← Back to context

Comment by cycomanic

7 hours ago

Why? If I was an intelligence agency and designing a VPN I would simply log all the IPs connecting to my VPN and not rely on statistics on exit nodes to identify the users, even more so because they rely on the users to pick different servers.

How would you claim it's a no log VPN?