Head's Up! VyprVPN is no longer owned by GoldenFrog and is based in Switzerland

Source

Certida LLC is a Texas based company, and this means all jurisdiction of privacy is now US based.

Not exactly sure when the company purchased GoldenFrog, as customers were given no information or announcement about this move.

I’ve been working with customer support for over 30 days trying to figure out why Vypr consistently shuts down connections and why certain US based servers (Seattle, especially), were being flagged as other countries. It’s not a coincidence this started after the sale.

In doing my own research because CS was less than helpful, I discovered this lovely bit of news.

Do with it as you must.

Meh…hopefully this means they are going to improve the Windows client so it doesn’t crash when the computer resets or loses Internet connection. Not to mention make the kill switch work properly.

Certida is new but the Texas ownership of the Swiss service isn’t.

I’d like to know more about Certida.

Update: Certida FAQ – VyprVPN Support

so are folks worried about privacy now with vyprvpn?

So criminals are still good on committing computer crimes with VyprVPN and can’t be identified with search warrants because they don’t have logs to associate with the users.

VyprVPN has been a Swiss company but run from Texas all along AFAIK

This is 100% correct.

This is insane, I had no idea. Honestly I don’t have other reasons to worry about this change other than the lack of transparency. We haven’t been informed and this definitely translates to a huge lost of trust on VyprVPN.

When being a user of any VPN services available out there we’re putting lots of trust on them, as they can access all of our traffic. I was trusting VyprVPN, but I definitely can’t trust them anymore if the fail to inform us of such an important change in the service.

Well, except that back when I did try out VyperVPN my ISP sent me a copyright claim they received from accidental file sharing from my account / IP, so they must log something despite claims to the contrary.

It’s on their website. I don’t see how it’s a big deal. To me it seems a generational change; the old ownership had been doing Internet stuff for literal decades.

There’s a ton of ways you can be exposed if using any VPN. Most relate to partial tunneling. For example, you could have per-app tunneling turned on. You could have existing connections established when the VPN is activated. You could be using your ISP for DNS lookups. A momentary disconnect could have reverted your connection to an un-tunneled state. Your ISP may have provided (or installed) “helpful” software on your computer–perhaps luring you with some streaming service–that facilitates their surveillance. And on and on.

It’s a challenge to find VPN advice articles that aren’t thinly-veiled advertisements, but a few (like this one) can be found.

If your ISP is flagging you, it’s virtually certain it’s because they directly observed your activity, not because they somehow accessed your VPN provider’s logs, which is a bit of a project (requiring subpoenas and of course requiring that the logs exist-- point being, it’s not a process of a few days).

Bottom line: It is almost 100% certain that something about your configuration or usage exposed what you were up to right at the very first node of your Internet access, your ISP. Whatever the issue, it is independent of your choice of VPNs and doesn’t involve the ISP accessing the VPN provider’s logs, especially if there aren’t any.

This is all good information and I’m glad you’ve shared it, but it likely didn’t apply to my setup. I run my own DNS sevrers for instance, and wouldn’t think of installing anything from my ISP. I only got DMCA letters on VyperVPN and have used 4 or 5 other VPN providers since. Maybe things have changed in the intervening years, but I rather doubt it.

Perhaps it was a brief interruption in service like you say. Regardless moving to other providers solved the issue.