The server, a standard VPN node, was physically removed by law enforcement
seeking potential logs tied to criminal activity. Unlike routine data requests, where Windscribe responds that it holds no user information, this marked a direct hardware confiscation.
Windscribe employs
RAM-only (diskless) servers that erase all data upon power loss or reboot, reloading a pristine Ubuntu installation each time. This eliminates persistent storage of connection timestamps, IP addresses, or browsing activity, aligning with its audited no-identifying-logs policy.
Security experts note that RAM disks effectively block casual forensics but warn that advanced techniques, such as
live memory dumps, if a seized device is powered on, could theoretically capture transient data, though unlikely here. Past incidents, such as the 2021 Ukraine seizures exposing unencrypted configs, prompted Windscribe’s full RAM pivot.
Dutch authorities seized a Windscribe VPN server located in the Netherlands as part of an undisclosed investigation. The Canadian provider quickly highlighted how its privacy-focused design thwarted any data recovery efforts.
cybersecuritynews.com