July 26th, 2024

Why Proton VPN doesn't use RAM-only VPN servers

Proton VPN does not use RAM-only servers, arguing their security benefits are overstated. Instead, it relies on full-disk encryption, a no-logs policy, and strong privacy protections for user data.

Read original articleLink Icon
Why Proton VPN doesn't use RAM-only VPN servers

Proton VPN does not utilize RAM-only servers, despite their perceived security advantages over traditional hard drive servers. While RAM-only servers are promoted for their ability to erase data upon shutdown, Proton VPN argues that the security benefits are overstated. If a server is running, data can be accessed regardless of whether it is stored in RAM or on a hard drive. Proton VPN employs full-disk encryption on its hard drives, ensuring that data remains inaccessible without proper authentication, even if the server is seized while powered off. This encryption is robust, using AES-256 and off-site key storage to enhance security.

Proton VPN emphasizes a strict no-logs policy, verified through annual third-party audits, ensuring that even if servers are compromised, no user data is available. The company also considers the legal jurisdiction of its servers, opting for locations with strong privacy protections. While RAM-only servers may offer operational benefits, such as consistency and ease of updates, Proton VPN prioritizes the security provided by full-disk encryption. The company believes that effective privacy measures include a no-logs policy, regular audits, and the use of secure protocols. Ultimately, Proton VPN maintains that RAM-only servers do not provide significant privacy or security advantages compared to their encrypted hard drive approach.

Link Icon 12 comments
By @neilalexander - 6 months
A downside to having persistent storage that is not mentioned is that a server could potentially be compromised in a way that survives restarts. No amount of disk encryption will protect you from that.

If the machine has no persistent storage and boots from a medium that is provably read-only (i.e. a DVD or a netboot image), it's always going back to a known state every time it comes back up.

By @999900000999 - 6 months
What a strange article.

The obvious benefit of having a ram only vpn is eventually it will be shutdown or rebooted. An encrypted hard drive will have its data stored for practically the rest of time.

Nothing in this article tells me why Proton VPN is better than a Ram vpn.

By @Beijinger - 6 months
Switzerland had security scandals before.

https://en.wikipedia.org/wiki/Crypto_AG

And Proton does not inspire confidence.

https://expatcircle.com/cms/the-not-so-private-privacy-email...

By @neilv - 6 months
You have to read the whole argument, to get past "Full-disk encryption achieves the same end" where they're equating the encrypted-on-disk with ephemeral RAM.

Only once you get to a later claim that the logs they store on local disk "contain no personal information" (they claim; even in event of error?) is the earlier claim arguable for a relevant threat model.

By @infotapeworm - 6 months
-1 for Proton services

This does not inspire confidence, and only displays their mediocrity and technical incompetence.

By @photonbeam - 6 months
The updates section seems odd to me

Are they unaware that you can update the OS running on ramdisk just like you can with regular disk?

By @thayne - 6 months
> RAM can be just as easily accessed as hard disks if the computer is on

Ok. But that doesn't protect you from cases where it is off. Like if the hard drive is confiscated or stolen.

> Full-disk encryption achieves the same end

Not entirely. The decryption key could be compromised. Or someone might figure out may have some way to crack the decryption (unlikely, but not impossible).

> A good VPN service has no logs worth seizing anyway

That is half of a good argument. The other half would be "and we disable swap so that parts of memory don't accidentally end up on disk". But they don't mention swap.

> Location, location, location

That might help against government seizure, but what if the disk is stolen?

By @daveoc64 - 6 months
>And, of course, Portion VPN itself is headquartered in Switzerland

Autocorrect?

By @cyberpunk - 6 months
> “The result is that seizing our servers when powered off will yield no more information than seizing RAM-only servers.”

This is just false. If your servers are seized I guarantee they also want your disk encryption password. How to prevent it? No disk, and no way into the OS without booting it with some special arguments.

By @theovermage - 6 months
Awesome. Can we have stable Linux clients now thanks.
By @dtx1 - 6 months
Proton is a honeypot and articles like this essentially prove that. What absolute nonsense.