• Flattr FoI: 
Falkvinge &Co. on Infopolicy
Falkvinge on Infopolicy - Home
Unmasked woman

Never Trust A VPN Provider That Doesn’t Accept Bitcoin


Privacy – Rick Falkvinge

Privacy – Rick Falkvinge

It was the nightmare come true. An unscrupulous VPN provider that happily handed over identifying information to law enforcement, providing a cold-shower reminder that security consciousness can be the very real difference between life and death.

As the VPN provider HideMyAss.com happily identified a person at the request of law enforcement, it was a jaw-drop moment for many of us. This was the exact thing that was supposed to not happen. It was supposed to be physically impossible; the log files were not supposed to exist. Many rightly criticize the company for advertising a service they didn’t deliver, and from their defense of righteousness and entitlement in a “we did nothing wrong” statement, it is obvious that they are completely oblivious to the concept of lawful evil:

Our VPN service and VPN services in general are not designed to be used to commit illegal activity. It is very naive to think that by paying a subscription fee to a VPN service you are free to break the law without any consequences.

I mean, like, wtf? I am speechless. Flabbergasted. Tell this to the activists of Egypt, Syria, or Palestine. Then try to say with a straight face that the countries in the West are completely different when it comes to Net censorship and corruption.

As a quick recap, just because something is lawful, that doesn’t make it good. This is most obvious in hindsight. Homosexual individuals were criminal from birth in most countries two generations ago, and still are in many. Forced sterilizations were legion one generation ago in countries we consider civilized. In retrospect, this is pure evil, even if it was the law.

My point here is that anybody who thinks that the future won’t think exactly this of today’s laws is delusional. There are still many examples of evil going down in the name of the law, today. I am sure all of us can think of several examples.

Therefore, the activists fighting against this evil and for a change of society have a very legitimate reason to hide themselves from law enforcement. But breaking the law is not the only reason to use a VPN or other kind of cryptographic tunnel.

Because, after all, you can desire to be private and untrackable for many legitimate purposes. The future always judges the activists who fight for good to have been completely legitimate in retrospect, even though they were lawbreakers in their own time. (Consider Greenpeace, which were considered borderline terrorist in their time, who are now instead borderline heroes.)

Regardless of the necessity of people breaking the law to advance society, there are many other legitimate reasons to be private. You probably lock the door when you go to the toilet, for instance. Not because you know that it may get you in trouble with authorities, but simply because you want that moment to yourself.

The shameful deceit of HideMyAss.com forces us to revisit many assumptions. It goes back to the basic information advantage game: who has what information, and in particular, is there anybody who knows what I do online and who I am? If so, that is a weak link that needs to be addressed.

Specifically, we have seen now that we can’t trust VPN providers with our identity, as — no shocker, really — a “trust us with your life” isn’t worth the recycled electrons it’s displayed with when it comes from a marketing department that really says “trust us with your money“.

So how to you separate the good from the bad tunnel providers without risking to become the case that uncovers the bad apple? Nobody wants to take that risk. For some, it’s even a matter of life and death. The obvious conclusion is that nobody should trust a VPN or tunnel provider with their identity — and that VPN providers who demand the identity of their subscribers cannot, should not, and must not be trusted.

Specifically, this means that nobody should pay commercial VPN or tunnel providers with a credit card.

Now, in the case of commercial providers, that does pose a bit of a problem. There are only two somewhat anonymous payment methods: cash and bitcoin. And people who pay in person by cash have frequently been tracked by CCTV cameras.

I’m therefore going to argue that bitcoin, while not perfectly anonymous, offers the best level of identity protection of the available payment systems. The exchange where you get your bitcoin knows your identity, but the places where you transfer them after that don’t.

I just learned in the wake of this scandal that at least one VPN provider, AirVPN, is now accepting bitcoin. (HugeHedon tips us off in the comments to this post that they have commented extensively on the situation, agreeing with the message of this article and going a good bit further.)

In closing, we also need to take some care with other details that the VPN or tunnel provider will know and that can be used against us. The provider will know our originating IP address. If we do something that authorities don’t like, this can be used to track us. Therefore, the IP address of origin should be a public place like a café, a bus, an airport, or similar. There will be CCTV cameras, which need to be considered.

The public location may be able to identify your computer through its MAC address (its individual network interface), if logs are kept. Assume logs are kept. Therefore, it may be possible to tie your computer to having had a specific IP address in the public location, an IP address which a hostile tunnel provider gives to law enforcement. If you want to mitigate this risk, use USB wi-fi sticks (some €15) and change them regularly, discarding and destroying used ones. Better yet, change your network MAC address regularly if you can. Google for how to do it.

And of course, you should never give your identity to the wi-fi network in the public location, either. That’s just as dangerous as giving your identity to the VPN provider, which is able to track you to the public network.

As a final note, always route through multiple countries under jurisdictions that have serious problems cooperating. Like Israel, from there to Iran, on to North Korea, and end it up with Germany which has strong privacy laws. (If you find tunnel entrances and exits in Iran and North Korea, that is. But as an example.)

And never, never, ever, trust a VPN or tunnel provider that requires your identity or credit card.

You've read the whole article. Why not subscribe to the RSS flow using your favorite reader, or even have articles delivered by mail?

About The Author: Rick Falkvinge

Rick is the founder of the first Pirate Party and is a political evangelist, traveling around Europe and the world to talk and write about ideas of a sensible information policy. He has a tech entrepreneur background and loves whisky.

Liked This?

This article is also available in other languages: Hungarian.

By participating in the discussion and posting here, you are placing your contribution in the public domain (CC0). If you are quoting somebody else, credit them.

Contributors take own responsibility for their comments.


  1. 1

    It seems to me that, however carefully you choose a VPN provider, you are likely to end up giving them more identifying information than you might want to. For those communications requiring a high degree of privacy, using Tor to remove that single point of failure would seem wise.

    • 1.1

      That is why I chose https://VPNme.com. Information collected. email address, password, and my bitcoin payment.

      I have been using them for quite some time now. Their speeds are fantastic, p2p allowed and they do not even log connect and disconnect times like HMA and many others do.

      All I know is that with the limited information that https://VPNme.com requires when you pay with bitcoin they must be taking my privacy seriously.

      They also allow you to have two concurrent connections on the cheapest plan with unlimited bandwidth and allow you to use all protocals no up charges.


    • 1.2
      Reginald the Anonymous

      Tor has it’s vulnerabilites too. I can’t find the article at this moment, but researchers were able to pull actual IP addresses from the tor network via some tech trickery.

      Bitcoin is great. You can also use prepaid credit cards for vpn providers that don’t accept bitcoin but don’t require anything more than an email address, payment method and password.

      I don’t think HIdeMyAss ever stated that they didn’t keep logs. Their name is a bit misleading though, considering how fast they handed the hacker over.

      I think picking a vpn that doesn’t keep logs is way more important than picking one with bitcoin. If your network activity is untraceable, who cares if they know who’s paying. People seem to want to go with offshore vpn’s for added privacy, but actually the united states might be the safest for these reasons:

      1) The us is one of the few developed nations without mandatory data retention policies

      2) U.S. companies actually are bound to do what they say and advertise. If I company said they didn’t log when in fact they did, they could be liable. US companies are less likely to have malicious intentions towards their customers. Who knows what that startup vpn from malaysia is doing with your information.

      You can find a solid list of vpn providers with minimal or no data logging at This Bittorrent VPN Site

    • 1.3


  2. 2

    Another example of bitcoin provider is http://mullvad.net/sv/bitcoin.php .
    Also, if paying with bitcoin, and then connecting to the VPN via TOR network, could make you reasonably anonymous. It will make it harder for TOR sniffers to find out what you are doing. But if you are downloading a lot via this solution, you are putting a big strain on the TOR network.
    Lastly, how do you anonymously set up the deal with the VPN provider, payment method aside? You still need to communicate. TOR might hold some answers here, but I doubt they are adequately implemented yet.

    • 2.1

      mullvad is a GREAT service! all the way from texas, i get 90% of the speed of my internet. The only problem i have is youtube can be iffy, but you try and encrypt streaming data without it chopping up – its not easy! I personally do not care for tor as it is slow. its good, but slow.

      I pay mullvad via bitcoins. Once you pay, they give you an account id that can be used to access their network for x days. Thats all their is to it, there isn’t really any verification involved. If you do have problems, their customer support is pretty good, all they ask is your account id that you use, if they ask that.

      if you want, just keep a record of the bitcoin address you used to pay along with your account id, just in case they ask you for further verification. Like i said, i have had no problems with mullvad, and although i dont recommend using it to log into your facebook and im accounts (as with any vpn!) it does put another barrier between you and authorities.

      you also may want to look into http://www.prq.se

      • 2.1.1
        Just Mullvad Folks

        Mullvad is safe to pay even by credit card, because they don’t even keep records of that. You pay, they delete. Mullvad keeps NO records. Sure you have an entry on your card statement showing a payment, but it doesn’t say you paid Mullvad either.

    • 2.2

      Why should you trust a VPN service enough to run binaries on your machine? That is clearly not necessary to run a VPN service… Sounds more like under-cover spyware to me.

      • 2.2.1
        Endless, Nameless

        The more trustworthy VPN providers will not give you software to run on your machine, but will tell you what you need to have installed (such as Windows’ VPN client (such as it is) or OpenVPN). You will have to trust the manufacturer of your operating system and not the VPN provider.

        Of course, the question then becomes “How far down the stack of turtles do you want to go?” in terms of where your trust ends?

        • PiratGurra

          Yes, well.. There are a couple of turtles required to trust. As you say at least OS, hardware in your PC and network equipment can be “compromised” in some sense. In the end.. you even need to trust your landlord not to break into your home, or to allow others to, in case you are being too much of a pimple in someones butt… There is not much to do to protect your privacy if someone is granted physical access to your machine… right..?

      • 2.2.2

        The supplied software is just a preconfigured openvpn bundled with some GUI magic. There is no need to use it to connect through the mullvad vpn

      • 2.2.3

        It says clearly on the Mullvad page that you do not need their software to use Mullvad, OpenVPN works too. In fact, I use OpenVPN because i already had it on my machine because I used Anonine before. I switched to Mullvad because it felt safer to pay via cash sent by mail than via cell phone, and also Anonine added a Facebook plugin to their page (!) That was my limit. Mullvad can be paid in a few different ways, of which cash and Bitcoin are (somewhat) anonymous.
        Since the cash is sent by mail, it will only look like you are posting a letter on any CCTV camera that may be present. However, you do leave fingerprints and DNA on the cash, so if extraordinary efforts are put in, you could still be identified if the money hasn’t yet been separated from your Mullvad account number and mixed with other money, or if the envelope is seized (In sweden “brevhemligheten” – “the mail secrecy” is strong (as of yet) and much is required for police to break it ).

        But it’s still a matter of trust to a degree, because Mullvad can see your IP address. They clearly state that they do not keep any logs, but perhaps HMA did too… At least I trust Mullvad more than my ISP, that is forced to follow the Data Retention Directive.

        Also, DO NOT Google for anything, Google is a privacy nightmare. Use something that doesn’t track you, like DuckDuckGo(.com) for example.

      • 2.2.4

        Mullvad offers exe to make things easier. You are not required to use it if you don’t want to, you can set OpenVPN manually.

    • 2.3


      The service I use that I posted above https://VPNme.com not only has Direct IP, and Nat modes for their VPN users that also have a proxy, and tor mode to hide your traffic without having to install the tor software on your on computer.


  3. 3

    If you don’t trust a VPN provider to keep your identity hidden, then why use them at all?

  4. 4

    In Sweden I think one can get one of these (from Pressbyrån or 7eleven)
    and use that to pay for a VPN. If one want to be really safe and secure of course do it with a clean computer and an internet-connection that hasn’t got your name attached to it.

    And speaking of HideMyAss it’s quite easy to say “Boo, boo! You shouldn’t have done that!!”, but it’s really hard to know what one actually would have done in the same situation. Who knows, maybe they were threatened with Rendition and Gitmo? :-/

    • 4.1

      That “SpendOn Presentkort” was a very positive news to me.

    • 4.2

      If that was the case you can bet HMA wouldn’t have talked about it ever again, they would have been under a gag order for sure. Seeing how open they are about it just proves they had no problem cooperating.

    • 4.3

      you can’t buy that shit without showing id-card, and it will get registred and connected with that cardnumber.

      • 4.3.1

        Checking the spendon website there is no such indication. On the contrary, they say the opposite.

        “Jag har tappat bort mitt kort. Vad gör jag?
        SpendOn Presentkort är ett opersonligt kort, därför kan vår kundtjänst aldrig avgöra vem som är ägare till kortet. Om du har antecknat ditt kortnummer kan du ringa vår kundtjänst på 0771-24 20 00 för omedelbar spärr. Därefter kan kundtjänst skicka ut ett ersättningskort med ny PIN. Har du däremot ej kortnumret kvar har vi dessvärre ej möjlighet att hjälpa dig.”

  5. 5

    Of course the countries in the West are completely different when it comes to Net censorship and corruption. Don’t be silly. It’s not a black and white situation, but the differences are huge.

    Pretending anything else is just demeaning the Arab Spring.

    • 5.1
      Scary Devil Monastery

      “Of course the countries in the West are completely different when it comes to Net censorship and corruption.” Yes, and then again, No.

      Western countries in general don’t care whether middle eastern dissidents communicate with one another through encrypted networks or whether journalists are able to communicate safely with sources or not. That’s not really the problem.

      The problem lies in when Saudi Arabia or Turkey asks the US for such data, or when China leans on a “neutral” asian nation to provide ISP subscriber details from a local VPN. Both of these recipients have allies of which Amnesty International and the UN commission on torture have strong views.

      I.e. if the US shares data with mid-east allies then you can’t trust any VPN which would provide the US with subscriber details. That’s all there is to it. In essence, being able to communicate without supervision is one of the most fundamental human rights and there is no way any provider of communication should have to record traffic data for law enforcement use after the fact én másse.

  6. 6

    If you mean so called Western democracies are far more subtle than say the Syrian regime, you are right. Most of the time they convince the majority of their subjects that they are trying to act for the public good.
    If you mean Western governments REALLY act for the public good and represent their electorates, I totally disagree. They act for the good of politicians, who are getting bribes from big business. Don’t forget the freedoms they have taken away in recent years in the name of ‘security’. Laws get passed, “to be used only against the worst terrorist threats’, and end up being used by local authorities for trivial offences.

  7. 7

    More “lawful evil” behaviour to report here… not very much about privacy or information policy though…


    Is the operator actually mentally handicapped or just brainwashed by the authority..?

  8. 8
    Vitalik Buterin

    ” If you want to mitigate this risk, use USB wi-fi sticks (some €15) and change them regularly, discarding and destroying used ones.”

    Why not just give used ones away? If enough people do it, it’ll provide a standard of plausible deniability cover for everyone.

  9. 9

    AirVPN has a rather extensive comment on the HideMyAss situation here:


    — they suggest to use BitCoin and VPN over TOR etc.

  10. […] niezmierniespokojny @ 12:00 pm It finally happened – a VPN provider in their customer (1,2). It just had to happen eventually. It’s the first case that I heard of and I’m sure […]

  11. […] Falkvinge: Bitcoin Best Payment System For Identity Protection Falkvinge: Bitcoin Best Payment System For Identity Protection: […]

  12. 10

    Don’t use wifi if you’re concerned with anonymity and privacy. Even if WEP/WPA is secure, many free access points will log info.

    Also instead of using Tor, it might be better (definitely higher speed) to use multiple VPN providers.

  13. 11
    Name of My Choice

    This will offend those of you who believe in the sanctity of property rights, but anonymous wi-fi connections can be found in nearly any residential area. There is an abundance of people too ignorant to secure their wi-fi setups. Their routers still have the factory default password, so if there are any logs, you can delete them.

  14. […] by ToryJujube [link] [2 comments] Tweet This Post Thursday, September 29th, 2011 […]

  15. […] Falkvinge: Bitcoin Best Payment System For Identity Protection: […]

  16. 12

    “Google for how to do it.”

    How about using a search engine with a privacy policy?

  17. 13

    Make sure you connect to bitcoin through tor/vpn also as it maybe possible to link a transaction to your ip address http://pi.uk.com/bitcoin/unconfirmed-transactions

  18. 14

    JAP http://anon.inf.tu-dresden.de/index_en.html uses a superior technology compared to VPN and it accepts payment via Bitcoins or other anonymous payment methods.

    • 14.1
      Walter Sobchak

      @JAP stay away from it! They integrated tracking code into the protocol/clients on request of the German gov to hunt supposed pedophiles. In the end they tracked thousands of innocent users and catched *no* criminal pedophile.

  19. 15

    http://riseup.net provides VPN service. They have been defending our rights online for 10 years now, dont keep logs and accept bitcoin!

  20. 16

    Before you waste money AND resources by throwing away or buying new wireless sticks try to change their MACs regularly simply by using some of these tools:

    For Windows
    for OSX
    and for Ubuntu or with eventual changes other Linux distros

  21. 17

    startpage.com is a good privacy search engine. That’s what it claims anyway.

  22. 18

    http://www.bitcointorrentz.com seems to make it extremely easy to get some quick anonymity for bittorrent downloads at least, but of course not for the rest of VPN usage

  23. 19

    To remove that single point of failure, you simply may use Tor or – they have bit coin support already implemented since three months – Jondonym: https://anonymous-proxy-servers.net/blog/index.php?/archives/298-JonDo-00.15.004-Bitcoin,-connection-manipulation-protection-and-higher-efficiency.html

  24. 20

    I cannot believe no one has spoken of the obvious solution to this problem besides bitcoin….prepaid visa or mastercard (credit card style) gift cards.

    Step 1: Go to grocery store or other source of pre-paid credit card style gift cards.
    Step 2: register this gift card online with a pseudonym whilst using Tor.
    Step 3: Register and pay for your year long VPN account with this gift card and your registered pseudonym.
    Step 4: Enjoy anonymity, in a year, buy a new giftcard and repeat, maybe with a different VPN provider. Simple.

    • 20.1
      Obivous Problem

      Step 1: Go to grocery store or other source of pre-paid credit card style gift cards. (let’s assume you’re smart enough to at least pay with cash)
      Step 2: register this gift card online with a pseudonym whilst using Tor.
      Step 3: Register and pay for your year long VPN account with this gift card and your registered pseudonym.
      Step 4: Enjoy anonymity…until Law Enforcement decides they need to talk to you. All they do is serve a warrant with the VPN for your credit card info, then do the same with the gift card company to get the activation information, then get the CCTV footage from the grocery store at the time of activation.
      Step 5: Your face on the 11 o’clock news, with viewers being asked to contact police if they recognize you.

  25. 21

    Rick have you read this article with the heading “The bursting of the Bitcoin bubble” in the Economist?

  26. 22

    http://mullvad.net is operated by Swedish libetarians and accept bitcoin, thay donot log anything ither.

  27. What are some business concepts that  bitcoin specifically enables?…

    There have been a few of these that have already been implemented — with wildlly varying degrees of success. * Escrow for low-value transactions EBay has been trying to figure out how to lessen fraud occurring by sellers.  The result today is essentia…

  28. […] ostatecznym zakupem dobrze by było, żeby wirtualna waluta trochę pokrążyła. Pamiętajmy: hidemyass to zły wybór, Ipredator dyskusyjny ze względu na swoje położenie. Najlepiej wykupić usługę […]

  29. 23

    will get back here

  30. 24

    http://forum.hidemyass.com/index.php?/topic/6914-hide-my-ass-a-joke-sell-your-ass-is-more-like-it/ read this thread. I cannot believe no one has spoken of the obvious solution to this problem besides bitcoin….prepaid visa or mastercard (credit card style) gift cards.

    Step 1: Go to grocery store or other source of pre-paid credit card style gift cards.
    Step 2: register this gift card online with a pseudonym whilst using Tor.
    Step 3: Register and pay for your year long VPN account with this gift card and your registered pseudonym.
    Step 4: Enjoy anonymity, in a year, buy a new giftcard and repeat, maybe with a different VPN provider. Simple.
    thank you anonymous but will this work in the UK?

    • 24.1

      I like what you have put, but i do believe you need a form of identity to obtain a pre paid visa card in the UK. If there is a way do tell, where and how.

      I put together a VPN service for the iphone as the iphone already has the VPN software installed. We supply a username / password and server address thats it. I don’t want to know who you are.

      You put this into your iphone and log into our servers. I don’t keep logs of any type and CRON is set to delete those that have to be created on the hour. Lets say i am very hard to reach… I see it this way if i am pulled in because ‘activity’ has been traced to my Servers IP. My expanation is simple i run a VPN server with no logs and lets face it if the sh** really hits the fan its always ‘no coment’ besides i haven’t come across any law that says i do need to keep logs.

      I used tor and even isolated the exits so my son could watch US tv on his laptop, found 75% of the exits slow, but after going through one at a time there were 25% fast enough to watch a stream.

      This is where i saw a VPN service was needed. Also an secure email server that resides within the VPN Servers so if two people join this service and have one of our local email accounts when they send each other a message via the web email page their message never leaves our system and when you collect it its under VPN so tunneled all the way. A secure way to communicate as the emails never leave our server.

      Last of all i decided to just cover my costs and at a pound a week you can’t get better. If you want to send me cash put a email address in the envolope and we will email you the user id and password. Cant get any safer than that. Cash is untracable in this method sometimes its best to risk a couple of pounds for your total anonymous internet connection. You have to trust someone, dont you and trusting someone with a fiver is far better than trusting someone with your private browising history.

      btw if i was paranoiod i would jack into a remote open wifi (you must have the owners permission first) using a ubuntu boot USB stick on a diskless notebook. With the lan disabled. Use a wifi usb adapter you can dump.

      So the trace ends in Ireland (with our VPN) but if you dont trust our VPN the IP your connection is created from doesnt belong to you or can be traced back to you. If you use a local open wifi this could happen. If the boys in blue do a street search on those that are on the Electrol Role (lol – silly) and you are on it and you have a bit of previous your get a little visit, they will take the notebook. But the mac address is on the wifi adapter and ofcourse you hid that elsewhere, with the ubuntu stick which contains the Tor browser. OMG theres more, the tor browser disables all the usual whisles and bells javascript etc which reduces the sites you can actually see. So thats tors limitations well what i found. Remember use a remote open wifi not a local one. Sometimes you can’t find an open wifi point so you have to use a device such as a iphone4 VPN – thats how i got the idea. http://www.vpn4iphone.co.uk

      Keep safe and be honest.

  31. 25

    I used to be a hidemyass customer. I no longer use it anymore. If u dig through their support forum you can see there are tons of complains that hidemyass doesn’t refund after the trial ends. It is also extremely difficult to unsubscribe when you no longer need the service anymore. They are very creepy, they will tell you that you account will not be charged again but they will continue charging you anyhow. Even their hide my ass affiliates are not getting paid and earnings are being held. Stay away from this company. I am currently use Tor. it is slow. but it works and it is free.

  32. 26

    What exactly do you mean by “activists in Palestine”? Do you mean people fighting for their freedom from their oppressive Palestinian leadership like Hamas, who incidently persecute homosexuals? I sure hope that’s what you meant.

  33. 27

    blackvpn.com also accepts bitcoins for their VPN service

  34. […] ostatecznym zakupem dobrze by było, żeby wirtualna waluta trochę pokrążyła. Pamiętajmy: hidemyass to zły wybór, Ipredator dyskusyjny ze względu na swoje położenie. Najlepiej wykupić usługę […]

  35. 28

    Ditto, simplevpn.net are now accepting bitcoins for their VPN service.

  36. 29

    I found https://www.bitronictech.net/secure-ssl-vpn.php which has worked out well for me as far as getting a VPN with bitcoin.

  37. 31

    Always go for the trusted and reliable ones so as to make sure you’re really protected. You can use the free PPTP or OpenVPN service from VPNBook.com .

  38. 32

    Hello Rick,

    As a bitcoin accepting VPN provider we would like to be added to your site.Please advise us how to progress.

    Warm Regards,
    EarthVPN Ltd

    PPTP, L2TP, SSTP and OpenVPN Access to 32 Countries & 54 Locations
    Dr. Fazil Kucuk Bulvari
    Yeni Sanayi Bolgesi
    No: 3020

  39. 33
    Alan Wade

    PureVPN is one of the top VPN providers in the VPN industry, know for providing the best security and privacy; and why should not it be so? PureVPN does what it does well; continuously enhancing the features of its services. Recently, PureVPN has added Bitcoin, the most anonymous online payment method, to its services. Now, with PureVPN your security is ensured even before you buy it!

  40. 34

    This design is incredible! You certainly know how to keep a reader
    entertained. Between your wit and your videos, I was almost moved to
    start my own blog (well, almost…HaHa!) Excellent job.
    I really enjoyed what you had to say, and more than
    that, how you presented it. Too cool!

  41. 35

    Really enjoy this incredible website, awesome information here, was actually
    a tid bit sceptical in regards to purchasing a steam shower
    system for our house however, the information and knowledge here sorted
    my head out, fantastic thanks

  42. 36

    The best investments from the worlds top consultants. Stock market tips, real estate investments,

    gold prices, oil and gas, all from the top analysts.

  43. […] It’s also interesting to see how effective VPNs are at protecting end-users who manufacture unlicensed copies of knowledge and culture from the monopolized copyright industry – apparently, the people behind Expendables 3 are on a suing spree, but hitting a no-log VPN on an end-address is literally a dead end – there’s nowhere to go from there. (Which is another reason to only use VPN services that a) create no logs, b) don’t demand personal information in the first place – like allowing payment with bitcoin.) […]

  44. 37

    Make your images, videos, and infographics easy to pin by placing
    them on the page rather than displayed as a background.
    To add an exciting note to this aspect, popular public figures and top level politicians
    are now harnessing the potential of this tool for their specific purposes.

    There are different ways on getting invited to Pinterest.

  45. 38

    I agree with author. It is much important for user to be able to pay through an anonymous payment method for anonymous VPN.

    That’s why i use https://privatoria.net

    Combined with the anonymous creating of Privatoria account via an Anonymous E-mail, specially crafted for me and not correlated with my own e-mail, name or other data, i believe it provides the highest level of security.

  46. 39

    TOTOVPN is one such company that is committed to protecting online identities.
    terms and commendation note: “TOTOVPS absolutely do not maintain any VPN activity logs. We utilize shared IP addresses rather than dynamic or static IPs,All Virtual Data is 128 bit encrypted(NO VPN data log / NO Packet Sniffing)”


  47. 40

    The FCC should make an app that enables a consumer to voluntarily upload their wifi connection logs and report a
    hotel for doing this.

  48. 41

    I think everything published made a bunch of sense.
    However, what about this? what if you added a little
    content? I am not saying your content is not good, however suppose you added a post
    title that grabbed a person’s attention? I mean Never Trust A VPN Provider That

  49. 42

    I use Privatoria VPN provider. They do not keep logs and accept Bitcoin Payments https://privatoria.net/blog/pay-for-vpns-anonymously-with-bitcoin/

  50. 43

    Doublehop.me is a fresh VPN startup aiming to rock the boat with double VPN hops and encrypted multi-datacenter interconnects. Twice wrapped crypto? Sweet like peppermint.

    Our only accepted payment method is Bitcoin ^_^

Add a Comment

On Facebook

Popular Articles

Other Recent Headlines


Activism – Nozomi Hayase

Activism – Nozomi Hayase

Swarmwise in Czech

Swarm Management – Rick Falkvinge

Swarm Management – Rick Falkvinge

Earth view taken by US Astronaut Terry Virts, Flight Engineer for Expedition 42 on the International Space Station Jan. 30, 2015 by NASA/Terry Virts.

Civil Liberties – Nozomi Hayase

Civil Liberties – Nozomi Hayase

Image of padlock

Civil Liberties – Rick Falkvinge

Civil Liberties – Rick Falkvinge


Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge


Copyright Monopoly – Martin Doucha

Copyright Monopoly – Martin Doucha


Cryptocurrency – Nozomi Hayase

Cryptocurrency – Nozomi Hayase


Europe – Rick Falkvinge

Europe – Rick Falkvinge

Printing Press

Freedom of Speech – Zacqary Adam Xeper

Freedom of Speech – Zacqary Adam Xeper

Bitcoin concept

Cryptocurrency – Nozomi Hayase

Cryptocurrency – Nozomi Hayase

Bitcoin concept

Civil Liberties – Rick Falkvinge

Civil Liberties – Rick Falkvinge

About The Author

Rick is the founder of the first Pirate Party and is a political evangelist, traveling around Europe and the world to talk and write about ideas of a sensible information policy. He has a tech entrepreneur background and loves whisky.

More On Infopolicy


Quality Legislation – Zacqary Adam Xeper

Quality Legislation – Zacqary Adam Xeper

US Capitol Buildings

Quality Legislation – Nozomi Hayase

Quality Legislation – Nozomi Hayase

Bitcoin concept

Cryptocurrency – Nozomi Hayase

Cryptocurrency – Nozomi Hayase


Diversity – Zacqary Adam Xeper

Diversity – Zacqary Adam Xeper

Bitcoin. Photo by Antana.

Cryptocurrency – Rick Falkvinge

Cryptocurrency – Rick Falkvinge

Money cut into pieces - Photo by Flickr user Tax Credits

Swarm Economy – Zacqary Adam Xeper

Swarm Economy – Zacqary Adam Xeper

Adobe the leech - original photo by OakleyOriginals on Flickr

Swarm Economy – Zacqary Adam Xeper

Swarm Economy – Zacqary Adam Xeper


Swarm Economy – Lionel Dricot

Swarm Economy – Lionel Dricot


Swarm Economy – Zacqary Adam Xeper

Swarm Economy – Zacqary Adam Xeper

NSA Seal Holding the Heartbleed Logo

Infrastructure – Zacqary Adam Xeper

Infrastructure – Zacqary Adam Xeper


Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge

Code tumblers with the code 1-2-3-4-5. The kind of code an idiot would have on their luggage (homage to Spaceballs). Render by Falkvinge.

Cryptocurrency – Rick Falkvinge

Cryptocurrency – Rick Falkvinge

Bitcoin concept by Antanacoins. CC-By-SA, Flickr.

Cryptocurrency – Charlie Shrem

Cryptocurrency – Charlie Shrem

simple combination keycode

Cryptocurrency – Rick Falkvinge

Cryptocurrency – Rick Falkvinge


Cryptocurrency – Rick Falkvinge

Cryptocurrency – Rick Falkvinge

Bottles of Snake Oil - Photo by Jagrap on Flickr

Copyright Monopoly – Zacqary Adam Xeper

Copyright Monopoly – Zacqary Adam Xeper

Frozen Waterfall

Cryptocurrency – Rick Falkvinge

Cryptocurrency – Rick Falkvinge

Soccer sports ball

Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge

A scheisseload of US Dollars

Cryptocurrency – Rick Falkvinge

Cryptocurrency – Rick Falkvinge


Swarm Economy – Zacqary Adam Xeper

Swarm Economy – Zacqary Adam Xeper


Infrastructure – Rick Falkvinge

Infrastructure – Rick Falkvinge

CCTV Cameras

Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge

Open hard disk

Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge


Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge


Infopolicy – Henrik Brändén

Infopolicy – Henrik Brändén


Infopolicy – Rick Falkvinge

Infopolicy – Rick Falkvinge


Copyright Monopoly – David Collier-Brown

Copyright Monopoly – David Collier-Brown


Infopolicy – Christian Engström

Infopolicy – Christian Engström

"God Hates Signs" next to "God Hates Fags" protesters

Freedom of Speech – Zacqary Adam Xeper

Freedom of Speech – Zacqary Adam Xeper

Many different currencies - CC photo by epSos.de

Diversity – Zacqary Adam Xeper

Diversity – Zacqary Adam Xeper


Copyright Monopoly – Lionel Dricot

Copyright Monopoly – Lionel Dricot

Valve mechanism

Freedom of Speech – Rick Falkvinge

Freedom of Speech – Rick Falkvinge

Books before copyright

Copyright Monopoly – Johnny Olsson

Copyright Monopoly – Johnny Olsson

euro banknotes

Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge

Bitcoin render by cybrbeast

Swarm Economy – Rick Falkvinge

Swarm Economy – Rick Falkvinge

Collaborative whiteboard at OuiShare 2012, full of wonderful ideas for venture capitalists to ruin - photo by Natalie Ortiz

Swarm Economy – Zacqary Adam Xeper

Swarm Economy – Zacqary Adam Xeper

Spices - Marrakech 09 Souks

Swarm Economy – Rick Falkvinge

Swarm Economy – Rick Falkvinge

Oil platform

Infopolicy – Rick Falkvinge

Infopolicy – Rick Falkvinge


Swarm Economy – Rick Falkvinge

Swarm Economy – Rick Falkvinge

Screenshot-Thu, Feb 7, 2013 - TPBAFK UK no subs-1

Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge

Parabolic antenna

Privacy – Rick Falkvinge

Privacy – Rick Falkvinge

Surveillance camera

Privacy – Rick Falkvinge

Privacy – Rick Falkvinge

Finnish Parliament, the Eduskunta

Copyright Monopoly – Rick Falkvinge

Copyright Monopoly – Rick Falkvinge

This publication is protected under the Constitution of the Kingdom of Sweden. Any problem you have with this publication remains exclusively yours. Accountable publisher: Rick Falkvinge.
All text on this site is Public Domain / CC0 unless specifically noted and credited otherwise. Copy, remix, and inspire. (Troll policy.)
Log in | Original theme design by Gabfire themes (heavily modified)