Authorities have seized one of Windscribe's servers – but here's why your data is safe

Windscribe app logo displayed on screen
(Image credit: Thomas Trutschel / Getty Images)

Windscribe has revealed Dutch authorities seized one of its servers with the goal of fully analyzing it.

In recent months, authorities have had the best VPNs in their sights, but strict no-logging policies and secure server set-ups means no user information can be handed over.

No data to discover

Windscribe uses RAM-only servers, and was confident the Dutch authorities wouldn't access any user data. The VPN said "the only thing the authorities will find is a stock Ubuntu install."

RAM-only servers wipe all stored data as soon as they're unplugged. Windscribe, along with all leading VPNs, has a strict no-logs policy. This means none of your VPN browsing activity or identifiable information is collected and logged. Even if this data was collected, it would all be wiped as soon as the server was unplugged.

So, combining Windscribe's strict no-logs policy with its RAM-only set-up means Dutch authorities will see nothing.

In a later tweet, Windscribe said: "Once the server loses power, it has nothing on it besides a brand new Ubuntu install. Our operating system runs entirely in RAM so you can't spin up the server again in any modified capacity, any trace of Windscribe is off the machine once it's powered off."

This isn't the first time Windscribe has been pursued by authorities. In April 2025, Windscribe boss, Yegor Sak, appeared in a Greek court after being charged with an alleged offence carried out by a Windscribe user. The case was dismissed as Windscribe had no data to share and it showed how important no-logs policies are.

Cartoon of laptop with padlock on keyboard. White CCTV cameras are surrounding it, with a salmon pink background

(Image credit: J Studios / Getty Images)

Are RAM-only servers the best way to protect your data?

Alongside Windscribe, ExpressVPN and NordVPN are two of the biggest names operating RAM-only servers. The main argument for their use is their ability to erase on power-down and the lack of a physical hard disk drive (HDD). In some cases, data can be retrieved from an HDD, even after the server has been shut off.

Proton VPN doesn't use RAM-only servers. It operates full-disk encryption on all its hard drives. It said it uses "an AES-256 cipher and encryption keys that are long enough to resist any practical brute force attack." Proton VPN added that its encryption keys are stored "off-site."

It argues that seizing its powered off servers "will yield no more information than seizing RAM-only servers."

NymVPN is a newly launched decentralized VPN. Its COO, Alexis Rousell, replied to Windscribe's tweet and said "Our VPN relies on a diverse community of operators that only see one part of the network." Rousell added that they "don't even have the hardware" and said it uses zero-knowledge "to unlink the payment from the usage of the network."

There's arguably no right or wrong answer when it comes to using RAM-only servers – and the centralized vs decentralized VPN debate also has strong supporters on either side.

Above all else, having a fully audited, strict no-logs policy is most important. Regardless of how servers are run, if there's no data to retrieve then users are safe.

Disclaimer

We test and review VPN services in the context of legal recreational uses. For example: 1. Accessing a service from another country (subject to the terms and conditions of that service). 2. Protecting your online security and strengthening your online privacy when abroad. We do not support or condone the illegal or malicious use of VPN services. Consuming pirated content that is paid-for is neither endorsed nor approved by Future Publishing.

George Phillips
Staff Writer

George is a Staff Writer at Tom's Guide, covering VPN, privacy, and cybersecurity news. He is especially interested in digital rights and censorship, and its interplay with politics. Outside of work, George is passionate about music, Star Wars, and Karate.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.