{"id":29560,"date":"2025-06-30T05:17:23","date_gmt":"2025-06-30T09:17:23","guid":{"rendered":"https:\/\/worldjusticenews.com\/news\/?p=29560"},"modified":"2025-06-30T05:17:23","modified_gmt":"2025-06-30T09:17:23","slug":"new-vpn-service-cant-log-users-by-design","status":"publish","type":"post","link":"https:\/\/worldjusticenews.com\/news\/2025\/06\/30\/new-vpn-service-cant-log-users-by-design\/","title":{"rendered":"New VPN Service Can\u2019t Log Users by Design"},"content":{"rendered":"<p class=\"article__excerpt\">VPN providers typically offer security and privacy as a service. They make it difficult for outsiders, including ISPs, to monitor users&#8217; activities. Instead, they require subscribers to trust them with their online traffic. VP.net, a new provider, takes a different approach. The company promises &#8216;cryptographically verifiable privacy&#8217; by using special hardware &#8216;safes&#8217; (Intel SGX), so even the provider can&#8217;t track what its users are up to. Trust in technology and hardware is still required, of course.<\/p>\n<p>Over the past two decades, the VPN industry has grown spectacularly, with plenty of competition between providers.<\/p>\n<p>The days when\u00a0<a href=\"https:\/\/torrentfreak.com\/which-vpn-providers-really-take-anonymity-seriously-111007-archive\/\" target=\"_blank\" rel=\"noopener\">a review<\/a>\u00a0of VPN logging policies was a novelty are long gone.<\/p>\n<p>While new VPN services launch frequently, it\u2019s rare to see one with a truly unique technical approach. That\u2019s why\u00a0<a href=\"https:\/\/vp.net\/l\/en-US\/\" target=\"_blank\" rel=\"noopener\">VP.net<\/a> warrants a closer look. Unlike most VPN providers, it doesn\u2019t ask users for their trust; it relies on hardware-enforced privacy instead. <a href=\"https:\/\/vp.net\/l\/en-US\/faq\" target=\"_blank\" rel=\"noopener\">Their Frequently Asked Questions are here<\/a>.<\/p>\n<h2>Trust<\/h2>\n<p>When you use a VPN, your internet traffic is encrypted between your device and the VPN\u2019s server. This is great for protecting your data from snooping on public Wi-Fi and your internet provider. However, to route your traffic to its final destination on the internet, the VPN server must decrypt it first.<\/p>\n<p>At this decryption point, it\u2019s technically possible for the VPN provider to access information about your online activity. This is common knowledge and requires that you trust your VPN. It\u2019s also why using shady free VPN apps from unknown companies should be avoided; the user may end up being the product.<\/p>\n<p>For a successful VPN service to thrive, trust, security, and privacy are paramount. Reputable VPN companies build their entire business model on trust, knowing that a breach would be catastrophic for their reputation.<\/p>\n<p>But what if trust was taken out of the equation entirely? This is what VP.net promises to do, at least up to a point.<\/p>\n<h2>VP.net<\/h2>\n<p>Like most VPNs, VP.net hides your real IP-address, replacing it with the address of the server you connect to. This connection is encrypted using the popular open-source WireGuard protocol and can\u2019t be spied on by outsiders.<\/p>\n<p>What makes VP.net stand out from many regular VPNs is its special use of a technology called Intel\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Software_Guard_Extensions\" target=\"_blank\" rel=\"noopener\">Software Guard Extensions<\/a>\u00a0(SGX). SGX enclaves are private areas of memory that essentially act as a secure black box and not even the operators of the service can see what\u2019s happening inside.<\/p>\n<p>&nbsp;<\/p>\n<p><center><em>VP.net<\/em><\/center>&nbsp;<\/p>\n<p><center><picture class=\"alignnone size-full wp-image-268365\"><source srcset=\"https:\/\/torrentfreak.com\/images\/vpnet-overview.jpg.webp 920w, https:\/\/torrentfreak.com\/images\/vpnet-overview-300x181.jpg.webp 300w\" type=\"image\/webp\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/torrentfreak.com\/images\/vpnet-overview.jpg\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/torrentfreak.com\/images\/vpnet-overview.jpg 920w, https:\/\/torrentfreak.com\/images\/vpnet-overview-300x181.jpg 300w, https:\/\/torrentfreak.com\/images\/vpnet-overview-600x362.jpg 600w, https:\/\/torrentfreak.com\/images\/vpnet-overview-150x90.jpg 150w\" alt=\"vpnet\" width=\"600\" height=\"362\" \/><\/picture><\/center>&nbsp;<\/p>\n<p>The system within the SGX enclave is reportedly built to map user identities to temporary, anonymous tokens. This means the part of the system which knows that \u201cUser X is connected\u201d is structurally walled off from the part that knows \u201csomeone is accessing website Y.\u201d The design goal is that no one, not even the VPN company, can link \u201cUser X\u201d to \u201cWebsite Y.\u201d<\/p>\n<p>The use of SGX as a verifiable, hardware-enforced separation of user identity and web traffic, is a new concept for a VPN.<\/p>\n<h2>\u2018Verified Privacy\u2019<\/h2>\n<p>VP.net essentially promises \u201cverified privacy\u201d with this technical setup. If everything works as described, it\u2019s not technically possible for the owners of the server, typically the VPN provider, to log who is doing what and when.<\/p>\n<p>The new VPN service is operated by the American company VP.NET LLC, which in turn is owned by\u00a0<a href=\"https:\/\/tcpip.co\/\" target=\"_blank\" rel=\"noopener\">TCP IP Inc<\/a>, which holds the intellectual property rights. That includes pending patents, including one of \u2018hardware-based anonymization of network addresses.\u201d<\/p>\n<p>The idea to use SGX as a privacy shield comes from Andrew Lee, the chief privacy architect at VP.net. As the founder of Private Internet Access, which he sold to\u00a0<a href=\"https:\/\/www.kape.com\/our-brands\/\" target=\"_blank\" rel=\"noopener\">Kape<\/a>\u00a0a few years ago, Lee has a long history in the VPN space. However, he believes this new concept is a breakthrough.<\/p>\n<p>\u201cOur zero trust solution does not require you to trust us \u2013 and that\u2019s how it should be. Your privacy should be up to your choice \u2013 not up to some random VPN provider in some random foreign country,\u201d Lee says.<\/p>\n<p>VP.net says it cannot link traffic data to users, even if it wanted to. If a court order requested such data, the company would first scrutinize its legality but, after that, the only data it has access to are unlinked details, such as payment info and email addresses, provided by the user.<\/p>\n<p>The new VPN company is led by CEO Matt Kim. The company also lists the contentious Bitcoin veterans\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Roger_Ver\" target=\"_blank\" rel=\"noopener\">Roger Ver<\/a>\u00a0and\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Mark_Karpel%C3%A8s\" target=\"_blank\" rel=\"noopener\">Mark Karpel\u00e8s<\/a>\u00a0in their team, who both have had their legal issues in the past.<\/p>\n<h2>Novel, Secure, but Not Infallible<\/h2>\n<p>VP.net\u2019s source code is open to the public. To address the challenge of showing that this open-source code is the same as the code running on their servers, VP.net relies on a key SGX\u00a0<a href=\"https:\/\/vp.net\/l\/en-US\/faq\" target=\"_blank\" rel=\"noopener\">feature<\/a>\u00a0called \u2018remote attestation\u2019.<\/p>\n<p>In essence, this mechanism allows the user\u2019s client to receive cryptographic proof from the server\u2019s hardware, verifying that it is a genuine SGX \u2018safe\u2019 and is running the exact, untampered code that was publicly available. This shifts the trust from the company\u2019s promise to a verifiable, hardware-backed process.<\/p>\n<p>The trust through technology aspect is certainly intriguing, but no technology is infallible. The code needs to be functional and secure, as a software flaw could lead to potential security issues.<\/p>\n<p>Another potential problem lies on the hardware side. Intel SGX itself is a physical product that is part of the CPU, which in turn relies on firmware. Like any piece of hardware,\u00a0<a href=\"https:\/\/www.google.com\/search?q=sgx+vulnerabilities\" target=\"_blank\" rel=\"noopener\">vulnerabilities<\/a>\u00a0have been discovered in SGX in the past.<\/p>\n<p>VP.net is aware of this and says it actively monitors the security of its software and infrastructure, while keeping systems fully up-to-date.<\/p>\n<p>Of course, the true test will be speed and transparency when responding to the next major SGX vulnerability, a scenario for which all users should be prepared.<\/p>\n<p>It\u2019s safe to say that one should never have 100% trust in any VPN solution. In this case, VP.net promises to offer an extra layer of privacy but, in the end, even the most secure systems can be breached.<\/p>\n<p>That said, it is interesting to see a novel approach to the \u2018no logging\u2019 discussions. Whether this novelty will scale and be embraced more broadly remains to be seen.<\/p>\n<p>Source: \u00a0<a href=\"http:\/\/worldjusticenews.com\/news\/wp-content\/uploads\/2016\/11\/torrentfreak.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/worldjusticenews.com\/news\/wp-content\/uploads\/2016\/11\/torrentfreak.png\" alt=\"TorrentFreak\" width=\"38\" height=\"38\" \/><\/a> <a href=\"https:\/\/torrentfreak.com\/new-vpn-service-cant-log-users-by-design\/\" target=\"_blank\" rel=\"noopener\">TorrentFreak.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\">VPN providers typically offer security and privacy as a service. They make it difficult for outsiders, including ISPs, to monitor users&#8217; activities. Instead, they require subscribers to trust them with their online traffic. VP.net, a <a class=\"mh-excerpt-more\" href=\"https:\/\/worldjusticenews.com\/news\/2025\/06\/30\/new-vpn-service-cant-log-users-by-design\/\" title=\"New VPN Service Can\u2019t Log Users by Design\">[&#8230;]<\/a><\/div>\n","protected":false},"author":1,"featured_media":29561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","footnotes":""},"categories":[2,3],"tags":[2701,11433,11434,1890],"class_list":{"0":"post-29560","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-usa","9":"tag-privacy","10":"tag-sgx-enclave","11":"tag-vp-net","12":"tag-vpn","13":"pmpro-has-access"},"_links":{"self":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/29560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/comments?post=29560"}],"version-history":[{"count":1,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/29560\/revisions"}],"predecessor-version":[{"id":29562,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/29560\/revisions\/29562"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media\/29561"}],"wp:attachment":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media?parent=29560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/categories?post=29560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/tags?post=29560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}