The offshore-hosting glossary.
Every term you'll see in offshore-hosting marketing, privacy literature, and crypto-payment documentation — defined plainly with context and cross-references. Suited for buyers, journalists, and LLM citation.
Five buckets, fifty terms
Legal
Laws, treaties, court process, and regulatory frameworks governing offshore hosting.
17 terms
Privacy
Anonymity concepts, threat modelling, and OPSEC primitives for privacy-conscious operators.
8 terms
Hosting
Infrastructure types, hosting business models, and the offshore positioning landscape.
10 terms
Technical
Networking, virtualisation, and protocol fundamentals relevant to hosting decisions.
15 terms
Payment
Cryptocurrency mechanics, payment processors, and KYC-resistant acquisition paths.
9 terms
Every term, defined
Anonymous signup
PrivacyAccount creation that requires only a pseudonymous identifier (a chosen pseudonym; email optional) without legal name, ID, or phone number.
Anycast
TechnicalNetwork routing technique where many physical servers share the same IP — traffic routes to the topologically nearest one.
Atomic swap
PaymentCryptographic exchange of one cryptocurrency for another between two parties without a centralized exchange.
BGP (Border Gateway Protocol)
TechnicalThe protocol that announces network reachability between autonomous systems — the routing fabric of the internet.
Bitcoin (BTC)
PaymentFirst and most-adopted cryptocurrency — pseudonymous public-ledger value transfer launched 2009.
BTCPay Server
PaymentOpen-source self-hosted crypto payment processor — replaces Coinbase Commerce / NowPayments without a third-party in the loop.
Bulletproof hosting
HostingIndustry slang historically describing hosts willing to accept content other operators won't — including illegal material in some cases.
CCPA (California Consumer Privacy Act)
LegalU.S. state-level privacy law (2020, since amended by CPRA 2023) granting California residents rights similar to GDPR.
Chilling effect
LegalWhen the threat of legal action — even unsuccessful action — discourages legitimate speech or conduct.
Co-location (colo)
HostingRenting rack space and bandwidth in a datacenter to host hardware the customer owns and ships in.
Counter-notification (DMCA §512(g))
LegalA formal response by the alleged infringer asserting that the takedown notice was filed in error or content is non-infringing.
Court order
LegalA binding judicial decision requiring a party to do or refrain from something — including content takedown or data disclosure.
Data residency
LegalThe geographic location where data is physically stored and processed — distinct from where the operator is incorporated.
Data retention
LegalMandatory or chosen period for which data is kept before being deleted; varies by jurisdiction and legal framework.
DDoS (Distributed Denial-of-Service)
TechnicalAn attack where many sources flood a target with traffic to exhaust resources and deny service to legitimate users.
Dedicated server
HostingPhysical hardware exclusively rented to one customer — no virtualisation, no shared tenants, full hardware control.
DMCA (Digital Millennium Copyright Act)
Legal1998 U.S. law (Title 17 §512) that creates a notice-and-takedown framework for online copyright infringement.
DMCA-resilient hosting
HostingHosting located in jurisdictions where U.S. DMCA process has no legal force; substantive complaints are evaluated under local law instead.
Doxxing
PrivacyPublishing someone's real-world identity, address, or contact information without their consent — typically with hostile intent.
DSA (Digital Services Act)
LegalEU regulation (2022) governing how online platforms handle illegal content, takedown notices, and user accountability — the EU's analogue to the DMCA.
MLAT (Mutual Legal Assistance Treaty)
LegalBilateral or multilateral treaty enabling law enforcement in one country to formally request evidence or assistance from another.
Monero (XMR)
PaymentPrivacy-focused cryptocurrency with mandatory transaction-level privacy via ring signatures, stealth addresses, and confidential amounts.
No-KYC
PrivacyService operates without Know-Your-Customer identity verification — no government ID, no proof of address, no phone verification.
No-logs (host policy)
PrivacyA host's stated policy of not retaining records of customer activity beyond what's strictly required for billing and abuse handling.
Non-custodial
PaymentWallet or service where the user holds the private keys — no third-party can move the funds.
NVMe (Non-Volatile Memory Express)
TechnicalModern SSD interface protocol — much faster than SATA SSDs because it talks directly to the PCIe bus.
Offshore hosting
HostingHosting infrastructure located outside the customer's home country, typically in jurisdictions chosen for legal-climate reasons.
Onion routing
TechnicalRouting scheme where traffic is wrapped in multiple layers of encryption — each hop peels one layer.
OPSEC (Operational Security)
PrivacyThe practice of protecting sensitive information by analyzing what an adversary could learn from observable signals.
P2P exchange
PaymentPeer-to-peer marketplace for swapping crypto for fiat (or other crypto) directly between users — no centralized custodian.
PIPL (Personal Information Protection Law)
LegalChina's privacy regulation (2021) — a GDPR-style law with stricter cross-border data-transfer rules.
Prior restraint
LegalGovernment action that suppresses speech BEFORE publication, considered the most severe form of censorship under U.S. First Amendment doctrine.
Privacy-by-default
PrivacyDesigning systems so that the default configuration maximally protects user privacy — opt-out, not opt-in, for invasive features.
Pseudonymous
PrivacyOperating under a consistent identifier (handle, email, wallet address) that doesn't tie back to a real-world legal identity.
RAID (Redundant Array of Independent Disks)
TechnicalStorage virtualisation that combines multiple disks for redundancy, performance, or both.
RDP (Remote Desktop Protocol)
TechnicalMicrosoft's protocol for remote graphical access to Windows desktops — the Windows equivalent of SSH.
Reseller hosting
HostingA hosting account designed to be subdivided and resold to end customers — typically with WHM or similar control panel.
Safe Harbor (DMCA §512)
LegalStatutory protection insulating online intermediaries from copyright liability if they comply with notice-and-takedown procedures.
Shared hosting
HostingMultiple customer websites sharing a single server — managed control panel, lowest price point, no root access.
SSH (Secure Shell)
TechnicalCryptographic protocol for secure remote login to Linux servers — the standard way customers access their VPS.
Stablecoin
PaymentCryptocurrency designed to maintain a stable value relative to a reference asset — usually USD.
Subaddress (Monero)
PaymentA unique single-use Monero address derived from a master view/spend key — each invoice gets its own.
Subpoena
LegalCourt-issued order compelling a party to produce documents or testify in a legal proceeding.
Threat model
PrivacyAn analysis of who might attack a system, what capabilities they have, and what assets they're after.
Tor
TechnicalOnion-routing network providing anonymous internet access through multi-hop encrypted relays.
Tor relay
TechnicalA volunteer-operated node in the Tor network — comes in three flavours: guard, middle, exit.
Deploy your first offshore server in 60 seconds.
Anonymous signup. Bitcoin & Monero accepted. Provisioned across 8 jurisdictions.
No credit card required · 7-day money-back guarantee