

The user’s email id will be stored by most services for subscription purpose and for sending information pertaining to promotions and payment etc. Logs could also help in detection and prevention for fraud. It helps in improving the existing infrastructure of the network.

Keeping logs can be important for many reasons to a company. However there could be many VPN companies that just give access to restricted foreign sports or video streaming websites, and it’s possible that they collect data and track activity. As a rule VPN services do not log their user’s activities or browsing habits.

VPN service however is committed to protect a user’s privacy, therefore they are restricted in the information they collect. Ryan Dochuk, the co-founder at Tunnelbear explained that they had decided to minimize the size of data collected and make transparent the privacy policy to fully aware their users about which information could be collected and its reason.Īlmost all online services collect some form of data from their users. TunnelBear, a VPN service company recently changed its privacy policy. They could be prone to lying, get attacked by any third-party or get compelled legally to collect information. Ian Goldberg, a professor and expert cryptographer from the University of Waterloo explains that any VPN system which has not even promised to retain or record data could still be compromised in three ways. Any traffic which is unencrypted can be read by them, or in extreme cases they can even redirect the traffic to malware or phishing sites etc. They could see which sites are accessed and read or modified. A VPN operator can access all the traffic just like your ISP provider when not using the VPN. This complete dependency on another company which is not your ISP could have its privacy risks. Now, this tool can be used by anyone for securing their private network or a coffee shop connection etc. The tool was majorly used by employees to access remotely their company network through a secure channel. VPN creates a secure and private tunnel between the user’s device and the distant server which is connected to Internet, thus securing your outgoing and incoming data from interception and snooping.
