The audit, conducted under the International Standard on Assurance Engagements (ISAE) (UK) 3000 Type 1, included testing ExpressVPN’s policy of not collecting activity logs or connection logs, and that the TrustedServer technology works as described.
What else did the accountants think?
Separately, cybersecurity firm Cure53 conducted a source code audit and white-box security assessment of TrustedServer.
ExpressVPN claims the findings were positive, highlighting TrustedServer’s strong security stance, but auditors found some: “mostly general weaknesses and minor flaws were noted.”
“Furthermore, most of them can be rated as trivial to repair and fix”.
The Cure53 auditors explained, “It can also be positively acknowledged that none of the four actually identified vulnerabilities were ranked with a high or critical severity score, indicating an already quite robust environment exposed by the ExpressVPN TrustedServer components. “
If you are interested in fully verifying the results of the audit, you can view KPMG’s report hereand read the full Cure53 audit report here (opens in new tab).
“Regular third-party audits that validate our controls and the results of our internal team’s work, along with other security efforts like our bug bounty program, give us even more confidence that we’re protecting our users properly,” said Aaron Engel, head of Cybersecurity, ExpressVPN.
The news comes as VPN technology continues to play a key role in conflict zones around the world.
VPN use in Cuba has reportedly skyrocketed after authorities disrupted internet access as part of efforts to crack down on political protesters.
If you want to test ExpressVPN’s claims for yourself, the $100,000 bug bounty for detecting vulnerabilities TrustedServer (opens in new tab) is still up for grabs.