In a blog post, ProtonVPN just announced that it is open-sourcing its source code and has released the security audit reports as well.

With this step, ProtonVPN aims to become the most transparent and accountable VPN provider in the VPN market. The company has also conducted an independent security audit, which will become a crucial factor for users in trusting their VPN service.

For a full security audit, ProtonVPN has teamed up with the renowned security firm SEC Consult which will verify the security of Proton’s software.

Why Is ProtonVPN Going Open-Source?

The VPN market, especially with its share of free apps, is brimming with illegal data sharing practices, poor implementations, and security lapses.

“VPN services can technically access some very sensitive user data, which is why users should choose services with a track record for transparency and security,” said Dr. Andy Yen, CEO and founder of Proton.

By fully open-sourcing its client code, security experts across the world will be able to inspect ProtonVPN’s encryption implementations. There would be greater transparency on how the company handles user data, which in turn would help users gain more confidence in the company and keep a check on whether ProtonVPN is adhering to its strict privacy policies.

One can always trust open-source software more than a proprietary one because it can be independently scrutinized. In open source communities, potential vulnerabilities are also quickly identified and resolved.

On Other Open-Source VPN Clients

ProtonVPN has operated as a free service as well as a premium one. It is currently used by millions around the world and serves as an important tool for Internet freedom in places like Iran, China, and Russia.

While there are currently open-source VPN clients available, ProtonVPB is “the first to open source all their apps and publish a security audit of them all.”

In a statement issued to Fossbytes, ProtonVPN said that its app differs quite significantly from other open-source VPN clients such as OpenVPN as they provide a complete VPN service and “include additional functionality such as kill switch, always-on VPN, IKEv2 protocol support, split tunneling, etc.”