Home » Featured » “No Logs” VPN Provider Shared Logs with FBI
Click Here To Hide Tor

“No Logs” VPN Provider Shared Logs with FBI

Many Virtual Private Network (VPN) providers offer their services while making claims that they do not log traffic, IP addresses, and other user information. Some VPN providers are being honest when they make the claim that they don’t log IP addresses, but others are not being truthful with their customers. In an affidavit released by the Department of Justice, the FBI accused 24 year old Ryan Lin of Massachusetts of committing acts of cyberstalking and online harassment of another 24 year old Massachusetts woman. The affidavit against Lin was submitted to a federal magistrate by FBI Special Agent Jeffrey Williams.

The FBI alleges that Lin used encrypted and spoofed e-mail accounts and services, as well as a variety of anonymization services. Law enforcement officials believe that Lin is responsible for registering and using multiple social media accounts, e-mail accounts, and mobile phone accounts. According to the FBI’s affidavit, the accounts were accessed “by someone using VPNs, TOR, and proxy computers to hide their true IP address.” Lin is said to have extensively utilized a Protonmail account during the alleged cyberstalking and online harassment. Prosecutors even bring up the fact that Lin had publicly talked about anonymization services such as VPNs.

Ironically, the example that the FBI uses to show that Lin was familiar with online anonymization services is a Twitter message in which Lin declares that there is no such thing as a no logs VPN. “There is no such thing as a VPN that doesn’t keep logs. If they can limit your connections or track bandwidth usage, they keep logs,” Lin tweeted from his former Twitter account, @ryanlindev. Lin was replying to a tweet from the VPN service provider IPVanish that stated how the company had “a strict zero log policy” because the company cares about user privacy. While Lin thought there was no such thing as a “no logs” VPN, some VPNs actually do disable the logging of user information.

Law enforcement agents were able to identify Lin after they had obtained logs from the VPN service provider PureVPN. “We do NOT keep any logs that can identify or help in monitoring a user’s activity. You are Invisible – Even We Cannot See What You Do Online,” the privacy policy page of PureVPN boasts. The PureVPN privacy policy page continues, stating, “We Do Not monitor user activity nor do we keep any logs. We therefore have no record of your activities such as which software you used, which websites you visited, what content you downloaded, which apps you used, etc. after you connected to any of our servers.” The page then goes on to contradict itself by stating that PureVPN records the connection times, bandwidth use, the user’s real name, e-mail address, and phone number. The privacy policy also states that PureVPN can change the privacy policy at any time.

Lin had extremely sloppy security practices, which led to his downfall. According to logs provided to the FBI by PureVPN, Lin had accessed his own personal email account with Google and the accounts which were being used for the cyberstalking and online harassment from the same IP address. The PureVPN logs showed that Lin had been logging in from his home internet connection, as well as logging in from an internet connection at a software company he had been working. Law enforcement officers were able to determine that Lin had also used a second VPN service provider, WAN Security, which was also used by whoever was committing the acts of cyberstalking and online harassment. Lin had accessed his personal Google email account and registered an Instagram account while using the WAN Security VPN. Lin had even sent an email to his local police department seeking copies of a police report while connected to one of the VPNs he had allegedly used to commit the harassment.

We encourage readers to check out DeepDotWeb’s Best VPN Service Comparison Chart.


  1. PureVPN wasn’t reliable to begin with.

  2. PureVPN … That’s the primary info readers want. The case details are great, but why make us read half the story to get the name of the provider?

  3. Well, it was nice of you to finally tell us which VPN to avoid. After three paragraphs of filler. Click-bait titles are not a smart idea if you want to keep page views above 0!

  4. Mullvad is the way to go. So make a referral for them ddw that way you will actually post this.

  5. How did he get caught by local police with a vpn combined with tor. Smells fishy

  6. He had bad OPSec, the dumbass used PureVPN first of all, but he also made numerous fatal mistakes such as using both his dirty account and his personal account with the same IP address from the VPN.


    He for sure was from HackForums LOL

  7. i think when situations like this occur, the user may denounce the VPN provider for failing to comply with the contract rules. I pay for being anonymous and if the provider does not guarantee this I can compete from a legal point of view

  8. murderhomelesspeople

    Any VPN can be compelled by warrant from their local law enforcement to start keeping logs, there’s just no way around it. Better to use Whonix or Qubes if you want more security, VPN just can’t be trusted.

  9. Purevpn sucks, fake vpn with logs

  10. Lets bring the old debate back

    VPN -> TOR -> Internet


    TOR -> VPN -> Internet

    The later would be my choice. Tunnel your VPN through TOR so the VPN data center only logs the TOR exit node as the connection.

    Technical challenge, but possible.

  11. There isn’t a safe way, try to use TAILS, and things ready better…

Leave a Reply

Your email address will not be published. Required fields are marked *


Captcha: *