No-log policy
No exploitable traces, by design.
Inspired by Mullvad/Proton standards: no logs, no trackers, strict network plane separation. Audits and bounties guarantee verifiability.
Key commitments
- No collection of traffic, DNS, or session timestamps.
- Ephemeral technical logs, encrypted in memory only, purged under 12h.
- No trackers, no ad SDKs, no fingerprinting.
- Bi-monthly transparency reports, published warrant canary.
- Zero-retention stance: if a legal request arrives, no exploitable data exists.
What we do not do
- No data resale, no ad monetization.
- No long-term storage of identifiers, no profiling.
- No collection of source IPs, no server-side correlation.