tl;dr if you rely on PureVPN to cover your OPSEC arse, you just might be in for an unpleasant surprise. It seems the first paragraph in their privacy conditions might need to be updated. I use privatevpn but now wonder if they're any different from purevpn - they claim not to keep logs just like purevpn but they probably can put traces on certain customer accounts and then start keeping those logs for LE.
Sigh.
Here's the deal:
Security VPN logs helped unmask alleged 'net stalker, say feds PureVPN assisted investigation of man charged over 16-month harassment campaign By Richard Chirgwin 8 Oct 2017 at 22:10 4 Reg comments SHARE ▼
Virtual private network provider PureVPN helped the FBI track down an Internet stalker, by combing its logs to reveal his IP address.
The Department of Justice announced on Friday the arrest of Ryan Lin, a 24-year-old from Newtown, Massachusetts, on charges that he cyber-stalked a former room-mate.
According to the complaint [PDF] against Lin in the Massachusetts District Court, Lin's campaign against Jennifer Smith included doxxing (including posting passwords to her online accounts), posting intimate photos with the suggestion they were of Smith (though without her face), rifling her personal journal and emailing private information to her contacts, posting fake profiles of her to sites "dedicated to prostitution, sexual fetishes, and other sexual encounters", bomb threats, tricking a friend of Smith's into calling the police to her house, death and rape threats, and sending "images that likely constitute child pornography" to her family and friends.
Lin used various privacy services to maintain his cover: logging in via Tor, to conceal his IP address; VPN services; anonymised international texting services; and offshore private e-mail providers.
However, the complaint revealed, he made a fundamental error by using a work computer for some of his campaign, and even though he'd been terminated and the OS reinstalled on the machine, there were footprints left behind for investigators to associate Lin with the 16-month campaign against Smith.
Key details turned up by investigators included:
Lin's most-visited Website was the TextNow anonymous texting service;
Lin had a Proton Mail account;
There were "artefacts" indicating he used PureVPN; and
Similar artefacts suggesting he'd accessed his Gmail account from the machine.
"Further, records from PureVPN show that the same email accounts - Lin's Gmail account and the teleprtfx Gmail account - were accessed from the same WANSecurity IP address," the document stated.
And that's where the surprise came in - at least for those that believed a VPN is a complete protection: "Significantly, PureVPN was able to determine that their service was accessed by the same customer from two originating IP addresses" (those IP addresses were at Lin's work and home addresses).
As the investigators note, Tweets from Lin showed he knew there was some risk of logging from VPN providers. As recently as June, he posted a Tweet critical of provider IPVanish about its logging claims:
"There is no such thing as a VPN that doesn't keep logs. If they can limit your connections or track bandwidth usage, they keep logs."
If found guilty, Lin faces up to five years in prison and up to three years of supervised release. ®
Thanks for posting this! PureVPN's "privacy policy":
yada yada