Jawa the cat

Security

We believe that safe, private, and secure internet access these days is a basic human right. While it’s easy to take it for granted in the western world, millions of people are still at risk due to surveillance done by ISPs, governments, and corporations. A reliable VPN can be an effective solution, but how can you be sure your VPN provider is truly trustworthy?

It’s always worth it to look at the technical and security features that your VPN offers. This may get a bit technical, but we promise to keep it straightforward!

What sets AzireVPN apart in the highly saturated VPN market is our unique privacy and security features. Be sure to browse the internet with peace of mind, knowing that AzireVPN has got your back when it comes to privacy.

Blind Operator mode

If there’s one feature that truly makes us stand out among other VPN services out there, it’s Blind Operator.

This unique security measure is designed to completely disable both remote and local access to our servers, creating a barrier against unauthorized modifications and traffic interception. It makes it virtually impossible for anyone, including our employees, to modify, or to tap the traffic on our servers.

Blind Operator works by disabling both SSH and console access on our servers. This means that even if an attacker were to gain physical access to the server, they would be unable to use these methods to access or extract sensitive data.

To achieve this level of security, we’ve removed GeTTY, the Unix-based system program that enables command-line interface access, as well as sshd, the daemon used for remote access.

This means:

  • No local access (Console, Serial, etc.)
  • No remote access (SSH)
  • Magic SysRq keyboard shortcuts disabled

Hardware

At AzireVPN, privacy starts at a hardware level. Our team has personally brought and installed a top of the line kit of SuperMicro servers and a Juniper EX4300 switch to all our offered locations.

Our SuperMicro servers are powered by a quad-core Intel Xeon CPU, 12GB of RAM, and have no hard drive or CD-ROM drive. Instead, we use a custom PXE environment to boot our VPN servers. This approach loads the server image directly into RAM, making sure that all data is wiped clean with every reboot, maintaining the highest level of security and privacy.

No logging

We uphold a strict no-logging policy, which means that we don’t retain any access logs, traffic logs, DNS logs, or any other data that could potentially identify our users.

You can be sure that:

  • AzireVPN does NOT log any traffic or user activity while using our service
  • AzireVPN does NOT log timestamps or any information relating to when a user connects/disconnects from our service
  • AzireVPN does NOT log or shape any bandwidth on our servers
  • AzireVPN does NOT log the original IP addresses of our users when they connect OR their AzireVPN IP address when they are using our service
  • AzireVPN does NOT log the number of your active sessions or total sessions
  • AzireVPN does NOT log your DNS requests on our servers

When it comes to logging, what matters the most are the laws governing your VPN provider’s country. AzireVPN is based in Sweden, which means that we operate under Swedish jurisdiction. As part of the EU, Sweden doesn’t require us to log any data.

So, even if law enforcement, like the Stockholm police (who have visited us at the AzireVPN office before), would request information and we’d be obligated to provide what we have, due to our strict no-logging policy, we would have virtually no identifying data to share, other than possibly your username – which likely won’t be very useful to them anyway (pro tip: avoid using personally identifying information for your username).