A no-KYC VPS is a virtual private server you can buy without surrendering identity documents, a phone number, a billing address or a real name. At Cryptoservers we deliver one in roughly 60 seconds after your crypto invoice confirms — five tiers, four offshore jurisdictions, full root, 1 Tbps DDoS shield. No KYC means no KYC: it is not a synonym for "above the law", and we say so explicitly below.
Drei Listen, in einfacher Sprache: was wir nicht erheben, was wir noch benötigen, was optional ist. Kein Marketing-Geflüster, keine Sternchen, keine „vorbehaltlich Verifizierung"-Fußnoten.
Was wir von Ihnen NICHT erheben:
Was wir noch benötigen (Liefermetadaten, keine Identität):
Was optional ist:
Vier Schritte vom unbekannten Besucher bis zum Root-SSH auf einem frisch bereitgestellten VPS. Der längste Schritt ist die On-Chain-Bestätigung; alles andere wird in Sekunden gemessen.
Spezifikationen und Preise für die fünf Cryptoservers-VPS-Stufen. Gleiche Hardware, gleiches Netzwerk, gleicher KYC-freier Checkout — wählen Sie die Größe, die zu Ihrer Workload passt. Monatliche Abrechnung, keine Einrichtungsgebühr, jederzeit kündbar.
| Tier | vCPU | RAM | NVMe | Bandbreite | Price |
|---|---|---|---|---|---|
| Starter AMD EPYC 7443P |
2 | 4 GB DDR4 ECC | 60 GB | 1 Gbps unbegrenzt | $16.99/mo |
| Growth AMD EPYC 7443P |
4 | 8 GB DDR4 ECC | 120 GB | 2.5 Gbps unmetered | $26.99/mo |
| Business Intel Xeon Gold 6430 |
6 | 16 GB DDR5 ECC | 240 GB | 5 Gbps unmetered | $39.99/mo |
| Pro Intel Xeon Gold 6430 |
8 | 24 GB DDR5 ECC | 400 GB | 5 Gbps unmetered | $54.99/mo |
| Scale AMD EPYC 9454P |
12 | 32 GB DDR5 ECC | 640 GB | 10 Gbps unbegrenzt | $69.00/mo |
Das Argument dafür, einem Hosting-Unternehmen keinen Ausweis auszuhändigen — Datenschutz, Quellenschutz, Ad-Tech-Realität und ein kritischer Blick darauf, was KYC-Freiheit bietet und was nicht.
1. Privacy by default, not by upgrade. When a hosting provider collects ID at signup, that ID lives in their database forever — through breaches, acquisitions, subpoenas, employee turnover and the inevitable "we have updated our privacy policy" email five years later. The only data that cannot be exfiltrated is the data that was never collected. RFC 6973 calls this "data minimisation"; we call it not asking the question. The fewer fields you fill in to obtain service, the smaller the disclosure surface for the rest of the relationship.
2. Journalism, activism, dissent. A reporter publishing leaked documents, a researcher running a Tor relay, a developer hosting a censorship-circumvention tool, an activist coordinating on a self-hosted Matrix server — all of them benefit from not being on a list of "people who paid this hosting company in this country with this ID." The Electronic Frontier Foundation has documented the chilling effect of identity-tied hosting on speech for over twenty years. No-KYC is the operational answer.
3. The ad-tech tracking landscape. Modern identity collection is not a closed loop. ID-verification SaaS vendors (Onfido, Jumio, Persona) sit between you and the hosting company and retain their own copies. Customer-data platforms re-identify based on email + IP combinations. Even if your hosting provider is principled, the third parties they integrate with often are not. No-KYC at the front door collapses this graph: there is no record to be re-shared, re-sold or re-leaked.
4. Jurisdictional realities. No-KYC is not legal immunity and we do not pretend it is. Cryptoservers is incorporated in Saint Kitts and Nevis; we honour valid court orders served in that jurisdiction (see the <a href="/de/canary/">canary</a> for the current count). What no-KYC does is structurally limit what we can be compelled to hand over: nothing we never collected. A subpoena can produce only the records that exist. We have engineered the "exist" set to be small on purpose.
Further reading: the <a href="https://2019.www.torproject.org/about/overview" rel="nofollow noopener">Tor Project privacy primer</a>, the <a href="https://ssd.eff.org/" rel="nofollow noopener">EFF Surveillance Self-Defense guide</a>, and <a href="https://datatracker.ietf.org/doc/html/rfc6973" rel="nofollow noopener">RFC 6973 — Privacy Considerations for Internet Protocols</a> all document the threat model in more depth.
Der ehrliche Abschnitt. Wenn ein Hosting-Unternehmen behauptet, KYC-frei bedeutet grenzenlose Freiheit, lügt es. Hier steht, was KYC-Freiheit nicht bietet.
Illegal use is illegal regardless. CSAM, credible threats of violence, active phishing infrastructure and malware command-and-control are illegal in every jurisdiction we operate in. We accept abuse reports for these categories and act on them within 48 hours. No-KYC does not insulate any user from criminal law — it never has and we have never claimed otherwise.
In-country prosecution is unaffected. If your home country considers what you are doing illegal, the fact that your VPS provider is in the Caribbean does not help you. Operational metadata produced by your own ISP, your own device, your own login fingerprint and your own published service can be used to attribute the activity to you locally. Choose your threat model accordingly.
No-KYC is not anti-forensics. A VPS is a multi-tenant Linux box on hardware that exists somewhere physically. Memory dumps, disk images, hypervisor introspection — the technical surface for forensic analysis is the same as any other VM. No-KYC means we do not know who you are; it does not mean a forensic analyst with the disk image cannot work out what was on it. Encrypt sensitive data at rest, inside the guest, with keys you hold.
Only court orders from our jurisdiction (Nevis) are honoured. A US DMCA notice has no force in Saint Kitts and Nevis. Neither does a UK ICO request, nor a German BNetzA letter. Court orders that we are legally bound to honour are limited to those served through Nevisian courts — and even those can only compel the production of data we hold. We publish the count quarterly via our <a href="/de/canary/">warrant canary</a>; if the canary stops being signed, draw the appropriate inference.
Eight questions buyers ask us most about identity-free VPS hosting. Same answers we give over email, with the same caveats.
Einführungen zu Datenschutz und Anonymität:
Tor Project — How Tor protects your privacy
EFF — Surveillance Self-Defense
IETF RFC 6973 — Privacy Considerations for Internet Protocols
Wikipedia — Know Your Customer
FinCEN — Customer Due Diligence Final Rule (US-KYC-Rahmenwerk zum Vergleich)
Fünf Stufen, vier Rechtsgebiete, keine Formulare, keine Anrufe, keine Identitätserhebung. Rechnung bezahlen, SSH-Zugang erhalten.