Share

cover art for IVPN Breaks Industry Silence on Logs, Audits & Affiliate Scams

Techlore Talks

IVPN Breaks Industry Silence on Logs, Audits & Affiliate Scams

•

Viktor Vescei from IVPN gives us a brutally honest VPN interview. He admits you can't truly verify no-logs claims, explains why most audits are "snapshots in time," and reveals why IVPN shut down their affiliate program due to industry-wide misinformation. This is an insider's perspective on what's really broken in the VPN industry and how to actually evaluate providers. Techlore empowers individuals with practical digital privacy knowledge, security tools, and advocacy resources. Discover how to protect your online data and regain control of your digital identity.


šŸ“± RESOURCES IN VIDEO:

• https://www.ivpn.net/


Timestamps:

00:00:00 - Intro

00:01:54 - Viktor's background & journey to IVPN

00:04:47 - IVPN's 15-year history

00:07:33 - VPN company ownership & acquisition attempts

00:11:24 - IVPN's brutally honest blog

00:12:56 - White labeling in the VPN industry

00:15:55 - VPN use cases beyond privacy

00:19:04 - Using a VPN for streaming?

00:20:17 - Compartmentalization techniques

00:21:32 - Normalizing VPN usage

00:22:27 - Privacy vs. streaming compatibility

00:25:32 - Websites blocking VPN users

00:29:04 - VPN technology deep dive

00:30:11 - Are VPN comparison charts useful?

00:34:29 - VPN jurisdiction & the "eyes" debate

00:42:09 - Multi-hop VPN connections

00:44:38 - Threat modeling for VPNs

00:45:30 - Picking a VPN server location

00:48:44 - Transparency reports & warrant canaries

00:52:04 - VPN logging: the uncomfortable truth

00:54:42 - Why VPN audits are "snapshots in time"

00:55:28 - Diskless servers explained

00:57:17 - System transparency project

01:00:09 - Being an open source VPN

01:01:54 - VPN payment methods (cash & Monero)

01:06:09 - Simultaneous device limits

01:09:58 - WireGuard history & privacy issues

01:14:34 - First-party vs. rented servers

01:19:35 - Sponsors & affiliate program problems

01:32:15 - VPN provider relationships behind the scenes

01:35:04 - Acquiring Safing (Portmaster)

01:37:08 - DNS filtering plans

01:38:39 - Firewalls (Safing Portmaster integration)

01:40:50 - Safing SPN network

01:42:05 - IVPN's 2025 roadmap

01:44:33 - Outro

—

Keep Techlore Independent:

• Become a Techlorian: https://discuss.techlore.tech/s

• Patreon: https://www.patreon.com/techlore

• YouTube Memberships: https://www.youtube.com/channel/UCs6KfncB4OV6Vug4o_bzijg/join

• Affiliate Links: https://techlore.tech/affiliates

• All Support Methods: https://techlore.tech/support

More episodes

View all episodes

  • Telecom Insider Explains What Your Carrier Actually Sees (Cape Interview)

    01:31:05|
    David Dunn from privacy-focused cellular carrier Cape talks about how to break down what carriers actually collect, how threats like IMSI catchers and SIM swaps work, and how Cape is building a mobile network specifically designed to minimize that exposure.ā±ļø TIMESTAMPS00:00:00 INTRO00:01:01 WHAT CELLULAR CARRIERS SEE00:02:50 THE CONCERNS00:04:08 ABUSE OF DATA00:05:28 LTT SIM SWAP ATTACK00:06:33 PHONE CALL BEHIND-THE-SCENES00:12:24 CELL TOWER TRIANGULATION & GEOFENCING00:15:32 LOCATION SERVICES00:16:25 CALL DATA & SMS RECORDS00:19:24 SMS VS. EMAIL SECURITY00:20:23 SIM SWAPPING + IMSI CATCHERS00:24:09 CELL TOWER TRIANGULATION + GEOFENCING SOLUTIONS00:26:38 CALL DATA RECORD + SMS SOLUTIONS00:28:48 WI-FI CALLING00:30:54 SS7 SIGNALING ATTACK PROTECTION00:32:25 4G VS. 5G PRIVACY00:36:34 USER AGENTS + CUSTOM ROMS00:42:15 DEVICE PROTECTION00:46:06 CAPE'S APPROACH00:55:01 MOBILE CORE00:59:18 CDR DELETION01:00:06 IMSI ROTATION01:00:52 OTHER USER CONFIGURABLE OPTIONS01:04:05 PHONE NUMBER REPUTATION01:05:29 ISSUES WITH PRIVACY TOOLS01:08:22 OBSCURA01:10:48 REGISTRATION01:13:04 TRUST & VERIFICATION01:15:37 COMPATIBILITY01:17:33 AVAILABILITY01:17:54 ROAMING01:18:36 LAW ENFORCEMENT REQUESTS01:21:15 PALANTIR01:23:25 PROTON PARTNERSHIP01:25:05 WHO IS CAPE FOR?01:26:43 TELL US SOMETHING SHOCKING01:29:28 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • Why This Linux Distro Is Growing Faster Than Ever (Zorin OS Interview)

    01:12:13|
    Artyom Zorin, co-founder and lead developer of Zorin OS, explains why this Linux distribution is seeing explosive growth, its user-friendly approach, business models & incentives, privacy, open source, and more.ā±ļø TIMESTAMPS00:00:00 INTRO00:02:55 ZORIN OS VS. UBUNTU00:04:14 PACKAGE COMPATIBILITY00:07:01 OPEN SOURCE? FREE?00:11:46 BUSINESS MODELS + INCENTIVES00:14:48 TARGET DEMOGRAPHIC00:16:00 PRIVACY BY DEFAULT00:17:51 SECURITY MODEL00:19:48 WHY UBUNTU?00:21:16 DESKTOP ENVIRONMENTS00:25:03 RELEASE SCHEDULE00:26:26 COMPATABILITY LAYERS00:28:52 ARM SUPPORT00:32:32 PROFESSIONAL +CREATIVE SOFTWARE00:36:43 DEFAULT APP CHOICES00:39:19 ZORIN GRID00:42:22 ZORIN EDUCATION00:43:35 DEVICES + INSTALLATION00:47:50 ZORIN OS LIMITATIONS00:50:26 DUAL BOOT00:51:30 THE ZORIN TEAM00:52:58 LOCATION00:53:12 OPEN SOURCE + GIVING BACK00:56:24 DOWNLOADS00:59:17 WINDOWS 1001:01:09 AI01:07:23 THE FUTURE OF ZORIN OS01:09:49 MOBILE DEVICES?01:10:35 HOW TO FOLLOW01:11:18 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • Ad Blocking, Search Independence, and the Hidden Web | JP Schmetz (Ghostery / Brave Search)

    01:27:08|
    Most ad blockers start by blocking everything—then you become tech support for friends & family when pages break. Henry interviewed JP Schmetz, founder of Brave Search and CEO of Ghostery, about making trackers visible, why there are only 3 search indexes in the world, reinventing the open web with AI, and how to avoid becoming "the family CTO."ā±ļø TIMESTAMPS0:00:00 INTRO00:01:32 ORIGINS WITH GHOSTERY00:03:15 SEARCH ENGINES + BROWSERS00:06:32 GHOSTERY'S BROWSER EXTENSION00:09:09 THE PRIVACY DISCONNECT00:13:02 REAL WORLD IMPACTS00:16:03 PRIVACY VARIES BY LOCATION00:16:47 PAGE BLOCKING + BREAKING00:24:06 ADAPTATION + TRUST00:28:48 ROLES AT GHOSTERY + BRAVE00:29:22 OPEN SOURCE00:30:38 BRAVE SHIELDS OR GHOSTERY?00:32:36 SUGGESTED CONFIGURATIONS00:40:13 WHOTRACKS.ME00:44:30 WHAT IS A TRACKER?00:47:39 WHAT ARE THE INCENTIVES?00:50:31 DOES BLOCKING = NO DATA SHARING?00:53:50 THE INVESTIGATIVE PROCESS00:57:27 PRIVATE SEARCH01:00:11 META SEARCH VS. INDEPENDENT INDEX01:02:30 CONTEXTUAL VS. TARGETED ADVERTISING01:06:28 BRAVE SEARCH ADS01:08:16 INDEXES01:10:53 AI + SEARCH01:19:43 WHAT'S NEXT?01:22:22 PUBLISHING + INCENTIVES + THE FUTURE01:25:30 HOW TO FOLLOW🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • Why This Password Manager Requires a Private Key (Passbolt Interview)

    48:41|
    Most password managers use your master password as the encryption key—which means it can be phished and brute-forced. Passbolt uses a random private key instead. Henry interviewed co-founder Remy Bertot about why they optimized Passbolt for teams, how granular permissions prevent credential leaks, and why self-hosting matters for businesses.ā±ļø TIMESTAMPS00:00 INTRO01:20 PASSBOLT TARGET DEMOGRAPHIC05:52 PASSWORD MANAGER BASICS06:51 PASSBOLT TYPICAL CUSTOMER07:41 PASSWORD MANAGER OPTIONS10:33 ATTACKS ON BUSINESSES13:17 PASSBOLT BUSINESS MODEL16:24 SELF-HOSTING19:22 PROPRIETARY TECHNOLOGY22:09 SUITE VS. FOCUSED PRODUCT24:12 FEATURE REQUESTS25:49 EMAIL ALIASING27:04 PASSKEYS28:54 MANIFEST V3 + BROWSERS30:26 PASSKEYS (CONT'D)33:30 TOTP36:49 INTEGRATIONS37:59 TWO PASSWORDS?42:09 REMY'S FAVORITE PW MANAGER43:39 COMMON MISTAKES?44:38 HIDING TOTP SEEDS46:49 FINAL THOUGHTS47:30 HOW TO FOLLOW47:51 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • Why Everyone Should Use an Ad Blocker (AdGuard Interview)

    01:04:12|
    Ad blockers have broad permissions to intercept all your web traffic—which means you need to know which ones to trust. Henry interviewed the CTO and co-founded of AdGuard about why they pivoted from data collection to privacy protection, how DNS filtering differs from local ad blocking, and Apple's revolutionary new API that lets ad blockers work system-wide on iOS without ever seeing your traffic.ā±ļø TIMESTAMPS0:00:00 INTRO00:06:04 PRE-SNOWDEN VS. POST-SNOWDEN00:07:58 TYPES OF FILTERING00:15:03 LOCAL FILTERING VS. DNS & VPN00:18:14 INTERCEPTING WEB TRAFFIC CONCERNS00:21:27 ADGUARD VS. BROWSER SOLUTIONS00:26:15 ADGUARD EXTENSION VS. OTHERS00:31:15 ADGUARD FILTERING VS. OTHERS00:32:04 ADGUARD HOME00:34:08 PRICING STRUCTURE00:35:52 BASED IN CYPRUS?00:38:25 OPEN SOURCE?00:41:04 THE AD BLOCKING ECOSYSTEM00:44:26 MITIGATING ATTACKS00:51:13 THE ROLE OF AD BLOCKING00:54:37 APPLE'S NEW API00:57:38 COMPARISON TO DNS FILTERING00:58:56 ETA FOR THESE UPDATES00:59:43 APPLE'S PATTERN01:00:58 BLOCKING APPLE DOMAINS01:02:28 WRAPPING UP🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • The Chat App that Can't Go Down (Holepunch + Keet Interview)

    01:15:07|
    Peer-to-peer networks have no servers—just devices talking directly to each other. Henry interviewed Mathias Buus Madsen, CEO of Holepunch, about how BitTorrent handled 40 million users without servers, why their messenger Keet can't go down even when usage spikes, their new P2P password manager, and how P2P apps are more energy efficient than data centers.šŸ”— LINKSHolepunch: https://holepunch.to/Keet Messenger: https://keet.ioPears: https://pears.comPear Pass: https://pass.pears.comā±ļø TIMESTAMPS0:00:00 INTRO00:01:25 WHAT IS PEER-TO-PEER (P2P)?00:03:16 BENEFITS OF P2P00:05:38 GETTING STARTED IN P2P00:08:43 NEGATIVE P2P ASSOCIATIONS00:14:13 P2P CENSORSHIP RESISTANCE00:17:14 P2P SAFETY00:21:29 KEET (P2P MESSENGER)00:26:21 OPEN SOURCE?00:27:12 BEING SERVERLESS00:31:04 OPEN SOURCE VS. CLOSED SOURCE00:34:05 ARE UPDATES P2P?00:34:33 IS THERE AN APK?00:35:37 BACKGROUND SYNC00:39:27 WHAT ELSE DOES HOLEPUNCH WORK ON?00:42:04 MORE INFO ON THE STACK00:45:00 FUNDING + TETHER00:48:09 P2P PASSWORD MANAGER?00:54:48 AUDITS00:55:57 AVAILABLE ON LINUX?00:58:33 CENTRALIZED/HYBRID P2P?01:01:49 P2P DOWNSIDES?01:05:01 APPLE FINDMY NETWORK01:07:16 ENVIRONMENTAL IMPACT01:11:48 SERVICE DOWNTIME01:12:52 HOW TO FOLLOW01:13:59 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • The Messaging App With No User IDs (SimpleX Interview)

    01:53:03|
    SimpleX Chat is the only messaging network where users have no identifiers—no phone numbers, no usernames, no user IDs at all. Henry interviewed founder Evgeny Poberezkin about how unidirectional message pipes create a network where servers don't even know users exist, why this isn't federation, how it compares to Signal and Session, and why the company is based in the UK despite encryption battles.šŸ”— LINKSSimpleX: https://simplex.chatEvgeny's Website: https://www.poberezkin.com/about.htmlā±ļø TIMESTAMPS0:00:00 INTRO00:01:31 SIMPLEX NAME00:04:20 SIMPLEX TEAM00:05:10 SIMPLEX VS. MAINSTREAM MESSENGERS00:08:05 WHY THIS APPROACH?00:11:14 THE FUTURE OF SIMPLEX00:14:28 SIMPLEX NETWORK + FEDERATION00:20:46 REGISTRATION MODELS00:23:11 GOVERNMENT REQUESTS TO SIGNAL00:25:42 REGISTRATION MODELS (CONT'D)00:27:52 MESSENGER DISCUSSION?00:29:54 SIMPLEX LIMITATIONS00:31:00 WAYS TO USE SIMPLEX + SCALING00:37:27 OPEN SOURCE00:42:21 SIMPLEX ENCRYPTION + DENIABILITY00:54:00 SIMPLEX METADATA01:00:53 IP ADDRESS OBSERVATION01:05:02 USABILITY CHALLENGES01:09:53 MESSAGE DELIVERY01:10:58 OUTAGES01:13:14 MULTI-DEVICE SYNC01:13:56 DESKTOP ONLY?01:18:10 BATTERY IMPACT01:19:44 BACKGROUND SYNC01:21:50 FUNDING + SUSTAINABILITY01:30:38 JURISDICTION01:31:56 LEGAL + LIABILITY01:40:37 PRIVACY AS A MEANS, NOT AN END01:41:55 PRIVACY FOR THE MASSES VS. THE FEW01:45:27 WHAT'S NEXT FOR SIMPLEX?01:50:57 HOW TO FOLLOW01:52:09 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • It's Time for the VPN Industry to Innovate (Obscura Interview)

    01:09:20|
    You don't have to trust Obscura—you just have to trust that not both Obscura and Mullvad are compromised. Henry sat down with Carl, former Bitcoin Core developer and founder of Obscura VPN, to discuss how it's the first VPN that mathematically can't log your activity, what makes it censorship-resistant against networks like the Great Firewall, and what it really means to build privacy that's more than "a pinky promise."šŸ”— LINKSObscura: https://obscura.netGitHub: https://github.com/Sovereign-Engineering/obscuravpn-clientTrust, 2-Party Relays, and QUIC: https://obscura.net/blog/bootstrapping-trust/Mullvad: https://mullvad.netā±ļø TIMESTAMPS0:00:00 INTRO00:01:50 CARL'S BACKGROUND00:10:47 APPLE'S PRIVATE RELAY00:17:11 TRUSTLESS MODELS00:19:05 MULTI-PARTY RELAY PARTNERSHIP00:21:39 TRADITIONAL MULTI-HOP00:23:39 CENSORSHIP RESISTANCE00:27:33 MULLVAD VS. OBSCURA TRAFFIC00:29:35 EXIT IP00:30:18 BLOCKS, CAPTCHA, & SPLIT TUNNELING00:31:16 CUSTOM DNS00:32:41 PARTNERING WITH MULLVAD00:36:05 OBSCURA VS. PRIVATE RELAY00:37:10 OBSCURA VS. MULLVAD00:38:33 OBSCURA VS. DECENTRALIZED VPNS00:40:57 OBSCURA VS. TOR00:41:58 REPRODUCIBLE BUILDS00:50:23 CLIENTS & DEVELOPMENT TIMELINE00:55:24 SPEED00:59:06 DEFAULTS VS. CUSTOMIZATION01:00:48 PRICING01:02:43 OPEN SOURCE01:03:34 THE OBSCURA TEAM01:05:39 THOUGHTS ON THE VPN INDUSTRY01:07:49 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support
  • Why F-Droid Still Can't Get on iPhone (FSFE Lawyer Explains)

    01:20:46|
    The Digital Markets Act is a can opener for Big Tech's walled gardens, forcing Apple, Google, and Microsoft to open their platforms whether they like it or not. Henry sat down with Lucas Lasota from the FSFE (Free Software Foundation of Europe) to understand what the DMA actually does, why Big Tech is fighting it in court, and what it means for open source software and your digital freedom.Topics Covered:The Digital Markets Act explained - how the EU is regulating Big Tech platforms (and what's missing from the law)Interoperability: the "can opener" for competition - why forcing WhatsApp, Apple, and Google to work with smaller apps mattersApple's gatekeeping tactics - billion-euro barriers and why no independent app stores exist on iPhone yetSmall tech vs Big Tech - why 94% of EU software comes from companies with less than 9 employees (and why the DMA forgot them)Links:Free Software Foundation Europe (FSFE): https://fsfe.orgFree Software Foundation (FSF US): https://www.fsf.orgPublic Money, Public Code campaign: https://publiccode.euā±ļø TIMESTAMPS0:00:00 INTRO00:01:36 WHAT IS THE FSFE?00:04:12 LUCAS' ROLE AT FSFE00:05:44 INTRO TO THE DMA00:09:45 THOUGHTS ON REGULATION00:12:47 PUBLIC MONEY, PUBLIC CODE00:21:25 BREAKDOWN OF THE DMA00:30:54 DMA ENFORCEMENTS00:31:44 INTEROPERABILITY00:36:20 DMA ENFORCEMENTS (CONT'D)00:38:50 DMA CRITICISMS00:50:41 USB-C ON IPHONES00:53:03 APPLE'S "MALICIOUS COMPLIANCE"00:56:57 UNDERSTANDING THE EU01:02:12 EU COMMISSION & OTHER ORGANIZATIONS01:06:58 DMA'S GLOBAL INFLUENCE01:11:57 BIG TECH + INTERPRETATION OF LAW01:18:23 OUTRO🧔 SUPPORT TECHLOREKeep Techlore Talks independent & growing: https://techlore.tech/support