Ξ welcome to cryptostorm's member forums ~ you don't have to be a cryptostorm member to post here Ξ
∞ take a peek at our legendary cryptostorm_is twitter feed if you're into that kind of thing ∞
Ξ we're rolling out voodoo network security across cryptostorm - big things happening, indeed! Ξ
Ξ any OpenVPN configs found on the forum are likely outdated. For the latest, visit GitHub Ξ

cryptostorm: our privacy policy

Looking for a bit more than customer support, and want to learn more about what cryptostorm is , what we've been announcing lately, and how the cryptostorm network makes the magic? This is a great place to start, so make yourself at home!
User avatar

Topic Author
cryptostorm_team
ForumHelper
Posts: 159
Joined: Sat Mar 02, 2013 12:12 am

cryptostorm: our privacy policy

Postby cryptostorm_team » Wed Aug 21, 2013 6:49 am

{direct link: privacy.cryptostorm.org}


Most of our published commitments regarding customer loyalty and operational security procedures can be found in our Terms of Service, so if you're interested in these questions we suggest a review of those as a starting point. However, it's also traditional to have a separate "privacy policy." We would gladly buck such tradition, as we often do... but instead here's our concise alternative version:

Frist, the best way to retain - and respect - privacy is to avoid the disclosure of sensitive data in the first place. We created our groundbreaking token-based network authentication framework with this goal in mind. Via tokens, our network members connect to and make use of cryptostorm with no accounts, subscriptions, or interpersonal connection with us. More importantly, their payment for network access is completely decoupled from the network itself: tokens break the chain.

Second, we've modified the core source code of the openvpn application to remove physical IP address as an element of our member-session network administration, anywhere in our infrastructure. Thus we do not retain "logs" of member activity on the network because it is not possible to do so given the production environment we use. Our core team pioneered the "no logging" concept back in 2007, and we were roundly mocked back them for doing so - called "irresponsible" and "unreasonable" and so on. Nowadays, "no logging" is largely an empty marketing buzzword - everyone and their cat claims to run a "no-logging VPN service." Whatever. It's not a buzzword for us; it's a core foundation of our service, and always has been.

Third, our websites (like this one) are totally separate and live on entirely separate physical machines from our production network. That's also true for our in-house email system & associated files, as well as other secondary administrative systems (IRC, etc.). In these non-production systems, we often keep digital records: email messages we send and receive, webserver access data, and so on. None of it directly relates to network operations or member sessions, but we're still careful to minimise what we keep and protect what is there. Outside folks who want to be sure they don't leave a breadcrumbs trail in those files are encouraged to visit our sites from within secure network techniques, as per usual opsec procedures.

Fourth, and perhaps most centrally, the question of law enforcement (i.e. cops, LEO, etc.). We have a hard-earned reputation for absolute loyalty to our customers, our secure network, and to the fundamental importance of secure communications in the face of enormous surveillance regimes. This manifests in our 'privacy seppuku pledge,' our approach to team identification, and in our support for a wide range of activists, activist projects, and technological approaches to social diversity enhancement and protection. It also results from ample firsthand experience on the part of team members with the sharp edges of the police state. So we're not terribly cooperative when it comes to "demands" we betray our customers, sorry. We've been accused of showing "unwavering defiance" in the face of such pressure. Indeed.

No system is perfect, no team is perfect, no person is perfect, and nobody can promise you perfect safety, perfect privacy, or perfect security. What we can offer is our decades of front-line experience, our hard-won personal reputations for integrity, our track record over nearly 10 years in the "VPN industry" as a team, and our unwavering defiance of police state shenanigans. Also... a cryptographically robust, well-designed, well-run secure network.

That's what we've got. We hope it helps.

Cheers,

the cryptostorm team
cryptostorm_team - a shared, team-wide forum account (not a person)
PLEASE DON'T SEND PRIVATE MESSAGES to this account, as we can't guarantee quick replies!
--> feel free to use any of our other contact channels, or post in the support forum
cryptostorm: structurally anonymous, token-based, unlimited ☂ bandwidth, opensource, darknet data security for everyone!
keybase.io validatorsonename.io validatorsPGP key @ MITnetwork statuscryptostorm github
support team bitmessage address: BM-2cTMH8K5JnjbfSALjZtSkRWCLfc3Tr8GBV
support team email: support@cryptostorm.is
live chat support: #cryptostorm

Return to “cryptostorm in-depth: announcements, how it works, what it is”

Who is online

Users browsing this forum: No registered users and 2 guests

Login