What Gets Scanned
- Referral glyph hashes and deployment metadata
- Email aliases and sponsor-facing contact headers
- Tunnel endpoint IPs or reissued config flags
- Onion-marked keyword dumps that match EcoVPN syntax
Scan Frequency
- Tier 2+ accounts: Monthly passive scans via EcoVPN infrastructure
- Tier 3 operators: Can request targeted onion sweeps
- Urgent scans triggered when signal anomalies or fingerprint drift are detected
What Happens If You're Found
- Your dashboard flags a Leak Alert
- Tier 3 staff may revoke your current config and issue a replacement
- You’ll be asked to revalidate your tunnel source and usage tags
How to Stay Hidden
- Never post or share `.conf` files publicly, even truncated
- Use randomised email aliases instead of institutional addresses
- Avoid bot-reachable endpoints - consider dedicated IP or single-region tunnels
- Review any infrastructure tied to your account for misconfigured DNS or public headers
“Your VPN config is unique. EcoVPN helps make sure it never leaks into unsafe places.”