✅ We publish: - Independent no-logs audit reports and methodologies - Logs of legal requests received and our responses - A regularly updated warrant canary - Quarterly impact reports on donations and partner outcomes - Advance notice of policy or infrastructure changes
❌ We don't publish: - Individual user data or browsing history (we don't have it) - De-anonymized connection metadata - Marketing metrics disguised as transparency - Secret compliance with data requests
Trust is built through transparency, not claims. In an industry where "military-grade encryption" and "100% anonymity" are thrown around as marketing slogans, words aren't enough. You need proof.
That is why we built the Transparency Hub. It is a central repository where we publish the data, audits, and reports necessary to verify that we are doing what we say we do. This guide explains exactly what you will find in the hub, how often it is updated, and how to interpret the information we provide.
The Transparency Hub is divided into several key sections, each serving a specific purpose in verifying our operations and impact.
A no-logs policy is only as good as the independent audit that verifies it. We commission reputable third-party security firms to examine our infrastructure, server configurations, and codebases.
Learn more: No-logs explained: what it means, what to look for, and how we design for it
As a VPN provider, we occasionally receive requests from law enforcement or government agencies asking for user data. We log every single request we receive.
A warrant canary is a regularly updated statement confirming that we have not received any secret subpoenas, gag orders, or classified data requests.
Part of every PrivateByRight subscription supports privacy, press freedom, and human-rights initiatives. We believe you have a right to know exactly where that money goes.
Learn more: How donations work at PrivateByRight: the model, rules, and accountability
Transparency also means being clear about how our service operates and any changes to the rules of engagement.
Data is only useful if you know how to interpret it. Here is how to read the two most complex sections of the Transparency Hub.
When you look at the legal request log, you will see columns for the number of requests and the number of times data was produced.
Our impact reports focus on the real-world effects of the organizations we support.
Learn more: Partner spotlight template: how we choose impact partners and who's next
True transparency does not mean publishing everything. It means publishing the right things while fiercely protecting user privacy.
We never publish individual user data. We do not publish anonymized browsing trends, aggregated connection logs, or de-identified traffic patterns. Even "anonymized" data can sometimes be re-identified if combined with other datasets.
The most secure data is data that is never collected. Our systems are designed around data minimization, meaning we simply do not have the logs to publish in the first place.
Learn more: Our privacy principles: data minimization, default protection, and clarity

Our approach to transparency is straightforward: verify, don't trust.
We design our systems to minimize data collection by default. We use RAM-only servers where possible, meaning a simple reboot wipes all data. We support modern protocols like WireGuard and OpenVPN, and we route DNS requests through our own encrypted tunnels.
But we don't expect you to take our word for it. The Transparency Hub exists so you can check our work. By publishing our audits, legal logs, and impact reports, we hold ourselves accountable to the standards we set.
A warrant canary is necessary because certain legal requests, like National Security Letters in the US, often come with gag orders. A company cannot legally disclose that they received the order. However, they can stop publishing a statement saying they haven't received one. If the canary disappears, users know something is wrong.
We aim to conduct independent no-logs audits annually, or whenever there is a fundamental change to our server architecture or core software. The full reports are always published in the Transparency Hub.
No. To protect user privacy, all financial contributions are pooled and aggregated before being distributed to our impact partners. We do not track individual user funds to specific outcomes.
If we ever need to change our privacy policy or logging practices, we will announce the changes in the Transparency Hub and notify users before the changes take effect. We do not make silent updates to our terms.
We contract with established, reputable third-party cybersecurity and auditing firms. The specific firm used for each audit is listed in the published report, along with their methodology and findings.