• Deloitte confirms PIA’s no-log claims, with servers running on RAM-only system for maximum privacy.
  • Independent audit verifies PIA’s infrastructure is not vulnerable to third-party exploitation, ensuring online activity remains private.
  • PIA offers full transparency with open-source apps and regular third-party audits, proving its commitment to data protection.
  • Brkdncr@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    7 months ago

    How to you syslog or net flow to identify malicious actions if you’re not logging?