GDPR update

The privacy policy at the bottom of this page was written in 2013, which might make it seem outdated, but the fact is we haven't ever updated it because our data policies have remained the same.
cryptostorm has no active business entities in any EU member state at the moment, but we do believe that every nation should be creating and enforcing data protection legislation like the GDPR.
For that reason, we thought we'd revisit the old privacy policy and see if we could provide more (probably too many) technical details on exactly how the whole ordering/connecting process works, what's being logged, and what to do if you don't want us to retain what little data we do have.

The first step any potential customer would take is visiting this site, This is an Apache webserver that has mostly default logging, which means the log will contain visitor IPs, user agents (browser), referrer (where you came from), the file you're requesting, and the time/date of the request. We have no reason to maintain historical records of our web visitors, so those logs are rotated/deleted automatically after 2 weeks. The reason these logs exist is because it's virtually impossible to maintain security on a web server without these access/error logs.
If you don't want your real IP address to show up in those web logs, you can also reach this website at the .onion address http://stormgm7blbk7odd.onion or http://bcwd7odqqxs62afg.onion.
If visiting this website on the clearnet is necessary, or not a big deal in your threat model, you can also visit this website using Tor Browser, Cryptofree, any type of proxy, or a competitor's VPN service.
To keep your browser/user agent hidden from us, you can use any one of the many user agent changing browser addons, such as User Agent Switcher for Firefox, or User-Agent Switcher for Chrome.
For the referrer, browser addons such as Change Referer Button for Firefox or Referer Control for Chrome is what you're looking for.
If for whatever reason you can't wait the 2 weeks for the web logs to purge themselves, you can always email and ask us to remove you from the web logs early.

The second step in the ordering process is selecting a payment method to use on the page.
No matter what payment method you choose, the data we retain is always the same: email, token delivered, and a transaction ID provided by the payment processor.
For security reasons, after about 2 weeks, that data is manually encrypted and sent to an offsite backup server, leaving only the transaction ID for reasons explained below.
The email address you provide is only used to deliver the token, and the token is retained for re-delivery in case you lose your token.
The transaction ID is used to prevent duplicate orders from being processed twice, which is necessary because the entire ordering/delivery process is fully automated.
In the case of Bitcoin payments through Bitpay, we also provide an option that allows you to opt-out of email delivery. When you choose that option, we send Bitpay a local '' email address for the order, because Bitpay requires an email address, and since we host our email on the same server as this website, the email never leaves for the internet.
At the moment, we can't offer the same option for PayPal orders due to limitations in the PayPal IPN, nor can we offer it for orders due to the amount of time it generally takes for most of those alternative cryptocurrencies to confirm the transaction.
The tokens used by the automated delivery process come from a simple flat database that is manually loaded after minting the tokens on a separate server that holds the authentication database.
Again, if for some reason you want your token/email removed from our delivery log or it's offsite/encrypted backup, just email and ask.

The third step, once a customer has their token, is connecting to cryptostorm.
Whenever a customer connects to any node, that node will authenticate the provided token by connecting to a separate/dedicated web server that hosts an API that accesses the actual authentication database running on the same server.
That authentication database is a simple MySQL database that uses the following columns:
| Field         | Type         | Null | Key | Default | Extra |
| activated_at  | varchar(20)  | YES  |     | NULL    |       |
| duration      | int(11)      | YES  |     | NULL    |       |
| hash          | varchar(129) | YES  |     | NULL    |       |
| session_count | int(11)      | YES  |     | NULL    |       |
The 'activated_at' field is NULL to begin with, then later filled with the current time/date in UNIX time format whenever the customer connects for the first time. This field allows tokens to expire whenever they're supposed to.
The 'duration' field contains the token's length, or duration, in days (i.e., 31, 7, 365, etc.). This field is used by to let customers know how many days their token has left until expiration, and it's also used to enforce simultanous connection limits.
The 'hash' field is the sha512 hash of the plaintext token. Whenever tokens are minted, the hash goes into this database on the auth server, and the plaintext token goes into the delivery server's flat database. That keeps the authentication database from knowing the plaintext token after minting, and it keeps the nodes from ever knowing the plaintext token.
And finally, 'session_count' is self-explanatory. OpenVPN on the server increases this field when a customer connects, using the script available at, and it decreases this field using when they disconnect.
The OpenVPN server-side authentication is done by using the --auth-user-pass-verify script available at
As you can see from the above three scripts, the only data ever sent from the nodes to the authentication server API is your token's sha512 hash, and it's always sent using HTTPS.

While connected to cryptostorm, none of the log files will ever contain any data that could be used to identify a customer:
[root@zuna ~]# ls -la /var/log/
total 102508
drwxr-xr-x.  4 root root      4096 May 26 08:07 .
drwxr-xr-x. 21 root root      4096 Aug 11  2017 ..
drwxr-x---.  2 root root      4096 May 26 07:58 audit
-rw-------   1 root root    672146 May 26 09:00 cron
-rw-r--r--.  1 root root    147752 May 26 08:59 lastlog
-rw-------   1 root root 104076476 May 26 09:00 messages
-rw-------   1 root root     54237 May 26 08:59 secure
drwxr-xr-x   2 root root      4096 Aug 11  2017 snort
-rw-rw-r--.  1 root utmp     84480 May 26 08:59 wtmp
The 'audit' directory contains log files used by auditd which records PAM activity that's only used by crontab and OpenSSH, neither of which are used for customer related activities.
The 'cron' directory contains output/errors from crontab, which is useful for debugging any potential problems we might be having with our cronjobs.
'lastlog' and 'wtmp' contain login data of the administrators who've logged in to the server at the console or using OpenSSH.
'messages' contains kernel messages, such as grsec execv() data, which allows us to monitor the node for unauthorized command execution.
And finally, the 'snort' directory contains a single 'alert' file that contains minimal data about positive hits against our snort IPS that we use to prevent basic forms of abuse (automated vulnerability scanning, brute force attacks, etc.). This 'alert' log never contains any real client IPs, only their internal VPN IP (10.x.x.x), and it's rotated/purged often.
Historical bandwidth usage data is collected by vnstat, but this data is NOT per-session or per-instance, it's for the entire server. We use this data to determine whether or not a node is getting so much traffic that it needs a secondary server to balance things out.
Again, none of the above log files ever contain any data that could be used to identify a customer.

I hope this information is useful to anyone curious about how our systems work, and if you have any more questions that aren't answered here, feel free to email

For posterity, and because it's still valid, here's the old privacy policy:

2013 privacy policy

Most of our published commitments regarding customer loyalty and operational security procedures can be found in our Terms of Service, so if you're interested in these questions we suggest a review of those as a starting point. However, it's also traditional to have a separate "privacy policy." We would gladly buck such tradition, as we often do... but instead here's our concise alternative version:

First, the best way to retain - and respect - privacy is to avoid the disclosure of sensitive data in the first place. We created our groundbreaking token-based network authentication framework with this goal in mind. Via tokens, our network members connect to and make use of cryptostorm with no accounts, subscriptions, or interpersonal connection with us. More importantly, their payment for network access is completely decoupled from the network itself: tokens break the chain.

Second, we've modified the core source code of the openvpn application to remove physical IP address as an element of our member-session network administration, anywhere in our infrastructure. Thus we do not retain "logs" of member activity on the network because it is not possible to do so given the production environment we use. Our core team pioneered the "no logging" concept back in 2007, and we were roundly mocked back then for doing so - called "irresponsible" and "unreasonable" and so on. Nowadays, "no logging" is largely an empty marketing buzzword - everyone and their cat claims to run a "no-logging VPN service." Whatever. It's not a buzzword for us; it's a core foundation of our service, and always has been.

Third, our websites (like this one) are totally separate and live on entirely separate physical machines from our production network. That's also true for our in-house email system & associated files, as well as other secondary administrative systems (IRC, etc.). In these non-production systems, we often keep digital records: email messages we send and receive, webserver access data, and so on. None of it directly relates to network operations or member sessions, but we're still careful to minimise what we keep and protect what is there. Outside folks who want to be sure they don't leave a breadcrumbs trail in those files are encouraged to visit our sites from within secure network techniques, as per usual opsec procedures.

Fourth, and perhaps most centrally, the question of law enforcement (i.e. cops, LEO, etc.). We have a hard-earned reputation for absolute loyalty to our customers, our secure network, and to the fundamental importance of secure communications in the face of enormous surveillance regimes. This manifests in our 'privacy seppuku pledge,' our approach to team identification, and in our support for a wide range of activists, activist projects, and technological approaches to social diversity enhancement and protection. It also results from ample firsthand experience on the part of team members with the sharp edges of the police state. So we're not terribly cooperative when it comes to "demands" we betray our customers, sorry. We've been accused of showing "unwavering defiance" in the face of such pressure. Indeed.

No system is perfect, no team is perfect, no person is perfect, and nobody can promise you perfect safety, perfect privacy, or perfect security. What we can offer is our decades of front-line experience, our hard-won personal reputations for integrity, our track record over nearly 10 years in the "VPN industry" as a team, and our unwavering defiance of police state shenanigans. Also... a cryptographically robust, well-designed, well-run secure network.

That's what we've got. We hope it helps.