"We can disclose only now that we had a server in Toronto seized in 2015, initially without our knowledge. Maybe a court order was served to the datacenter. For about 10 days we did not understand what happened to the server, which did not respond, while the datacenter did not provide information. After 10 days Italian police (and not any magistrate) contacted us. They informed us that Toronto police and FBI (*) asked for our help because they could not find any log in the server. Unfortunately their help request came after the server had been already seized. They did not even make a copy, they took it physically, therefore the server went offline, probably alerting the alleged criminals. It was obvious that forensic analysis could not find any log, simply because there were none. Our VPN servers did not even store the client certificates, go figure (now they also run in RAM disks, but in 2015 they did not). The whole matter was led by informing us without any document from any court or magistrate, but only through official and informal police communications, and only to ask for help after forensic analysis obviously failed completely.
We were not asked to keep confidentiality on the matter, but just to stay on the safe side and support the investigation on what it appeared as a serious crime (a whole database with personal information of a commercial service was cracked, stolen and published in public when the web site owners did not pay a “ransom”; while our server was apparently not used for the crack, it was used to upload elsewhere the database) we decided not to disclose the whole matter for at least 7 years. It’s one of those cases confirming that our servers do not store log, data or metadata of clients’ traffic.
(*) We may speculate that FBI was involved in a Canadian matter because the stolen database contained US citizens’ personal data"
Such a strange comment.
Surely they kept it private because it’s bad for business. Then they randomly respond with this on a forum post?
I dunno, if my VPN came out and said “heads up, one of our servers was seized and you have literally nothing to worry about because nothing is stored or logged on our servers,” that’s good news IMO. Obviously the best case scenario is not having it seized, but sometimes that’s not possible, and it’s a mark of a good VPN when the consequences to you of a server being seized are the same as if it wasn’t (i.e., none).
Yeah disclosure is always good its just odd the way they handled it
-no official post (yet)
-makes the announcement as a reply to a forum post even though they have a specific forum thread for this exact thing
-all of a sudden has a 7 year wait time on disclosures policy
-not written very professionally (i tend to assume english is a 2nd language for the staff but still as an orginization the staff should be a bit more refined).
I’m a user of airvpn. I like them but they do odd things like this, or being very obtuse about why they wont get audited.
deleted by creator
I agree, if they said this 7 years ago…
Yeah the whole thing is odd, especially since they disclosed it as a response instead of in the disclosure thread the first comment mentioned.
What else has happened in the 7 years that they haven’t bothered to mention? Absolutely NOT handled well as timely disclosure is a key part of that.
Exactly that. I don’t use that service but the past 7 years could have seen dozens of other events like this with less harmless outcome, and its clear they would not report these either.
Especially the way they snake around why they didnt disclose it. “We can only disclose now”. Why? They made it clear they didn’t receive a court order or anything that would prevent them. They specifically mention that it was only an informal phone call from a police department.
deleted by creator
deleted by creator
Yea. Seems odd they didn’t make a blog post, but seems like the situation was handled quite well.
Honestly good to hear. This is how all VPNs should handle user data.