- Proton VPN doesn’t use RAM-only servers, arguing they offer no additional security over full-disk encryption on hard drives.
- Full-disk encryption ensures data on hard drives is secure and inaccessible without proper authentication, even when servers are powered off.
- Proton VPN prioritizes a strict no-logs policy, independent audits, and operating servers in privacy-friendly jurisdictions to protect user privacy.
Very unconvincing. The only point they bring up which actually precludes RAM-only servers is hard drive encryption, which they only need to do because they store data on a hard drive. The whole article reads like them trying to justify a choice they’ve already made rather than a legitimate comparison RAM-only versus hard drives.
Their first point is literally that RAM-only doesn’t help when the power’s on. That’s like saying you shouldn’t wear a seatbelt because it doesn’t protect against someone smashing your window. That’s just not what it’s for.
I largely agree. The title and opening words are misleading. The rest of the article is much more clear that they are defending their position of using VPN software that relies on storage and securing it with full disk encryption.
Also, full disk encryption doesn’t solve everything. If an attacker has access to the running server, the disk is unencrypted. At that point, reading files is much easier than reading RAM from a running process.