Protect your privacy and bypass restrictions with Xeovo VPN and stealth proxies. Self-funded VPN company based in Finland. In operation since 2016.


The exchange ToS do not mention that it will ever request the user for a KYC verification.

Strict no-log policy No personal information needed Strict no-KYC policy Account needed to use the service Source code is private No JavaScript needed
(updated 19 hours ago)
ToS Review ?

Automated, ai-driven monthly ToS reviews.

Last Check: 2024-02-16

Account termination/blocking

User accounts may be terminated in cases of sharing accounts or committing crimes, as stated in the 'Subscriptions' and 'Illegal activities' sections respectively.

ToS section: "Subscriptions, Illegal activities"

Show non-conflictive ToS reviews

Transaction Monitoring

There is no mention of Xeovo monitoring user transactions or activities related to cryptocurrency in the sections provided.

ToS section: "Not applicable"

User Identification

The provided sections do not specify a requirement for users to verify their identity.

ToS section: "Not applicable"

3rd Party Data Sharing

The sections provided do not mention the sharing of user data with third parties. However, users are advised to refer to the Privacy Policy for detailed information.

ToS section: "Privacy policy"

Data sharing with authorities

According to the provided sections, there is no explicit mention of sharing user data with authorities, government agencies, or law enforcement.

ToS section: "Illegal activities"


Xeovo claims not to log any activity of its users, as explicitly stated in the provided text.

ToS section: "Logging"

Blocking of funds

The text does not explicitly discuss blocking or freezing of user funds. Nevertheless, it is noted that cryptocurrency payments are non-refundable.

ToS section: "Refund policy"

Transaction flagging

There is no mention of a system for flagging suspicious transactions in the provided text.

ToS section: "Not applicable"

Matrix Comments ?

Beware of fake reviews and accounts. Verify user profiles and conduct your own research.