They are all actually in the country we claim that they are in, and you can actually verify that by checking the ping times and running traceroutes.
For example, our servers in Iceland actually are in Iceland, they are physical servers we own, on a network we control, running our own IP addresses, and our own dedicated connection to the underwater fiber operators.
This is part of the reason why ProtonVPN tends to be more expensive than other VPN services. We have significantly higher fixed costs from the way that we run our infrastructure (in top of the costs of supporting free users).
There has not been any official comment, but I don't think there really needs to be an official comment. It's quite clear from the article that it's not applicable in ProtonVPN's case. As long as encryption is used, there's no way to really know who's traffic is who's because of the sheer size of ProtonVPN servers. Most servers have thousands or even more users connected at once, and thus, any sort of traffic correlation attack is incredibly difficult. This is because ProtonVPN servers function as an opaque box (I am assuming PVPN servers are uncompromised), and thus even if both the input and the output are watched, it is unlikely that one can correlate in and out traffic when thousands are doing pretty similar things. ProtonVPN also has some neat tricks up its sleeve, since servers often don't have the same exit IP as the ingress IP, and sometimes even have multiple exit IPs. The VPN accelerator (which uses a split-TCP proxy) even further obscures this attack, since there is no longer any guarentee that any TCP packet that goes in comes out the same. However, it is true that if you make your traffic unique in some way (such as doing illegal activities: portscanning, web crawling etc), then your traffic will stand out and will likely be able to be tracable with netflow data.
A good VPN, like NordVPN, encrypts all traffic on your device and routes it via the VPN server. The whole aim is to conceal your traffic from your Internet Service Provider. It makes no difference whether you're utilising an ISP-provided modem.
This is one of the dumbest things I’ve read in awhile, although there seems to have been an influx of shit posts here recently.
Of course ProtonVPN has a rough idea of how much load their servers are under and no, that has no privacy implications whatsoever.
edit: Looks like OP ninja-edited this post to phrase it more like an honest question instead of a false accusation, however I’m confused by the clickbait FUD title if this was just an honest misunderstanding.
Using a VPN is not hidden at all. Any network device between your device, and the VPN can see 'this traffic is using a VPN. And then they can look at the IP address of the VPN and figure out, that is owned by ProtonVPN.
Deep packet inspection is just reading the entire contents of a packet. Since you are using a VPN, the data (the text you typed, email, image you are looking at) is encrypted, so even if someone looks at the packet, the data remains indecipherable. Some information is still plain text, that is so network devices can send the packet to its destination correctly.
If you would like to know, can they figure out if you are using BitTorrent, yes, over time they could do some packet analysis and build-up a profile of what torrent data appears like, and be quite confident you are using torrent, but they would not know if it was a Linux ISO or pirated material. Same with any other protocol, if you are browsing, that is a very obvious profile. Think about what happens when you visit a page, it downloads the HTML file, then it gets all the graphics, and the scripts and everything that makes the page, then it stops. Then 30 seconds later (when you click a link), it does it again. If you saw traffic like that, it would be a good guess to say those packets are web browsing, but still, they couldn't know what page or what you clicked on.
> the biggest privacy weakness that WireGuard has is how it assigns IP addresses. When you connect to a VPN service using OpenVPN or IKEv2, you’re assigned a different IP address each time. WireGuard instead gives you the same IP address each time. This is faster, but it means the VPN server must keep logs of your real IP address and connection timestamps.
>For VPN services with a focus on user privacy and anonymity, this makes WireGuard a relatively poor protocol to use out of the box. However, some VPN providers that offer WireGuard have implemented their own systems to get around this flaw. NordVPN, Mullvad, and IVPN all offer their own modified versions of WireGuard that work around the IP address issue, so no connection logs are kept.
From Tom’s Hardware
Is proton also using an in house method to remove logs or is it the Base wireguard system?
It seems quite probable that you work for PIA (Private Internet Access) who is responsible for this smear campaign. All your posts are attacking ProtonVPN and only about this issue. These shady business practices really say a lot more about PIA than it does about Proton.
To be absolutely clear, ProtonVPN does not use any servers from Tesonet, and has never used any servers from Tesonet. It may have been previously offered or considered, but it never happened. There is no contradiction in what we have stated.
You can in fact confirm this yourself, as this is publicly verifiable. Just go through the list of ProtonVPN servers and check who the providers are.
We don't view Tesonet as really different from any other vendor such as Radix or LeaseWeb, in the sense that it is not possible to achieve full trust. That's precisely why we have Secure Core VPN:
Your VPN only masks your real IP. Your precise location can be determined by other means; through the geolocation API, through a WebRTC leak, or through an IPv6 leak. You should run a browser test to determine where your leak is coming from. https://tenta.com/test or https://browserleaks.com are both good.
Thanks for this amazing feedback, it means a lot to us! We have really tried to take a different approach to building a VPN service, one that puts security and users above profits. Unlike a lot of other companies, we do NOT try to monetize the free version through ads or selling user browsing data. For us, ProtonVPN's free version is not a loss center, but instead an essential part of our mission to make privacy tools accessible to all.
We can also comment briefly on this:
> It's a crime how seldom this product is included in 'professional tests and reviews'.
This is actually not due to the age of the product as one other commenter mentioned, but more due to our ethics as a company.
One dirty secret of the VPN industry that we discovered is that almost all "professional tests and reviews" are actually paid reviews. In other words, if you want to be "Editor's choice" or number 1 pick on sites like PCMag or CNET, you don't have to actually be the best VPN in terms of security or privacy, you just have to be the service willing to pay the most $$ for the review and placement.
95% of VPN reviews out there are either paid affiliates or placements. This is simply a practice that doesn't quite meet our ethical standards, and even though this puts us at a competitive disadvantage, this is something that we would like to avoid compromising on for as long as we can.
As a result, most real ProtonVPN reviews (there are fake ones out there) are of a different variety. They are made by real users, normal people who many times are actually more knowledgeable than the "professional" reviewer who is paid to print what other VPN companies request.
You can actually find a list of ProtonVPN reviews here:
They do exist, but they have a much more homemade feeling, because well, most of them ARE homemade, and we think that's actually a strength and something great about the Proton user community which we serve :)
Maybe you can "sideload" it? Just downloading the apk from elsewhere, to avoid geographic banning (not from Proton, for sure)?
https://protonvpn.com/download-android
Or apkmirror.
One dude in a dolphin onesie? Rest assured, there’s a whole team of us. u/atomlib_com
_demand_protonvpn_team_or_at_least_one_member_of/
George Duke-Cohan wasn't arrested because he used ProtonVPN. He was arrested because he was a criminal and because he left clues that were easily uncovered by infosec professionals. Even if we had it (we don't), IP data wouldn't have been necessary to find him.
If anything, the fact that he felt comfortable using ProtonVPN while DDoS'ing ProtonMail probably attests to our reputation of always sticking with our principles. We could have logged his IP, but we didn't. If the US decides to indict him, the indictment will contain information about how he was discovered, and it would show conclusively that it wasn't because of ProtonVPN logging his IP. If we did log his IP, it would have taken a day instead of a month to find him.
Proton team here. If you saw the other thread, you have probably also seen our previous comments about this topic:
_is_protonvpn_on_the_vpn_comparison_chart_of/djdqvrp/
The choice presented to us by TOPG comes down to the following.
It's not a good choice. But given this choice, we prefer to be transparent and honest, so we picked the second option.
>Has loyal customer base.
​
>Creates promo and makes loyal customer base ineligible.
​
>Posts promo in subreddit where ineligible loyal customer base will see it.
​
ProtonVPN (probably): That aughta fix that.
Your IP address will be hidden, but that's all. But if that's all you're exposing, your safe. So it depends on what you do.
ie: if you enable ProtonVPN, then login to your gmail, well, google knows who you are but your ISP may not know you went to gmail. Unless of course, you are using your ISP's DNS server- then they know you went to gmail too.
So in short, VPN is one part of a security package. It's like locking the door and asking if my house is secure. Well.. the door is....
>It turns out that due to the natural growth of ProtonVPN's userbase, the number of requests from the ProtonVPN authentication servers hitting our core network, has begun to look remarkably similar to a constant DDoS attack.
That's kind of amazing!
We appreciate the feedback, and trust us, we spent a lot of time thinking about this. At the end of the day, it comes down to the economics of VPN.
ProtonMail Plus costs $4 per month, given our high operating costs in Switzerland, we need all 4 of those dollars to sustain ProtonMail itself.
Most VPN services cost between $3-4 per month, some of them even more than that, and most of that is likely eaten up by the cost of bandwidth alone.
Now, given that VPN costs are already $3-4, and we only charge $4 per month for encrypted email, it just isn't economically possible to offer both VPN + Mail for $4 per month.
Keep in mind that our VPN costs are actually higher than most other VPN providers because we maintain a lot of our own hardware and network, and we're operating from Switzerland where the cost of labor is high.
Furthermore, unlike most VPN providers out there, we are also providing a FREE version of the VPN which we need to support (not to mention the FREE version of ProtonMail).
We do appreciate the support from Plus users, and if it was economically possible to give Plus users ProtonVPN Basic instead of ProtonVPN Free, we would try to do it. But given the costs of VPN, doing so would likely sink our finances, putting both projects at risk.
Later versions of ProtonVPN have resolved this issue and an update was rolled out to all users starting about a month ago. It is important to note that an attacker needs to already have access to your computer for this exploit to work, and it only impacts Windows users.
Some of these fields may well be wrong, but they don't document the correct data on their site - I require it to be listed on the official site for two reasons - 1) To encourage companies to be transparent for potential customers, and 2) To prevent abuse. I also reached out to ProtonVPN days ago via twitter and nobody has gotten back in touch. Comments below for the things I can comment on.
Logging:
"Each time a user connects to ProtonVPN, we... store a timestamp of the last successful login attempt. While it is stored indefinitely, this gets overwritten the each time you log in."
Anonymous payment method - You are asked for an email address and Bitcoin is not listed as a form of payment during signup.
DNS Servers - Not listed as far as I can tell, default is a "No" unless I can verify otherwise.
IPv6 blocked/tunneled - Not listed as far as I can tell, default is a "No" unless I can verify otherwise.
Other proprietary protocols - Blank is equal to no in this case.
TCP 443 - Not listed as far as I can tell, default is a "No" unless I can verify otherwise.
Multihop - I have changed this to "Yes" since you're technically right.
Contradictory Logging Policy - "ProtonVPN is a no logs VPN service." vs "Each time a user connects to ProtonVPN, we... store a timestamp of the last successful login attempt." Logging metadata is still logging.
If you notice anything wrong and can point me to something official that clarifies it, or you can bend the ear of the company itself to actually reply to my request for more info, feel free, I'll be happy to update what I can verify.
--TOPG
To those who say that OP must have configured ProtonVPN wrong, Proton themselves say that all the set-up that's required is to get your account, install the app, and run it. Other than OP disabling the VPN while downloading, wouldn't it be possible that the kill switch malfunctions again? It wouldn't be the first time ProtonVPN on Mac showed that problem, after all.
Detecting is not complicated rocket science. A whois lookup of an IP address will reveal the domain name is .
People providing online services who have vested interests with avoiding legal issues and demonstrating "due diligence" are going to invest sweat equity to know the IP addresses of VPNs. Not surprising would be if the Netflix folks have ProtonVPN accounts and regularly test all possible server nodes to discover IP addresses and registered domain names.
Spoofing the time zone at the operating system level or VPN configuration will not fool anybody with respect to the geographical location of the VPN server.
None of this explains what might be causing the interruptions.
From a technical and legal perspective, if using a VPN with a valid Netflix account causes disruptions then the dispute is with the Netflix folks and not the VPN provider.
Good luck!
In the ProtonVPN app, look in settings->Battery Usage, it explains it there.
It isn’t actually using that. Because the network traffic from other apps is routed through ProtonVPN, the battery usage from other apps gets attributed to it.
This causes me physical pain. If you dont know what changed, it is fine. But please do not insult the developers.
Important changes:
using SRP for login into ProtonVPN instead of openvpn credentials
dbus support with an actual daemon, which among other things will allow for proper GUI support down the line.
using nmcli for most things, which integrates this into network manager, allowing better reliability, especially on the killswitch end of things.
support for automatic reconnect when connection is interrupted (such as when a laptop wakes fron sleep), which was something really annoying with the old CLI.
netshield support
While it is lacking in features right now (it is a beta), it paves the way for a much better CLI experience than the old one. I am waiting for it to get on github so I can start contributing code again :)
Please note that the ProtonVPN plans are renewed automatically unless the subscription is canceled before the renewal date, as clearly stated in our Terms and Conditions: If a user wants to stop using the paid service, the subscription needs to be canceled.
Our support team has replied to your ticket, so please check your inbox and proceed accordingly.
I’m curious to hear from a ProtonVPN employee, but here’s my guess...
Pretty good chance the Australian servers will go bye bye.
The app may get region blocked in the app stores.
I doubt there will be much they can do about either of those things. Maybe increase servers near Australia. People in Australia could still connect via OpenVPN using open source clients.
You don't understand what happened here. It's not like the developer used tesonet's certificate, he generated a new cert and simply put tesonet as company name and not ProtonVPN, because that's the company he legally worked for. Sure, that's a mistake, but it's not like Tesonet even has access to that cert.
Hi! Note that some services are not VPN-friendly and they can block known VPN IP addresses. Please try switching to a different server or try another protocol to see if you can access the site in that manner.
Feel free to contact us and tell us with which exact servers are you encountering this, and on which websites, so we can try to reproduce the issue and flag it to our team.
I’m a big ProtonMail and ProtonVPN fan but all the variations in pricing are a bit much guys.
Instead of -33%, -45%, -50% and -60% off deals that apply to this plan but not that plan, let’s just have the lowest available price of $6 per month (converted for whatever currency) for ProtonMail Plus and ProtonVPN Plus when you pay for 2 years up front. The entire feel of ProtonMail and ProtonVPN is that of an aesthetically pleasing, clean, uncluttered, simple, functional and beautiful design. The Black Friday promotion should follow this design doctrine.
The marketing genius on this one needs to be reined in or switched to decaf.��
>So premium users are forced
to pay for free users. Interesting.
I wouldn't say 'forced'. We willingly opt into paying for this particular service and could as easily have chosen to stay on the free tier or just taken our business somewhere else where they do things differently.
Edit: To add, I hope you do find what you need in ProtonVPN though. It's a really good service.
I'd like to see Proton sponsor some organizations with free VPN and or email, since the marginal cost to Proton would be low compared to the value to society if they donate their services to the right NGOs.
Dear diary, today OP delivered.
For reference:
/r/ProtonVPN/comments/axw0tu/i_demand_protonvpn_team_or_at_least_one_member_of/
The free VPN is definitely the best out there.
However, in my opinion, the subscription tiers don't provide any value compared to other subscription VPNs from a features standpoint. The price needs to be lowered or advanced features like port forwarding need to be implemented.
The reason I keep my subscription to ProtonVPN is because I want to do my part to subsidize the free VPN and I trust Proton more than say, PIA or Nord. That has a monetary value to me, but it's still a tough pill to swallow when I know other VPNs cost 3x-4x less and offer more features.
The "facts" are not undeniable, they have explanations. Those given by ProtonVPN are believable.
I have no idea where you saw ProtonVPN contradict itself. Can you please provide some examples ?
Edit: Also, saying that VPNs is a shady business is not an ad hominem attack. You simply have to learn a bit about that industry to know that 99% of it is a pile of filth.
Edit 2: Also, nice new account specifically made to attack ProtonVPN you've got there, /u/common_sense7.
They actually address this in the comments
>Hi Jonathan. We operate all servers not directly under our control on the assumption that they are compromised. We have therefore designed our systems to ensure these store no information that can compromise our users privacy.
If you are worried about it, Proton does offer "secure core" services specifically meant to counteract these kinds of concerns.
Yeah, they already say in their privacy policy that while they do not permanently store your IP address, they may temporarily store it to combat fraud and abuse, which is what you're trying to do. You should instead be asking them how long IP addresses are stored...
> I was able to login with just my username and password, no 2FA needed. Is this intentional? Has it always been this way and I haven’t noticed?
This is intentional. Since there's very little risk involved with someone being able to log into your VPN account (they cannot access sensitive data, like with ProtonMail), the less information you put into the app, the better (as it lowers your risk of getting phished with a fake app). The combination of these two factors resulted in only your username and password being required for all ProtonVPN apps.
I am not familiar with RiseUpVPN at all.
But just in general, unless you're European, ProtonVPN will typically be slower than competing services. They have fewer servers, there's no getting around that.
On the flip side, Proton has an incredible reputation, and in my opinion is the most trustworthy company in the sphere.
So it's a bit of a personal choice.
Hello, how are you? I have an important question and surprised at the same time, but I would like to clarify things and are the following:
​
1-have added new servers in Portugal and I think it's great because it needs expansion according to customer requirements.
2-Eh Whois made in the new servers and I find that the registry there is data from a company called PureVPN. I leave the image for more information.
​
Do you have any relationship with PureVPN?, are they the same company? Or, can you please clarify this situation?
​
Thank you kindly, greetings.
I've said this before here. Never, ever, ever, ever trust a VPN killswitch on a mainstream OS that runs on your computer. Always make sure it is running on your router, or that you're using a OS that has network protections built-in.
This is going to be the case for all VPNs. Private Internet Access, NordVPN, the like, so don't bother changing services because of a client application.
This is so much better than what we've gotten. Honestly one of the few reasons I haven't fully switched from Mullvad. Mullvad's Linux client is the exact same as their Windows one. We need more Linux love from the protonVPN team!
Really great job dude.
First of all, do NOT do as the poster suggests and attack other networks.
Secondly, when you use ProtonVPN to attack other networks, we get real-time and automated reports from the targets sometimes, and our own monitoring can also be triggered (for example if ProtonVPN servers are being used to launch a DDoS attack, the network providers definitely inform us as soon as the attack is detected).
When this occurs, we immediately perform checks to understand what is happening on the server (it is a security issue to not check as it may also indicate a compromised server). Usually, this involves real-time outgoing traffic analysis (so no logs), allowing us to find outgoing attack vectors. If something is found, we have the capability to look deeper and find the user account responsible and to ban it. This can also be done real-time without relying on logs.
As we have discussed in our article about VPN threat model (), VPN providers always have the technical capability to scan traffic passing through their servers, and when suspicious activity is discovered, we do check to ensure the server in question is not compromised (which would be a massive security risk to users), and to ensure the abuse is halted so ProtonVPN IPs do not get banned.
Hi! Could you please contact our support team and tell us the username of your account so we can further look into this? Please tell us your ticket number here afterwards so we can follow up on the issue.
>your information can still be seen
This applies to any VPN, the exit node ISP can still see your traffic, no way around it. In general, you're only betting on the more users of that exit node, the harder it is to use a timing attack to correlate your traffic.
>what if you live in a country like that
Yep, the ISP you use and the exit node ISP are under the same jurisdiction, so no international cooperation is needed to correlate your traffic. That's exactly why Secure Core is offered, if your threat model includes your own government.
I think you are misguided. TOR is as legitimate as the use people give it. Sure, there will be people using Tor for shady stuff, but there is also plenty of people using Tor for legitimate purposes (the typical example being activists working from a country that is heavy on censorship).
The same way that a VPN itself can be used for a legitimate reason - for example, my ProtonVPN is currently running and I am here just innocently replying to a Reddit question -, but it can also be to used in order to hide illegal peer-to-peer traffic from one's ISP.
TL;DR: the "dark web" of the popular culture, where one launches Tor and is immediately flooded with people selling drugs, weapons, and people does not exist. All those bad things exist on Tor, but that's not what Tor is made of.
There's a misconception where people think that your IP is your online identity. It is not, it's part of it though. If you hide your IP behind 7 proxies but browse the orange youtube on the same browser you logged in on facebook your identity can still be pinpointed.
If all you care is about DDoS attacks yeah, your IP should pretty much be safe with ProtonVPN. You might want to do some ip leak test at
Here is what I do. Use a seedbox, don’t seed directly from your device. I use to dl and seed from there. You then dl the file from the box to your pc. This way you hide behind the seeebox and ProtonVPN.
> So is this VPN actually safe and won't steal your passwords and browsing history?
From their site:
Under Swiss law. Therefore, we are unable to comply with requests for user connection logs, even if they are legally binding. Furthermore, under Swiss law, a Warrant Canary is not meaningful, because under Swiss law, the target of a surveillance or data request must always be eventually notified, so they have the opportunity to contest the data request.
​
>if so, how do they profit off free users?
They hope the free users will one day become paid users
Basically, proton0
is a "virtual interface" that handles the encryption. It's by default called tun0
when running OpenVPN, but we renamed it to proton0
for a bit more clarity that it's from ProtonVPN.
What happens is that OpenVPN (which is controlled by the Linux Client) tells the OS that all packets should be routed through the proton0
interface. The proton0
interface then encrypts the packets and sends them to your actual, physical LAN/WLAN interface (wlp3s0
in this case) that's connected to the network. That is why you see unencrypted traffic on proton0
and encrypted traffic on wlp3s0
.
WTF. I use proton mail and nordvpn, def unsubbing to Nord and going to proton mail + proton VPN combo. Didn't know NordVPN owns Restoreprivacy? Anyone here like Proton VPN? I liked free trial but didnt get to test it much
I don't think ProtonVPN offer sponsorship, although I might be wrong about that. That would explain why they're not thrust in your face 24/7 like some of the others. Pretty much all of the positive VPN reviews you see are just by people who are being paid.
For the time being I can recommend Qomui as a good OpenVPN manager that has automatic server list updating for ProtonVPN and a few others, and manual for all the rest.
It also offers some features the ProtonVPN apps does not, like bypass/split tunneling and multi-hop connections through whatever servers you want, including servers from different providers.
Even if an official ProtonVPN app comes to Linux I'm not sure I'd use it.
>No ETA, yet. But it will be added. The Linux client is still in its infancy and there are other needed features that need to be implemented before.
There will always be those slight delays, but it's unlikely that something happens in the few seconds it takes to connect to the VPN.
Just make sure you don't have many programs open besides ProtonVPN so it's the least amount of data possible that's going through the VPN.
ProtonVPN is run by a small group of privacy living engineers. Pay for the premium service and you will get access to hundreds more servers and ensure the company lives for a long time.
I am not affiliated with them but pay for ProtonVPN and Protonmail
_and_tesonet/e21tfqw TL;DR: False claims by a competitor.
They aren't comparable. Nord is run by sketchy people with sketchy origins who use sketchy marketing and sketchy wording on their site to give people a false sense of security and sign up. There are also signs that they may be a honey pot operation. ProtonVPN is run by accountable and transparent people. The speeds are excellent and the privacy is better than others for the same reasons I listed above. Security is excellent, especially with Secure Core and onion servers but I'd like to see Wireguard servers and alternatives to IKEv2 on mobile. That's not a slight against Proton for other VPN companies though that's standard in the industry not to provide wireguard.
Personally I trust Proton more than others by a long long shot. I also use them for mail.
There was actually a very interesting discussion about this earlier, and you can get more insight here:
The short answer is, a lot of the criteria used by that site doesn't really make sense, and we are not willing to modify the more sensible and correct wording on our website for the sake of a better review.
Honestly, I don't have a problem with the pricing model for ProtonMail Plus users.
Just some things to note: ProtonMail Visionary Plans are not business plans, they are for big supporters of the service. Initially they didn't offer considerable value as they just offered more storage space and email addresses for a single user. As multi-user support and ProtonVPN have come online, the Visionary plan is rewarding its subscribers with better value.
ProtonMail Plus is an email service and not a VPN service. In my opinion, the 20% discount that one gets for bundling the VPN and Mail services is fantastic. You get a 20% discount on both mail and VPN. Furthermore an annual payment gives one another 20% off for a total potential discount of 36% on the services.
Finally, the internet has conditioned us to believe that we should just get free services. While this is possible with advertising subsidies, ProtonMail's policy is a privacy first one and because of that, services require user funding. You're paying for what you get not being sold to advertisers to get something for free.
If you haven't already, you should read about secure core VPN. I'm having a hard time understanding what you're actually suggesting with regards to the secure core servers. Secure core works by routing your connection through two separate VPN servers (you can also think of it as a double-VPN). The first server is one that Proton owns and has full control of, and the second is whatever exit you require. So, if you wanted to have a US IP address, your connection would first go to the server in, say, Switzerland, and then be routed to the exit server in the United States.
Secure Core servers are specifically located in Sweden, Switzerland, and Iceland so I'm not sure why you think there's no Secure Core servers in those countries. Perhaps you could be a bit more precise with your question?
There's a lot of points to identify you on the internet. I'm not qualified to identify them all. But offhand, a few are on THIS PAGE. You'll have to rely on others or your own research to identify them. If I want to be more secure, I use VPN and a VM running linux on my Mac and use Firefox where I clear all cookies, etc. after each session. That's not everything, but just VPN isn't much...
The ProtonVPN Linux official app is now available in beta. Feel free to give it a try, share your thoughts, and report any bugs the build might have. Your feedback will help us provide a better application to the community. We'll share more details across our social channels soon. Stay tuned ;)
It sometimes happens when your IP address gets changed. For example on your mobile phone, when you switch from “Mobile data like LTE/3G/4G” to “WiFi”, you are connecting from another IP address even though using same device. In this situation you will have to wait for like a couple of minutes for previous session to be expired OR in order to prevent that problem happening, you can hit the disconnect button and wait for connection to be disconnected before disconnecting your device from network (Wifi, 4g ...)and connecting to another network. Basically telling the servers that hey I’m leaving, so you will not have to wait 1 or 2 minutes for servers finding out that you just left. And it could also happened if you didn’t changed your network but you ISP decided to change your IP and somehow it could happen. I’m not a expert in this but in my country, it could happen. Alternatively purchasing the paid plan would fix this. . By the way, it is only my personal experience and I’m just a ProtonVPN user and maybe I’m wrong. Peace ✌️
When you download a torrent, you share your IP address to every user who is seeding the torrent. This is so that the seeders know where to send the torrent data. The list of users leeching or seeding a torrent is handled by a torrent tracker. I would guess that the website in question either mines data from torrent trackers, or more likely, seeds popular torrents, and records the IP of every connected user.
The information is not tied to "you", just to your IP address - you can switch between different ProtonVPN servers, and see what downloads are associated with each. This is why VPNs are used for downloading torrents; by downloading the torrent using the VPN's IP, you hide your own identity, and give your activity plausible deniability by mixing it with the activity of every other user on the VPN.
Hello. No, this is not allowed and your accounts may get disabled. Please note that you can install the ProtonVPN applications on as many devices as you'd like as we do not limit the installations. The limitation is for the simultaneous connections, so with the Free plan, you can connect only 1 device at a time. If you need to connect multiple devices at the same time, you may consider upgrading your ProtonVPN subscription.
Secure-Core: You connect to a Server that is entirely owned by ProtonVPN and not rented, in a very privacy respecting country, which then routes you to your exit server. Therefore ensuring a maximum level of privacy and security.
P2P: Servers optimized for Peer-to-Peer (torrent) traffic.
Tor: You connect to that server and your entire connection is routed through the Tor Network.
Exactly! That was a year ago and the experts at ProtonVPN couldn’t crack that but or it’s easier to get in bed with the devil and come up with excuses!?
Sorry for being so blunt but I hate Google and Facebook and the web is absolutely filled with them. Especially google with it’s hundreds of tracking and ad tools (analytics, tag manager, doubleclick, Adsense etc)
Parts of our code do get independently audited from time to time, for example:
Mozilla also did an examination of ProtonVPN crypto, policies, and practices recently before they selected ProtonVPN as the VPN company to partner with.
I would say no, it is not ProtonVPN's job to save a life. Your product's concern is user privacy and should focus solely on that. If you make something like this possible it increases the risk of abuse.
Upon reading the thread this seems kinda overblown. Sharing a building during it's startup is something literally all companies would do. This doesn't really create any sort of unusual or notable security issue; and it's an issue that companies have been dealing with for years. So I trust that the security is correctly handled until an actual incident proves otherwise.
Secondly; the application being signed by a different certificate isn't really an issue here in my opinion, as the certificate isn't insecure. The Human Who Is Responsible for the Application simply made a Human mistake and used the wrong cert most likely. I suspect that while the specific certificate has the wrong name it is still likely to be cryptographically unique and thus the secret key not owned or known to the entity that is named on the certificate. It's likely nobody else has the key except the human who now works under ProtonVPN.
However the credentials necessary to upload an Application as ProtonVPN is likely secure as well. So there's not an issue, as they've owned up to the mistake and as long as the certificate in question remains secure; it shouldn't be an issue.
To issue a new application now which is resigned with a new certificate is likely to cause no small amount of inconvenience for many users as well as cause unnecessary alarm.
To clarify what an APK Certificate really does; it performs only a basic assurance that the binary you have downloaded is not modified and has originated from the same entity that has initially created the binary. It is in fact, only a basic anti-tampering mechanism; similar to MAC, Message Authentication Code, that ensures that your device itself cannot as easily be targeted.
As long as ProtonVPN asserts that this certificate is what they signed it with, and that certificate remains secure, there's not much reason to worry, nor much reason to have any concerns.
I don't understand what is the purpose of your question, can you explain?
Apart that, Swiss Servers are already able to stream:
https://protonvpn.com/support/watch-netflix-with-vpn/
What exactly is your goal?
Actually, only paid accounts are able to use P2P:
>P2P sharing is only available using one of our paid plans: Basic, Plus, or Visionary.
I think their main point here was Proton Technologies as a company - and that the company need to follow the court rulings in the country they operate in - which is correct.
But they are probably not aware e-mail and VPN services are under different regulations in Switzerland, so while the French activist issue was related to ProtonMail service it would have been handled somewhat differently if it had been a request for the ProtonVPN service.
In this case, ProtonVPN no longer has control of the app after the code is published to github. This is simply how f-droid operates.
The up to date version is available on github.
If I recall correctly, others have had the issue you're dealing with when they were using peer to peer type of file sharing.
I think they may have addressed it by going through the settings of the software they were using to make sure their DNS wasn't leaking and / or to ensure all network traffic from that software ran exclusively through ProtonVPN?
Maybe someone else can be more specific if they remember what I think I remember? I want to say I've seen people on here talking about this problem at least a couple of times before?
I just recall it had to do with something like that and that ultimately the VPN was okay.
May go without saying but obviously you would probably need to be connected to a server specifically meant for peer to peer.
Well as an Indian, I feel it's not costly at all atleast for the Basic Plan. It is to be noted that ProtonVPN has the same pricing regardless of country which is the best model for any VPN so as to prevent differentiation and also considering the privacy first measures taken by the proton team they do deserve our support.
You should know that there are countries that are far poorer than India.
In addition, if you want privacy why don't you use their free tier which works pretty well too.
ProtonVPN does not currently support IPv6:
The official guidance recommends to turn off IPv6 while using VPN.
~1-2 weeks. They require physical servers to be installed.
_is_australia_getting_server_upgrades/
Tor only supports TCP traffic. Therefore, we cannot tunnel UDP traffic through Tor. However, UDP does not "leak" in the traditional sense, because UDP is still passed through the ProtonVPN server, it is just not passed through the Tor network because Tor does not support this type of traffic.
​
We understand your point however and will update documentation accordingly.
> First of all There terms of use says not to use there network for attacking other networks, then how the fuck can they know if they don’t keep logs?
You don't have to be keeping logs in order to know that an attack is happening in real time. If someone lights up your network like an xmas tree and you have other networks telling you that an attack on their servers is originating from one (or several) of your IP's, it's not hard to find out what account is generating the attack based on the traffic pattern. If you launch a DDoS from NordVPN (apparently your favourite VPN) your account would also be shut down promptly due to violating the ToS.
Free version only gets access to servers in three locations worldwide (thanks to u/Suspicious_Tone's comment below for correcting me). There's no speed limit on them, but because there's relatively few free servers they tend to be slower than the many paid servers purely because the number of people connecting to them can slow them down.
But unlike other "free" VPNs out there, there's no hidden catch. The servers are still just as well designed and private as the other ProtonVPN paid servers, and are subsidised and paid for by the paying users (not from secretly scraping your data). But yeah, if you find yourself using it a lot it's definitely worth moving up to at least the first paid option (like I am). If it's only occasional use, then the free servers are probably just fine for that.
I was going to take advantage of the Black Friday sale, but when I logged into my account it said the regular price of Plus is now $10/month. When I log out and go to their front page it says $8/month for Plus.
Anyone know if ProtonVPN increased their price or if this is an error?
Also, when I log in the deal says it expires 5 days earlier than it should, which is also confusing.
For the reasons above and the general poor support for GNU/Linux by many VPN providers, I have written Qomui. It's an OpenVPN frontend that supports auto-downloading and updating ProtonVPN configurations. It's written in Python, though it's using requests and other python libraries instead of bash tools with very few exceptions such as OpenVPN up scripts (only if you are using some of the advanced features). Importantly, it separates the gui from a dbus-service that handles privileged commands such as running OpenVPN where this is required. I'd be glad to hear your opinion. I have published Qomui on github:
You and /u/davidhenn should read the explanations by ProtonVPN.
Do note that the original post is made by Private Internet Access' co-founder. VPN is a VERY shady business, so I wouldn't trust them so much in the first place.
ProtonVPN has been transparent about the whole situation and their explanation makes sense.
I'm skipping the old "comes down to if you trust them" thing and just assume they hold their word:
No, there is no catch. ProtonVPN is an entirely free VPN, that only has limitations in server access. There are only a few servers in US, NL and JP accessible with the free plan. And P2P is (normally) also disabled on those servers... So lucky for you if it works, I guess :P
Other than that, nothing. Unlimited bandwidth, unlimited account life, unlimited speed (at least not software limited, but the free servers have higher load so that's what limits the speed)
The free tier is backed by the paid users, so that's how they pay the bills. I think the paid tiers are slightly more expensive than they need to be in order to allow the free tier, but that's just an assumption of mine.
I think the way ProtonVPN team handles this review situation in very poor. Your main response is not to disprove the claims made in the review, but to attack the credibility of the source, and even in that you have not provided any concrete proof that the reviewer was biased, of the screenshots were fake (at least I can't find it). And then you provide us with your own list of reviews, asking us to trust the reviews you picked.
I did not experience any leaks when testing with , but your handling of the situation doesn't exactly inspire trust.
We own all of the secure core servers. "Own" means the following:
Windows already got wireguard. Linux don't.
Also, as far as i know, there's only one developer working on the linux version. The guy does what he can, but yeah..linux is a second class. The only VPN i'm aware that treats both clients equally is Mullvad. Using their client on Linux is a breeze, whith auto-connect on startup and on resume from sleep. Anyway, i'm more in love with proton, even with the linux app being worst.
I do have to mention however, that i don't have such issue you describe. Seems like a dns resolve problem?
Safe from what? You will need to define your threat model to get a better answer.
You ISP can't see your real IP. The sites you visit can't see your real IP, but they have many other ways of tracking you. Both can see that you are using a VPN, and with trivial effort can know you are using ProtonVPN.
> sites that should not be visited
What does that even mean?
ProtonVPN Plus plan is worth it IMO
You should check r/ProtonMail for Mail & Calendar feedback.
You should check their Twitter where they publish updates on downtime.
ProtonDrive and ProtonCalendar are still in beta, so not mature.
ProtonDrive storage is currently shared with Mail storage.
I’ve decided to not pay for multi-year offers and instead pay monthly. That way, in case something happens, I can cancel at any time and move quickly.
The better solution would be to check the most upvoted post:
Then disable smart protocol, manually select ikev2 and try that. The battery usage should be dramatically lower with ikev2.
I run protonvpn 24/7 on my phone with ikev2 and protonvpn doesn‘t even make it to the list in the battery usage.
TL:DR; It is normal, as with openvpn any app using the network will be counted towards the protonvpn app in the battery usage.
ProtonVPN definitely does not use the base wireguard system, given that it is basically impossible to effectively use it on ProtonVPN's scale. However, Proton does work around this and other problems in their implementation.
Tor is actually partially funded by the US government, and formerly funded by DARPA. Nothing really wrong with that. Tor's system is designed to be as trustless as possibly, which means that with their nodes distributed all over the internet worldwide, it doesn't really matter where Tor is based on.
If a tor exit node has been tampered with, that exit node still can't find the originating IP. Essentially using tor through ProtonVPN is using ProtonVPN as your "guard" server.
The Linux-CLI is pretty much garbage for a company of ProtonVPN's stature. What needs to happen is this:
Only allow internet traffic over protonvpn.
If the connection drops for any reason, then all internet activity is shut down.
Upon starting your machine, internet activity should be zero, and only until the VPN is connected is internet activity allowed.
This needs to be an all-in-one package install, users shouldn't have to tweak anything.
Its pretty sickening that they develop their software much more for Winblows, than linux.
Explanation here: _will_protons_security_audit_be_publicly/ex1hcx0/
The tl;dr is that this is how audits work, you generally can't publish until you get the final audit done, and at present we only have the initial audit results (which didn't find any severe issues).
Explanation here: _will_protons_security_audit_be_publicly/ex1hcx0/
The tl;dr is that this is how audits work, you generally can't publish until you get the final audit done, and at present we only have the initial audit results (which didn't find any severe issues).
Indeed, we are planning to implement Wireguard as a protocol, but that will take some time since Wireguard is not yet a stable protocol considering all of the aspects. Our team is testing Wireguard internally, and we are unable to provide you with an exact time-frame regarding its implementation within ProtonVPN. You can find more details here:
Also, how can ProtonVPN prove they don’t keep logs?
It’s logically impossible to prove a negative, and logging could easily be disabled and re-enabled if they were being kept, which I doubt they are.
If it came out that ProtonVPN were logging, they’d lose every customer in an instant and likely be subject to lawsuits.
Not sure how they detect a proxy, but probably check if the server listens on HTTP/HTTPS ports. As ProtonVPN does that to circumvent common network blocks, that service thinks it's actually a proxy server.
I rather not have this function. I trust Proton team, but I don't want them to remove what ads I should not see or see.
Just install a adblocker for God's sake. If NordVPN blocks ads for you that's a huge privacy concern.
The dedicated server provider for the Portugal servers are HostRoyale, based in India. We used them when bringing up our servers in India. When bringing up new servers, we try to use existing providers (fewer providers is easier to manage). Since HostRoyale also provides server in Portugal, they were selected.
The RIPE entry there may be an outdated database, because on RIPE we don't see any connection between HostRoyale and PureVPN. Our guess is that PureVPN also has rented servers from HostRoyale. That seems likely given that HostRoyale is based in India which is close to where PureVPN is located, so it makes sense for them to go with a local provider.
There's no connection between us and PureVPN however. All of our servers are dedicated servers which we configure from scratch on top of the bare metal.