How CyberGhost VPN manages to stay true to its no-log policy

Many privacy-concerned Internet users around the world are worried that companies which should be focusing on supplying digital anonymity solutions are doing quite the opposite.

That is because there are two types of VPNs: the ones that supply their services for a fee, and the VPN services that would like to get a bit extra in addition to that fee or instead of it. Thus, the latter decide to sell their users’ data and that way, they also finance their (free) services.

At CyberGhost we believe this is not the way to go, all we stand for is privacy protection that is our promise to our users and we believe it is our duty to fulfill that promise to all of our customers.


How to recognize which VPN service to use

VPNs that appear overnight, have no real contact details or are headquartered in controversial locations around the globe, such as tax havens, which imply no obligations on behalf of the company should make you wonder. Are these firms indeed trustworthy or do they wish to gain profit from your private data?

Another good indication is whether the service is completely free, if there is no paid option then they probably monetize your data; providing a good VPN service is costly and companies usually do not provide great products for free.


How CyberGhost manages to maintain its free service

We, at CyberGhost VPN, however, fund our free version with the profit obtained through the sale of subscriptions to paying users.

Like this, we stay true to our no-log policy and never have to resort to advertising campaigns from third-parties.

How do you know if a #VPN tracks its users? It's quite simple: just look at how it finances its free service Click to Tweet

We have created the free version of our software to enable users from around the world mainly it countries where the freedom of speech is in question to have access to a better, faster and censorship-free Internet. With the help of our free service, digital citizens from Turkey or Brazil managed to communicate with their loved ones when social media such as Facebook, Twitter, or messaging services such as WhatsApp were blocked by the government.

Other people, from more democratic locations around the globe, wish to enjoy the benefits of hacker- and snooper-free web browsing and have become paying users. Their constant support helps us maintain and improve both the free version of CyberGhost and the paid subscription plan.

So you can rest assured that when we say that we are not keeping any logs, we mean it.

About the author

Corina Dumitrescu
Corina Dumitrescu

A professional wordsmith, Corina has improved her writing skills through extensive experiences in journalism, advertising and marketing. Curious by nature, she enjoys learning foreign languages and discovering everything, as well as everyone around her.


Leave a comment
  • Good info and well written, but the blog doesn’t answer the question posed. It does a great job explaining about evaluating VPNs by looking at how they’re funded and the privacy issue involved. It does, to be fair, imply that it is able to maintain its log free policy by being a paid service committed to clients’ privacy.

    However, it does not explain the question most meaningful – at least to me – how do you manage to do that under government pressure to keep logs, or am I deluded in thinking the government is trying to find ways to make you divulge data? I’m thinking especially of the example of when the FBI tried to coerce Apple into building a back-door into its iPhones.

    • Hi George! Thank you for your awesome feedback.

      Now, to answer your question, the fact that we are headquartered in Romania reinforces our privacy policy. As a member of the EU, Romanian law does not force us to keep any logs of the users’ actions. So the US government has nothing on us. 🙂

      Cheers and let me know if you need further information.

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

© 2017 CyberGhost