- VPN
Privacy-friendly VPN, no logs, anonymous payment methods, and Tor and I2P access Supports OpenVPN and WireGuard.
Scores
- Guaranteed no KYC
- Terms explicitly state KYC will never be requested.
-
Guaranteed no KYC +25 0
-
Verified 0 +10
Thoroughly tested and verified by the team. But things might change, this is not a guarantee. Read more about the listing statuses.
Check out the proof.
0 Privacy+10 Trust -
Strict no-log policy +5 +3
The service has a strict no-log policy, which means that it does not collect or store any information about its users.
+5 Privacy+3 Trust -
Open source code 0 +7
The source code of the service is publicly available and licensed as open-source. This allows the community to audit the service, though it doesn’t guarantee security or quality.
0 Privacy+7 Trust -
Accepts Monero +5 0
This service accepts Monero, a privacy-focused cryptocurrency that provides enhanced anonymity.
+5 Privacy0 Trust -
Has Onion or I2P URLs +5 0
-
No registration needed +5 0
Users can access and use the service without creating an account. This enables a faster and more convenient user experience while also offering enhanced privacy and anonymity.
+5 Privacy0 Trust -
No JavaScript needed +1 0
The service does not require the user to enable JavaScript in order to access and use its features.
+1 Privacy0 Trust - Base score +50 +50
Overall = 60% Privacy + 40% Trust (Truncated)
Terms of Service Review
Cryptostorm offers a no-logging VPN service with a token-based authentication model, ensuring user anonymity and freedom from censorship. They do not host content or track user activity.
No Logging
The company states they do not log anything you are doing. They simply pass encrypted packets and do not host content, serve resources, or log anything.
Token Authentication
Access is gained via a valid network access token. This means there’s no way they can “shut off” an individual customer, even if they wanted to.
DMCA Response
They receive hundreds of DMCA letters weekly but respond with explanations of their operational model and member-agnostic authentication topology. Users are never exposed to these DMCA harassment letters.
Prohibited Use
Users are asked not to send massive volumes of spam, engage in hacking/DDoS attacks, or push child porn/terrorist-related activities through their network.
Reviewed from cryptostorm.is/tos
ToS reviews are AI-generated and should be used as a reference only.
Events
View all-
Service updated
Service URLs updated from https://cryptostorm.is/ to https://cryptostorm.is. Description was updated
-
Attribute change
An attribute was removed (details unavailable)
-
KYC update
KYC level changed from 1 to 0
Verification
Learn moreThoroughly tested and verified by the team. But things might change, this is not a guarantee.
Comments
Pros: They answer by mail and try to help. Ability to create keys locally on your PC. Ability to pay XMR
Cons: An old inconvenient site. Long search for setup instructions. The instructions are old. There is no button to log out of your personal account. I don’t understand why the rating is so high.
I do like how they open sourced almost everything. Port forwarding is allowed also. I’m bypassing their device limitation with VPN router as they recommended in their site.
I’m still hopping between various VPN but as of right now, I can recommend CS for torrent user.
Really appreciate what Cryptostorm is doing for privacy. No account needed at all — just use a token and you’re in. It’s one of the few VPNs that still take anonymity seriously, plus the Tor and I2P support is a huge bonus.
I haven’t tried their service yet, but since they support Monero (XMR) payments, I believe that adds significant value.
Fantastic service for the privacy-minded, no account or KYC required, not even an email address. I have been using them for 6 years now. The instructions are not outdated, they are intended for advanced users and work fine.