Their browser identifications look legit, but some of the other data isn't accurate.
I'm on one of the CS US South nodes at the moment and whoer.net is saying I have no ports open.
That's not true, because every CS exit node IP will appear to have all TCP/UDP ports open.
This isn't a security risk, because the only thing behind the IP is two OpenVPN instances (one for UDP, one for TCP).
iptables is used to forward traffic from all ports to one of those two OpenVPN instances, so that people behind a restrictive non-DPI firewall can still access CS (i.e., like when UDP port 1194 or 443 is blocked, but not UDP port 53).
As for their VPN service, I wouldn't trust it. There's absolutely no technical details on their VPN page, just some generic marketing terms ("the most protected, secured communication channels all over the world", etc.).
A good idea would be to avoid any VPN provider that requires you to register/purchase before you can view their client configs.