim no-logs. Without an independent audit, there is no verification.
✅ Specific, technical language "We do not log DNS queries, browsing history, connection timestamps, session duration, originating IP addresses, or destination IPs."
✅ Independently audited Look for public audit reports from reputable firms. The audit should verify logging practices, not just infrastructure security.
✅ Open-source code (if applicable) Open-source apps and server software can be reviewed by the community, making it harder to hide logging mechanisms.
✅ Transparent about what is collected Good providers clearly explain what data they do collect (e.g., account emails, payment info) and why.
✅ Favorable jurisdiction VPNs based in privacy-friendly countries are less likely to face legal demands for data.
✅ Warrant canary or transparency reports Some providers publish transparency reports showing how many legal requests they receive and how they respond. A "warrant canary" is a regularly updated statement that they haven't received secret legal orders.
Where a VPN company is based affects what data can be legally demanded—and whether "no-logs" is even enforceable.
These are intelligence-sharing alliances between countries. If a VPN is based in one of these countries, their government may be able to request data—or even compel secret logging.
Does this mean you should avoid VPNs in these countries? Not necessarily. If a VPN has a true no-logs policy (audited), there is no data to hand over—even if authorities request it. But jurisdiction is still a factor in assessing trust.
Countries with strong privacy laws and no mandatory data retention:
Jurisdiction alone doesn't guarantee privacy. A VPN in a privacy-friendly country can still log data if they choose to. Always verify the policy and audits.
Learn more: How we handle legal requests: principles, process, and what we can share
Several VPN providers have faced legal requests for user data. Here is what happened:
Turkish authorities seized an ExpressVPN server to investigate a case. Because the provider used RAM-only servers with no logging, authorities found no user data. This validated their no-logs claim under real-world pressure.
The FBI requested user logs in a criminal investigation. PIA provided evidence that they had no logs to hand over, and the case proceeded without VPN data. Their no-logs policy held up in court.
A VPN claiming "no-logs" was revealed to have handed over connection logs, including IP addresses and timestamps, to authorities. The provider later admitted they log metadata "for troubleshooting."
Legal pressure is the ultimate test of a no-logs policy. Look for providers with a track record of transparency when authorities come knocking.

We design systems to minimize data collection—not just avoid logging after the fact.
Our no-logs policy is designed to be audited and verified by third parties. We publish audit reports in our Transparency Hub, along with any legal requests we receive and how we respond.
Learn more: Transparency hub: what we publish and how to read our reports
We use RAM-only servers (diskless infrastructure) wherever possible. When a server reboots, all data is wiped. There is no persistent storage of session data.
We also implement multi-hop routing (where supported) so that even if one server were compromised, individual session data can't be reconstructed.
Learn more: Our privacy principles: data minimization, default protection, and clarity
Look for specific, technical language in the privacy policy, independent audits from reputable firms, transparent jurisdiction, and transparency reports showing how they respond to legal requests. If any of these are missing, treat the claim skeptically.
Yes. A true no-logs VPN can confirm that a user has an account and provide payment information, but they won't have browsing activity or connection data to hand over. They can comply without compromising user privacy.
No. A no-logs VPN means your provider doesn't keep records of your activity, but websites can still track you through cookies, fingerprints, and logged-in accounts. Anonymity requires layering tools.
Learn more: Do VPNs make you anonymous? What a VPN can and can't hide
Rarely. Free VPNs need to make money somehow—usually by logging and selling data, injecting ads, or limiting service to push paid upgrades. If you are not paying, you are likely the product.
Ideally, annually or after significant infrastructure changes. A one-time audit from years ago is less trustworthy than regular, up-to-date verification.
If the VPN is based in a country with mandatory logging laws, their "no-logs" claim may not hold up under legal pressure. Consider providers in privacy-friendly jurisdictions—or at minimum, verify their policy with independent audits.
A VPN leak occurs when your traffic bypasses the encrypted tunnel. Even with a no-logs policy, a leak can expose your real IP address or DNS queries to your ISP or the websites you visit.
Learn more: VPN leaks explained: DNS, IPv6, and WebRTC (and how to check yours)