A no-KYC VPS is a virtual private server you can buy without surrendering identity documents, a phone number, a billing address or a real name. At Cryptoservers we deliver one in roughly 60 seconds after your crypto invoice confirms — five tiers, four offshore jurisdictions, full root, 1 Tbps DDoS shield. No KYC means no KYC: it is not a synonym for "above the law", and we say so explicitly below.
Three lists, in plain English: what we do not collect, what we still need, what is optional. No marketing fluff, no asterisks, no "subject to verification" footnotes.
我们不向您收集的信息:
我们仍需要的信息(交付元数据,非身份信息):
可选项:
Four steps from cold visitor to root SSH on a freshly-provisioned VPS. The longest step is the on-chain confirmation; everything else is measured in seconds.
Specs and pricing for the five Cryptoservers VPS tiers. Same hardware, same network, same no-KYC checkout — pick the size that fits your workload. Monthly billing, no setup fee, cancel any time.
| 级别 | vCPU | RAM | NVMe | 带宽 | 价格 |
|---|---|---|---|---|---|
| 入门版 AMD EPYC 7443P |
2 | 4 GB DDR4 ECC | 60 GB | 1 Gbps 不限流量 | $16.99/mo |
| 成长版 AMD EPYC 7443P |
4 | 8 GB DDR4 ECC | 120 GB | 2.5 Gbps unmetered | $26.99/mo |
| 商业版 Intel Xeon Gold 6430 |
6 | 16 GB DDR5 ECC | 240 GB | 5 Gbps unmetered | $39.99/mo |
| 专业版 Intel Xeon Gold 6430 |
8 | 24 GB DDR5 ECC | 400 GB | 5 Gbps unmetered | $54.99/mo |
| 扩展版 AMD EPYC 9454P |
12 | 32 GB DDR5 ECC | 640 GB | 10 Gbps 不限流量 | $69.00/mo |
The case for not handing your ID to a hosting company — privacy, source protection, ad-tech reality, and a hard look at what no-KYC does and does not buy you.
1. Privacy by default, not by upgrade. When a hosting provider collects ID at signup, that ID lives in their database forever — through breaches, acquisitions, subpoenas, employee turnover and the inevitable "we have updated our privacy policy" email five years later. The only data that cannot be exfiltrated is the data that was never collected. RFC 6973 calls this "data minimisation"; we call it not asking the question. The fewer fields you fill in to obtain service, the smaller the disclosure surface for the rest of the relationship.
2. Journalism, activism, dissent. A reporter publishing leaked documents, a researcher running a Tor relay, a developer hosting a censorship-circumvention tool, an activist coordinating on a self-hosted Matrix server — all of them benefit from not being on a list of "people who paid this hosting company in this country with this ID." The Electronic Frontier Foundation has documented the chilling effect of identity-tied hosting on speech for over twenty years. No-KYC is the operational answer.
3. The ad-tech tracking landscape. Modern identity collection is not a closed loop. ID-verification SaaS vendors (Onfido, Jumio, Persona) sit between you and the hosting company and retain their own copies. Customer-data platforms re-identify based on email + IP combinations. Even if your hosting provider is principled, the third parties they integrate with often are not. No-KYC at the front door collapses this graph: there is no record to be re-shared, re-sold or re-leaked.
4. Jurisdictional realities. No-KYC is not legal immunity and we do not pretend it is. Cryptoservers is incorporated in Saint Kitts and Nevis; we honour valid court orders served in that jurisdiction (see the <a href="/zh/canary/">canary</a> for the current count). What no-KYC does is structurally limit what we can be compelled to hand over: nothing we never collected. A subpoena can produce only the records that exist. We have engineered the "exist" set to be small on purpose.
Further reading: the <a href="https://2019.www.torproject.org/about/overview" rel="nofollow noopener">Tor Project privacy primer</a>, the <a href="https://ssd.eff.org/" rel="nofollow noopener">EFF Surveillance Self-Defense guide</a>, and <a href="https://datatracker.ietf.org/doc/html/rfc6973" rel="nofollow noopener">RFC 6973 — Privacy Considerations for Internet Protocols</a> all document the threat model in more depth.
The honest section. If a hosting company tells you no-KYC means anything-goes, they are lying. Here is what no-KYC does not buy.
非法使用无论如何都是非法的。 CSAM, credible threats of violence, active phishing infrastructure and malware command-and-control are illegal in every jurisdiction we operate in. We accept abuse reports for these categories and act on them within 48 hours. No-KYC does not insulate any user from criminal law — it never has and we have never claimed otherwise.
境内起诉不受影响。 If your home country considers what you are doing illegal, the fact that your VPS provider is in the Caribbean does not help you. Operational metadata produced by your own ISP, your own device, your own login fingerprint and your own published service can be used to attribute the activity to you locally. Choose your threat model accordingly.
无 KYC 不等于反取证。 A VPS is a multi-tenant Linux box on hardware that exists somewhere physically. Memory dumps, disk images, hypervisor introspection — the technical surface for forensic analysis is the same as any other VM. No-KYC means we do not know who you are; it does not mean a forensic analyst with the disk image cannot work out what was on it. Encrypt sensitive data at rest, inside the guest, with keys you hold.
我们只遵从本司法管辖区(尼维斯)的法院命令。 A US DMCA notice has no force in Saint Kitts and Nevis. Neither does a UK ICO request, nor a German BNetzA letter. Court orders that we are legally bound to honour are limited to those served through Nevisian courts — and even those can only compel the production of data we hold. We publish the count quarterly via our <a href="/zh/canary/">warrant canary</a>; if the canary stops being signed, draw the appropriate inference.
Eight questions buyers ask us most about identity-free VPS hosting. Same answers we give over email, with the same caveats.
隐私与匿名入门资料:
Tor Project — How Tor protects your privacy
EFF — Surveillance Self-Defense
IETF RFC 6973 — Privacy Considerations for Internet Protocols
Wikipedia — Know Your Customer
FinCEN — Customer Due Diligence Final Rule (US KYC framework, for comparison)
Five tiers, four jurisdictions, no forms, no calls, no identity collection. Pay an invoice, get SSH.