EDIT: If you want a truly safe VPN, you will need to do some work on both adversary modeling and technical implementation. If you are just worried about your ISP (filesharing of legally protected digital backups), use whatever. If you are worried that your data may be collected by your VPN provider, use a series of tor/vpn multihop. If you are a paranoid mf, use a privacy coin to purchase a VPS and then connect to it via tor on a public wifi network, set up a .onion hidden service for your ssh/chisel/etc port, connect over tor to forward your tunnel port to localhost, use that tunnel to connect to a multihop VPN system. Suggestions include mullvad, PIA, cryptostorm, whatever you want really. Throw a VPS with generic openvpn in the middle of your multi-provider hops, again paid in a privacy coin. Pay a homeless man to colocate a physical server that has DRAC and luks along with something like AMD TSME, then run containerized multihop there aswell.
Basically if you want something done right, at least do some of it yourself.
VPN is not classified as a communication tool in Switzerland and there are no existing Swiss laws that can compel us to log.
The Proton VPN Transparency Report & Warrant Canary is also still available at: https://protonvpn.com/blog/transparency-report
Thanks for sharing this.
https://www.bbc.com/news/world-europe-51467536.amp
Some of us also remember Hushmail.
https://www.theverge.com/2021/9/6/22659861/protonmail-swiss-...
Protonvpn does log data and does hand it over. It doesn't matter if they "had to" (they can fight) You can't put the genie back in the bottle.
Sure you can refuse to believe the company's statement, but your comment is based on your (maybe deliberate, conveniently) misunderstanding of mail vs VPN...
Considering you, as a person, are stateful, the strategy will inevitably fail and you'll be caught.
This is how people seeking privacy after doing bad things got found out. People were tracing patterns of behaviour long before there was an internet that produced access logs.
What's a better VPN service anyway? Mullvad? I see Proton's stealth feature as being valuable.
Disclaimer: I have no conflict of interest whatsoever with Proton other than being a free user.
The recommendation the person you're responding to (PIA and Cryptostorm), is very untrustworthy and doesn't even match the minimum criteria from PrivacyGuides.
AFAICT, the only discriminating factor is lack of solicited third-party security audits. Which I don't think implies being "untrustworthy".
https://www.privacyguides.org/en/vpn/#marketing
https://discuss.privacyguides.net/t/why-is-vpn-providers-lik...
(PIA/Kape I get and relevant information is easily discoverable available on controversy surrounding them and their owners)
What we need is a truly secure and private method of communication and payment. We're close on both.
So many questions about that server provisioning workflow :)
https://arstechnica.com/information-technology/2021/09/priva...
however there is a significant issue with using hard drives to transfer data in airgapped networks without proper f-caging, optical transfer of data via taking a video of rapidly flashing QR codes is fairly secure when under enough blankets, but mylar shielding of walls and windows may be required depending on the adversary model.
Wireguard sets up an IPV4 based internal network and the machine responsible for the routing MUST know the client IP that was assigned to the connecting machine. There are some kernel modules to OBFUSCATE but not eliminate this data. Wireguard therefore has a fundamental design flaw that makes it faster but potentially less anonymous than OpenVPN protocol.
DYOR and YMMV. I always disable WG for at least my first hop.
How else would it work? You could strip the source IP, but then you couldn't get replies and you'd have a very anonymous VPN that could only be used to send UDP packets; no receiving and no TCP since even establishing TCP requires replies.
While theoretically there may be more secure approaches you may also be introducing new dangers as well. Eg; paying for a VPS with an anonymous coin doesn't mean your VPS provider can't deanonymize you or comply with a warrant. You need to make sure every single link in the chain is foolproof. That's way more error prone.
IMO a proven legal track record is in a way more valuable than unproven theoretical flaws (if you can even call them that).
I began mistrusting Proton some time ago with their hit piece on RAM-only VPN server confirming my bias.
Let's assume any adversary interested in reversing that new protocol, what's the point of not being transparent on how this new and fancy obfuscation works.
The TOR project has a lot of innovation in censorship circumvention[1] while still being transparent to their userbase.
In their defense, they're basically saying this doesn't do anything since it's still detectable.
Anyways kudos to them, and I can’t wait to see how it fares against China’s GFW.
[0] The article says Wireguard is easy to block, but in my experience GFW lets it through.
[2] https://xtls.github.io/en/development/protocols/vless.html
[3] https://xtls.github.io/en/development/protocols/vmess.html
Depending on how you were connecting, your traffic may have been explicitly allowed. If you were connecting via your cell phone, using roaming with your home SIM card, you're not subject to the Great Firewall (all your data was essentially VPNed through your wireless carrier's PoP already). And IIRC many larger hotel chains that cater to foreigners (and would likely refuse to allow a citizen to stay there) also aren't GFW'd
TLS-in-TLS (trojan) seems to be detectable too.
If we look at Chinese and Russian government DPI, we will see that now VLESS with XTLS‑Vision and XTLS‑Reality are not detectable. YET.
For some time. After a while, the connection eventually gets blocked or throttled. The annoying thing about understanding the GFW is that it's not quite deterministic.
https://github.com/ProtonVPN/android-app
PS: Tried their free plan in China and it won't connect ("Connection Timeout"). In fact, I had to use another VPN to get past their app's loading screen (guessing it got stuck while doing a request to their server)...
https://github.com/ProtonVPN/android-app/blob/fc9e7f500fe56b...
* Is this an open protocol?
* I would like to see a detailed comparison to similar solutions
* Looks like it's TCP so head-of-line blocking may cause performance issues.
* What prevents entities from detecting that all your traffic is going to a single endpoint, or just blocking known VPN servers directly?
I would think it would've been best to keep this update "silent", so to speak, to avoid letting said parties know of this new protocol.
Question though: don't most VPN filters simply block a list of all known VPN endpoints? Maybe I missed something but I don't see how Proton's Stealth evades this simple filter?
The reason most VPN protocols use UDP is for performance. With TCP, a single blocked packet can delay multiple streams. And fwiw, openvpn supports using TLS over TCP, but it is less performant than udp.
I would be more interested in a protocol that uses quic and looks like http/3
[1] https://apps.apple.com/ru/app/proton-vpn-fast-secure/id14370...
- Endpoints (e.g. Netflix or video game) detecting VPNs and blocking users of VPNs from their server because they don't trust the user to not be bypassing their rules
- Middleboxes (e.g. airport wifi or the great firewall) detecting VPNs and blocking the user from the internet because they don't want the user to have unfiltered internet access.
The latter group have a lot more tools to see if something is VPN traffic since they have access to the entire (encrypted) traffic, so can do stuff like checking are you constantly exchanging the vast majority of your requests through a few hosts.
The former don't have as much information, but they have one really easy, really effective option, which is to contract with one of the IP classification databases that lets them see if the client is on a home internet connection. If it's not, they can just block you. Watching Netflix from your EC2 instance isn't going to be that reliable. And it's hard for the VPN providers to reliably get IPs that look residential, residential service usually prohibits such uses, companies that run both residential and business services still usually run them separately from an infra perspective as it makes their life easier, and even if you found an ISP to co-operate and let you use their residential addresses to run your VPN, the databases can just mark the entire ISP as having this kind of use, which would hurt the ISP's users, which counts as a strong disincentive for an ISP to become known for this kind of business.
So for VPNs to bypass blocks by remote services, it means they're going from (most legitimate) shopping around ISPs willing to host them on residential IPs on the down low to the more sketchy end buying residential IP traffic from places that sell residential IP space from e.g. malware or software that buries this detail in its T&Cs. There's also the Tor exit node route of using your users as a sort of mesh network to get residential IPs, but legitimate VPN providers are not going to do that because of the risk it exposes their users to legal liability.
This is not really something that can be fixed with protocol updates like Proton is doing here - the protocol updates are more about evading the middleware style traffic analysis mentioned here
The actual service you are connecting to (example: website, game server etc.) most likely uses a IP-based detection service such as https://focsec.com/ or similar. In such cases, the protocol will not make a difference.
Reference: https://web.archive.org/web/20230310043036/http:/sites.inka....
I'm assuming this boils down to a cat and mouse game, then? E.g. popular firewalls patch this and Proton releases an update to bypass filters?
Also, couldn't access this site directly because of corporate firewall, how ironic.
It doesn't work against GFW nor in Russia. I've seen some people saying they're having issues in Iran as well.
If you had a protocol like this combined with something like MysteriumVPN (which has "decentralized" VPN nodes) then yeah, it'd probably help.