Jawa the cat

Security

We believe that safe, private, and secure internet access these days is a basic human right. While it’s easy to take it for granted in the western world, millions of people are still at risk due to surveillance done by ISPs, governments, and corporations. A reliable VPN can be an effective solution, but how can you be sure your VPN provider is truly trustworthy?

It’s always worth it to look at the technical and security features that your VPN offers. This may get a bit technical, but we promise to keep it straightforward!

What sets AzireVPN apart in the highly saturated VPN market is our unique privacy and security features. Be sure to browse the internet with peace of mind, knowing that AzireVPN has got your back when it comes to privacy.

Blind Operator mode

If there’s one feature that truly makes us stand out among other VPN services out there, it’s Blind Operator.

This unique security measure is designed to completely disable both remote and local access to our servers, creating a barrier against unauthorized modifications and traffic interception. It makes it virtually impossible for anyone, including our employees, to modify, or to tap the traffic on our servers.

Blind Operator works by disabling both SSH and console access on our servers. This means that even if an attacker were to gain physical access to the server, they would be unable to use these methods to access or extract sensitive data.

To achieve this level of security, we’ve removed GeTTY, the Unix-based system program that enables command-line interface access, as well as sshd, the daemon used for remote access.

This means:

  • No local access (Console, Serial, etc.)
  • No remote access (SSH)
  • Magic SysRq keyboard shortcuts disabled

Hardware

At AzireVPN, privacy starts at the hardware level. We own 100% of our server infrastructure, and all of our servers run without hard drives, ensuring that no data can be stored on the physical hardware. The servers are remotely operated using our own PXE environment to boot them. This approach loads the server image directly into RAM, ensuring that all data is wiped clean with every reboot, maintaining the highest level of security and privacy.

Most of our hardware is powered by a quad-core Intel Xeon CPU and 64 GB DDR4 RAM with 10GE uplinks. The servers are free of hard drives, SATA cables are removed, and all unused ports are glued shut. Intrusion alerts trigger custom code execution, such as a kill switch. We also use refurbished hardware to extend the lifecycle of our servers as much as possible, ensuring both sustainability and reliability.

We’ve been doing this from the very beginning, ever since Azire was established in 2012, and it's something we're truly proud of. To learn more about the journey AzireVPN servers go through, check out our video here, where we walk you through each step in detail.

No logging

We uphold a strict no-logging policy, which means that we don’t retain any access logs, traffic logs, DNS logs, or any other data that could potentially identify our users.

You can be sure that:

  • AzireVPN does NOT log any traffic or user activity while using our service
  • AzireVPN does NOT log timestamps or any information relating to when a user connects/disconnects from our service
  • AzireVPN does NOT log or shape any bandwidth on our servers
  • AzireVPN does NOT log the original IP addresses of our users when they connect OR their AzireVPN IP address when they are using our service
  • AzireVPN does NOT log the number of your active sessions or total sessions
  • AzireVPN does NOT log your DNS requests on our servers