This page is currently in development.

Disable Usage Logs for Anonymity

Add an extra layer of privacy by disabling logs for forwarding proxies, recursive DNS, and reverse proxies.

Logging functionality can be verified with open-source.

Enable Usage Logs with Enhanced Privacy

Become your own surveillance system by taking control of access logs on each node component.

Only deploy nodes on instances that you trust to avoid intermediary monitoring by third parties.

Remove Access Logs After One Hour

All node access logs are deleted from GhostCompute system databases after one hour by default for better performance, privacy and scaling.