right, so i posted a while back about proxies for ad verification, but today i'm curious about the opposite end. i got a client who needs a vpn for heavy torrenting, insists on a no-log policy that holds up. my usual move is to check their privacy page, maybe read one court case summary and call it good. lmao. but this time i got paranoid and did a dumb test. i spun up a cheap vps in a different country, installed a client vpn app from a big name provider, and started a torrent of a linux iso. at the same time, i had wireshark running on the vps and my own firewall logging all outbound connections. spoiler: the vpn client was making direct calls back to the provider's analytics domain every 90 seconds, even with their 'anonymous' mode on. the packets were tiny but they had a unique session id baked in. so my question is, for a real setup tutorial, what's the actual step-by-step to verify no-log claims before you even install the thing? i'm not talking about reading their blog. i mean, like, packet inspection, dns leak tests with actual torrent traffic, maybe checking for webrtc leaks during a download. is there a guide that starts with 'assume they are lying' and works backwards? because my little experiment has me side-eyeing every 'audited' policy now. genuinely want to learn a better method here.