The Perfect Pair: FlokiNET Servers and High-Performance GPUs

Servers with High-Performance GPUs.

FlokiNET offers a range of dedicated servers that can be paired with powerful GPUs to meet your demanding workloads. Lets have a look at what our GPU portfolio has to offer!

– NVIDIA A100: Ideal for high-precision tasks such as scientific computing, engineering applications, and physics simulations. Its extensive support for various tensor precisions (TF32, BFLOAT16, FP16, INT8) makes it highly suitable for deep learning training and inference, making it a versatile choice for data centers focused on AI, machine learning, and HPC workloads.  A perfect match with the following dedicated servers: DL380 Gen 10 and DL385 Gen 10 Plus V2! 

-NVIDIA L40S: the BEST universal GPU is built on the NVIDIA Ada Lovelace architecture and boasts exceptional performance for a wide array of applications, including:
Generative AI: Supercharge image generation with up to 200 stable diffusion images per minute.
Large Language Model (LLM) Inference: Experience lightning-fast inference with low latency for models like Llama 2.
3D Graphics and Rendering: Accelerate complex workflows with third-generation RT Cores and hardware-accelerated motion blur.

Video Content: Streamline video processing and enhance AI video performance with up to 99% better energy efficiency.
The L40S is data center-ready, offering reliability, security features like secure boot, and compliance with industry standards like NEBS Level 3.

Excels in FP32, TF32, BFLOAT16, FP16, FP8, INT8 for deep learning, AI training and inference, graphics rendering, edge computing, real-time video analytics, healthcare AI, autonomous vehicles, and recommendation systems. Another perfect match with our DL380 Gen 10, DL385 Gen 10 Plus V2! 

-NVIDIA L4 Tensor Core GPU: Versatile accelerator designed to enhance a wide array of workloads, including video processing, AI tasks, virtual desktops, and graphics rendering. Leveraging the NVIDIA Ada Lovelace architecture and fourth-generation Tensor Cores, it delivers exceptional energy efficiency and up to 120X faster AI video performance compared to CPU-based solutions. Its single-slot, low-profile form factor makes it easy to integrate into various server environments.

Efficient in FP32, TF32, BFLOAT16, FP16, FP8, INT8 for inference tasks, media processing, virtualized workloads, edge AI, real-time video processing, IoT applications, smart devices, and financial AI. Ideal for the following dedicated servers: DL360 Gen 10, DL360 Gen 11 and BL460c Gen 10! 

– NVIDIA A2: Suitable for entry-level AI inference, edge computing, and virtualization tasks. Its low power consumption and compact design make it ideal for smart devices, real-time analytics, and mobile AI applications. It is an excellent choice for edge deployments and scenarios requiring efficient performance in constrained environments.

Suitable for FP32, TF32, BFLOAT16, FP16, INT8 for entry-level AI inference, edge computing, virtualization, smart devices, real-time analytics, autonomous systems, healthcare AI, and mobile AI applications. Perfect match with DL360 Gen 10, DL360 Gen 11 and BL460c Gen 10! 

– NVIDIA T4: Designed for a wide range of modern applications including machine learning, deep learning, and virtual desktops. Its energy-efficient design and small form factor make it ideal for mainstream enterprise servers, cloud computing, and edge deployments. The T4 is particularly effective for inference tasks, media processing, and virtual desktop infrastructure (VDI). Compact, energy-efficient powerhouse designed for diverse workloads. Powered by NVIDIA Turing Tensor Cores, it excels at accelerating deep learning, machine learning, video trans-coding, and virtual desktops. Its low-profile, single-slot design makes it ideal for space-constrained environments, while its 70W power limit ensures optimal efficiency. Another perfect match with DL360 Gen 10, DL360 Gen 11 and BL460c Gen 10! 

GPU and the AI Development

GPU and the AI Development.

GPUs have revolutionized the field of AI development, enabling researchers and developers to train complex models faster and more efficiently. Their parallel processing capabilities are perfectly suited for the computationally intensive tasks involved in AI, such as deep learning and neural networks.

Choosing the right GPU for your server is a crucial step in optimizing your infrastructure for the tasks at hand. By carefully considering your needs, budget, future plans, and the technical specifications of each option you can make an informed decision that will empower your server to reach its full potential.

Feel free to reach out to FlokiNET’s experts for personalized guidance and support in selecting the ideal GPU for your specific requirements.

Now let’s match you up with our servers!

Let’s see how we can team up to help you make the best decision for your server. A more elaborated match series on how to choose the right GPU for your FlokiNET dedicated server can be found below. 

360 Gen 10 – 2x Platinum 8173M, 28-core CPUs – Start at €​​​​​​​467.00/m!

  • Ideal for AI and Machine Learning: For this high-performance setup, the NVIDIA Tesla T4 would be an excellent choice. It offers high computational power and is optimized for AI and machine learning workloads.

380 Gen 10 – 2x Gold 6132, 14-core CPUs (mostly for LFF storage and GPU) – Start at €433.00/m!

  • Great for Storage and GPU Tasks: The NVIDIA L4 could be a suitable option for this server. It provides a balanced performance for storage and GPU-intensive tasks, aligning well with the server’s configuration and intended usage.

385 Gen 10 Plus V2 – 2x AMD EPYC 7543, 32-core CPUs – Start at €5978.90/half year!

  • Perfect for High-Performance Computing: Given the robust CPU configuration, the NVIDIA L40s would be a fitting choice. It offers high performance and is well-suited for high-performance computing tasks, aligning with the capabilities of the 32-core CPUs.

360 Gen 11 – Gold 6448H, 32-core CPUs – Start at €7953.00/half-year!

  • Ideal for Versatile Applications: This server can benefit from GPUs like the NVIDIA Tesla T4 or the NVIDIA L40s. The Tesla T4 excels in AI and machine learning tasks, while the L40s offers high performance for general computing tasks, ensuring versatility based on workload requirements.

Have any questions or suggestions? Let us know on our social media platforms or send us an e-mail at and we’ll get right back to you!

7 Tips to Help You Choose the Right GPU

How to Choose the Right GPU.

How to Choose the Right GPU for Your Server: Ultimate Guide

Selecting the right GPU for your server is a critical decision, as it directly impacts performance, efficiency, and ultimately, your bottom line. Whether you’re into the AI, rendering high-definition videos, or running complex simulations, your GPU is the engine that powers your server’s capabilities. This guide will walk you through the essential factors to consider and offer 7 expert tips to ensure you make the best choice. But first things first.

What is a GPU?

What is a GPU?

In a nutshell it is a specialized processor designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. While originally developed for rendering graphics, GPUs have evolved to excel in parallel processing, making them ideal for tasks that require handling massive amounts of data simultaneously.

While both GPUs and CPUs are essential components of a computer system, they serve distinct purposes.

  • CPU: Responsible for executing sequential instructions and general-purpose tasks. It is able to handle a wide variety of operations but is less efficient at processing large datasets in parallel.
  • GPU: Designed for parallel processing, GPUs excel at handling multiple tasks simultaneously. This makes them perfect for tasks like rendering graphics, running simulations, and accelerating machine learning algorithms.

What are the different features that GPUs for servers have?

Server GPUs are specifically designed for data center environments and are optimized for performance, efficiency, and reliability. Below we will be comparing a few cards from our product list, based on their features:

  • Higher memory bandwidth: To handle large datasets efficiently.
    •  A100: 1,935GB/s
    •  L40S: 864GB/s
    •  L4: 300GB/s
    •  A2: 200GB/s
  • Precision: refers to the detail and accuracy with which numerical values are represented and processed, influencing the performance and suitability of the GPU for various computational tasks:
    • FP64 (High Precision): Used in scientific computing for simulations, climate modeling, engineering applications, financial modeling, physics simulations.
    • FP32 (Medium Precision): Utilized in graphics rendering for game development, 3D modeling, and animation, general-purpose computing, machine learning training, data analytics, VR, real-time simulations, and computational photography.
    • Tensor Float 32 / BFLOAT16 / FP16 (Low Precision): Ideal for deep learning with large datasets, AI research, image recognition, natural language processing, recommendation systems, speech recognition, autonomous vehicle development and scalable AI services in cloud computing.

When choosing the right GPU for your dedicated server keep these tips in mind: 

7 tips to choose the right GPU for your server.

1. Identify Your Needs

The first step is understanding the exact role your GPU will play in your server environment. Are you building a powerhouse for AI and machine learning algorithms? Do you need to render high-quality videos or graphics? Perhaps you’re hosting a demanding gaming server. Each use case has different demands on GPU capabilities.

2. Determine Your Budget
GPUs come in a wide range of prices. It’s essential to establish a realistic budget that aligns with your needs and overall project goals. Don’t forget to factor in additional costs like power consumption and cooling requirements, as high-performance GPUs can be power-hungry. Balancing performance with cost is key to getting the most value out of your investment.

3. Evaluate Your Current Infrastructure
Before diving into GPU selection, take a close look at your existing server setup. What resources do you rely on currently? Go through the documentation of the GPU you plan on using and compare its features and compatibility with the current set-up you have and how you plan to scale/grow.

Consider the following:

  • PCIe Slots: Ensure your server motherboard has the necessary PCIe slots to support the GPU.
  • Power Supply: Check if your power supply unit (PSU) can provide sufficient power for the GPU.
  • Physical Space: Verify that your server chassis has enough space to accommodate the GPU, especially if it’s a large, high-end model.
  • Driver Support: Ensure that the GPU has stable drivers that are compatible with your server’s operating system and software stack.

4. Explore Various GPU Server Choices
While the market is flooded with multiple options – we have a select list of GPUs, each offering unique features and specifications. Take the time to research different models and compare:

  • CUDA Cores/Stream Processors: These determine the GPU’s ability to handle parallel tasks. More cores generally mean better performance for complex calculations.
  • VRAM (Video RAM): This is essential for handling large datasets and textures. Ensure the GPU has enough VRAM to manage your applications without bottlenecks.
  • Clock Speed: Higher clock speeds can improve performance, especially for applications requiring quick data processing.
  • TDP (Thermal Design Power): This indicates the GPU’s power consumption and heat output. Ensure your server can handle the thermal and power requirements of the GPU.

Read reviews, benchmark results, and expert opinions to understand how different GPUs perform in real-world scenarios.

5. Ask the Experts
Don’t hesitate to contact us, our experienced team is here to assist. They can offer valuable insights and recommendations based on your specific requirements and budget. Explain your use case in detail, and we can guide you towards the most suitable GPU options for our dedicated servers.

6. Consider Scalability and Plan for the Future
Your computational needs might evolve over time, so it’s wise to choose a GPU that can scale with your demands. Consider models that allow for future upgrades or the addition of more GPUs to your server. Investing in a scalable solution can save you money and hassle in the long run.

7. Find a Trustworthy Provider
Purchasing your GPU from a reputable vendor is crucial. Look for vendors with a proven track record of reliability and excellent customer support. A solid warranty can also provide peace of mind in case of any issues. Don’t solely focus on price; factor in the vendor’s reputation and after-sales service.

Stay tuned for our upcoming article, where we will guide you on how to pair your FlokiNET dedicated server with the ideal GPU for optimal performance. Feel free to reach out to FlokiNET’s experts at for personalized guidance and support in selecting the ideal GPU for your specific requirements.

World Day Against Cyber Censorship

Today we celebrate World Day Against Cyber Censorship, a major online event that focuses on raising awareness of the various ways governments around the world restrict and censor free expression on the Internet. First recognized on 12 March 2008 at the request of Reporters Without Borders and Amnesty International, this day serves as an important opportunity for reflection and action against online censorship. At FlokiNET, we join in the celebration of World Day Against Cyber Censorship and reaffirm our commitment to fostering an Internet space that values freedom of expression.

According to, a non-profit organization based in Washington, D.C., best known for its policy advocacy on issues of democracy, political freedom, and human rights, the following key findings were noted in the past year: 

Global internet freedom on the decline

For the 13th year in a row, global internet freedom declined, with Iran facing increased digital repression, including internet shutdowns and the blocking of apps such as WhatsApp and Instagram, aimed at suppressing anti-government protests. Myanmar almost overtook China as the world’s worst internet freedom environment, a title China held for nine years. In the Philippines, President Rodrigo Duterte used an anti-terrorism law to suppress critical news sites, signalling a worrying deterioration.

Multiple attacks on freedom of expression

Around the world, attacks on free expression surged, with 55 out of 70 countries experiencing legal repercussions for online expression. More alarmingly, 41 countries reported physical attacks or killings linked to online expression. The severity peaked in Myanmar and Iran, where death sentences were handed down for crimes related to online expression. Belarus and Nicaragua saw harsh repression, with dictators Alexander Lukashenko and Daniel Ortega resorting to harsh prison sentences to stifle online speech.

AI and disinformation

AI poses a significant threat to online spaces, with 47 governments doubling down on the use of commentators to manipulate discussions. In at least 16 countries, AI-generated text, audio and images have been used to shape narratives, smear opponents and influence public discourse.

AI and online censorship

AI is enabling governments, particularly authoritarian regimes, to increase online censorship through technologies such as chat bots. In 21 countries, legal frameworks require digital platforms to use machine learning to suppress disfavored speech. Despite these advances, 41 governments continue to block websites protected by freedom of expression standards.

Protecting internet freedom 

Protecting internet freedom is crucial in the face of increasing AI-driven digital repression. While private companies are contributing to self-regulation, concerns about human rights remain. Democratic policymakers must work with global civil society experts to establish human rights-based standards for AI development and deployment.

What can you do? 

In the fight against cyber censorship, consider taking the following steps:

Support, educate yourself and others, and advocate for internet freedom: Get involved in advocacy efforts, support organizations that promote Internet freedom, and stay informed about issues related to online censorship.
You can stay informed by following organizations such as the National Coalition Against Censorship, Reporters Without Borders, Amnesty International, Electronic Frontier Foundation, Freedom House, Freedom of the Press Foundation.

Use encrypted communication tools: Use encrypted messaging services and email platforms to secure your communications and protect sensitive information, such as Signal, Element and Proton Mail. 

Support decentralized platforms: Explore and promote decentralized social media platforms and communication tools that are less susceptible to centralized control and censorship. Some platforms we recommend are Mastodon and Matrix for anti-censorship communication.

Stay informed about online safety: Keep up to date with the latest developments in online security, use strong passwords and regularly update your software to mitigate potential cyber threats. Get the latest news and updates on cyber security from sources like KrebsOnSecurity, Schneier on Security and Ars Technica.

Access censored content (if blocked in your region): Use tools such as Tor for anonymous browsing and VPN as a secure tunnel for your internet traffic to access censored content, giving you a safe and private way to browse the internet without restrictions.

Have any questions or suggestions? Let us know at or on our social media channels.

World Password Day

World Password Day is a day to be aware of the important role passwords play in our digital lives. Here are five important tips:

  1. Use a unique password for each online account that consists of a combination of letters, numbers, and symbols. A strong password is one of the most important measures you can take to secure your online accounts. By using a unique password for each account, you can prevent a hacker from gaining access to multiple accounts if they manage to crack one password.
  2. Never use personal identifiers in your password. Avoid using any information that can be easily guessed or found online, such as your name, birth date, or phone number. Instead, use a combination of random letters, numbers, and symbols that are difficult to guess.
  3. Use a password manager to generate and store your passwords securely. Password managers are software applications that can generate and store complex passwords for you. They can also fill in login credentials automatically, saving you time and effort. Some popular password managers include KeepassXC, 1Password, and Bitwarden. KeepassXC is free and open source software while 1Password and Bitwarden are pais services.
  4. Use two-factor authentication for an extra layer of protection. Two-factor authentication (2FA) adds an extra layer of security by requiring you to provide two forms of identification before accessing an account. This could be a password and a fingerprint, a password and a one-time code sent to your phone, or a password and a security token. We recommend using an open-source 2FA app like FreeOTP+.
  5. Regularly check if your data has been compromised in a data breach by visiting Have I Been Pwned is a free website that allows you to check if your email address has been included in any known data breaches. If your email address has been compromised, it’s important to change your password for that account immediately.

Another year, another censorship attempt

On January 15th, 2023, we received a Cease and Desist letter (you can see the letter at the bottom of this page) from the ‘General Counsel’ of Cellebrite Ltd., requiring [us] to immediately shut down the site named “” on the grounds that their intellectual property was made public as part of a series of leaks which also include “Micro Systemation AB” from Sweden. Within these leaked data, it is possible to find documentation with tools developed to break into private devices (phones, tablets and laptops) and extract information.

Both companies are notorious for selling their products to oppressive regimes with very poor human rights records, which use these tools to harass journalists and put their work and lives in danger. So, while a cease and desist letter is an internationally recognized procedure, according to the EU law this leak is protected by the DIRECTIVE (EU) 2019/1937 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 October 2019.

We take the protection of our customers’ privacy, security, and general rights seriously and in this case, we have determined this request clearly attempts to use copyright laws to suppress free speech and media, which is not legal as detailed in the DIRECTIVE 2001/29/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. As a result, we have politely informed the representative of Cellebrite Ltd. that we will not take action.​​​​​​​​​​​​​​ Last year ended with a similar request regarding this platform:

More information about these companies can be found here:


The letter can be found here:

Dear Sir / madam:

I am Cellebrite DI Ltd. and its group companies (“Cellebrite”) General Counsel. It has come to our attention that person(s) operating under the name of “” (“Enlace”) have a domain under the name of It has further come to our attention that FlokiNET are the ISP hosting this Enlace domain. On January 13, 2023 Enlace issued a statement on their website notifying of the receipt of certain Cellebrite owned files from an authorized person, and further indicated the “leaks” are available for download in different locations including their said domain.

Cellebrite hereby requires that you immediately shut down and cease and desist from making available or enabling the availability, on such website or otherwise, of any of Cellebrite’s copyrighted software, documentations, scripts or any other artifact identified to be owned by Cellebrite, including, without limitation, the Cellebrite installation files (collectively the “Cellebrite Materials”).

All use or distribution of the Cellebrite Materials is subject to Cellebrite’s end user license agreement (“EULA”). Cellebrite’s EULA provides that the license grant is subject to the terms and conditions of the EULA, including without limitation the restrictions on transfer, assignment or distribution, making the grant of the license conditional on compliance with the terms of the EULA. Under Cellebrite’s EULA, Cellebrite Materials may not be sublicense, transferred or assigned without Cellebrite’s prior written consent. Under Cellebrite’s EULA, Cellebrite Materials may not be distributed, including by selling a product on a secondhand market, nor is it permitted to attempt to distribute Software. As Cellebrite’s EULA does not permit transfer, assignment, distribution or an attempt to distribute Software or other Cellebrite Materials, publishing of Cellebrite Materials infringes Cellebrite’s copyright and other intellectual property rights in such materials.

We, therefore, demand that you immediately cease and desist from making available or aiding in allowing availability of any Cellebrite Materials on the said website or otherwise. Your failure to remove the website or our materials from the website and to provide us with written assurance that you have done so within seven (7) days of the date of this letter will force us to explore additional means of legal redress available to Cellebrite in connection with the unauthorized use of Cellebrite’s copyrighted Software and other materials.

This letter is not intended to exhaust or waive any claim or argument that Cellebrite have or may have. Nothing in this letter (or any lack thereof) shall prejudice any of Cellebrite’s claims, rights or cause of action against you or any other party acting on your behalf.


General Counsel

Cellebrite DI Ltd.

As we stated before, we will not censor free press and the freedom of speech!

Censorship in Ecuador

After we received a request from the Australian Police in May this year (see more here), in which they wanted to censor one of our customers for leaking important data about the abuse happening in the Island of Nauru, we received another request from law enforcement in Ecuador.

Spanish original:

“Buenas tardes señores, Flokinet

Les saludamos de Ecuador para reportar que la Ip alojado en su hosting se encuentra publicando información que afecta a la integridad de la Empresa Pública del Estado Ecuatoriano, por lo consiguiente solicito a ustedes como provedores de servicio de internet, tengan a bien dar de baja mencionado foro.

Saludos cordiales,

Dirección de Ciberinteligencia”

English translation:

Good afternoon gentlemen, Flokinet

We greet you from Ecuador to report that the Ip hosted on your hosting is publishing information that affects the integrity of the Public Company of the Ecuadorian State, therefore I request you as internet service providers, please remove the above mentioned forum.

Kind regards,

Directorate of Cyber Intelligence

This time, Ecuadorian law enforcement is focused on shutting down the hacktivist group Guacamaya which leaked 400000 e-mails uncovering the cyber vulnerability of the military corps.

As a reply, we remain committed to our fight for a free press so our answer remains clear: We will not take down whistleblowers’ websites.

Keep Iran connected

In the light of recent events happening in Iran:
You can use the secure Signal app to stay in touch with friends and family.

For Android users:
Playstore is blocked in Iran so you have to download the Signal APK file if you dont have Signal yet installed:

Optional: you can download the file from our website:

For iPhone users: You have to get a VPN to download Signal from the app store as a manual setup for Android is impossible.

After the setup, you will have to set in the settings the proxy domain you can request from us by Twitter or email (

A detailed how-to can be found here:

Also in Persian available:

If you have any questions, please contact us at

Why The Netherlands?

Why did we open a data center in the Netherlands?

We made this decision in order to have a footprint in Western Europe for low latency and high bandwidth options. Additionally, the freedom of speech and press laws are great, something that comes to our advantage in protecting the values that we believe in.

What does the Netherlands have to offer in terms of hosting advantages?    

Excellent connections within Europe, low bandwidth prices, DDoS protection and withal all products are wind energy powered, having a low carbon footprint.

Where is the following location of a FlokiNET data center?

We are perpetually probing, for now, various locations. The next one will be most likely outside Europe. As soon as we have details, we will publish them and let the world know our next move.

What products does FlokiNET offer in the Netherlands?

We already offer all products that are available in other locations like shared hosting, VPS, dedicated servers and colocation. You can check out our products here and see which one fits best to your hosting needs.

Have any questions or suggestions for us? Contact us at

Fight surveillance law in Romania

How does it influence the hosting and cybersecurity industry in Romania?

The law will require:

– Hosting provider to intercept communications, provide customer data and decrypt data if necessary, also at their own expense.

– IP resource hosting providers and electronic communication providers “to grant, at the request of authorized bodies, under the conditions of this law, the decrypted content of communications transited in their networks”

But what would this cause for customers in reality?

– decrypt encrypted content. So for example SSL/TLS based data has to be decrypted on request. In case the provider has access towards your key (for shared and managed hosting this is always the case, the same for most DDOS filter)

– provide details about website visitor (IP log)

How will be FlokiNET affected?

The law does include also foreign provider operating IP / network in Romania. However we and our legal team does clearly sees the proposed law as illegal under Romanian constition as well as under EU law. All passwords, decryption keys, SSL keys etc are managed by FlokiNET ehf Iceland and handing them over would violate Icelandic law. We are more then willing to discuss this in court and will not cooperate in any matter that would break Icelandic law.

Customer data remains safe?

Yes, it does! All our server are encrypted, without the keys stored safely in iceland no data can be decrypted.

Should i move my hosting / server towards a different location?

There is no need for this, in case our legal opinion changes or the law becomes permanent we will adress our customers.
What action will take FlokiNET to ensure customer data safety?Since FlokiNET was founded in 2012 customer data protection is our DNA.

This includes the encryption of all data and several technical and legal measurements to make sure this data remains safe. However in the case the law will become active in Romania we will immidiate challenge this in court and are confident to appeal the law.

Conclusion for our customers:

No changes or worries required for now. In case the situation changes we will let you know.

What can i do?

In our previous blog post we mentioned that the Romanian Senate is due to vote on a piece of legislation that severely crippled the ability that hosting companies have to provide secure services to you, the customers. If you want to take a stand against this, we urge you to send a letter to the Commissions inside the Romania Senate, as well as the representatives of Romanian political parties.

You can use the letter below as a template, add your own position to it, and send it. We recommend you act sooner rather than later, since the vote on this piece of legislation is scheduled, most probably, for Monday, February 14th.

Think of it as sending a Valentine’s Day letter to a secure Internet. 😉

The blog entry with the background:


A new proposal to extend communication surveillance and to intercept encrypted communications is about to be voted in the Romanian Senate.

This law proposal is designed to increase surveillance by crippling hosting security. Below you can find an open letter that we and other hosting companies have send to prevent this from happening and the letter that will go to the Romanian Senate.

In our second blogpost you can find further details how it influence your services with us.


There is a piece of legislation, most likely due to receive the Senate’s vote on Monday, February 14th, in Romania, that introduces a number of obligations that amount to increased surveillance and a decrease in the secure services we can offer. 
The piece of legislation is an amendment introduced, without any public debate, inside the Code for Communications (which implements a European directive). The amendment has nothing to do with the surrounding legislation – it was introduced strictly in order to increase state surveillance. 
I’ve composed an open letter, which I invite you to read and if you are in agreement with what is expressed, sign. The English version of this letter is appended at the end of the e-mail, and the Romanian version is attached. Your signature will appear on both. 
I urge you to respond to this as soon as you can – we need to send the open letter, in order for it to be received and read by all those we will contact:- the Communications, Economic and Juridic Committees inside the Senate;- the president of the Senate;- leaders of Romanian political parties.
The exact same open letter that I have attached to this e-mail will be sent to all of the above. 
Please respond, if you are willing to sign, by 5pm this Friday, February 11th. Let me know how your want your signature to appear (I suggest a format such as “Ion Popescu representing XYZ hosting company”).
For more context around this matter, you can consult the following:- the open letter of the civic society– the initial form of this amendment– the aftermath of the amendment going through the Senate Committees


With this open letter, the signatory entities, providers of storage (hosting), instant messaging, and other online services express their common position of rejection of the Bill to amend and supplement certain regulatory acts in the field of electronic communications and to establish measures to facilitate the development of electronic communications networks (L532/2021, Communications Code) [1]. 
The signatory entities appeal directly to you to reject Article 10 index 2, in its current form and, possibly if still necessary, to send it to the Special Committees for rethinking and appropriate discussion.

In particular, the new obligation for IP resource hosting providers and electronic communication providers “to grant, at the request of authorized bodies, under the conditions of this law, the decrypted content of communications transited in their networks” puts us in the position of violating the confidentiality of communications transited in our networks, which is an express legal obligation provided by Art 4 Law 506/2004 (as the implementation of EU Directive 2002/58/EC Eprivacy) and Art 28 of the Constitution on the secrecy of correspondence.
Technically, this would be almost impossible if content served by one entity was encrypted by another entity unless we equipped ourselves with a series of highly sophisticated tools and turned into cyber criminals for a man-in-the-middle attack. Even then we don’t think we’d succeed.
Also, the concept of transit itself is vague and cannot be directly translated into a technical solution. In any web application, the term “communications content” refers both to messages exchanged between human users, who are communicating, but also messages exchanged between automated entities, which are part of the smooth functioning of the application. It is incorrect to treat any form of information exchange as homogeneous.  We remind you that most web communications are encrypted (https) nowadays.

The signatory entities are brought together by a common interest in providing customers with quality hosting, storage and messaging services to the same standards as other entities operating in the same field. The signatories carry out commercial activity on the territory of Romania, an activity which is directly targeted by the provisions of the draft law through the following wording:
“provider of electronic hosting services with IP resources – a person who, on the territory of Romania, provides services for storing, distributing content and ensuring access to it, on owned or rented servers, by managing a set of IP addresses on the Internet”.
We would also point out that providers of this type are already regulated by Law 365/2002 on electronic commerce, and an obligation to notify ANCOM (unique in the European Union) would violate the principle of Art 4 (1) of this law.

The Romanian civil society has addressed an open letter to you [1] whose arguments we support:
1. The Communications Code should not be extended with amendments that legislate the interception of communications. The European Directive, which is transposed by the present Communications Code, does not specify such obligations. Moreover, the amendment introduced in the Communications Code is contrary to the existing E-Commerce Directive and the proposed Digital Services Act Directive; 
2. The wording in the amendment is vague: both the wording describing the entities covered by the amendment and the wording describing the obligations incumbent on the entities. From the present wording, the obligation is imposed on any entity hosting content or providing messaging services on the territory of Romania, regardless of the legal entity, the location of the infrastructure, the purpose of the activity. Moreover, this wording is directly contrary to the proper functioning of some hosting and messaging services – from a technical point of view, encryption is necessary and critical for the security of these systems. The obligations of the amendment translate directly into a degradation of the quality of services, which will be suffered by all persons accessing content on Romanian territory;
3. The Constitutional Court of Romania has ruled that vague formulations cannot be considered constitutional.  
Thus, the signatory entities recommend:
1. Rejection of art 10^2 or referral to discussion in the Senate Committees.
2. Transparency in the drafting of legislation on hosting and messaging services, as well as public debates in which the actors concerned offer their support for the drafting of laws that are beneficial to all. 
[1] –