Setting Up a Bulletproof Hosting Stack - Technical Guide 2026
A bulletproof hosting stack is not a single product - it is a layered system where each component addresses a specific vulnerability. The term "bulletproof" is often used loosely to mean "provider that ignores takedowns." That is one layer. A truly resilient stack also covers the payment trail, the domain registration, the server access pattern, the application hardening, and the operational security habits of the operator. This guide documents the full stack from an engineering perspective: how to choose the right jurisdiction, how to pay without leaving a financial trail, how to configure the server, how to route traffic for maximum resilience, and how to maintain the stack over time. The guide is written for technically capable operators - developers, sysadmins, security researchers, and platform builders - who want to understand every component rather than trust a single provider's marketing claim.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
The first architectural decision is where the server physically sits. This determines which legal system has authority over the hardware, which takedown mechanisms apply, and what the abuse tolerance of the local provider ecosystem is.
The jurisdictional hierarchy for bulletproof hosting in 2026:
Iceland is the legally strongest tier for content that faces pressure from US rightholders or requires source protection. Iceland is outside the EU (EEA member but not EU), not subject to the DMCA (a US statute), and operates under the Icelandic Modern Media Initiative (IMMI) which provides statutory protection for freedom of expression and source protection stronger than any other jurisdiction globally. A DMCA notice sent to an Icelandic provider is discarded. An EU Article 17 copyright demand has no direct force. Only a valid Icelandic court order can compel action, and getting one requires substantiated proceedings in Icelandic courts under Icelandic law. For journalism, whistleblowing infrastructure, adult content, media archives, and IPTV platforms, Iceland is the most defensible tier.
Romania is the practical bulletproof standard for the majority of operators. Romania is an EU member, which means EU copyright directives technically apply, but Romanian providers in the bulletproof segment apply a much higher friction threshold to abuse demands than most EU providers. US DMCA notices are discarded by default. EU complaint handling has historically been slow and procedurally demanding enough that continuous operation of adult content, IPTV, and DMCA-target material is routine. Romania also delivers better latency to Eastern Europe than Iceland. It is the default recommendation for operators who want bulletproof tolerance at lower cost and better CIS/Eastern European network performance.
Ukraine is outside the EU, not subject to DMCA, and has a long history of bulletproof provider operations. For operators targeting CIS-region audiences, Ukraine delivers the best combination: lowest latency to Russia, Belarus, Kazakhstan, and the Caucasus, DMCA-ignored by jurisdiction, and competitive pricing. Anubiz Host Ukraine VPS includes 32TB monthly bandwidth, significantly outperforming Western European plans at the same price point.
Netherlands, Finland, Switzerland are in a different tier - procedurally resistant rather than operationally bulletproof. They honor legitimate local court orders but provide strong procedural friction against informal demands. Not suitable for content categories that face legitimate EU-level copyright challenge.
Decision rule: if your content faces US DMCA pressure only: Romania or Ukraine. If it faces EU-level pressure too: Iceland. If you need the strongest legal framework for journalism or source protection: Iceland. If your audience is in Russia/CIS: Ukraine.
Layer 2 - Anonymous Provisioning
The provisioning step is where most operators leave their most visible footprint. If you pay with a credit card under your real name, the hosting provider has a permanent record linking your legal identity to the server. Everything else in the stack becomes less meaningful.
Account creation: use an email address that cannot be linked to your real identity. Create a fresh account at ProtonMail or Tutanota before provisioning. Access the email service and the hosting provider's signup page through Tor Browser. Never reuse a pseudonymous email across multiple identities.
Payment - Monero is the correct answer: Monero is the only cryptocurrency in widespread use in 2026 where on-chain privacy is structural rather than requiring active mixing steps. Ring signatures hide the sender, stealth addresses hide the recipient, RingCT hides the amount. No blockchain analytics product publicly claims reliable de-anonymization of modern Monero transactions. Pay from a non-KYC wallet: acquire XMR through Haveno (Monero-native P2P exchange), FixedFloat, or eXch (non-KYC instant swap), or via atomic swap from Bitcoin acquired on Bisq or Robosats.
Payment - Bitcoin if you must: if Monero liquidity is insufficient for your amount, Bitcoin from a non-KYC wallet provides practical privacy. The requirement is: do not fund the payment wallet directly from a KYC exchange. Acceptable: buy BTC on Bisq, receive from peer-to-peer cash trade, or receive from a coin mixing service. Unacceptable: Coinbase withdrawal directly to payment address (one-hop, chain-analytically trivial).
Server ordering through Tor: place the order from Tor Browser, not from your home IP. Your IP at order time is logged by the payment gateway and potentially by our session layer. Tor replaces your home IP with an exit node, breaking the IP-to-account link. Anubiz Host does not block Tor connections at the checkout page.
SSH key generation before provisioning: generate an Ed25519 SSH key pair locally before the server is delivered. Use the public key when the provisioning email arrives. Immediately disable password SSH login in /etc/ssh/sshd_config (PasswordAuthentication no, PermitRootLogin prohibit-password or disable-root). The default root password in the provisioning email becomes useless and is not needed again.
Layer 3 - Server Hardening on Arrival
The server arrives with a minimal OS install and root credentials delivered by email. The first 30 minutes after provisioning should follow a consistent hardening checklist. The following covers Debian/Ubuntu as the baseline; adjust package names for RHEL-based systems.
Immediate steps (first 5 minutes):
SSH in, change the hostname to something non-identifiable:
```
hostnamectl set-hostname node-a1
```
Update all packages immediately:
```
apt update && apt upgrade -y && apt autoremove -y
```
Disable password SSH, configure key-based auth:
```
mkdir -p ~/.ssh && echo "YOUR_PUBLIC_KEY" >> ~/.ssh/authorized_keys
chmod 700 ~/.ssh && chmod 600 ~/.ssh/authorized_keys
sed -i 's/#PasswordAuthentication yes/PasswordAuthentication no/' /etc/ssh/sshd_config
sed -i 's/PasswordAuthentication yes/PasswordAuthentication no/' /etc/ssh/sshd_config
systemctl restart sshd
```
Firewall configuration (ufw or nftables):
Allow only the ports your application needs. A minimal default-deny setup:
```
apt install ufw -y
ufw default deny incoming
ufw default allow outgoing
ufw allow 22/tcp # SSH - restrict to your access IP range if possible
ufw allow 80/tcp # HTTP if serving web
ufw allow 443/tcp # HTTPS if serving web
ufw enable
```
Disable unused services:
Check what is listening and disable what you do not need:
```
ss -tulpn
systemctl disable --now
```
Set up unattended security upgrades:
```
apt install unattended-upgrades -y
dpkg-reconfigure --priority=low unattended-upgrades
```
Log minimization:
If your threat model requires minimizing log retention, configure logrotate to rotate daily with short retention:
```
# /etc/logrotate.d/custom
/var/log/auth.log {
daily
rotate 3
compress
missingok
notifempty
}
```
Application logs (nginx, apache, your custom app) should also be configured with short retention. If logs are not required for debugging, configure the application to log nothing. A server that never creates access logs has nothing to produce under a court order.
Layer 4 - Network Architecture and Tor Integration
The network configuration determines how traffic reaches your server and whether that traffic pattern can be linked to real-world identities.
Option A - Clearnet with HTTPS only: the standard configuration. Your server has a public IP, traffic comes in over clearnet, HTTPS encrypts the content from observers on the path. This is appropriate for most business applications, IPTV panels, adult content platforms, and services where the content policy requires offshore hosting but the end-user connection does not need to be hidden. The server's IP is public; DDoS protection at the network edge (provided by Anubiz Host) absorbs volumetric attacks.
Option B - Tor hidden service (.onion): the highest-anonymity option for both server and client. A Tor hidden service routes traffic through the Tor network on both ends - the client does not need to know the server's real IP, and the server does not need to know the client's real IP. Setting up a hidden service is straightforward:
Install Tor:
```
apt install tor -y
```
Configure /etc/tor/torrc to add the hidden service:
```
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
```
Restart Tor:
```
systemctl restart tor
```
Your .onion address is in /var/lib/tor/hidden_service/hostname. This address is cryptographically tied to the server's private key; it cannot be spoofed. The server is not reachable by any path other than Tor unless you also expose it on clearnet.
Hidden services eliminate IP-based deanonymization entirely: DMCA notices sent to a .onion address have no actionable target. Law enforcement would need to de-anonymize the Tor circuit at scale to find the server - a capability that remains difficult even for nation-state adversaries when the hidden service is properly configured.
Option C - Layered: clearnet + .onion simultaneously: expose the service on both clearnet (for users who cannot run Tor) and .onion (for users who can). This is what many legitimate privacy-oriented platforms do: serve the primary audience on clearnet while making the service reachable via Tor for users in censored regions or high-threat environments.
DDoS considerations: .onion services are partially DDoS-resistant by nature - the Tor network absorbs some volumetric attack capacity, and the server IP is hidden, so conventional DDoS amplification against the server IP is not possible unless the attacker already knows the IP. Clearnet exposure reintroduces DDoS surface. If you expose clearnet, keep the Anubiz Host network-edge DDoS mitigation active and do not disable it.
Layer 5 - Domain and CDN Strategy
The domain registration and CDN choice can undermine a robust hosting stack if done carelessly.
Domain registration pitfalls:
Registering a domain in your real name with a US registrar (GoDaddy, Namecheap, Network Solutions, Google Domains) creates a record that is subject to US subpoenas and DMCA orders. A DMCA registrar can be compelled to transfer, redirect, or suspend a domain. Even with WHOIS privacy, the underlying registrant data is held by the registrar and can be disclosed under valid legal process.
The solution: register through a registrar outside the US jurisdiction, with WHOIS privacy enabled. Anubiz Host's domain registration infrastructure uses offshore registrar routing. Register the domain through the same account you used to provision the VPS, pay with the same Monero, and the entire stack sits under a single pseudonymous identity with no real-name link.
Alternatively, use a .onion address exclusively and avoid the registrar problem entirely. .onion addresses do not require a registrar; they are generated from the server's public key. No third party holds any registration data.
CDN pitfalls:
Cloudflare is a US company. Proxying your traffic through Cloudflare's free plan means Cloudflare sees all your traffic, holds your real origin server IP (shared with Cloudflare to enable proxying), and is subject to US DMCA orders. A DMCA notice to Cloudflare can result in Cloudflare disabling the proxy, exposing your real server IP, or responding to the legal request with your origin data. For DMCA-ignored hosting, using a US-based CDN in front of it defeats the purpose.
Alternatives: use no CDN (your server's bandwidth is your CDN capacity), use a non-US CDN service, or use Tor as the delivery mechanism (no CDN required; Tor routing handles distribution). Anubiz Host VPS plans include substantial bandwidth allowances (Iceland plans include 1-2 TB+, Ukraine plans include 32 TB) which are sufficient for most use cases without a CDN.
DNS resolution: if you are using a clearnet domain, choose a DNS provider outside the US. Point the domain's nameservers to a non-US authoritative DNS provider. This prevents a US subpoena on the DNS provider from being used to redirect traffic away from your server.
Layer 6 - Application Security
The hosting stack is only as strong as the application running on it. An injectable web application defeats all the jurisdictional and operational work in the layers above by leaking server contents directly.
Web application basics:
Run all web-facing services as non-root users. Never run nginx, apache, node, or your application as root. Create dedicated service accounts:
```
useradd -r -s /bin/false appuser
chown -R appuser:appuser /opt/yourapp
```
Enable HTTPS on all clearnet endpoints. Use Let's Encrypt (certbot) for free TLS certificates:
```
apt install certbot python3-certbot-nginx -y
certbot --nginx -d yourdomain.com
```
Set security headers in nginx:
```
add_header X-Frame-Options DENY;
add_header X-Content-Type-Options nosniff;
add_header Referrer-Policy no-referrer;
add_header Content-Security-Policy "default-src 'self'";
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always;
```
Database security:
Never expose database ports to the internet. Bind database listeners to 127.0.0.1 only:
```
# For PostgreSQL: listen_addresses = 'localhost' in postgresql.conf
# For MySQL/MariaDB: bind-address = 127.0.0.1 in /etc/mysql/mariadb.conf.d/50-server.cnf
# For Redis: bind 127.0.0.1 in /etc/redis/redis.conf
```
Use strong, unique passwords for each database user. Do not use the root database account for application connections. Create minimal-privilege users that can only access the specific database and tables they need.
Fail2ban for brute force protection:
```
apt install fail2ban -y
```
The default configuration protects SSH. Add jails for your specific application login endpoints if they exist.
Backup encryption: if you run application backups, encrypt them before storing. An unencrypted backup on a remote storage service is a liability - the contents are accessible to the storage provider and to anyone who subpoenas them. Use GPG encryption on backups:
```
tar czf - /opt/yourapp/data | gpg --symmetric --cipher-algo AES256 -o backup-$(date +%Y%m%d).tar.gz.gpg
```
Layer 7 - Ongoing Operational Security
The stack is a living system. Configuration drift, forgotten services, and repeated access patterns create vulnerabilities over time.
Access pattern discipline: always access your server through the same privacy mechanism you used at setup. If you configured SSH access through Tor, maintain that pattern. If you access from a VPN endpoint, always use the same VPN. Introducing new access vectors (your home IP appears in server logs one day because Tor was slow) creates correlation points.
Renewal payment consistency: pay all monthly renewals with the same privacy measures as the initial payment. One renewal paid with a credit card because it was convenient creates the record that the previous Monero payments worked to avoid. Automate renewal notices through the client area (delivered to your pseudonymous email) and always pay with Monero.
Monitoring without leaking identity: do not send server metrics to a US-based monitoring service (DataDog, New Relic, Grafana Cloud hosted in the US) using your real account credentials. Self-host monitoring on the same server or on a separate VPS. Prometheus + local alerting rules or a simple shell script that checks service health and alerts via Signal (self-hosted), Matrix, or email to your pseudonymous inbox.
Incident response planning: before you go live, decide what you will do if the server is suspended, seized, or loses connectivity. Maintain an encrypted backup of your configuration, database dumps, and application state that you can restore to a new VPS in under two hours. Test the restore process before you need it. Have the restore playbook documented somewhere offline.
Key rotation: rotate your SSH key pair annually. Add the new public key before revoking the old one. Consider time-limited SSH certificates if you manage multiple servers.
Software updates: unattended security upgrades handle most of this automatically, but check for major version updates of your application framework quarterly. Running a three-year-old Django, Rails, or Node version with known CVEs in a bulletproof hosting environment does not make you bulletproof - it makes you vulnerable to attackers who know you are unlikely to respond to a security takedown.
Reference Stack Configurations
These are concrete example configurations for the most common bulletproof hosting use cases.
Adult content platform - Romania, small:
- Server: Bulletproof VPS Small ($22.99/mo, Romania) or Romania VPS Mini ($19.99/mo)
- OS: Debian 12 minimal
- Web server: nginx with HTTPS, Let's Encrypt cert on a domain registered through Anubiz Host with WHOIS privacy
- App layer: any framework (PHP, Node, Python)
- Database: MySQL or PostgreSQL, localhost only
- CDN: none or non-US CDN
- Access: SSH via Tor
- Payment: Monero, renewed monthly
IPTV panel - Romania, medium:
- Server: Romania VPS High-Performance II ($74.99/mo, 4 vCPU, 8GB, 80GB NVMe)
- OS: AlmaLinux 9
- Panel: XtreamUI or Xtream Codes on localhost:25500
- Media streaming: ffmpeg HLS transcoding, nginx HLS delivery
- CDN: none (32+ GB RAM configs needed for in-memory HLS buffer, use internal LB)
- Access: admin panel via WireGuard tunnel from a second VPS in a different jurisdiction
- Payment: Monero
Whistleblower platform - Iceland, high security:
- Server: Iceland VPS II ($83.87/mo, 4 vCPU, 8GB, 160GB)
- OS: Debian 12 hardened (AppArmor enabled, unnecessary kernel modules disabled)
- Service: SecureDrop or custom submission app
- Network: Tor hidden service (.onion) only - no clearnet exposure
- Access: SSH exclusively via Tor
- Monitoring: local Prometheus with alertmanager, Matrix notification to self-hosted Matrix server
- Payment: Monero, legal consultation in Iceland before launch recommended
Anonymous proxy / personal VPN - Ukraine or Romania, minimal:
- Server: Romania VPS Mini ($19.99/mo) or Ukraine VPS I (~$20/mo range)
- OS: Debian 12 or Alpine Linux
- Software: WireGuard server + PiHole for DNS filtering
- Network: minimal attack surface (only WireGuard port open), no web services
- Access: manage via the WireGuard tunnel itself once established
- Payment: Monero
FAQ
What makes hosting "bulletproof" - is it legal?
Bulletproof hosting is a term for providers who set a higher threshold for responding to content complaints, particularly informal ones like US DMCA notices that have no legal force in the provider's jurisdiction. It is legal for a Romanian or Icelandic provider to not comply with a US statute that has no force in their country. The content on the server must still comply with local law. Bulletproof does not mean lawless - it means the provider does not capitulate to out-of-jurisdiction demands.
Can I run a Tor exit node on a bulletproof VPS?
Tor exit nodes are permitted on Iceland and Romania VPS plans at Anubiz Host. Exit nodes generate more abuse complaints than middle relays or bridges because exit traffic looks like it originates from the exit node's IP. Configure a responsible exit policy (reduced exit policy document published in the Tor Project's guidelines), set sensible contact info in the relay descriptor, and be prepared to respond to abuse correspondence promptly. Middle relays and bridges are allowed on all plans.
How do I keep my setup private long-term if I need to renew monthly?
Pay with Monero every month, using the same pseudonymous email and the same Tor access pattern. Configure renewal reminders in the client area dashboard delivered to your pseudonymous email. Access the billing dashboard through Tor. Consistency matters more than perfection - one exception (one credit card payment, one home IP in the logs) creates the record that all the careful prior months avoided creating.
Is this guide appropriate for illegal activity?
No. This guide describes how to operate hosting infrastructure in a jurisdictionally resilient way for lawful content that faces unreasonable enforcement pressure. All content hosted on Anubiz Host must comply with the laws of the datacenter's physical jurisdiction. We do not host CSAM, active fraud infrastructure, or content used to facilitate real-world violence. The legitimate use cases this guide serves are: journalism, whistleblowing, privacy-sensitive research, adult content (in permissive jurisdictions), IPTV, media archiving, and political expression that faces censorship in the operator's home country.
What should I do if my VPS gets suspended?
Open a support ticket immediately with your account ID and the service label. Suspensions at Anubiz Host for bulletproof-jurisdiction servers are typically related to abuse complaints we are legally required to act on (CSAM, active DDoS source) or for non-payment. Legal-origin suspensions are communicated with specifics. If the suspension is a misfire, the ticket resolves it quickly. Maintain an encrypted backup at all times so you can restore to a new server in under two hours if needed.