This is a multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

User Guide

Main Services Provided for a Fee

Basic Features

  1. Access Logs
  2. Blocking Logs
  3. Statistics
  4. Custom Upstream
  5. Custom Filtering Rules
  6. Custom Resolution
  7. Whitelist Mode

Advanced Features

  1. HTTP3 Support
  2. DDNS Support
  3. ECS Support
  4. Resolution by Traffic Rules
  5. Block Specific Applications
  6. Schedule

Access Logs

View internet access logs. The private service provides a 24-hour network access log query.

Access Logs

Blocking Logs

View blocking logs to understand which ads are blocked and which websites are blocked.

Blocking Logs

Statistics

The private service provides 24-hour network access statistics to understand user internet habits.

Statistics will show which websites are visited the most and which websites are blocked the most.

Statistics

Custom Rules

Create custom rules within the private service to block ads from commonly used applications or allow websites that are not considered ads by the user.

Users may need to view access logs to observe website query records when launching specific applications, in order to add custom rules.

Custom Rules

Whitelist Mode

If you need to avoid blocking certain types of websites, you can set whitelist mode, allowing access only to specific websites.

The whitelist has a higher priority than the blacklist; if a website is on the whitelist, it will not be blocked. Users can add commonly used websites to the whitelist to avoid accidental blocking.

Whitelist Mode

Authoritative Resolution

Supports adding authoritative resolution for devices within a company or home, resolving specified names to the IP addresses of home devices, eliminating the need to remember IP addresses.

Users do not need to purchase a domain name or register; they only need to add authoritative resolution rules within the private service.

Authoritative Resolution

1 - How to Configure

AdGuard Private Service Configuration Guide

After the paid service expires,

  • The service will immediately become invalid, and accessing the backend management address will redirect to the service status inquiry page.
  • Personalized settings will be retained for 7 days; if not renewed within 7 days, all data of the service will be completely deleted.
  • After the service is completely deleted, the custom domain name will no longer be able to access the service. Please remember to modify your encrypted DNS settings, otherwise you will not be able to access the internet.

Need Help

Send an email service1@adguardprivate.com
Please describe the issue you are experiencing in detail, and we will respond as soon as possible.

1.1 - Android

Configuration Steps

Specific setup steps for different brand phones:

Xiaomi/Redmi Phones

  1. Open Settings
  2. Select Connection & Sharing
  3. Click Private DNS
  4. Choose Private DNS service provider hostname
  5. Enter: {xxxxxxxxxxxxxxxx}.adguardprivate.com

Samsung Phones

  1. Open Settings
  2. Select Connections
  3. Click More connection settings
  4. Choose Private DNS
  5. Enter: {xxxxxxxxxxxxxxxx}.adguardprivate.com

Note: Please replace {xxxxxxxxxxxxxxxx} with your dedicated DNS server address

Verify Configuration

After configuration:

  1. The system will automatically verify the DNS connection status
  2. Displaying “Connected” indicates successful configuration

Troubleshooting

If the configuration fails, check:

  1. Whether the DNS server address is correct
  2. Whether the network connection is normal
  3. Whether the account is active

1.2 - iPhone

iOS 14 and later versions support native DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypted DNS. You can enable it using the following steps:

  1. Open the built-in browser Safari, navigate to the private service backend, Setup Guide -> DNS Privacy
  2. Download the configuration file
  3. Open the phone Settings
  4. Tap General
  5. Tap VPN & Device Management
  6. Select your dedicated configuration to install

Configuration Demonstration

1.3 - Windows

Windows 11

Windows 11 21H2 and later versions support native DNS over HTTPS (DoH). You can enable it using the following steps:

  1. Open Settings
  2. Open Network & Internet
  3. Open Ethernet
  4. Find DNS server assignment, click Edit
    1. Select Manual
    2. Enter 120.26.96.167 in the Preferred DNS server IPv4 field, and 2408:4005:3de:8500:4da1:169e:dc47:1707 for the IPv6 address
    3. For DNS over HTTPS (DoH), select: On (Manual template)
    4. Enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query in the DoH template field, where {xxxxxxxxxxxxxxxx} is your encrypted DNS service username.
    5. Do not check Use unencrypted requests on failure
    6. For the Alternate DNS server, you can optionally enter 223.5.5.5 (Alibaba Cloud Public DNS service), with DNS over HTTPS off, and check Use unencrypted requests on failure.

Windows 10 and Earlier Versions

Windows 10 and earlier versions do not support native encrypted DNS, but if you are using newer browsers like Chrome/Edge or various browsers based on the Chromium engine (such as 360/QQ and other domestic browsers), you can set up DoH encrypted DNS in the browser. Here’s how to set it up in Chrome:

  1. Open Chrome browser Settings
  2. Open Privacy, search, and services
  3. Scroll to Security
  4. Enable Use secure DNS to specify how to look up the network address of websites
  5. Enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query in the Choose service provider field, where {xxxxxxxxxxxxxxxx} is your encrypted DNS service username.

For other browsers, please refer to their respective settings, which are generally found under Settings - Privacy - Security.

1.4 - macOS

macOS Big Sur and later versions support native DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypted DNS. You can enable it using the following steps:

  1. Open the built-in browser Safari, navigate to the private services backend, Settings Guide -> DNS Privacy
  2. Download the configuration file
  3. Open System Settings
  4. Open Privacy & Security
  5. Select Profiles
  6. Select your dedicated configuration to install

1.5 - Browser

Browser versions of Chromium 79+ support DoH. Here are the settings methods for Chromium-based browsers (Chrome/Edge/360/QQ, etc.):

  1. Open Chrome browser Settings
  2. Open Privacy, search, and services
  3. Scroll to Security
  4. Enable Use secure DNS to specify how to look up the network address of a website
  5. In Choose service provider, enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query, where {xxxxxxxxxxxxxxxx} is your username for the private encrypted DNS service.

2 - Advanced Features

This section will introduce some advanced techniques for using private services.

2.1 - Blocked Applications List

It is important to avoid confusion: blacklists are typically used to block ads, privacy intrusions, malware, etc., while the Blocked Applications List is used to completely block the use of specified applications.

This is often used in conjunction with a schedule for personal habit formation to prevent addiction. It is commonly used for habit formation in minors, for example: prohibiting the use of social media and games during study time. It can also be used for self-discipline in adults, for example: prohibiting the use of social media and games during work hours.

This service pre-configures some rules based on popular applications in various countries. Due to changes in popular culture and business developments, these lists may become outdated, but we are committed to ongoing maintenance.

If you find that an application on the list is not fully blocked, or if you need to add a recently popular application, please contact us, and we will address it promptly.

Need Help

Send an email service1@adguardprivate.com
Please describe the issue you are experiencing in detail, and we will respond as soon as possible.

Country and RegionApplication List
GlobalGlobal Application List
Mainland ChinaMainland China Application List

2.2 - Enhancing CDN Access Speed with ECS

AdGuard Private supports the ECS feature, providing more precise resolution to optimize your network experience.

Setup method: Setup method

What is ECS (Extended Client Subnet)?

ECS (Extended Client Subnet) is a DNS protocol extension that allows the DNS resolver (such as your AdGuard Private server) to pass part of the client’s IP address information to the authoritative DNS server. This enables the authoritative server to provide more accurate DNS responses based on the client’s network location.

How ECS Works

  1. Traditional DNS Query: Without ECS, the DNS resolver only sends its own IP address to the authoritative DNS server. This means the authoritative server can only make resolution decisions based on the location of the resolver (usually a data center), which may lead to suboptimal results.

  2. DNS Query with ECS Enabled: When ECS is enabled, the DNS resolver includes a part of the client’s IP address (subnet) in the DNS query. For example, if the client’s IP address is 203.0.113.45, the resolver might send 203.0.113.0/24 as ECS information.

  3. Response from the Authoritative Server: Upon receiving a query with ECS information, the authoritative DNS server can use this information to select the most suitable IP address for the client. This typically means choosing a server geographically closest to the client.

Advantages of ECS

  • Faster Response Times: By directing the client to the nearest server, ECS can reduce latency and improve application response times.
  • Improved User Experience: Faster response times can lead to a smoother and more enjoyable online experience.
  • More Efficient CDN Usage: Content Delivery Networks (CDNs) can use ECS to direct users to the optimal content server, thereby increasing efficiency and reducing costs.
  • Bypassing Local Resolver Limitations: Some local network operators’ DNS servers may have issues, such as incorrect resolution or domain hijacking. Using ECS can bypass these limitations and obtain more accurate resolution results.

Why Use ECS in AdGuard Private?

AdGuard Private, as a private DNS server, can be configured to use upstream DNS servers for domain resolution. When ECS is enabled, AdGuard Private can pass your client subnet information to the upstream server, thereby obtaining more accurate resolution results.

2.3 - DDNS Dynamic Resolution

Use Adguard Private for convenient DDNS dynamic resolution service

What is DDNS?

DDNS (Dynamic DNS) allows you to bind a fixed domain name to a dynamic IP address, suitable for home broadband users to access internal network devices such as NAS, smart home controllers, etc.

Features

  • Easy to Use: Only one script is needed for automatic updates
  • No Additional Cost: No need to purchase a domain name
  • High Reliability: Relies on Adguard Private’s DNS infrastructure
  • Quick Effect: DNS records take effect immediately after update, no need to wait for DNS propagation

Preparation for Use

To use the DDNS feature, you need:

  1. A valid Adguard Private service
  2. Username and password for the management panel
  3. The domain name to be resolved (e.g., nas.home)

DDNS script download:

Configuration Steps

1. Gather Necessary Information

You need to prepare:

  1. Adguard Private service address, like: https://xxxxxxxx.adguardprivate.com
  2. Administrator username and password
  3. The domain name to be resolved, like: nas.home

2. Deploy the Update Script

The following script will automatically update the resolution address of the specified domain.

Windows PowerShell

# Download the script
Invoke-WebRequest -Uri https://www.adguardprivate.com/docs/startup/private/tutorial/ddns/update_dns.ps1 -OutFile update_dns.ps1
# Set execution policy (optional, only for the current session)
Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Scope Process
# Execute the script
.\update_dns.ps1 https://xxxxxxxx.adguardprivate.com admin:password123 nas.home

Linux && MacOS

# Download the script
wget https://www.adguardprivate.com/docs/startup/private/tutorial/ddns/update_dns.sh -O update_dns.sh
# Add execution permission
chmod +x update_dns.sh
# Execute the script
./update_dns.sh https://xxxxxxxx.adguardprivate.com admin:password123 nas.home

Frequently Asked Questions

How to Verify if it’s Effective?

You can check if the resolution correctly points to your current IP address using the ping your-domain.name command.

Or log into the service backend and check the Filter -> DNS Rewrite records.

How to Set Up Scheduled Updates?

Windows Scheduled Task

  1. Open Task Scheduler
  2. Create a basic task
  3. Set the run frequency (recommended 15-30 minutes)
  4. Choose PowerShell as the program location, and enter the full command of the script as the argument

Linux Cron Task

Add the following to crontab (execute every 15 minutes):

*/15 * * * * /path/to/update_dns.sh https://xxxxxxxx.adguardprivate.com admin:password123 nas.home

Precautions

  • Please keep your username and password safe to avoid leaks
  • It is recommended to add the update script to the system’s scheduled tasks for automatic execution
  • If the resolution does not take effect promptly, please check the network connection and the validity of the credentials

2.4 - DNS Split Configuration Guide

A detailed guide on how to optimize network access experience through DNS split configuration, including domestic and international DNS server setup guides and split rule settings.

DNS Split Overview

DNS split can significantly enhance the network access experience by distributing resolution requests for different domain names to different DNS servers. A reasonable DNS split configuration can:

  • Speed up domain name resolution
  • Improve website access stability
  • Optimize cross-border access experience
  • Avoid DNS pollution issues

Adguard Private Split Configuration

Basic Configuration Example

# Domestic DNS server
223.5.5.5                                    # Ali DNS
2400:3200::1                                 # Ali DNS IPv6
public0.adguardprivate.svc.cluster.local    # Private DNS, mainland upstream

# International DNS server
tls://1.0.0.1                               # Cloudflare DNS
tls://[2606:4700:4700::1001]               # Cloudflare DNS IPv6
public2.adguardprivate.svc.cluster.local    # Private DNS, other upstream

# Split rule example
[/google.com/bing.com/github.com/stackoverflow.com/]tls://1.0.0.1 public2.adguardprivate.svc.cluster.local
[/cn/xhscdn.com/tencentclb.com/tencent-cloud.net/aliyun.com/alicdn.com/]223.5.5.5 2400:3200::1 public0.adguardprivate.svc.cluster.local

List of Domestic ISP DNS Servers

Telecom DNS Servers

NamePrimary DNS ServerSecondary DNS Server
Anhui Telecom61.132.163.68202.102.213.68
Beijing Telecom219.142.76.3219.141.140.10
Chongqing Telecom61.128.192.6861.128.128.68
Fujian Telecom218.85.152.99218.85.157.99
Gansu Telecom202.100.64.6861.178.0.93
Guangdong Telecom202.96.128.86202.96.128.166
Guangxi Telecom202.103.225.68202.103.224.68
Guizhou Telecom202.98.192.67202.98.198.167
Henan Telecom222.88.88.88222.85.85.85
Heilongjiang Telecom219.147.198.230219.147.198.242
Hubei Telecom202.103.24.68202.103.0.68
Hunan Telecom222.246.129.8059.51.78.211
Jiangsu Telecom218.2.2.2218.4.4.4
Jiangxi Telecom202.101.224.69202.101.226.68
Inner Mongolia Telecom219.148.162.31222.74.39.50
Shandong Telecom219.146.1.66219.147.1.66
Shaanxi Telecom218.30.19.4061.134.1.4
Shanghai Telecom202.96.209.133116.228.111.118
Sichuan Telecom61.139.2.69218.6.200.139
Tianjin Telecom219.150.32.132219.146.0.132
Yunnan Telecom222.172.200.6861.166.150.123
Zhejiang Telecom202.101.172.3561.153.177.196
Tibet Telecom202.98.224.68202.98.224.69

Unicom DNS Servers

NamePrimary DNS ServerSecondary DNS Server
Beijing Unicom123.123.123.123123.123.123.124
Chongqing Unicom221.5.203.98221.7.92.98
Guangdong Unicom210.21.196.6221.5.88.88
Hebei Unicom202.99.160.68202.99.166.4
Henan Unicom202.102.224.68202.102.227.68
Heilongjiang Unicom202.97.224.69202.97.224.68
Jilin Unicom202.98.0.68202.98.5.68
Jiangsu Unicom221.6.4.66221.6.4.67
Inner Mongolia Unicom202.99.224.68202.99.224.8
Shandong Unicom202.102.128.68202.102.152.3
Shanxi Unicom202.99.192.66202.99.192.68
Shaanxi Unicom221.11.1.67221.11.1.68
Shanghai Unicom210.22.70.3210.22.84.3
Sichuan Unicom119.6.6.6124.161.87.155
Tianjin Unicom202.99.104.68202.99.96.68
Zhejiang Unicom221.12.1.227221.12.33.227
Liaoning Unicom202.96.69.38202.96.64.68

National Mobile DNS IP

NamePrimary DNS ServerSecondary DNS Server
Beijing Mobile221.130.33.60221.130.33.52
Guangdong Mobile211.136.192.6211.139.136.68
Jiangsu Mobile221.131.143.69112.4.0.55
Anhui Mobile211.138.180.2211.138.180.3
Shandong Mobile218.201.96.130211.137.191.26

Public DNS IP

NamePrimary DNS ServerSecondary DNS Server
114 DNS114.114.114.114114.114.115.115
CNNIC SDNS1.2.4.8210.2.4.8
Aliyun Public DNS223.5.5.5223.6.6.6
DNSPod DNS+119.29.29.29119.29.29.29
Google DNS8.8.8.88.8.4.4

Configuration Recommendations

  1. Prioritize nearby DNS servers
  2. Configure both IPv4 and IPv6 DNS
  3. Set up backup DNS for important domains
  4. Regularly update split rules
  5. Monitor DNS response time

Precautions

  • Record original DNS settings before configuration
  • Avoid using untrusted DNS servers
  • Regularly check if DNS resolution is normal
  • Keep the rule list concise and effective

By reasonably configuring DNS split, you can significantly enhance the network access experience. It is recommended to choose appropriate DNS servers and split rules based on actual needs.

References

2.5 - Using Custom Device Names

If you directly use the service’s listening address, such as:

  • tls://xxxxxxxx.adguardprivate.com
  • https://xxxxxxxx.adguardprivate.com/dns-query

The IP shown in the Client Rankings in the backend will be the cluster IP of the load balancer, which is meaningless to users and does not distinguish between different devices.

Client Rankings

You can identify different devices by using extended domain names and adding URL paths.

Custom Client Name

  • DoT uses the extended domain name method, such as tls://device1.xxxxxxxx.adguardprivate.com
  • DoH uses the method of adding a URL path, such as https://xxxxxxxx.adguardprivate.com/dns-query/device2

Note:

  • When setting up on Android devices, you do not need to enter the protocol prefix tls://, just enter device1.xxxxxxxx.adguardprivate.com
  • For Apple devices, enter the client ID in the setup guide, download the configuration file to set up, no manual input is required

Apple Device Setup Guide

All devices of a personal service share the service’s query limit of 30 requests per second.

2.6 - Faster Request Response

Paid users using AdGuard’s private service have the following DNS request path:

Based on the path, the fastest response scheme can be analyzed.

Local Cache Hit

The fastest response is a local cache hit. Since the local cache is at the memory level, it is very fast, taking only a few microseconds.

This is controlled by the TTL (time to live) value of the DNS response, typically ranging from a few minutes to several hours, indicating that the query result is valid during this time and does not need to be queried again.

You can set the minimum TTL value in Control Panel -> Settings -> DNS Settings -> DNS Cache Configuration -> Override Minimum TTL Value. Increasing this value extends the cache time, allowing the system to use the local cache more often. The typical TTL value is 600 seconds.

However, since this site also has filtering capabilities, if the service you need is mistakenly blocked by ad rules, you won’t be able to access it immediately even if you temporarily disable encrypted DNS, because the local cache result has been modified by the filtering rules. Therefore, setting it to 60 seconds is a safer value, ensuring that in rare cases, users won’t have to wait too long after disabling encrypted DNS due to misblocking.

AdGuard DNS Server

Currently, this site uses Alibaba Cloud servers located in Hangzhou, which can meet the low-latency needs of most users in the eastern region. As the business grows, servers will be added across the country in the future.

Server Cache Hit

By default, 4MB of DNS cache is set for each user, which is sufficient for a household based on experience. Freely modifying this setting may lead to forced termination of user services, and this site has blocked the modification entry for this setting.

Upstream DNS Server

Due to the use of Alibaba Cloud services, the upstream DNS service also uses Alibaba Cloud’s DNS service, which is very fast, typically returning results within a few milliseconds.

Users have three ways to request the upstream DNS server:

  1. Load Balancing: This site uses load balancing by default, automatically selecting the fastest server to return results.
  2. Parallel Requests: This site currently does not restrict the use of parallel requests.
  3. Fastest IP Address: This setting is currently meaningless, and this site has blocked the modification entry for this setting.

Here’s why the Fastest IP Address is meaningless: the fastest IP needs to be chosen by the device actually accessing the service. When the AdGuard service runs in Hangzhou and the user is in Beijing, AdGuard will think the IP address in Hangzhou is the fastest, but in reality, the user’s access to services in Beijing is the fastest. Choosing the Hangzhou IP address would actually increase latency. Therefore, this site has blocked the modification entry for this setting. This setting might be useful in a user’s home network but is meaningless in public services.

Many factors affect network experience, such as server bandwidth, network congestion, server load, and network quality. Choosing the fastest IP address does not guarantee the fastest response speed; latency is just one factor, not the only one. To prevent users from setting it incorrectly and causing a decline in service quality, this site has blocked the modification entry for this setting.

Rule Filtering

The most commonly used mode is the blacklist list, from which users can choose. The blacklist hit uses a hash algorithm, so regardless of the number of rules, the hit time is O(1), and users do not need to worry about the hit time being too long due to a large number of rules.

However, after rule calculation, they are stored in memory, with each user’s service memory usage limited to within 300MB, which can meet the needs of most users. If a user has too many rules, it may lead to insufficient memory, causing the service to restart repeatedly and resulting in service interruption.

This site has temporarily blocked the use of third-party rules to avoid users introducing too many rules. In the future, with better restriction methods, the use of third-party rules will be reopened.

Summary

To achieve faster request responses, users can:

  1. Appropriately increase the minimum TTL value to increase the local cache hit rate.
  2. Set an appropriate DNS cache size (pre-set value).
  3. Choose to create a service in the geographically closest city (awaiting business development).
  4. Choose load balancing for no overseas needs; choose parallel requests for overseas needs.
  5. Use a blacklist rule that suits you, avoiding introducing too many rules.

2.7 - Setting Up Trusted Service Providers

When creating a paid service, the default setting uses faster domestic upstream services, including Ali’s IPv4 and IPv6 as well as DoT services.

Some service providers may have issues with incorrect DNS resolution, directing some overseas websites to the wrong IP addresses, resulting in inaccessibility. A common symptom is a certificate error in the browser.

To avoid resolution errors, you can switch to an upstream service provider like Cloudflare. When using such services, ensure you are using the DoH or DoT protocol to prevent hijacking.

Additionally, you need to disable domestic upstream services, as they are closer and faster, and AdGuard will prioritize them.

To disable an upstream service, simply add a # before the corresponding service IP.

Avoiding Resolution Errors

After setting up, you need to test the upstream to ensure the upstream server is available, and then apply the changes.

Avoiding Resolution Errors - Apply

However, using only overseas services can degrade the access experience for domestic apps, as these apps typically route overseas resolutions to specific external servers, resulting in slower domestic access speeds.

If you only need to avoid resolution errors for commonly used services, you can manually specify a specific resolution address for the domains that are incorrectly resolved, while still using the default domestic upstream services for unspecified domains.

In the AdGuard console, go to Settings -> DNS Settings -> Upstream DNS Servers, and add the domains that are incorrectly resolved in the format [/example1.com/example2.com/]tls://1.0.0.1 to Custom DNS Servers, then click Save Settings.

Setting Upstream Servers

Setting Upstream Servers

public2.adguardprivate.svc.cluster.local is our internally provided resolution service that avoids resolution errors, with the upstream set to Cloudflare. Compared to users manually specifying an overseas upstream, it offers faster resolution speeds, at the cost of a slight delay when updating domain resolutions. If you do not have specialized needs, you can use our provided resolution service that avoids errors.

If you need to use external resolution addresses from Cloudflare or Google, you must specify the IP using DoT/DoH. Here are some examples:

#tls://1.1.1.1
tls://1.0.0.1
tls://[2606:4700:4700::1111]
tls://[2606:4700:4700::1001]
tls://[2606:4700:4700::64]
tls://[2606:4700:4700::6400]
https://1.1.1.1/dns-query
https://1.0.0.1/dns-query
https://[2606:4700:4700::1111]/dns-query
https://[2606:4700:4700::1001]/dns-query
#tls://8.8.8.8
#tls://8.8.4.4
tls://[2001:4860:4860::8888]
tls://[2001:4860:4860::8844]
tls://[2001:4860:4860::64]
tls://[2001:4860:4860::6464]
#https://8.8.8.8/dns-query
#https://8.8.4.4/dns-query
#https://[2001:4860:4860::8888]/dns-query
https://[2001:4860:4860::8844]/dns-query

The addresses commented with # are currently blocked by the firewall and temporarily unusable.

Our site fully supports IPv6, which is one of our advantages, allowing the use of IPv6 addresses for upstream services to achieve more stable resolution speeds.

3 - Privacy Policy

AdGuard Private Service Privacy Policy
  • AdGuard Private does not collect any information from paying users.
  • AdGuard Private does not share any information of paying users with third parties.
  • AdGuard Private uses randomly generated usernames and passwords to provide services, with only the payment order number linked to the username, and the payment order number does not involve personal information.
  • When initiating consultations via WeChat and email, AdGuard Private will be aware of contact details such as WeChat ID or email address.
  • Contact details are used only for service inquiries, and AdGuard Private will not proactively send any promotional information to the obtained contact details.
  • AdGuard Private uses tools like Google Analytics for website traffic statistics, but does not collect any personal information.
  • AdGuard Private, when troubleshooting user issues, will review the service operation logs of the user’s private service, but will not collect any personal information.