We own servers that we use. But once again, there is very little we can actually share about. No logs are kept whatsoever. Our choice is to reply to any such messages that are not obviously generated by automated and quite likely illegal spambots. We also provide guides for every other platform. By now most Internet users are well aware of the fact that pretty much every step they take on the Internet is logged or monitored. No, we refuse to use 3rd party software.
We decided to find out. We keep user authentication and billing information on independent platforms. We are currently deploying our Ipv6 network across our servers. The process is fully automated and we keep this info till the user is connected. We have never received any court order. We do not hold much information anyway.
The only external tool we use is Zopim LiveChat. We operate under the jurisdiction of Bulgaria. We do not store sensitive payment information on our servers, in most cases payment system simply sends us a notification about successful payment with the amount of payment. Finally, when a user pays via credit card their address, first name and email address is required. We treat BitTorrent, P2P, streaming and any other traffic equally on all servers. We have Killswitch in our Windows and Mac software. We do not allow P2P on all servers due to the legal pressure on the data centers in certain regions of the world.
It is impossible to any data to leak if a connection drops as the firewall will not deactivate until explicitly instructed to do so. All Protocol are allowed in all our locations. We do not log, period. We have physical control of our servers in Romania. So far this has never happened. Since we are based in Singapore, all legal notices have to be dealt with according to Singapore laws first. The main marketing entity for our business is based in the United States of America and an operational entity is based out of Nevis.
This has never happened so far, but we have to be in compliance with the laws while also trying to fully protect our users. For this reason, the highest risk users should definitely use Bitcoin, Ripple or a major gift card with an anonymous e-mail account when subscribing to our privacy service. Our custom applications work for Windows, Mac and Android. We run our own email server plus support and live chat systems using open source tools. In this way it is not even possible to match an external time stamp to a user that was simultaneously logged in. We severely scrutinize the validity of any and all legal information requests. This is used to enforce free tier limitations as you can use Windscribe for free as well as prevent abuse.
Since we do not have log files, we have no information to share. We own some of the servers in Toronto. If we were served a subpoena which compelled us to log traffic we would find a way to inform our customers and relocate to a new jurisdiction. We have in the past taken down such nodes based on an alert from onboard systems and offsite, independently maintained remote logs that confirmed a violation was taking place. This allows us to offer locations from all over the world. We would publish any correspondence from law enforcement to our transparency section on the website and if we were not allowed to do that we would stop updating our Warrant Canary.
All servers have been set up with a zero logs policy. We simply respond to each notice confirming that we do not host the content in question. Yes, all types of traffic our allowed with our services. Encryption algorithms and key lengths are important but often get way too much attention at the expense of other important but harder to measure things such as leaks and computer security. We check portforwards, close them and send the notice into your account.
We do not collect sensitive payment information. We offer a light and easy to use app for windows. We do not require personal details to register an account with us. If required to wiretap a user under a National Security Letter, we have a passively triggered Warrant Canary. Australia, Austria, Belgium, Bulgaria, Canada, Czech Rep.
On the other hand, we do not welcome illegal activities which potentially harm other people. We get requests from governments from time to time. All are linked by an email. This protects our servers from a wide range of attacks on the encryption. We have a custom application for Windows and Mac and also a slightly modified version for Android.