VPN No-Logs Claims: Which Ones Actually Got Tested
VPN marketing is full of “we don’t log your data” promises. Some of those claims are legit, some are marketing fiction, and most have never been properly tested.
Here’s what we actually know about which VPNs can prove their no-logs claims.
The Gold Standard: Server Seizures
The best test of a no-logs policy is when law enforcement seizes servers and finds nothing. It’s happened a few times, and the results are instructive.
ExpressVPN had servers seized in Turkey in 2017. Authorities were looking for data related to an investigation. They found nothing useful because the servers genuinely didn’t have logs. ExpressVPN’s claims checked out.
Private Internet Access (PIA) has been tested in US court cases multiple times. In each case, they couldn’t provide logs because they didn’t have them. Court documents back this up - it’s not just marketing.
These real-world tests are way more valuable than any audit or company promise.
Independent Audits That Matter
Some VPNs have paid for independent security audits. The quality varies wildly depending on who did the audit and what they examined.
Mullvad has been audited multiple times by reputable security firms. The audits examined their infrastructure, code, and policies. Results consistently showed they’re doing what they claim - no activity logs, minimal metadata, actual privacy.
ProtonVPN (from the ProtonMail people) has undergone audits and publishes transparency reports. Their infrastructure is designed to make logging difficult even if they wanted to.
NordVPN got audited by PricewaterhouseCoopers after some security incidents embarrassed them. The audit was more thorough than typical marketing exercises, though it’s still not as convincing as a server seizure.
The “Trust Us” Category
Most VPNs fall into this category. They claim no-logs policies but haven’t been tested by either law enforcement or rigorous independent audits.
That doesn’t automatically mean they’re lying, but you’re taking them at their word. Given that VPN marketing is full of exaggeration and outright deception, that’s not a great position.
Some VPNs are owned by companies with questionable track records or unclear ownership structures. If you can’t figure out who actually owns the VPN you’re using, that’s a red flag.
What “No Logs” Actually Means
Even legitimate no-logs VPNs collect some information. They need to know which user is connected to which server to route your traffic. The question is whether they store that information and for how long.
Best practice is keeping minimal connection logs in memory only, deleting them when you disconnect. No permanent storage of who connected when from where.
Some VPNs claim “zero logs” but bury exceptions in their privacy policies. They might not log your browsing activity but still track connection times, bandwidth usage, or IP addresses. Read the actual policy, not just the marketing claims.
Payment Methods Matter
If you pay for your VPN with a credit card tied to your real name, the VPN provider knows who you are even if they’re not logging your activity. For actual anonymity, you need anonymous payment (cryptocurrency, cash, prepaid cards).
Mullvad accepts cash mailed to them anonymously, which is about as serious as you can get about not knowing who their users are. Most VPNs don’t go that far.
The Business Model Question
Free VPNs need to make money somehow. Often that means logging and selling data, despite privacy claims. If you’re not paying for the product, you are the product.
Even paid VPNs have incentives to collect data. More data means better ability to prevent abuse, optimize networks, or monetize their user base. The question is whether they resist those incentives.
Practical Recommendations
If you need a VPN for actual privacy (not just accessing region-locked content), stick with providers that have been tested: Mullvad, ProtonVPN, PIA, or ExpressVPN.
Understand that no VPN provides perfect anonymity. They’re part of a security stack, not a complete solution. Your browsing behavior, account logins, and other factors can still identify you.
For truly sensitive activities, you need more than just a VPN. Tor, proper operational security, and understanding your threat model all matter.
Verification is Hard
Even with audits and transparency reports, you’re ultimately trusting the VPN provider. You can’t personally verify their infrastructure or policies.
The best you can do is pick providers with track records of keeping promises, ideally proven through real-world tests rather than marketing claims.
For detailed technical analysis of VPN protocols and security, check PrivacyGuides. They do thorough research and update recommendations regularly.