VPN firm that claims zero logs policy leaks 20 million user logs:
The VPN company in the discussion is a Hong Kong-based UFO VPN owned by Dreamfii HK Limited.
[...] Discovered by researchers from Comparitech on July 1st, 2020; the exposure occurred due to the database hosted on an Elasticsearch cluster being left without any password.
[...] Worth 894 GB, the data allegedly included plaintext passwords, IP addresses, timestamps of user connections, session tokens, information of the device, and OS being used along with geographical information in the form of tags.
[...] This, as Comparitech has rightly pointed out, goes against the service provider's privacy policy and the promises of a zero log policy it has communicated to its users:
UFO VPN does not collect, monitor, or log any traffic or use of its Virtual Private Network service, under any circumstances, on any platform.
(Score: 2, Funny) by fustakrakich on Saturday July 18 2020, @04:02AM (13 children)
So, what's left? Where do people find a secure connection? The Sunday classifieds are probably still the best way to hide a message
La politica e i criminali sono la stessa cosa..
(Score: 1) by Zinnia Zirconium on Saturday July 18 2020, @04:55AM (12 children)
Run your own VPN server and turn off your own logs.
(Score: 2) by jasassin on Saturday July 18 2020, @05:14AM (10 children)
What? Are you serious?
jasassin@gmail.com GPG Key ID: 0xE6462C68A9A3DB5A
(Score: 2, Funny) by Zinnia Zirconium on Saturday July 18 2020, @05:28AM (9 children)
I'm doing it right now. And because I'm running my own VPN server on a VPS registered to me and paid for with a credit card in my own name that means I'm getting none of the cover-your-ass-by-hiding-in-a-crowd protection that most people expect when they think of the letters V P N. But hey at least I know I'm not logging me.
(Score: 2) by Bethany.Saint on Saturday July 18 2020, @11:53AM (1 child)
But ... how do you do illegal things without it being traced backed to you?
(Score: 0) by Anonymous Coward on Saturday July 18 2020, @05:01PM
That's not what a VPN is for... A VPN is for ComSec
(Score: 2) by maxwell demon on Saturday July 18 2020, @01:37PM (6 children)
Actually, if you provide VPN for anyone without keeping log files, then of course you can use your own service also yourself. And without logs, no one can prove that it was you who did those things, rather than one of your customers.
The Tao of math: The numbers you can count are not the real numbers.
(Score: 2) by hendrikboom on Saturday July 18 2020, @02:57PM
Unless they use a warrant to enter your premises and confiscate the devices where you stored the products of your illegal acts.
-- hendrik
(Score: 0) by Anonymous Coward on Saturday July 18 2020, @08:23PM (3 children)
Customers/users are charged to cover expenses and make a profit. The AI would hire consultants + lawyers to do stuff like "reproduce" aka make other independent similar entities - because inevitably the parent entity would eventually get corrupt (consultants or lawyers screw up or successfully betray the "trust" despite safeguards) or "die" via some accident etc.
For bonus points have the AIs pick mates and share "genes" (sex) when reproducing.
(Score: 0) by Anonymous Coward on Saturday July 18 2020, @10:21PM (2 children)
The very act of creating a legal entity requires making some other legal entity responsible for its actions. And unlike the Earth, it cannot be turtles all the way down.
(Score: 1) by khallow on Sunday July 19 2020, @03:06AM (1 child)
(Score: 2) by fraxinus-tree on Monday July 20 2020, @07:15AM
You don't have to try that hard.
There is still quite a few jurisdictions where one can create a company A owned by company B which is in turn is owned by company A.
Usually done for debt "management", but you can use your imagination.
(Score: 2) by corey on Sunday July 19 2020, @04:15AM
What about buying some cloud server time, set up a VPN on it and then the recipient only sees AWS or Azure.
Use a weak password so the deniability is someone else got in and abused the VPN, for if shit hits the fan.
(Score: 2) by Opportunist on Saturday July 18 2020, @08:19AM
Preferably via servers that belong to someone else and you compromised so you're not going to be held responsible for not having logs when the feds collect it.