TL;DR
No-logs means the provider does not keep activity logs such as your source IP ↔ destination mapping or browsing history. It does not mean zero data ever — some ephemeral service metrics (load, session count) may exist to operate the network.
Prefer providers with independent audits, RAM-only infrastructure, robust kill switch and DNS/WebRTC leak protection. Verify your setup with quick user-side tests.
What “no logs” means (and what it doesn’t)
- Typically NOT kept: visited sites, traffic contents, long-term source IP ↔ account correlation.
- May exist transiently: active session counters, anonymised performance metrics, crash reports (opt-in is best).
- Still identifiable without care: logins to your accounts, browser cookies, device IDs, behavioural fingerprints.
A VPN hides your IP and encrypts traffic between your device and the VPN server. It does not anonymise logged-in behaviour on websites and apps.
Telemetry & app analytics
Good VPN apps separate privacy from product analytics:
- Opt-in diagnostics only, with clear toggles.
- No third-party ad SDKs inside the VPN client.
- On-device crash logs scrubbed of user identifiers.
In settings, disable anything you don’t need. On Android: Settings → Apps → <VPN> → Notifications — keep a foreground status to reduce OS-kill risk.
Audits, incidents & jurisdictions
Marketing is cheap; audits and track record aren’t. Prefer providers that:
- publish independent no-logs audits (and repeat them),
- run RAM-only or diskless servers (wipes on power-off),
- document incident handling when an endpoint is seized/compromised,
- state clearly how legal requests are handled (and what data they don’t have).
Jurisdiction matters, but so does infrastructure. A well-run network with RAM-only nodes and minimal access beats a poor network in a “privacy-friendly” country.
5 quick checks you can run
- Kill switch: Pull the WAN cable / toggle flight mode. Traffic should stop instantly until the tunnel returns.
- DNS leaks: Visit a leak-test site. Resolvers should be the VPN provider’s, not your ISP.
- WebRTC leaks: In your browser, disable WebRTC local IPs or use an extension; confirm external IP equals VPN server.
- Split tunnelling sanity: Ensure sensitive apps are inside the tunnel; UK banking/work apps can be excluded if they dislike VPN egress.
- Auto-connect: Set “Always-on” + “Block connections without VPN” (Android 9+). Reboot and confirm it sticks.
Guides: IP/DNS/WebRTC leaks — UK • Best VPN Settings (UK).
Notes for UK users
- ISPs can profile unencrypted traffic. A VPN limits that visibility, especially on public Wi-Fi.
- For restrictive networks (office/hotel), use OpenVPN TCP/443 as a fallback; return to WireGuard for speed.
- Smart TVs & consoles: consider a router-level VPN with policy routing.
Trusted providers to consider
Shortlist prioritised for UK: repeated audits, RAM-only infra, working kill switch/DNS protection, stable UK endpoints.
Provider | Why it fits “no-logs” users | Notes |
---|---|---|
NordVPN | Independent audits, RAM-only, NordLynx (WireGuard). Strong UK/NL performance. | Great apps; Threat Protection optional. |
Surfshark | Audited, unlimited devices, CleanWeb. Good value, quick UK endpoints. | Simple UI; reliable streaming as a bonus. |
ExpressVPN | Audited RAM-only (“TrustedServer”), Lightway protocol. | Often pricier; very consistent on tricky networks. |
See also: Best VPN for the UK.
Video unavailable? Open it on YouTube:
FAQ
Are no-logs VPNs legal in the UK? Yes. Using a VPN is legal; illegal acts remain illegal with or without a VPN.
Does no-logs mean zero data kept? No. Basic, short-lived service metrics may exist. The key is no activity logs that identify what you did.
How do I trust the claim? Look for independent audits, RAM-only infra, and a clear history of handling incidents transparently.