PoodleVPN Infrastructure Audit
This page displays a transparency audit of a real PoodleVPN production server.
Sensitive fields (keys, endpoints, hostnames) were redacted.
No logs, no identifiers, and no metadata are retained.
Last Updated
December 2025 — PoodleVPN Switzerland Server
Full Audit Screenshot
This is the exact terminal output captured live from our audit.
All sensitive identifiers were redacted.
This image is hosted locally on this server.
What This Audit Confirms
- ✔ No session logs (wtmp, btmp, lastlog are zeroed)
- ✔ No root history (history wiped, HISTFILE disabled)
- ✔ rsyslog disabled (no system log persistence)
- ✔ journald RAM-only (Storage=volatile)
- ✔ No persistent journal in /var/log/journal
- ✔ WireGuard non-logging mode
- ✔ No account system (manual keys only)
- ✔ No analytics / telemetry
- ✔ No connection tracking logs in firewall
How We Perform Audits
PoodleVPN conducts internal audits before every transparency publication:
- • No user-identifying data exists
- • No network logs or timestamps
- • No metadata stored anywhere
- • All logs that must exist are RAM-only
Future Plans
PoodleVPN will expand transparency with:
- • Third-party audits
- • Signed, reproducible configurations
- • Open-source deployment methods
- • Continuous transparency reports
Contact
Audit or transparency questions:
Telegram: @mrpoodles
Email: [email protected]