Surfshark is among the first providers in the VPN industry to upgrade its servers to RAM-only infrastructure, meaning that servers boot up using only RAM memory instead of hard drive storage.
Welcome to Surfshark’s Trust center!
Surfshark focuses on creating humanized security products.
Here, you’ll learn how we maintain the highest security standards for all our services and products, all to your benefit:
- Inspect the security standards we follow
- Get familiar with the technical aspects of our server infrastructure
- See our certifications, patents, and audits
- Learn more about our values and privacy-related initiatives
Find out the security methods we apply to our products & services.
Discover how our high-end server infrastructure delivers top-level user privacy worldwide.
Learn which certifications, patents, and audits
verify the quality of our products.
Explore our initiatives that strive to make cybersecurity accessible to all.
To ensure your security using Surfshark, we comply with the strictest security measures. Learn about our security implementations, testing procedures, and other methods that Surfshark and its products undergo to maintain the safety of our services and customers.
Implementation of the most secure protocols
Surfshark offers WireGuard, OpenVPN, and IKEv2 VPN protocols and uses robust AES-256-GCM encryption. Along with AES-256 encryption, Surfshark uses ChaCha20 encryption for the WireGuard protocol. Moreover, Surfshark uses a 2048-bit version of the RSA (Rivest-Shamir-Adleman) encryption keys.
Third-party bug bounty
We comply with third-party bug bounty at Surfshark. It means that we employ reliable companies to search for bugs or system vulnerabilities in our software. This allows us to better identify and patch even the most minor security flaws and protect our clients and company operations.
We check for exploitable vulnerabilities and assess the software by executing frequent system penetration tests. Regularly performed internal and external pen testing guarantees a thorough assessment of our service and products.
Secure design and development
Our design process includes security and privacy threat modeling. Using Static Application Security Testing (SAST) and other methods to find the security gaps, threats, and vulnerabilities, we can reduce or eliminate the potential dangers by implementing sufficient countermeasures.
The 2FA at Surfshark is used for our applications for Surfshark clients and is obligatory for internal operations. It’s a standard security method that adds a second step to the login process and prevents particular attacks, such as brute-forcing.
Hardened secure shell (SSH)
To securely access Surfshark’s vital servers from a distance, we use monitored, hardened, and audited SSH, backed by an access management system. The configuration is always written in code.
Surfshark constantly monitors and checks the service for suspicious or illegal activity. The monitoring is performed 24/7, and all processes are automated.
Zero-knowledge password storage
User logins in Surfshark’s database are encrypted, ensuring no one can decrypt the stored login information. Even in the event of a server data breach, no one could decode the users' stored logins.
Surfshark uses automated unattended upgrades to ensure our production environment meets the software requirements.
We use an automated system that monitors and informs us about the latest threats worldwide based on knowledge, expertise, and experience about incidence, evaluation, and threat actors - Surfshark is constantly up to date.
The principle of least privilege (PoLP)
Our company adheres to the PoLP, also known as the principle of minimal privilege (PoMP). This means that our personnel only have access to the tools, resources, and operational systems required for their responsibilities at work. Our customer support operates with the least-required access.
Surfshark aims to provide the best possible environment in pursuit of higher user privacy and security. Increasing the number of servers and converting them into RAM-only profiles are only a few substantial steps toward more private and transparent practices in the VPN market.
10 Gbps server speed
By shifting the servers from 1 Gbps to 10 Gbps, Surfshark VPN connection is faster and gives the new servers better throughput, which means they can transfer big chunks of data quicker. Since the data is throughput faster, the servers host more people, and the speeds are more stable. Moreover, the servers are less crowded.
3200+ servers worldwide
You can select from over 3200+ servers spread across 100 countries. Surfshark also covers many VPN-restricting states and offers virtual locations that appear to be in one country but physically are in another. The more high-quality servers a VPN offers, the faster and less crowded the server connection is.
Most of our VPN servers are destroyed and rebuilt regularly. This way, we reduce the window of vulnerability for our systems.
We at Surfshark understand that quality is the base of our company and one of the key components to our customers’ satisfaction. We seek to maintain the quality of our products through frequent third-party assurance reports, patents, and other practices that can demonstrate our high standards, while constantly working on innovation.
Surfshark acquired an official seal of approval from the independent German IT security organization AV-Test for reliable protection, ad blocking software, and streaming capabilities. Moreover, according to VB100 certifications from Virus Bulletin, our Surfshark Antivirus complies with the strictest security measures.
Surfshark was granted a few patents – exclusive rights – for our inventions, methods, and ideas. This legally allows us to prevent others from creating, using, or selling our innovations for a limited time.
You can find our patents right here.
Audits are an integral part of a trustworthy cybersecurity firm. Read the evaluations of Surfshark carried out by Cure53 and Deloitte, one of the Big Four auditing firms.
Server infrastructure audit
Robust and secure server infrastructure is vital to excellent VPN service. That’s why we employ independent auditors to evaluate our service’s security and software. Cure53, a German company, conducted a thorough study of our infrastructure and found no significant concerns.
Browser extensions’ audit
Another audit by Cure53 revealed that our browser extensions stand out for their robust security. The study confirms that our internal security measures successfully reduce security risks, and now we can provide proof that the safety of our products is accurate.
No-logs assurance report
The no-logs policy is at the core of every secure VPN. Deloitte, one of the Big Four auditing firms, confirmed that Surfshark adheres scrupulously to the commitments made in our no-logs policy. This now gives our users and potential clients concrete proof that Surfshark complies to the highest privacy and quality requirements.
With the help of SAST, Surfshark regularly performs software quality assurance.
To ensure our service quality, Surfshark offers 24/7 customer support. The support agents can be reached via live chat or email.
Employee background check
Surfshark runs background checks on new employees to verify their reputation and reduce insider threats.
We’re continuously developing new and better features to improve our service and exceed industry standards. One of our most recent innovations is Nexus – a technology that connects all our VPN servers into a single, global network. Nexus also enables groundbreaking features, such as an IP rotator and Dynamic MultiHop.
Changes the user’s exit IP address on the chosen location every five to ten minutes without disconnecting the user from the VPN.
Enables users to select their VPN entry and exit destination from the existing list of servers.
Our overarching goal is for everyone to be in total control of their digital lives. That’s why we use cybersecurity terminology that everyone can understand, making our products available to everyone – from the average person to a cybersecurity nerd.
Continuous research efforts
Surfshark spreads knowledge about cybersecurity and privacy by providing data-driven content through the Research Hub. It includes studies, such as the Digital Quality of Life Index and Data Breach Monitoring Map. With our content, we aim to help people decode their digital worlds, which have become an integral part of our reality.
Initiatives cultivating change
Contribution to the Shark Awareness Day
Surfshark aims to make a difference by addressing not only cybersecurity but global issues as well. That is why we pursue initiatives beyond the online ocean — like our collaboration with a British NGO, Shark Trust for Shark Awareness Day 2023. We signed their Big Shark Pledge to mark this day and do our part in helping oceanic sharks and rays. Our efforts and donation will contribute to raising awareness of the dangers they face.
Support & donations to our furry friends
Surfshark aspires to help those who can’t ask for help themselves. That’s why we donated 50k to the Big Dog Ranch Rescue initiative along with MrBeast.
“Big Dog Ranch Rescue has found homes for 58,000+ dogs. As America’s largest cage-free, no-kill shelter, we rescue and provide medical care to dogs in life-threatening situations. Thanks to Surfshark, Big Dog Ranch can care for more dogs, lead rescue missions, and save lives. We appreciate the support of Surfshark and MrBeast, who helped get over 100 dogs adopted!”
Evan Nader, the Fundraising Officer at Big Dog Ranch Rescue
Aiming for higher industry standards
Surfshark works closely with the VPN Trust Initiative – an industry-led consortium that promotes consumer safety and privacy online. We support and follow VTI principles, which serve as a baseline for how VPN providers should operate. The principles cover security, advertising practices, privacy, disclosure and transparency, and social responsibility.
Surfshark has joined forces with a digital rights watchdog and internet monitoring organization – NetBlocks. Their mission and objectives of raising awareness and expanding the distribution of information about global internet outages resonate with our values of unrestricted and available to all internet.