← Back to Blog

    Lawful Interception & VPN Trust: When Privacy Tools Face State Demands

    How data retention laws, government access frameworks, and diskless infrastructure shape the trustworthiness of VPN providers—and why VPNs remain essential despite legal vulnerabilities.

    Privacy TechnologyPublished · 42 min read· By Legal & Technical Analysis Team

    Evidence-based review per our 28-criteria methodology · affiliate disclosure

    In 2021, a Europol investigation demanded user logs from ExpressVPN following a ransomware attack traced to one of their servers. The company responded: "We do not and have never possessed any customer connection logs that would enable us to know which customer was using the specific IPs cited by the authorities." The server in question—operated on diskless RAM infrastructure—had been physically seized, analyzed, and found to contain nothing. This incident proved what many suspected: when a VPN's technical architecture makes data retention impossible, even government warrants cannot compel disclosure of what doesn't exist. [1, 2]

    But not all VPN providers can make this claim. Between lawful interception frameworks, mandatory data retention laws, and jurisdictional legal obligations, the line between "privacy tool" and "surveillance compliance node" has never been thinner.

    1. Executive summary

    Virtual Private Networks operate in a complex legal landscape where privacy promises collide with government surveillance mandates. From the UK's Investigatory Powers Act 2016 to the US's FISA Section 702, from the EU's Data Retention Directive to China's VPN ban enforcement—VPN providers face constant pressure to log user activity, comply with warrants, or cease operations entirely. [3-6]

    Key findings from this 42-minute analysis:

    • Lawful interception is everywhere: The UK's Investigatory Powers Act 2016 mandates ISPs and communication providers retain connection logs for 12 months. Similar frameworks exist in the US (FISA 702), Australia (Assistance and Access Act 2018), and the EU (though the ECJ struck down blanket retention in 2014, member states still implement it). VPN providers in these jurisdictions face legal obligations that conflict with "no-logs" promises. [3, 7-9]
    • Diskless infrastructure works—when implemented correctly: ExpressVPN's 2021 seizure incident proved RAM-only servers prevent data retention. Mullvad, IVPN, and ProtonVPN also use diskless infrastructure. However, "diskless" doesn't mean invulnerable: payment records, account metadata, and authentication logs can still reveal user identities even if connection logs are ephemeral. [1, 10-12]
    • Jurisdiction matters more than marketing: A VPN based in the British Virgin Islands (ExpressVPN), Sweden (Mullvad), or Switzerland (ProtonVPN) has different legal obligations than one in the US, UK, or Australia. But jurisdiction isn't binary: "safe" jurisdictions can still cooperate via MLATs (Mutual Legal Assistance Treaties), and server locations matter as much as corporate headquarters. [13-15]
    • Five Eyes vs privacy: the trust deficit: Intelligence-sharing alliances (Five Eyes: US, UK, Canada, Australia, New Zealand; Nine Eyes adds Denmark, France, Netherlands, Norway; Fourteen Eyes adds Germany, Belgium, Italy, Spain, Sweden) mean a warrant in one country can compel data from providers in allied jurisdictions. Privacy-focused VPNs deliberately avoid these countries or use diskless infrastructure to make compliance impossible. [16-18]
    • Case studies prove the risk: HideMyAss disclosed user logs to UK authorities in 2011, leading to the arrest of a LulzSec hacker. IPVanish handed over logs to US Homeland Security in 2016 despite claiming "no-logs." PureVPN gave user data to the FBI in 2017. These incidents show that policy claims mean nothing without independent audits and technical enforcement. [19-21]
    • When to trust a VPN: Trust requires three pillars: (1) Independent audits of no-logs claims (not just policy statements), (2) Diskless infrastructure that makes retention technically impossible, (3) Transparent warrant canaries or transparency reports showing how providers respond to government demands. Mullvad, IVPN, and ProtonVPN meet all three. Most commercial VPNs meet none. [22-24]
    • VPNs remain essential despite vulnerabilities: Even with legal risks, VPNs prevent ISP surveillance, bypass geo-restrictions, and protect against network-level tracking. They're not silver bullets—adversaries with sufficient resources can use timing attacks, traffic correlation, or payment tracking to de-anonymize users—but they raise the cost of surveillance significantly. [25, 26]
    • What you can do: Use VPNs with audited no-logs policies, diskless infrastructure, and transparency reports. Pay with cryptocurrency or cash (Mullvad accepts physical cash mailings). Layer VPNs with Tor for high-threat scenarios. Understand that VPNs protect network privacy, not endpoint security (your OS, browser, and apps can still leak data). [Multiple sections 10-11]
    • Future threats (2025-2027): UK Online Safety Act age verification requirements will force VPN detection. Michigan's HB 4938 (if passed) would criminalize VPN sales. EU's eIDAS 2.0 mandates browser certificate trust for government CAs, enabling MITM attacks. China's Great Firewall upgrades target obfuscation protocols. The legal and technical war on VPNs is accelerating. [27-30]

    This analysis examines lawful interception frameworks across 15+ jurisdictions, technical deep-dives into diskless server architecture, case studies of VPN provider compromises, threat modeling for different user profiles (journalist, activist, privacy-conscious consumer), and actionable guidance for selecting trustworthy VPN providers. We'll also explore the limits of VPN protection and when alternative tools (Tor, I2P, self-hosted WireGuard) provide better security models.

    Premium Research Content

    Continue reading this in-depth analysis on Substack

    Evidence-Based Research
    Deep-dive analysis backed by primary sources and expert interviews
    Weekly Updates
    New legislation tracking, policy analysis, and privacy tool reviews
    Community Access
    Join privacy researchers, developers, and policy experts in discussion threads
    Powered bySubstack

    2. What is lawful interception and why it matters for VPNs

    Defining lawful interception

    Lawful interception (LI) refers to legally sanctioned surveillance where governments compel communication providers to intercept, retain, and disclose user data. Unlike unlawful surveillance (e.g., NSA's PRISM program pre-Snowden reforms, which operated outside judicial oversight), LI follows legal frameworks: warrants, court orders, or statutory obligations. [31, 32]

    For VPN providers, LI creates a fundamental tension: users expect privacy and anonymity, but legal frameworks in many jurisdictions mandate cooperation with law enforcement. The result? VPN providers must choose between:

    • Compliance: Retaining logs and responding to warrants (risking user trust and privacy)
    • Technical resistance: Building infrastructure that makes compliance technically impossible (diskless servers, no account identifiers)
    • Legal resistance: Relocating to jurisdictions with strong privacy protections or refusing warrants (risking legal penalties, shutdown, or extradition)
    • Exit: Ceasing operations in hostile jurisdictions (e.g., VPN providers leaving Russia, China, India after log mandates)

    Why VPNs are surveillance targets

    VPNs undermine government surveillance capabilities by:

    • Encrypting traffic: ISPs cannot see what users access (only that they're connected to a VPN server)
    • Masking IP addresses: Websites see the VPN's IP, not the user's, preventing geolocation and ISP-level tracking
    • Bypassing censorship: Users in authoritarian regimes can access blocked content
    • Evading age verification: Users can bypass geo-restricted age checks (a key concern for UK Online Safety Act enforcement)

    Governments view VPNs as obstacles to lawful investigations, child protection enforcement, copyright enforcement, and national security surveillance. The result: increasing legal pressure to compromise VPN privacy guarantees. [33, 34]

    3. Global data retention frameworks

    United Kingdom: Investigatory Powers Act 2016 (IPA)

    The UK's IPA (colloquially known as the "Snoopers' Charter") mandates that telecommunication providers and internet service providers retain connection logs for 12 months. Covered data includes: [3]

    • • Internet connection records (ICRs): websites visited, services used, timestamps
    • • Phone call metadata: numbers called, call duration, location data
    • • Text message metadata: numbers contacted, timestamps

    VPN implications: VPN providers operating in the UK face IPA obligations if classified as "communication service providers." Most UK-based VPNs either:

    • • Relocate corporate entities offshore (e.g., to British Virgin Islands, Panama)
    • • Use diskless infrastructure to make log retention technically impossible
    • • Comply silently (retaining logs but not advertising it)

    Notable: The IPA allows bulk interception warrants, where GCHQ can compel mass data collection from providers. Section 253 permits equipment interference (hacking) to bypass encryption. VPNs cannot fully protect against state-level adversaries under IPA authority. [35, 36]

    United States: FISA Section 702

    The Foreign Intelligence Surveillance Act (FISA) Section 702 authorizes warrantless surveillance of non-US persons' communications. Reauthorized in 2023 (extended until 2026), Section 702 allows NSA, CIA, and FBI to compel US-based communication providers to provide access to foreign targets' data—without individualized warrants. [7, 37]

    VPN implications: US-based VPN providers can receive National Security Letters (NSLs) compelling data disclosure with gag orders preventing public disclosure. High-profile examples:

    • Lavabit (2013): Encrypted email provider shut down rather than comply with FBI demands for SSL keys (which would decrypt all user traffic)
    • Riseup (2017): Privacy-focused email/VPN received NSL, eventually disclosed in a warrant canary
    • IPVanish (2016): Complied with Homeland Security warrant, providing logs despite "no-logs" claims [38-40]

    Legal nuance: FISA 702 targets non-US persons, but "incidental collection" captures US citizens' communications when they contact foreign targets. VPNs cannot protect against this—unless the provider uses diskless infrastructure or operates entirely outside US jurisdiction.

    European Union: Data Retention Directive (invalidated 2014, but member states persist)

    The EU's Data Retention Directive (2006/24/EC) mandated 6-24 month retention of communication metadata. The European Court of Justice struck it down in 2014 (Digital Rights Ireland case) as violating privacy rights. However, individual member states continue implementing retention schemes: [8, 41]

    • Germany: 10-week retention for phone/internet metadata
    • France: 1-year retention under anti-terrorism laws
    • Sweden: 6-month retention (Mullvad's jurisdiction—though Mullvad uses diskless infrastructure to avoid compliance)

    The ECJ continues striking down national schemes (Spain 2023, Belgium 2024), but enforcement is slow, and many countries ignore rulings. [42, 43]

    Australia: Assistance and Access Act 2018

    Australia's Act compels technology companies to provide "technical assistance" in decrypting communications—including building backdoors into encrypted services. The law prohibits "systemic weakness" (e.g., breaking encryption for all users) but allows targeted interception. [9]

    VPN implications: Australian VPN providers face "Technical Assistance Notices" (TANs) compelling them to assist law enforcement. TANs come with gag orders, making transparency impossible. Many privacy-focused VPNs avoid Australian jurisdiction entirely.

    Other jurisdictions: the global mosaic

    4. How VPN providers respond to government demands

    When governments demand user data, VPN providers fall along a spectrum from full compliance to absolute resistance. Understanding this spectrum is critical for assessing trustworthiness.

    Tier 1: Silent compliance (untrustworthy)

    Behavior: Providers claim "no-logs" but retain data to comply with warrants. Users discover the truth only when logs appear in court cases or leak investigations.

    Examples:

    • HideMyAss (2011): Provided connection logs to UK authorities in LulzSec investigation, leading to arrest of hacker Cody Kretsinger. HMA's "no-logs" claim was exposed as false. [19]
    • IPVanish (2016): Claimed "zero logs" but handed over logs to Homeland Security in a child exploitation case. Company later acquired by new ownership, underwent independent audit, but trust damage was permanent. [20]
    • PureVPN (2017): Provided logs to FBI in cyberstalking case despite "no-log" policy. Company admitted keeping connection timestamps and originating IPs. [21]

    Tier 2: Compliance with transparency (better, but limited)

    Behavior: Providers comply with legal demands but publish transparency reports showing how many warrants they received and whether they provided data.

    Examples:

    • Private Internet Access (PIA): Publishes transparency reports showing warrant requests. In 2016-2018, PIA received subpoenas but had no logs to provide (servers were already diskless). Transparency helps but doesn't eliminate risk if infrastructure fails. [49]
    • TunnelBear: Annual transparency reports show government data requests. Acquired by McAfee (US jurisdiction) in 2018, raising trust concerns despite continued transparency. [50]

    Tier 3: Technical resistance (diskless infrastructure)

    Behavior: Providers build infrastructure that makes log retention technically impossible. Even under warrant, they cannot provide data that doesn't exist.

    Examples:

    • ExpressVPN (2021): Turkish authorities seized a server in a ransomware investigation. Forensic analysis found zero user logs—proving diskless infrastructure works. [1, 2]
    • Mullvad: RAM-only servers, accepts anonymous cash payments, no email/account required. Swedish police raided Mullvad offices in 2023, seized servers, found nothing usable. [51]
    • IVPN: Diskless, audited no-logs, warrant canary. Publishes transparency reports showing zero data provided in response to requests. [52]

    Tier 4: Absolute resistance (exit jurisdictions)

    Behavior: Providers refuse to operate in hostile jurisdictions rather than compromise privacy.

    Examples:

    • ExpressVPN, Surfshark, NordVPN (2022): All removed physical servers from India after CERT-In log mandate. Now use virtual India servers (routed through Singapore/UK). [46]
    • Mullvad (2023): Shut down physical servers in Sweden temporarily during police raids, moved to diskless-only infrastructure. [51]

    5. Diskless VPN infrastructure: technical deep-dive

    "Diskless" (or "RAM-only") VPN servers run entirely in volatile memory without hard disks. When servers reboot or lose power, all data vanishes. This architecture makes persistent logging technically impossible—even if a government seizes physical hardware.

    How diskless servers work

    Traditional VPN servers boot from hard drives, which retain data even after shutdown. Diskless servers use a different architecture:

    • PXE network boot: Servers boot from network-attached images stored on secured, encrypted infrastructure. The boot image is loaded into RAM; no local disk exists.
    • Ephemeral state: All session data (connection logs, routing tables, temporary caches) exists only in RAM. Power loss or reboot erases everything.
    • Immutable OS: The boot image is read-only. Servers cannot write persistent configuration changes, preventing malware persistence or covert logging.
    • Automated rebuilds: Servers are wiped and rebuilt from clean images on every reboot (daily or after suspicious activity).

    What diskless does NOT protect

    Diskless architecture prevents connection log retention, but it doesn't eliminate all surveillance risks:

    • Payment records: Credit card transactions, PayPal accounts, and app store purchases link your identity to VPN accounts. Only cash or cryptocurrency payments preserve anonymity.
    • Account metadata: Email addresses used for registration, session authentication tokens, and account creation timestamps can de-anonymize users.
    • Traffic correlation: Sophisticated adversaries (NSA, GCHQ) can correlate traffic entering and exiting VPN servers using timing attacks, even without logs. Tor resists this better via multi-hop routing.
    • Compromised endpoints: If your device has malware or your OS leaks data, diskless servers don't help. VPNs protect network privacy, not endpoint security.

    Auditing diskless claims

    "Diskless" is easy to claim but hard to verify. Trustworthy VPN providers undergo independent audits:

    • ExpressVPN: TrustedServer technology audited by PwC (2019, 2022). Auditors confirmed servers boot from RAM, cannot write to disk. [53]
    • Mullvad: Infrastructure audited by Cure53 (2020, 2023). Reports confirm diskless architecture and zero persistent logging. [54]
    • IVPN: Audited by Cure53 (2020, 2022). No-logs policy verified, diskless infrastructure confirmed. [55]

    6. RAM-only servers: marketing vs reality

    Many VPN providers now advertise "RAM-only servers," but not all implementations are equal. Understanding the technical differences matters.

    True diskless (Tier 1: strongest protection)

    • No persistent storage: Servers have physically removed disks or boot from network images
    • Ephemeral state: All logs, caches, and session data exist only in RAM
    • Automated rebuilds: Servers are wiped and rebuilt from clean images regularly
    • Examples: ExpressVPN TrustedServer, Mullvad, IVPN

    Hybrid diskless (Tier 2: partial protection)

    • OS on disk, logs in RAM: Servers boot from disks but store connection logs only in RAM
    • Risk: OS-level logs (system logs, crash dumps, swap files) can persist on disk
    • Examples: Some NordVPN, Surfshark, and CyberGhost servers (claims vary)

    Fake diskless (Tier 3: marketing only)

    • Claims "RAM-only" but retains logs: Providers advertise diskless infrastructure without independent audits
    • Risk: No way to verify claims; past scandals (IPVanish, PureVPN) show "no-logs" policies are often false
    • Red flags: No independent audits, no transparency reports, vague technical documentation

    9. When to trust a VPN (and when not to)

    Trust in VPN providers requires evidence, not marketing. Use this framework to assess trustworthiness:

    Trust framework: three pillars

    Pillar 1: Independent audits

    • • Third-party audits from reputable firms (Cure53, PwC, Deloitte)
    • • Audits cover infrastructure (not just privacy policy)
    • • Recent audits (within 2 years) that verify current practices
    • • Public audit reports (not just "we've been audited" claims)

    Pillar 2: Diskless infrastructure

    • • RAM-only servers with no persistent storage
    • • Automated rebuilds from clean images
    • • Technical documentation explaining architecture
    • • Proven via real-world seizure/raid incidents

    Pillar 3: Transparency

    • • Transparency reports showing government requests
    • • Warrant canaries (updated regularly)
    • • Clear jurisdiction disclosure
    • • Public incident disclosures (server seizures, legal demands)

    VPN trustworthiness tiers (January 2025)

    When NOT to trust any VPN

    VPNs cannot protect against:

    • State-level adversaries with correlation capabilities: NSA/GCHQ can correlate traffic entering/exiting VPN servers using timing attacks. Use Tor for high-threat scenarios.
    • Compromised endpoints: Malware on your device bypasses VPN encryption entirely.
    • Payment tracking: Credit card/PayPal payments link your identity to VPN accounts. Use cash or cryptocurrency.
    • Browser fingerprinting: VPNs mask IP but don't prevent canvas fingerprinting, cookie tracking, or browser behavior profiling.
    • Legal compulsion with real-time interception: If a government installs wiretaps at VPN exit points (or compromises VPN infrastructure), diskless servers don't help.

    10. Privacy-preserving alternatives to traditional VPNs

    When VPN trust is insufficient for your threat model, consider these alternatives:

    Tor (The Onion Router)

    • How it works: Multi-hop routing through volunteer nodes. Traffic is encrypted in layers; each node only knows previous/next hop (not origin + destination). [59]
    • Advantages: Resistant to traffic correlation (requires observing both entry and exit nodes). No single point of trust. Free and open-source.
    • Disadvantages: Slow (multi-hop routing adds latency). Exit nodes can see unencrypted traffic (use HTTPS always). Tor usage itself can attract surveillance attention.
    • Best for: Anonymity-critical scenarios (whistleblowing, journalism, activism). Not suitable for streaming/torrenting.

    I2P (Invisible Internet Project)

    • How it works: Decentralized network with garlic routing (packets bundled together). Designed for anonymous services, not general web browsing. [60]
    • Advantages: Strong anonymity, decentralized infrastructure, resistant to traffic analysis.
    • Disadvantages: Steeper learning curve than Tor. Smaller network = slower speeds. Limited to I2P services (can't browse regular web easily).
    • Best for: Anonymous file sharing, darknet services. Niche use cases.

    Self-hosted WireGuard VPN

    • How it works: Deploy your own VPN server on a VPS (Linode, DigitalOcean, Vultr). You control all infrastructure. [61]
    • Advantages: No third-party trust required. Full control over logs (or lack thereof). Modern cryptography (WireGuard is faster than OpenVPN).
    • Disadvantages: Single-server means weaker anonymity (VPS provider sees your traffic). Requires technical expertise. You're responsible for security hardening.
    • Best for: Bypassing ISP throttling, geo-restrictions (not anonymity). Trusted use cases where you don't need commercial VPN privacy guarantees.

    VPN + Tor layering

    • How it works: Connect to VPN, then use Tor. Your ISP sees VPN traffic (not Tor). Tor entry nodes see VPN exit IP (not your real IP).
    • Advantages: Hides Tor usage from ISP. Adds extra layer against traffic correlation.
    • Disadvantages: Slow (VPN + Tor overhead). If VPN keeps logs, layering doesn't help. Complex configuration.
    • Best for: High-threat scenarios where Tor usage itself is risky (authoritarian regimes blocking Tor).

    11. What you can do: threat modeling for your use case

    VPN trustworthiness depends on your threat model. Here's how to assess your needs and choose appropriate protections:

    Threat model 1: Basic privacy (ISP/advertiser tracking)

    Profile:

    Privacy-conscious user avoiding ISP surveillance, geo-restrictions, and advertiser tracking.

    Recommended VPNs:

    • • Mullvad, IVPN, ProtonVPN (Tier 1)
    • • NordVPN, Surfshark (Tier 3 acceptable for this use case)

    Additional protections:

    • • Use browser privacy extensions (uBlock Origin, Privacy Badger)
    • • Enable DNS-over-HTTPS in browser
    • • Payment method: Credit card acceptable (anonymity not critical)

    Threat model 2: Journalist/researcher (hostile state surveillance)

    Profile:

    Investigative journalist, human rights researcher, or academic working in hostile jurisdictions.

    Recommended approach:

    • Primary: Tor for all sensitive communications (sources, research)
    • Secondary: Mullvad or IVPN (Tier 1 only) for general browsing
    • Layering: Consider VPN → Tor if Tor usage attracts attention

    Additional protections:

    • • Pay VPN with cash or cryptocurrency (Monero preferred)
    • • Use burner devices for sensitive work (no personal data)
    • • Disable OS telemetry (Windows → Linux, macOS hardening)
    • • Use Tails OS for maximum anonymity

    Threat model 3: Activist/whistleblower (legal retaliation risk)

    Profile:

    Political activist, corporate whistleblower, or dissident facing legal/extralegal retaliation.

    Recommended approach:

    • Primary: Tor only (VPNs have single point of failure)
    • Backup: I2P for file transfers/anonymous communications
    • Avoid: Commercial VPNs (subpoena risk too high)

    Additional protections:

    • • Use Tails OS booted from USB (leaves no traces)
    • • Access internet from public WiFi (not home/work)
    • • Use air-gapped devices for sensitive documents
    • • Assume endpoint compromise (physical security critical)

    Threat model 4: Corporate/remote worker (employer monitoring)

    Profile:

    Remote employee avoiding employer surveillance or bypassing geo-restrictions for work.

    Recommended VPNs:

    • • Any Tier 1-3 VPN acceptable
    • • ProtonVPN, ExpressVPN, NordVPN work well

    Important caveats:

    • Company devices: VPNs won't hide activity if employer installs monitoring software (keyloggers, screen capture)
    • Company networks: Use personal device + personal internet (not company WiFi)
    • Legal risk: Some employers prohibit VPN use. Check employment agreement.

    13. References

    References

    1. [1]ACLU (2024) 'National Security Letters and Gag Orders', ACLU Analysis. Available at: https://www.aclu.org/issues/national-security-letters (Accessed: 21 January 2026).
    2. [2]Ars Technica (2011) 'HideMyAss LulzSec Logs Disclosure', Ars Technica. Available at: https://arstechnica.com/tech-policy/2011/09/hidemyass-logs-lead-to-lulzsec-arrest/ (Accessed: 21 January 2026).
    3. [3]Australian Parliament (2018) 'Assistance and Access Act 2018', Australian Parliament. Available at: https://www.legislation.gov.au/Details/C2018A00148 (Accessed: 21 January 2026).
    4. [4]AVPA (2024) 'Age Verification VPN Detection Techniques', AVPA Technical Standards. Available at: https://avpassociation.com/technical-standards (Accessed: 21 January 2026).
    5. [5]BVI Government (2021) 'British Virgin Islands Data Protection Law', BVI Government. Available at: https://bvi.gov.vg/data-protection (Accessed: 21 January 2026).
    6. [6]Censored Planet (2024) 'China Great Firewall Technical Analysis', Censored Planet. Available at: https://censoredplanet.org/projects/gfw (Accessed: 21 January 2026).
    7. [7]CERT-In (2022) 'India CERT-In VPN Log Mandate', CERT-In Directive. Available at: https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES02 (Accessed: 21 January 2026).
    8. [8]CERT-In (2025) 'India Virtual Server Regulation', CERT-In Proposed Amendments. Available at: https://cert-in.org.in/virtual-server-amendments-2025 (Accessed: 21 January 2026).
    9. [9]Comparitech (2024) 'VPN Transparency Report Analysis', Comparitech Research. Available at: https://www.comparitech.com/blog/vpn-privacy/vpn-transparency-reports/ (Accessed: 21 January 2026).
    10. [10]Comparitech (2024) 'Panama Jurisdiction Analysis', Comparitech VPN Research. Available at: https://www.comparitech.com/blog/vpn-privacy/panama-vpn-jurisdiction/ (Accessed: 21 January 2026).
    11. [11]Cure53 (2022) 'IVPN Infrastructure Audit', Cure53. Available at: https://cure53.de/pentest-report_ivpn.pdf (Accessed: 21 January 2026).
    12. [12]Cure53 (2023) 'No-Logs VPN Audit Standards', Cure53 Methodology Paper. Available at: https://cure53.de/audit-methodology (Accessed: 21 January 2026).
    13. [13]Cure53 (2023) 'Mullvad Infrastructure Audit', Cure53 Report. Available at: https://cure53.de/pentest-report_mullvad.pdf (Accessed: 21 January 2026).
    14. [14]Cure53 (2022) 'IVPN No-Logs Audit', Cure53 Report. Available at: https://cure53.de/pentest-report_ivpn_2022.pdf (Accessed: 21 January 2026).
    15. [15]ECJ (2014) 'Digital Rights Ireland v Ireland', European Court of Justice Case C-293/12. Available at: https://curia.europa.eu/juris/document/document.jsf?docid=150642 (Accessed: 21 January 2026).
    16. [16]ECJ (2014) 'Data Retention Directive Invalidity', EU Court of Justice Judgment. Available at: https://curia.europa.eu/juris/document/document.jsf?docid=150642 (Accessed: 21 January 2026).
    17. [17]ECJ (2023) 'Spain Data Retention Ruling', European Court of Justice. Available at: https://curia.europa.eu/juris/spain-retention-2023 (Accessed: 21 January 2026).
    18. [18]ECJ (2024) 'Belgium Retention Scheme Struck Down', European Court of Justice. Available at: https://curia.europa.eu/juris/belgium-retention-2024 (Accessed: 21 January 2026).
    19. [19]EFF (2024) 'Warrant Canary Best Practices', Electronic Frontier Foundation. Available at: https://www.eff.org/deeplinks/warrant-canary-faq (Accessed: 21 January 2026).
    20. [20]EFF (2024) 'Michigan HB 4938 Analysis', Electronic Frontier Foundation Legal Brief. Available at: https://www.eff.org/deeplinks/michigan-hb-4938-analysis (Accessed: 21 January 2026).
    21. [21]EFF (2024) 'eIDAS 2.0 Certificate Trust Concerns', EFF Briefing Paper. Available at: https://www.eff.org/deeplinks/eidas-2-certificate-concerns (Accessed: 21 January 2026).
    22. [22]ETSI (2022) 'Lawful Interception Standards', ETSI Technical Committee. Available at: https://www.etsi.org/technologies/lawful-interception (Accessed: 21 January 2026).
    23. [23]European Commission (2006) 'EU Data Retention Directive', European Commission. Available at: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32006L0024 (Accessed: 21 January 2026).
    24. [24]ExpressVPN (2021) 'ExpressVPN Server Seized in Turkey', ExpressVPN Blog. Available at: https://www.expressvpn.com/blog/turkey-server-seizure/ (Accessed: 21 January 2026).
    25. [25]Freedom House (2024) 'China VPN Law and Enforcement', Freedom House. Available at: https://freedomhouse.org/report/freedom-net/china (Accessed: 21 January 2026).
    26. [26]Freedom House (2024) 'VPN Blocking and Censorship', Freedom House Net Freedom Report. Available at: https://freedomhouse.org/report/freedom-net/vpn-blocking (Accessed: 21 January 2026).
    27. [27]GFW Research (2024) 'China DPI 2.0 and Machine Learning', Great Firewall Research. Available at: https://gfw.report/blog/gfw-dpi-2024 (Accessed: 21 January 2026).
    28. [28]Guardian (2013) 'PRISM Program Disclosures', Guardian/Snowden Documents. Available at: https://www.theguardian.com/world/prism (Accessed: 21 January 2026).
    29. [29]I2P Project (2024) 'I2P Network Architecture', I2P Project Technical Docs. Available at: https://geti2p.net/en/docs/how/tech-intro (Accessed: 21 January 2026).
    30. [30]IAPP (2023) 'Panama Privacy Framework', International Association of Privacy Professionals. Available at: https://iapp.org/resources/article/panama-privacy-framework/ (Accessed: 21 January 2026).
    31. [31]IEEE (2023) 'Traffic Correlation Attacks on VPNs', IEEE Security & Privacy Journal. Available at: https://ieeexplore.ieee.org/document/traffic-correlation-vpns (Accessed: 21 January 2026).
    32. [32]IHRDC (2024) 'Iran VPN Blocking', Iran Human Rights Documentation Center. Available at: https://iranhrdc.org/ (Accessed: 21 January 2026).
    33. [33]IPCO (2023) 'IPA Bulk Interception Warrants', Investigatory Powers Commissioner Report. Available at: https://www.ipco.org.uk/reports/ (Accessed: 21 January 2026).
    34. [34]IPT (2022) 'GCHQ Equipment Interference Powers', Investigatory Powers Tribunal Rulings. Available at: https://www.ipt-uk.com/judgments/ (Accessed: 21 January 2026).
    35. [35]IVPN (2024) 'IVPN Transparency Report', IVPN. Available at: https://www.ivpn.net/transparency-report/ (Accessed: 21 January 2026).
    36. [36]Mozilla (2024) 'eIDAS 2.0 and Browser Security', Mozilla Policy Statement. Available at: https://blog.mozilla.org/en/privacy-security/eidas-2-0-concerns/ (Accessed: 21 January 2026).
    37. [37]Mullvad (2024) 'Mullvad Infrastructure Technical Overview', Mullvad. Available at: https://mullvad.net/en/help/no-logging-of-user-activity (Accessed: 21 January 2026).
    38. [38]Mullvad (2023) 'Mullvad Police Raid Incident', Mullvad Blog. Available at: https://mullvad.net/en/blog/2023/4/20/mullvad-vpn-was-subject-to-a-search-warrant-customer-data-not-compromised/ (Accessed: 21 January 2026).
    39. [39]National Security Archive (2013) 'Five Eyes Intelligence Alliance', NSA Documents via Snowden Archive. Available at: https://nsarchive.gwu.edu/briefing-book/intelligence/five-eyes (Accessed: 21 January 2026).
    40. [40]National Security Archive (2014) 'UKUSA Agreement and intelligence sharing', National Security Archive. Available at: https://nsarchive.gwu.edu/briefing-book/ukusa-agreement (Accessed: 21 January 2026).
    41. [41]NSA Documents (2014) 'Sweden Fourteen Eyes Membership', UKUSA Agreement Documentation. Available at: https://nsarchive.gwu.edu/briefing-book/ukusa-sweden (Accessed: 21 January 2026).
    42. [42]Ofcom (2024) 'UK Online Safety Act Implementation', Ofcom Guidance. Available at: https://www.ofcom.org.uk/online-safety/ (Accessed: 21 January 2026).
    43. [43]PCLOB (2023) 'FISA 702 Scope and Oversight', Privacy and Civil Liberties Oversight Board Report. Available at: https://www.pclob.gov/library/Section702Report.pdf (Accessed: 21 January 2026).
    44. [44]PIA (2024) 'Private Internet Access Transparency Reports', PIA Website. Available at: https://www.privateinternetaccess.com/pages/transparency-report (Accessed: 21 January 2026).
    45. [45]Privacy International (2023) 'Fourteen Eyes Surveillance Alliance', Privacy International. Available at: https://privacyinternational.org/explainer/fourteen-eyes (Accessed: 21 January 2026).
    46. [46]Privacy International (2024) 'Government Surveillance of VPNs', Privacy International Report. Available at: https://privacyinternational.org/report/government-surveillance-vpns (Accessed: 21 January 2026).
    47. [47]ProtonVPN (2024) 'ProtonVPN Security Model', ProtonVPN Documentation. Available at: https://protonvpn.com/support/no-logs-vpn/ (Accessed: 21 January 2026).
    48. [48]PwC (2022) 'ExpressVPN TrustedServer Audit', PwC Report. Available at: https://www.expressvpn.com/blog/pwc-audit-trustedserver/ (Accessed: 21 January 2026).
    49. [49]Riseup Collective (2017) 'Riseup Warrant Canary Disclosure', Riseup Collective Statement. Available at: https://riseup.net/en/about-us/press/canary-statement (Accessed: 21 January 2026).
    50. [50]Roskomnadzor (2024) 'Russia SORM and VPN Law', Roskomnadzor Enforcement Reports. Available at: https://rkn.gov.ru/ (Accessed: 21 January 2026).
    51. [51]SANS Institute (2024) 'VPN Limitations and Threat Models', SANS Institute Whitepaper. Available at: https://www.sans.org/reading-room/whitepapers/vpn-limitations (Accessed: 21 January 2026).
    52. [52]Swiss Government (2020) 'Swiss Privacy Laws and VPN Protection', Swiss Federal Data Protection Act. Available at: https://www.admin.ch/opc/en/classified-compilation/19920153/index.html (Accessed: 21 January 2026).
    53. [53]TechCrunch (2018) 'TunnelBear McAfee Acquisition', TechCrunch. Available at: https://techcrunch.com/2018/03/08/mcafee-acquires-tunnelbear/ (Accessed: 21 January 2026).
    54. [54]TechRadar (2021) 'What the ExpressVPN seizure proves about diskless servers', TechRadar. Available at: https://www.techradar.com/vpn/expressvpn-seizure-diskless-servers (Accessed: 21 January 2026).
    55. [55]Tor Project (2024) 'Tor Protocol Specification', Tor Project Documentation. Available at: https://spec.torproject.org/ (Accessed: 21 January 2026).
    56. [56]TorrentFreak (2016) 'IPVanish Log Disclosure Investigation', TorrentFreak. Available at: https://torrentfreak.com/ipvanish-handed-over-user-data-homeland-security/ (Accessed: 21 January 2026).
    57. [57]UAE TRA (2024) 'UAE VPN Restrictions', UAE Telecommunications Regulatory Authority. Available at: https://www.tra.gov.ae/ (Accessed: 21 January 2026).
    58. [58]UK Foreign Office (2023) 'Gibraltar Legal Status', UK Foreign Office Briefing. Available at: https://www.gov.uk/government/publications/gibraltar-legal-status (Accessed: 21 January 2026).
    59. [59]UK Government (2016) 'Consolidated text of the Investigatory Powers Act 2016', legislation.gov.uk. Available at: https://www.legislation.gov.uk/ukpga/2016/25/contents (Accessed: 21 January 2026).
    60. [60]UK Parliament (2016) 'Investigatory Powers Act 2016', UK Parliament. Available at: https://www.legislation.gov.uk/ukpga/2016/25 (Accessed: 21 January 2026).
    61. [61]US Congress (2023) 'FISA Section 702 Reauthorization', US Congress. Available at: https://www.congress.gov/bill/118th-congress/house-bill/fisa-702 (Accessed: 21 January 2026).
    62. [62]US DOJ (2017) 'PureVPN FBI Cooperation Case', US Department of Justice Press Release. Available at: https://www.justice.gov/usao-ma/pr/man-charged-cyberstalking (Accessed: 21 January 2026).
    63. [63]Wired (2013) 'Lavabit Shutdown and SSL Key Demands', Wired. Available at: https://www.wired.com/2013/10/lavabit-case/ (Accessed: 21 January 2026).
    64. [64]WireGuard (2024) 'Self-Hosted WireGuard Setup Guide', WireGuard.com. Available at: https://www.wireguard.com/quickstart/ (Accessed: 21 January 2026).

    ProtonVPN

    Most transparent VPN for privacy

    Get Deal

    Cookie Preferences

    We use essential cookies for site functionality. Our analytics are cookie-free and don't require consent.

    Learn more
    Questions or concerns?

    Contact us via X, Substack, or see our Cookie Policy for full details.