Updated February 2026 • Audited by PwC, Cure53, Trail of Bits, OSTIF

Transparency Center

Complete transparency through independent security audits, bi-annual transparency reports, warrant canary, and open-source client applications. Trust is earned, not claimed.

4
Independent Audits
2025
0
Data Disclosures
All time
100%
Open Source Clients
GitHub
CH
Swiss Jurisdiction
Outside 5/9/14 Eyes

Independent Security Audits

Zero-Logs Policy Audit

Verified
December 2025PricewaterhouseCoopers (PwC) Switzerland30 days
Full Report PDF

AUDIT SCOPE

Infrastructure, databases, application code, server configurations, logging mechanisms

KEY FINDINGS

PwC conducted a comprehensive 30-day audit of our entire infrastructure. They confirmed that PulsVPN operates a true no-logs VPN service with no user activity data, connection logs, timestamps, or IP addresses stored on any server or database. All servers were verified to be running in RAM-only mode with no persistent storage.

Infrastructure Security Penetration Test

Passed
October 2025Cure53 (Germany)45 days
Full Report PDF

AUDIT SCOPE

All VPN servers, network infrastructure, API endpoints, admin panels

KEY FINDINGS

Comprehensive security assessment of our entire VPN infrastructure including server hardening, network segmentation, and access controls. Cure53 performed extensive penetration testing on all 20+ server locations. Two medium-severity issues were identified in server firewall configurations and immediately patched. No critical vulnerabilities found.

Cryptographic Implementation Review

Verified
June 2025Trail of Bits (USA)20 days
Full Report PDF

AUDIT SCOPE

VPN protocols, encryption algorithms, key management, TLS implementation

KEY FINDINGS

In-depth review of our WireGuard and QUIC protocol implementations. Verified that all encryption standards comply with industry best practices: AES-256-GCM for data encryption, ChaCha20-Poly1305 for mobile, RSA-4096 for key exchange, and SHA-512 for hashing. Perfect Forward Secrecy implementation verified. No cryptographic vulnerabilities discovered.

Open Source Client Code Audit

Passed with Minor Issues
March 2025OSTIF (Open Source Technology Improvement Fund)35 days
Full Report PDF

AUDIT SCOPE

All client applications, update mechanisms, crash reporting

KEY FINDINGS

Security review of our Windows, macOS, Linux, iOS, and Android client applications. All client code was verified to match the published open-source repositories on GitHub. Three low-severity issues were identified in error handling and immediately fixed in version 2.5.1. No backdoors, tracking, or data leakage found.

Bi-Annual Transparency Reports

H2 2025 (July - December)

Published: January 15, 2026

Download Report
Legal Requests0

Zero valid legal requests received from any jurisdiction

DMCA Notices3

Three DMCA notices forwarded to account holders per Swiss law. No user identification possible due to zero-logs policy.

Government Requests0

No government data requests received

Data DisclosedNone

Zero user data provided to any party

H1 2025 (January - June)

Published: July 15, 2025

Download Report
Legal Requests0

Zero valid legal requests received

DMCA Notices5

Five DMCA notices received and forwarded. Unable to identify specific users due to no-logs policy.

Government Requests0

No government data requests received

Data DisclosedNone

Zero user data provided to any party

H2 2024 (July - December)

Published: January 15, 2025

Download Report
Legal Requests1

One request from non-Swiss authority rejected as invalid under Swiss law

DMCA Notices2

Two DMCA notices forwarded to account holders

Government Requests0

No government data requests received

Data DisclosedNone

Zero user data provided to any party

Understanding Legal Requests

PulsVPN AG is incorporated and operates under Swiss law. We are based in Zurich, Switzerland and only respond to valid Swiss court orders.

Even if legally compelled, we have no activity logs to provide. Our zero-logs policy means we cannot identify which user accessed which content, at what time, or from which IP address.

DMCA notices are forwarded to the account holder's registered email per Swiss copyright law. However, due to our no-logs policy, we cannot determine which specific user may have engaged in the alleged activity.

Warrant Canary

As of February 26, 2026, PulsVPN AG confirms the following:

  • No National Security Letters: We have never received any National Security Letters, FISA orders, or secret court orders of any kind.
  • No Backdoors: We have never been compelled to install backdoors, surveillance tools, or provide master keys to any government agency.
  • Zero Data Disclosures: We have never provided user data, connection logs, or activity information to any government, law enforcement, or intelligence agency.
  • Full Infrastructure Control: We maintain complete control over all our infrastructure. No third party has access to our servers or databases.
  • No Gag Orders: We are not under any gag order that prevents us from disclosing requests for user information.

Important: This warrant canary is updated with every transparency report (bi-annually). If this statement is removed, outdated by more than 6 months, or contains any modifications, you should assume we have received such an order that prevents us from updating it.

Open Source Commitment

All our client applications (Windows, macOS, Linux, iOS, Android) are 100% open source under the GPL v3 license. Anyone can audit our code, verify our claims, submit improvements, or fork the project. Transparency through code, not just words.

Questions About Our Transparency?

We're committed to being as transparent as possible while protecting user privacy.