18.206.194.83 EXPOSED

Here at CyberGhost, we consider privacy a basic human right.

It's what we're fighting to protect and the reason we keep no logs. But not everyone shares our vision. Case in point: the various requests we get to disclose the identity of CyberGhost users. Since we’re Bucharest-based and under no obligation from the Romanian law to store connections logs, we can honor our strict no-logs policy. This means we’re unable to comply with requests, even if they are legally binding.

To give you an idea of our judicial landscape, here are the three major types of legal demands we usually receive.

15,819
2015
43,647
2016
42,805
2017
27,747
2018

DMCA complaints

We usually receive Digital Millennium Copyright Act complaints from various law firms representing production companies. Most often, they indicate that copyrighted material was illegally shared via a CyberGhost IP. We're also provided with details like the timestamp of a torrent or the port used.

4,895
2015
10,362
2016
7,876
2017
11,116
2018

Malware Activity Flags

The complaints grouped in this category usually come from website owners or app developers and have to do with DDoS, botnets, scams, log-in attempts, or automated emails being send from CyberGhost IPs. Sometimes, data centers we work with around the world forward us complaints.

71
2015
40
2016
17
2017
37
2018

Police requests

Various law enforcement agencies or police departments can request logs or more information about an IP linked to an investigation or a case. These inquiries usually reach our data center collaborators first, and then get forwarded to us.

Tackling abuse on our end

Over the years, we’ve taken our own measures to reduce the number of violations committed by using CyberGhost. For example, analyzing the ports used for torrent streaming and blocking them in countries where specific laws are in place turned out to be efficient.

And RE: malware activities, since most of the complaints specify the source of the attack, as well as the victim’s IP, we resorted to blocking access to the attacked IP, making further exploits impossible.

Also, a not-so-gentle reminder from our Legal team: by using our VPN, you have agreed to comply with our Terms and Conditions

We're keeping safe more than 30 million Ghosties from all around the world.

Got questions for us?

Send them our way, and we’ll gladly get back to you. Drop us a line at press.office@cyberghost.ro.