X-VPN Trust Center

X-VPN will never sell, use, or disclose any data to any third parties for any purpose. We are committed to transparency, security, and privacy by design, ensuring that your data stays yours, always.

Trusted X-VPN, Protected Users

Encrypted Data Transmission

TLS-Based Tunnel Encryption

We secure all VPN tunnels with TLS (Transport Layer Security), employing AES-GCM cipher suites combined with Elliptic-Curve Diffie–Hellman Ephemeral (ECDHE) key exchange. This configuration provides both confidentiality/integrity and forward secrecy for user traffic.

Key Rotation & HKDF Derivation

Encryption keys are rotated regularly—either on a time schedule or upon new session establishment. We leverage the HMAC-based Extract-and-Expand Key Derivation Function (HKDF):

• Extract: Derive a pseudorandom initial key material (IKM) from the shared secret and a salt via HMAC.
• Expand: Generate distinct encryption and authentication keys from the IKM using HMAC with context-specific identifiers.

All Phases Encrypted

Every phase, from VPN connection establishment and authentication to traffic billing and user data transmission, is fully encrypted with AES-GCM-256.

Industry Assurance: TLS 1.3 and AES-GCM are widely recognized as the most secure and efficient cryptographic standards in use today. They are endorsed by organizations such as NIST (National Institute of Standards and Technology), and are the foundation of secure communication protocols used across banking, government, and large-scale cloud platforms.

Zero-Retention Packet Handling

Client Side

  • All VPN traffic is handled in-memory before passing packets to the tunnel. No data is collected or persisted.

Server Side

  • The server performs in-memory tunnel read or write operations and traffic-size billing, without logging or storing any user data.

Implementation

In-Memory Session Caching

All VPN packet handling and session metadata reside exclusively in volatile RAM on our VPN servers. No traffic payloads or IP-to-client mappings are ever written to disk—only aggregated TX/RX byte counts are briefly held in memory for billing calculations. User traffic data in RAM is automatically purged within 1 second, and all in-memory data is fully erased upon shutdown or reboot, ensuring complete data ephemerality.

Whitelisted Logging via Code Review

We maintain a strict log‐whitelisting policy: every log statement must be explicitly approved in code review. Any attempt to introduce unapproved or sensitive logging is automatically rejected by our CI pipeline.

Centralized Log Governance

All logs from client, API and VPN servers are redirected to a designated directory structure—no ad-hoc or stray log files can exist outside this controlled pipeline.

DNS Handling

We operate our own DNS recursive server. All DNS requests are forwarded to a dedicated process that only handles queries and responses, without any user-identifiable information. As a result, DNS activity cannot be traced back to individual users.

No User Data Stored

No User Data Stored

No Real IP Storage

  • Our system does not collect or store users’ real IP addresses at any point.

No Traffic or Content Logging

  • We do not log browsing activity, DNS requests, or content access. VPN traffic is processed in memory and immediately discarded.

Unknown User-VPN Server Relationship

  • Our infrastructure does not track or retain which users connect to which VPN servers.

Strict Internal Access Control

Least Privilege

  • Access to production servers and logs is strictly limited. Even developers can only access separate test clusters.

Dual-Approval Log Access

  • Requests to view or export production logs require a co-signature from two authorized persons.

SSH-Only Authentication

  • Administrative access uses SSH key-based login, with password authentication disabled to minimize credential theft risks.

Code Review

  • All code changes must pass a GitLab Merge Request, reviewed and approved by at least two technical peers before merging.
    Our CI/CD Pipeline uses mandatory static code analysis tools to automatically scan submissions and Merge Requests, blocking non-compliant code from entering the master branch to maintain security and compliance.

Continuous  Compliance

To ensure ongoing adherence to our zero-retention and privacy commitments, X-VPN has implemented a multi-layered Continuous Compliance program that builds on our existing Testing & Validation framework.

Scheduled Code Audits (Quarterly)

We perform comprehensive code audits every quarter. Led by our security engineering team, these reviews target all traffic-handling, logging, and data-processing modules. Findings are logged in our issue-tracking system and must be remediated in the next sprint, with fixes verified through our CI pipeline.

CI Pipeline–Enforced Static Analysis

Every GitLab Merge Request triggers automated static analysis (custom security linters, forbidden-logging detectors). Any introduction of unapproved logging calls or deviations from our secure-coding standards causes the build to fail, preventing non-compliant code from merging.

Internal Training & Accountability Mechanism

We hold regular developer training on privacy requirements and secure-coding best practices. Any policy violations detected during audits or CI runs trigger a formal accountability process—including documented remediation steps and targeted retraining—to close the loop on compliance.

Collaborative External Supervision

Bug Bounty Program

  • We are dedicated to enhancing our services in partnership with our users. We recognize and reward security researchers who report vulnerabilities with bug bounty, contributing to our safety.

24/7 Feedback Mechanism

  • Our support team is 24/7 on standby for user feedback, fostering a collaborative supervision that drives our growth.

Bug Bounty Report

We have received privacy and security-related issues reported by security researchers, experts, and users from around the world. These insights helped us grow and provide better services.

Bug Types

Amount

Status

Email Security & Validation

3

Solved

Input Validation & Injection (Client-Side)

3

Solved

Server & Protocol Configuration Issues

5

Solved

Web Security Headers & iframe Settings

3

Solved

Session & Authentication Controls

2

Solved

Reports received from Jan 2025 to June 2025

Our Innovation

We have made significant efforts to protect user data security by deploying RAM-only servers for our online products and implementing zero-trust technology to strictly control internal access.

Encrypted Data Transmission

RAM-Only Servers

  • • All data is wiped on every reboot, as the VPN server runs entirely in memory.
  • • No data is ever written to disk, minimizing the risk of leakage or recovery.
  • • The full software stack is reinstalled each time the server starts.
  • • All server binaries are centrally managed and verified with hash checks to ensure consistency—we always know exactly what is running on each machine.
  • • A monitoring system continuously checks the server's health to ensure the VPN service remains stable and operational.

Zero-Trust Access Control

  • • Access Based on Roles: Employees get only the access they need, based on their job role.
  • • Ongoing Identity Checks: We constantly verify who is accessing the system to make sure everything is in compliance.
  • • Secure Communications: All internal communications are encrypted to keep them safe.
  • • Flexible Security Measures: We adjust security settings automatically based on what employees are doing and their environment.
  • • Blocking Unwanted Access: We immediately stop unauthorized access attempts and alert on suspicious activities.

X-VPN Transparency Report

We provide a fully transparent report on user data requests from global government and law enforcement. As there are no logs kept, no user data exists, X-VPN simply responded that there's nothing we can do.

Type

Requests Received

Data Provided

Law Enforcement Requests

65

0

DMCA Requests

239,509

0

Civil Court Orders

0

0

Criminal Court Orders

0

0

Gag Orders/Restrictive Orders

0

0

Data requests received from 2017 to June 2025: none resulted in data disclosure.

Our Commitment to Privacy

Your Data, Your Choice

Your Data, Your Choice

You can use X-VPN without an account. No registration or email is necessary. If you choose to create an account, a virtual email is acceptable. You can also pay with cryptocurrency to maintain your anonymity. All personal information is optional.

No Tracking, No Worries

No Tracking, No Worries

We never track your activity. No third-party analytics or social widgets are used to analyze user habits. We even developed an innovative anti-tracking feature to help you against unwanted trackers. Browse worry-free, as the internet should be.

Self Hosted, In Control

Self Hosted, In Control

X-VPN routes all your DNS requests through our secure private DNS servers. Your data never passes through untrustworthy third-party services, ensuring your privacy and security at all times. You maintain complete control.