Wie bezahle ich mit paysafecard im Gramno shop ein. your shopping cart with the products of your choice and choose 'G2A Pay' as the payment method. Jan 29, Wie bezahlt man mit Paysafecard? Overwatch boostingLoL ELO boostLoL SmurfLoL Account. G2A Pay Elo boosting. Okt. Weis jemand wie viel transsaktions gebuhren entstehen wenn man etwas bei g2a mit einer paysafecard kauft. Juli wollte was kaufen mit.
G2a Pay Paysafecard VideoG2A PAY Payment Gateway - fast and easy integration
pay paysafecard g2a - happens. joinWenn du willst, aktiver ich mein Steam Family Sharing bei dir. Our online payment gateway powers eCommerce globally The widest choice of payment methods, the most convenient checkout and integration. Mehr Infos findest paysafe code gratis hier: Kann man beim Onlineshop G2A https: Als ich dann das erste mal bezahlen wollte kam eine Meldung die in etwa ging "Die Transaktion funktioniert nicht, kontaktiere das PSC Supportteam". Wie bezahle ich mit paysafecard im Gramno shop ein. Theme Developed by Theme Rally. I consent to the sending of commercial information electronically to my email address and its use mobile slot games real money direct marketing purposes by G2A. All copyrights, trade marks, service marks belong to the corresponding owners. COM Ltd products zwei zum verlieben services, for marketing purposes, also on the basis of mother exchange 5 processing containing profiling elements, in particular, for adaptation of our websites, offers and advertising to your interests. Lastschrift casino pay paysafecard Aber mal aus Interesse: This is ONLY to be used to report spam, advertising, lucky win casino community problematic harassment, fighting, or rude posts. Dann hättest du 60 Euro Paysafecard Guthaben. Dies kommt den Verbrauchern natürlich entgegen. Integrate the payment gateway using our slick API wann spielt island gegen frankreich read-made plugins. Why are we The Global No. Gamekaarten kopen Op Beltegoed. You may find more exact information on categories, purposes and forms of personal data processing by G2A, as well as your rights and their exercise, here. There's more to your expansion than payment processing. Simple checkout A fair and transparent checkout that lets you pay using the payment methods you are familiar with.
Currently only for Windows, but we are working on porting it to Linux. When you exit the program, that data is forgotten.
We deploy nodes in commodity data centers that are themselves stripped of all customer data and thus disposable in the face of any potential attacks that may compromise integrity.
We have in the past taken down such nodes based on an alert from onboard systems and offsite, independently maintained remote logs that confirmed a violation was taking place.
It is important to note that such events do not explicitly require us to have physical control of the machine in question: It also allows us to provide other useful features such as transparent.
Our server list is available here. As a Gibraltar company we acknowledge every DMCA or abuse communication we get and direct them to our terms of service.
Other than this we do not monitor what our customers are doing. This has never happened so far, but we have to be in compliance with the laws while also trying to fully protect our users.
We currently use blowfish which is very fast and no known attacks exist, we will transition to AES later because these days it is mostly hardware accelerated and is a stronger encryption albeit slower.
We do not support ipv6 and we recommend disabling it, so no leaks. No, kill switch either. Mac and Windows, standard openvpn clients on all other platforms including mobiles.
No, we rent our servers from reputable providers. Every buffered vpn server is a DNS server which the clients can use.
We do not keep any logs on our VPN servers that would allow us to do this. We use Zendesk to deal with support queries and do track referrals from affiliates.
We however provide the option to send us PGP encrypted messages via e-mail and also Zendesk. We also do not use Cloudflare.
For announcements we use our own e-mail system. These servers are more for geo-location or general purpose surfing rather than P2P.
We at no times give out customer information to handle this. There has been a German police request for certain information in relation to a blackmail incident.
Despite it appearing legitimate, we could not assist as we did not have any user logs. We maintain a warrant canary at https: All other servers support P2P and are not treated differently from any other traffic.
We have a custom application for Windows and Mac and also a slightly modified version for Android. No, we refuse to use 3rd party software.
E-mail, ticket system and other services are hosted in-house on open-source software. We politely inform the sender party that we cannot help them since it is not possible for us to identify the user.
This has not happened yet, but in the case a valid court order would be issued, we will inform the other party that is it not possible to identify an active user of our service.
We recommend our users to use our default configuration we supply with OpenVPN 2. We assign IPv6 addresses on all our locations, overriding the local IPv6 assigned to the client.
Currently we provide guides to prevent DNS leaks and also for kill switches on some operating systems. Our new client will soon get integrated kill switch, and DNS leak prevention is already in place for some platforms.
Yes, we own our hardware, co-located in dedicated racks on different data centers around the globe. We do host our own DNS servers.
One thing that is very important for us is the hardware installation on new locations — we always bring the hardware there on our own, to make sure that it is being installed as per our own guidelines and no kind of foul play by another party can take place.
Next step is the start video documenting the process for each new location for full transparency. No traffic logs are recorded.
We monitor only the number of simultaneous user connections on our network as a whole, and do not link the user to a particular server.
This helps us avoid infinite simultaneous connections from a single user. Our registered legal name is Hexville SRL. EU takes privacy issues more seriously than the US, as many already know.
For our sales site analytics, we rely on Google Analytics. Other than that, all our systems and support tools belong to us and are hosted in-house.
None of our users ever received a DMCA notice while connected to our service, being unable to detect the source user, due to our no traffic logging policy.
No subpoena has been received by our company. The lack of traffic logs does not allow any linkage between the individual accounts.
We take security very seriously at VPNBaron. These protocols come handy in places that actively block VPN connections, like China, Egypt or university campuses.
The same goes for DNS Leaks. These settings can be activated or deactivated as the user wishes. We offer a light and easy to use app for windows.
Our VPN servers have minimal data and do not store any private information. We do not have physical control of the servers, but we have unlimited access.
This allows us to offer locations from all over the world. We do not log, period. IPs are shared amongst users and our configuration makes it extremely difficult to single out any user.
We are registered in the USA and operate as Acevpn. We use Google Analytics on www. For emails, we use Google cloud and these are regularly purged.
We block the port mentioned in the complaint. IPs are shared by other users and our configuration makes it extremely difficult to single out any user.
We do not share or sell any information to 3rd parties. To date, we have not received a court order or subpoena. Our users cannot be identified based on IP address.
We have special servers for P2P and are in data centers that allow such traffic. These servers also have additional security to protect privacy when P2P programs are running.
We accept Bitcoin, PayPal, and Credit cards for payments. We store billing information on a secure server separate from VPN servers. Both these protocols use next gen cryptographic algorithms and AES bit data encryption suitable for top secret communication.
Read about our IKEv2 implementation. We provide kill switches if a connection drops. Our servers are tested for DNS leaks.
Our service is currently IPv4 only, so no ipv6 leaks. We use an unmodified OpenVPN client that is signed by the developers. Our users are encouraged to use a VPN client of their choice.
We do not offer custom applications at this time. We have full control over our servers. Servers are housed in reputed data centers.
Many of them are ISO certified and are designed to the highest specifications for performance, reliability, and security. Our gateway servers operate out of an encrypted RAM Disk volume that loads remotely on boot.
When they are powered down, the RAM Disk is lost. We operate as two separate companies. Octane Networks is a US registered company and handles customer-facing communications.
The infrastructure company is a Nevis-based company and manages all the network infrastructure. We use Google Analytics for general website trends.
If we receive a DMCA notice or its equivalent based on activity that occurred in the past, we respond that we do not host any content and have no logs.
No customer data is used to respond to DMCA notices. This has not happened. We would handle a court order with complete transparency.
A court order would likely be based on an issue traced to a gateway server IP address and would, therefore, be received by our network operations company which is Nevis based.
The validity of court orders from other countries would be difficult to enforce. The network company has no customer data and no log data, so if it were compelled to respond to a court order, our response would likely lack the type of information requested.
Our marketing company is US-based and would respond to an order issued by a court of competent jurisdiction. The marketing company does not have access to any data related to network operations or user activity, so there is not much information that a court order could reveal.
We operate with net neutrality with the exception of restricting outgoing SMTP to prevent spammers from abusing the service. We allow customers to edit their account information.
Our system is proactive vs a reactive kill switch. In our more active gateway locations, we colocate. In locations with lower utilization, we normally host.
All of our network infrastructure is set up so that each gateway boots, creates an encrypted RAM Disk, and authenticates with a central server before loading its configuration over our encrypted network remotely.
The individual gateways only have a boot script — no data or config information is on the individual gateways.
If we lost access to a gateway due to a third party action, the encrypted RAM Disk would vanish upon powering down.
We have gateways in 45 countries and 92 cities. We do not log any information about IP usage, in fact in most locations we NAT everything so it is not even possible to be able identify a requester and a user account and a source IP.
We utilize a tracking cookie for affiliate sales that expires in 30 days. We use SendGrid for email which sends out the welcome and support emails, but email information is never shared with another 3rd party.
We respond and have internal processes that deal with these requests that do not include or disclose any customer information.
We provide DNS leak protection. All dynamic routing is turned off to use static routing. We have also been audited by one of the finest independent security experts, Leon Juranic, who has certified us to be completely log free.
Our landing pages, which are solely used for advertising purposes, include a limited amount of third-party tracking scripts, namely Google Analytics.
However, no personal information that could be linked with VPN usage is shared with these providers.
In case we are forced to store user logs, we would prefer to close down rather than putting our users at risk who have put their trust in us.
There is no effective way of blocking file-sharing traffic without monitoring our customers which is against our principles and would be even illegal.
All payments are handled by external payment providers and are linked to a temporary payment ID. After the payment is completed, the temporary payment ID will be permanently removed from the database.
We follow cryptographic standards and configured our VPN servers accordingly in order to support a secure key exchange with bit keys and a strong symmetric encryption AES for the data transfer.
Our Windows client has the features such as kill switch, Auto Connect, Auto Reconnect etc which makes sure that the user is always encrypted and anonymous.
Even if one of our customers decides not to use the client, in our community there is a big variety of tutorials to help our customers to protect themselves against any sort of leaks.
Above all, we have put in some additional layers of security which include default protection against IP and DNS leaks. We operate 32 server locations in 27 different countries.
However we do not own physical hardware, there is an intrusion detection and other various security measures in place to ensure the integrity and security of all our single servers.
We choose all third party hosting providers very carefully, so we can assure that there are certain security standards in place ISO and no unauthorized person could access our servers.
Our servers are located in countries all over the world, among the most popular ones are Canada, Netherlands, Singapore, Germany, Brazil, Mexico and Australia.
Below is the complete list of countries, alternatively you can view all available locations here. No court order or magistrate decree has ever been issued to disclose the identity of any of our customers, but we will of course do our best to comply with a valid and jurisdictionally competent magistrate decree or order.
Up to now, no personal information has ever been given away, while data about traffic is not even kept by us we do not inspect, log or monitor traffic in any case.
We do not discriminate against any protocol. Our infrastructure is totally agnostic and we do not even monitor traffic to see which protocols are being used.
We accept Bitcoin, a wide range of cryptocurrencies, PayPal and major credit cards. When this is unacceptable for security reasons, then Bitcoin or some other cryptocoin should be used.
Bitcoin is not anonymous by itself, but it can be provided with a rather good anonymity layer simply by running the Bitcoin client behind Tor.
On top of that we also accept some cryptocurrency which offers intrinsically and by default a strong anonymity layer protecting the transactions.
In general, we would also recommend to be cautious and get well documented before jumping to ECC. Our service setup, based on OpenVPN, is the following:.
After the initial key negotiation, re-keying is performed every 60 minutes this value can be lowered unilaterally by the client. We block outbound IPv6 packets at the moment on client side a solution preferred over disabling IPv6, which remains anyway an optional feature.
In we planned IPv6 support for half or late and at the moment we are fine with this deadline. Our servers are housed in data centers which we have physical access to, provided that the access is arranged well in advance for security reasons.
Access to servers is also guaranteed to the data center technicians, for any need of on-site support. We have servers located in several countries.
We offer a public real-time servers monitor in one of our web pages which provides a lot of information including location, of course for each server.
We store no logs related to any IP address. There is no way for any third-party to match user IP to any specific activity in the internet.
For outgoing email we use our own SMTP server. Since no information is stored on any of our servers there is nothing that we can take down. HideIPVPN may disclose information, including but not limited to, information concerning a client, a transmission made using our network, or a website, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation, or governmental request.
This has never happened so far. We also have a specific VPN plan for torrents. Our apps can re-establish VPN connection and once active restart closed applications.
Also, the app has the option to enable DNS leak protection. Our VPN servers have been checked against those issues.
Users were warned about DNS leak danger. Yes, we recommend to our customers to use our free VPN application for an easier, faster and better connection.
Servers are outsourced in premium data centers with high-quality tier1 networks. We do not watch what our users do online, neither record their Internet activities.
For billing purposes, order IP addresses of users are stored permanently. Yes we use several third party vendors, such as Zopim for online chat messages and Picreel for promotional purposes.
In most cases DMCA emails are ignored. PayPal, Credit cards, webmoney, Paymentwall, Bluesnap. We do not keep such data logs. We do not handle DMCA notices, our data center partners do, and in all cases we do not keep logs so we cannot identify the customer.
We accept various payment methods: All are linked by an email. We are currently deploying our Ipv6 network across our servers. Our application also offers various features such as a Kill switch.
Our application is open-source and can be found on github. We have servers in around 33 countries and we try our best to expand to locations most requested by our customers.
Our entire infrastructure and VPN service is built to ensure that no logs can be stored — anywhere. Our servers are locked in cabinets and operate without any hard drives.
For website insights, we use Piwik, an Open Source solution that we host ourselves. For support, we use an internally built system. The mail server is hosted by Glesys, a trusted provider in Sweden.
Automatic emails from the website are sent using Mailgun, but we never send any sensitive information via email.
No court orders have ever been received. However, the police have contacted us numerous times regarding whom had a specific IP address at a particular time.
We published an open letter to the Swedish police to disclose that we are unable to provide any user information they request.
We also have an insurance that covers trial expenses enabling us to take any requests to court in case an agency doubts our truthfulness.
We recommend all users to pay anonymously. We tunnel both IPv4 and IPv6 and therefore no leaks should happen. Our custom client has DNS leak protection as well as a killswitch to ensure our users safety.
Yes — we own all the servers used to operate OVPN. Our servers are locked in separate cabinets in each data center. However, using physical force one could break open the cabinets and therefore get physical access to our servers.
To mitigate these extreme scenarios we have focused immensely on the physical security of our servers. Someone can literally be standing right next to our servers and will still fail to extract any data.
We do not log or store any traffic, IP addresses, or any other kind of data that would allow identification of our users or their activities.
The anonymity and privacy of our users are our highest priority, and the Perfect Privacy infrastructure was built with this in mind. All email and support tools are developed and hosted in-house under our control.
We do use Google Analytics for website optimization and better market reach, but with the anonymizeIp parameter set. However, Perfect Privacy users are exempted from any tracking by Google Analytics and are also able to use our TrackStop filter which will block any tracking as well as ads and known malware domains directly on our servers.
Because we do not host any data, DMCA notices do not directly affect us. However, we do receive copyright violation notices for filesharing in which case we truthfully reply that we have no data that would allow us to identify the party responsibly.
The only step on our side is to inform the contacting party that we do not have any data that would allow the identification of a user.
There had been incidents in the past where Perfect Privacy servers have been seized but never was any user information compromised that way.
Since no logs are stored in the first place and additionally all our services are running within ramdisks, a server seizure will never compromise our customers.
Yes, Bittorrent and other file-sharing is generally allowed and treated equally to other traffic. However, at certain locations that are known to treat copyright violations rather harshly very quick termination of servers , we block the most popular torrent trackers to reduce the impact of this problem.
Currently this is the case for servers located in the United States and France. We offer a variety of payment options ranging from anonymous methods such as sending cash, or Bitcoin.
However, we also offer payment with PayPal and credit cards for users who prefer these options. We keep no data about the payment except for when the payment was received which is linked only to an anonymous account number.
Additional security can be established by using a cascaded connection: At the time of this article, the Linux, Mac and Android clients are still in open beta.
More functionality will be added to these clients in the near future. Our VPN servers run in various data centers around the world.
While we have no physical access to the servers, they all are running within RAM disks only and are fully encrypted.
We offer servers in 23 countries. For full details about all servers locations please check our server status site as we are constantly adding new servers.
That never happened before. Our primary focus is torrent and file-sharing traffic. We treat file-sharing traffic like any other traffic.
With TorrentPrivacy you get a full spectrum of security measures to protect your data. You can choose what is right for you from these protocols: And if that was not enough more encryption protocols are available.
No DNS leaks were registered by any of our users. When the connection drops for some reason, all downloads stop, so no information is exposed.
Ivacy believes in anonymity and therefore we do not maintain user activity logs. We come across encrypted credentials in this process. The process is fully automated and we keep this info till the user is connected.
It is automatically deleted as soon as user disconnects from our server. Our headquarter is based in Singapore; one of the few nations without mandatory data retention laws.
Working out of the region allows us to further ensure the anonymity of our users- something we hold very dear. At the present moment in time, there seems to be no legal hindrance or government intervention that could harm our reasoning behind working out of Singapore.
Moreover, working from Singapore, one of the few nations without mandatory data retention laws, allows us to further ensure the anonymity of our users.
We have not come across such an event, but if we do receive any legal notice, we cannot do anything more than to ignore it simply because they have no legal binding to us.
Since we are based in Singapore, all legal notices have to be dealt with according to Singapore laws first. Again, such a scenario has not presented itself yet.
We do not log any traffic or session data so we cannot identify and connect a specific activity with a particular user of our service. Apart from the aforementioned payment methods, we also accept more than region based payments through PaymentWall.
When a customer places an order, we immediately send a payment confirmation email to let him know that he has placed an order successfully. Then our merchant takes over and verifies the information given by the customer and lets us know whether to deliver the order or not.
This process normally takes typically from 5 — 60 minutes. We offer and recommend bit encryption in addition to SSL based protocols i.
Customers can enable it via settings; and we highly recommend them to do so. Soon we are launching same for Mac and iOS devices. Yes, we offer custom VPN applications to our users.
Other locations are hosted with third parties until we have enough traffic in that location to justify racking our own server setup. We host with multiple providers in each location.
We have server locations in more than forty countries. In all cases, our network nodes load over our encrypted network.
Yes, we have our own DNS servers. We have servers located in more than 40 countries. You can find the complete list of servers here.
We only ask Name and Surname on registration process but we are not going to verify it. We use marketing tools like Google Analystics for marketing purpose and improving customer experience.
We accept a large number of differents payment methods: Local payments are liked only if they have recurring subscriptions. We are implementing kill switches on all our apps.
Because we offer from more than 50 countries we do not have physical access, but they are hosted on trusted data centers.
We have a session management system that tracks which users are logged into which servers, however that system operates on real-time data and does not log events.
We have not yet received such a court order or subpoena for user information. However, if we do in the future, we will take several steps.
Then we would alert our user of the event if we are legally able to. If we DO have the information requested, we would immediately reconfigure our systems to stop keeping that information.
When a user selects a payment method our system will remember that payment method and link it to their account. This protects our servers from a wide range of attacks on the encryption.
This includes DNS traffic. You will leak a significant amount of traffic if we did not push you a default route for IPv6. We do not offer a custom VPN application.
Instead, we instruct our users to install an OpenVPN client of their choice from a trusted source i. All of our infrastructure is hosted in 3rd party colocations.
However, we use full-disk-encryption on all of our servers. We do not store logs relating to traffic, session, DNS or metadata.
We are using Live chat provided by Tawk. If we receive a valid DMCA notice we can only take action if the connection is still active we notify the user and stop the session.
If that happens, the agency will be informed that no user information is available as we DO NOT keep logs. We do not store any billing information such as credit cards or addresses.
All our VPN servers are hosted in 3rd party data centers with the highest specifications for performance, reliability and security. We have direct access to each server and they all are running within RAM disks which are fully encrypted.
We do not keep any logs whatsoever. We even have an anonymous token-based authenticating system. We are a not-for-profit unit part of offshore-based digital incubator Three Monkeys International Inc.
Everything else, from support to billing, is organised in-house. We do not use any CRM, and we do not have any advertising or marketing channel.
We only rely on word-of-mouth. We immediately block the affected port on the related node, and then we publish the notice to both our Transparency Report and our Twitter account.
In the event we are restricted from releasing it, we make use of our warrant canary. We respond that we are unable to identify any of our users, but that our premises are open for inspection by any forensic expert.
We also inform our members through Twitter and our transparency report about the situation. In case we are unable to speak, we make use of our warrant canary and warn our users that we updated the latter.
Finally, we make sure to drop the VPN node as soon as it is possible. This has happened once. There is no recurring subscription, and all billing information is processed by the gateways: Both are available directly within our custom-made, open-sourced OpenVPN client.
Also, we use our own physical servers in friendly data centers for our core services and our biggest VPN nodes.
Our VPN network is also supplemented with a variety of bare-metal dedicated servers or virtual private servers across the world.
We provide VPN nodes in 57 countries, across more than locations. We do not keep any logs. We do not keep information on our users and are unable to identify the user belonging to the notice.
We provide the information we can correlate from the court order, which is zero. Because we do not log the information pointing to an IP address of our servers, it does not denote a specific user.
Users are provided shared IPs so traffic is mixed between them. DNS Leak fix is on by default. The main infrastructure is colocated and owed by VPNSecure, remote endpoints are leased servers, these are configured with encrypted folders meaning any third-party that tried to access the server would be unable to access any VPN specific information.
The privacy of our customers is our top priority. Under no circumstances are we going to log, monitor or share any information about our customers.
No external payment processor receives any information because all payments are processed by our own payment interface.
These settings offer you the highest grade of security available. We fully support IPv6 internet connections. We plan to offer a version for Linux, Mac and mobile devices.
We rent 35 servers in 25 countries and are continuously expanding our server park. It is impossible to have physical control over all widespread servers, but we have taken security measures to prevent unintended server access.
At the moment we are using excellent anycast nameservers of UltraDNS. You can find our server list under the following link. We are located in Romania, which means we are under EU jurisdiction.
For the secure part of our web site the back end we do not use external e-mail providers we host our own mail server and we host a dedicated WHMCS installation for billing and support tickets.
To provide quick support and a user-friendly service experience, our users can contact us via live chat Zopim but activity logs are deleted on a daily basis.
That is normal considering that the servers are located in DMCA-free zones. Before we allow our clients to use a P2P server we test it for several months in order to make sure that the speeds are fine and we do not receive any complaints from the server provider.
So far, we have not received any valid court orders. As stated in our TOS, we do not support criminal activities, and in case of a valid court order we must comply with the EU law under which we operate.
Based on our legal research, we consider that it is NOT safe for our users to allow such activities on servers located, for example, in the United States or United Kingdom.
Payments are performed exclusively by third party processors, thus no credit card info, PayPal ids or other identification info are stored in our database.
When enabled, the Kill Switch closes all applications that are running and have been added to the Kill Switch app list in case of an unwanted VPN disconnection.
Our latest applications allow customers to disable IPv6 Traffic, to make sure that only our DNS servers are used while connected to the VPN and there is an option that filter the DNS requests by using the firewall — to avoid leaks.
We do not have physical control over our VPN servers, but we have full control to them and all servers are entirely managed personally by our technical staff.
Admin access to servers is not provided for any third party. Our servers are located in dozens of countries. A full list is available here.
All we need from users is just an email to sign up. No names, no personal info, no tracking, no logs. Zone is under Seychelles jurisdiction and we operate according to law in Seychelles.
There is no mandatory data retention law in Seychelles. The company is operated by Extra Solutions Ltd. Zone does not use any third-party support tools, tracking systems like Google Analytics or live chats that hold user information.
Zone is under Seychelles offshore jurisdiction. The laws of Seychelles are very friendly to Internet users. A court order would not be enforceable because we do not log information and therefore there is nothing to be had from our servers.
Zone has not received or has been subject to any searches, seizures of data or requirements to log any actions of our customers.
Zone does not throttle or block any protocols, IP addresses, servers or any type of traffic whatsoever. All major credit cards are accepted.
Besides, Bitcoin, PayPal, Webmoney, Alipay, wire transfer and many other types of payments are available.
To stay completely anonymous, we highly recommend using anonymous payments via Bitcoin. Zone uses the highest level of data encryption.
The most unique feature of Trust. Zone uses AES Encryption by default. Zone offers a kill-switch. Zone has no support for IPv6 connections to avoid any leaks.
We also provide users with additional recommendations to be sure that there are no any DNS or IP leaks. Zone provides users with one-click, easy-to-use application for Windows.
We have a mixed infrastructure. Zone owns some physical servers and we have access to them physically. In locations with lower utilization, we normally host with third parties.
But the most important point is that we use dedicated servers in this case only, with full control by our network administrators.
We also may use Google DNS depending on platform. The full map of the server locations is available here. Zero, zip, zilch, nada. We have nothing to share with authorities, even if we felt compelled to.
We operate as Doublehop. We do not use any external visitor tracking services such as AdSense. We use Mandrill to deliver email automatically when orders are placed.
In the interest of full disclosure, please be advised that Mandrill provides analytical statistics relating to email e.
We disable these features unless we are doing web development and need to quickly confirm that changes do not impact email delivery.
We also permit registration via Telegram Messenger as a more secure alternative to email. A Telegram message is automatically sent to confirm an order and payment.
We use Amazon S3 to provide access to client certificates. Files are protected in transit by TLS and at rest by server-side encryption. D We have nothing to share with authorities, even if we felt compelled to.
Yes, P2P is permitted on all Doublehop VPN servers and treated equally to other traffic, although we encourage our users to avoid using USA-based exit nodes for such traffic.
Since we do not require our clients to reveal their identity to use our services, paying with Bitcoin offers privacy when used properly.
A new Bitcoin address is generated for each order, and monitored for 72 hours before being scrubbed from the order details.
Our VPN clients see: No, the standard OpenVPN client is more transparent and open to peer review. Some VPN providers offer custom software that can introduce security issues or store connection logs.
We use dedicated servers that employ RAM disks, software based full disk encryption, or hardware-based full disk encryption, depending on their role and specifications.
Traffic between nodes is multiplexed, defeating passive correlation. And furthermore, Doublehop VPN doubles security and privacy with double hops across multiple legal jurisdictions, to disrupt potential investigations.
By default, we use Google DNS to ensure that users receive localized content from the exit node chosen. This is especially important when it comes to streaming e.
We do not record or store any logs related to our services, specifically speak, no traffic, DNS or metadata logs are stored.
We are located in Australia, and are one of the very few true aussie based virtual service providers. We run under Australian jurisdiction.
Google is the only external based system we use. We make standard use of Google Apps and Google Analytics. All other support tools are kept internal for our users and visitors.
As we do not keep any records of activities, nor do we host and content. As such we are unable to remove content that does not exist.
In the event that a DMCA notice is received by our abuse team, it is processed accordingly, however no forwarding of user details has ever occurred.
All notices are carefully examined when received. We have never passed any customer related information across to a third party, as we simply do not store records of activity.
Our systems use shared IP addresses which means we are unable to identify individual traffic. We have also not received any valid court orders. All web activity, including BitTorrent and P2P is allow by all our servers by default.
We do not limit or block any traffic across any of our servers. We currently accept all forms of credit card payments through the payment gateway Stripe.
PayPal is also an alternative method. We keep billing independent from our system, it is handled with only a basic reference of whether our customers have paid or not using reference codes.
We currently run up to AES encryption. We do not support IPv6 connections currently. We do plan to add DNS leak and kill switches directly into our custom app in the future.
We have a proviso on the page to disable IPv6 connections for all client side connection methods eg. Yes we have a custom VPN application.
At this point in time, we support the Windows platform, however mobile and other OS platforms will be added in the future to allow ease of use and access for any user on any device or platform.
Our VPN servers are virtual, and also hosted by a diverse range of third party providers. We ensure that no logs and no credentials are stored. We have direct access to each system and we ensure that only hashes on servers.
Rather than having a large number of systems, we have a limited number of locations to ensure quality over quantity. We currently provide the following service locations: We also still expanding our locations, and plan to have a VPN system in every state of Australia, as well as all the major countries, and we expand based on customer demand.
ShadeYou VPN does not keep any logs. To use our service only a username and e-mail are required. No personal or real data is required.
We are using Google Analytics as a tool which allow us to improve our website and bring our users better experience. Also we are using SiteHeart online support.
Sharing any personal data of our users is absolutely impossible since we do not store it and do not keep any logs. Yes such kind of situation has happened but there is not even one existing case when we have shared any information about our users with any 3rd parties.
BitTorrent and any other file-sharing traffic is allowed mostly on all our servers. Of course Bitcoin is available. We are not working with IPv6 at the moment but we are working on it.
Yes, we offer our own application which is available on the Windows OS. It is very simple and easy-to-use. Mobile clients are developing at the moment.
Yes, we are using our own DNS servers. Servers are running under their local jurisdiction and have to follow local laws. We have never received any valid court order or subpoena.
No references are left after transaction with Crypto Currency and you can always ask us to update your payment id.
This offers protection against IPv6 leaks. If we have a valid order from Canadian authorities we have to help them identify the user.
We have not received any orders yet. Yes, we have these features. For now we do not support IPv6. We store total amount of bandwidth your account has consumed in 1 month period, which is reset every month on the day of your registration.
This is used to enforce free tier limitations as you can use Windscribe for free as well as prevent abuse. We do not store historical usage.
We do not rely on any 3rd party tools. Website analytics are collected via self-hosted Piwik instance, and the helpdesk is powered by an open source version of osTicket, which is also hosted in-house.
Since we have no logs to link this kind of activity to any single user, we simply notify the sending party of this fact. Although we never received a valid court order for user data, we received multiple subpoenas from various law enforcement branches of governments.
Our response is always the same: We simply block known torrent trackers in that location. Transaction IDs are discarded after they are verified to be legitimate payments.
We support perfect forward secrecy. This is the only configuration we offer. Our desktop application comes with a built in firewall, which blocks all activity outside of the tunnel.
If your connection drops, any external connectivity is blocked by default, which guarantees that there will be no leaks. The same firewall also blocks ipv6 and WebRTC requests from leaking.
Each node is configured as a DNS server, which is only accessible via the tunnel over a LAN ip, this guarantees that requests will be made over the tunnel, with no chance of leaks.
Our browser extension blocks ads, trackers, social widgets, and rotates the user agent. This allows for much greater level of privacy, as a VPN alone will not give you the level of protection that is typically advertised.
We lease dedicated machines from 3rd party hosting providers world wide. We operate servers in 45 countries, which are listed here. The most important part of that attitude is depicted in our strict No-Logging-Policy.
We neither store connection nor usage logs. The only traffic related information that we do store is the amount of bandwidth used with free user accounts.
This information is stored temporarily for the time span of 30 days and purged automatically after that time period. Everything is in-house developed and run on our own dedicated servers that we configure and manage.
We process all DMCA notices by explaining, that we are not able to identify a certain user due to our zero logs infrastructure.
We have never received a court order requesting us to identify a user of our service. If we ever receive such a request, it would be impossible for us to comply as we do not keep any logs.
Yes, we allow all BitTorrent and P2P traffic. We do not limit or block this kind of traffic as long as it complies with our Terms of Service.
In the past we were able to handle all payment needs of our users. With the help of a request via our livechat, they were also able to pay in cash money or alternative cryptocurrencies like Monero.
The only data linked to the user account is the payment status of the individual subscription. No further data is attached the subscription nor linkable to the user online activity.
Personalize the gift by leaving your own personal message. You can easily redeem a Spotify code on you Spotify or Facebook account on spotify. You can also use our redeem page , the link redeem page or redeem the code manually:.
Xbox Live Gold Gift cards. Guild Wars Gift cards. League of Legends Gift cards. Google Play Gift cards. Karma Koin Gift cards.
Visa Mastercard Gift cards. Spotify code delivered directly by email. Directly delivered by email. Direct geleverd per e-mail.
What is Spotify Premium? Do you want to give Spotify to a friend?