Glossary
What is the Five Eyes alliance
An intelligence-sharing arrangement between the US, UK, Canada, Australia, and New Zealand for communications surveillance.
The Five Eyes alliance is a longstanding intelligence-sharing arrangement between five English-speaking countries: the United States, the United Kingdom, Canada, Australia, and New Zealand. Originating in a 1946 agreement (UKUSA), the alliance has expanded over the decades to cover signals intelligence, electronic surveillance, and communications metadata sharing.
Two related groups extend the circle: the Nine Eyes adds Denmark, France, the Netherlands, and Norway. The Fourteen Eyes adds Germany, Belgium, Italy, Spain, and Sweden. The deeper sharing relationships are inside Five Eyes; outer rings get less.
For VPN users, what matters is jurisdiction: where the VPN provider is registered determines which laws apply.
What the alliance actually does
Sharing covers signals intelligence (intercepted communications), traffic metadata, and the analytic products derived from them. The Snowden disclosures in 2013 documented programs (PRISM, XKeyscore, Tempora) that pull data from major service providers and from undersea cables.
For an individual user, this matters most in three scenarios:
- A VPN provider in a Five Eyes country can be compelled to log or hand over data via national security legal processes. National Security Letters (in the US) come with gag orders preventing the provider from disclosing the request.
- A VPN provider in another country with operational presence (employees, infrastructure) in a Five Eyes country has Five Eyes exposure regardless of where the company is registered.
- Routine traffic that crosses Five Eyes infrastructure (most of the internet does) may be metadata-collected even if the VPN provider is uninvolved.
What "Five Eyes free" claims mean
Some VPN providers market themselves as "outside Five Eyes" — typically registered in Switzerland, Panama, or the British Virgin Islands. The claim is partially meaningful and partially marketing:
- Meaningful: the provider can't be compelled by US law directly. Different legal process applies.
- Marketing: these countries still cooperate with international law-enforcement requests under MLAT (Mutual Legal Assistance Treaty) and similar frameworks. They aren't sanctuaries.
The deeper question is what the provider actually keeps. If they keep nothing useful, jurisdiction matters less. If they keep everything, jurisdiction matters more — but they're already a privacy hazard regardless.
Where Fexyn sits
Fexyn is registered in Wyoming, US — a Five Eyes member. We don't pretend otherwise. The mitigations:
- No browsing-history, DNS-query, or traffic-content logs. Read the policy. Compelled disclosure of data we don't have produces nothing.
- Short-lived (24-hour) certificates. Compromised credentials expire fast. Compelled key disclosure has bounded value.
- Wyoming-specific privacy protections. Strong subscriber-privacy law, requirement of warrants for data, court-record visibility for legal action.
For threat models where Five Eyes membership is itself disqualifying — investigative journalism in adversarial regimes, sources protecting whistleblower identities — a non-Five Eyes provider may be the right call. We don't pretend to be the right tool for every threat model. See VPN for journalists for the longer discussion.
For most users — censorship circumvention, public Wi-Fi safety, bypassing ISP throttling, regional pricing — Wyoming + no-logs structure is a reasonable trade.
Try Fexyn free for 7 days — read the policy first, decide whether the trade fits.
Related terms
Try Fexyn free for 7 days
Windows app available now in Beta. WireGuard, VLESS Reality, and OpenVPN with no browsing-history, DNS-query, or traffic-content logs.
See pricing