• Deloitte confirms PIA’s no-log claims, with servers running on RAM-only system for maximum privacy.
  • Independent audit verifies PIA’s infrastructure is not vulnerable to third-party exploitation, ensuring online activity remains private.
  • PIA offers full transparency with open-source apps and regular third-party audits, proving its commitment to data protection.
  • Socsa@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    6 months ago

    They don’t actually need to control the entrance nodes if they control the ISP. You can track TCP fingerprints through Tor with just exit nodes