by theschmed on 8/6/24, 5:30 PM with 132 comments
by kelsey98765431 on 8/6/24, 6:13 PM
EDIT: If you want a truly safe VPN, you will need to do some work on both adversary modeling and technical implementation. If you are just worried about your ISP (filesharing of legally protected digital backups), use whatever. If you are worried that your data may be collected by your VPN provider, use a series of tor/vpn multihop. If you are a paranoid mf, use a privacy coin to purchase a VPS and then connect to it via tor on a public wifi network, set up a .onion hidden service for your ssh/chisel/etc port, connect over tor to forward your tunnel port to localhost, use that tunnel to connect to a multihop VPN system. Suggestions include mullvad, PIA, cryptostorm, whatever you want really. Throw a VPS with generic openvpn in the middle of your multi-provider hops, again paid in a privacy coin. Pay a homeless man to colocate a physical server that has DRAC and luks along with something like AMD TSME, then run containerized multihop there aswell.
Basically if you want something done right, at least do some of it yourself.
by WhatsName on 8/6/24, 6:03 PM
I began mistrusting Proton some time ago with their hit piece on RAM-only VPN server confirming my bias.
Let's assume any adversary interested in reversing that new protocol, what's the point of not being transparent on how this new and fancy obfuscation works.
The TOR project has a lot of innovation in censorship circumvention[1] while still being transparent to their userbase.
by tuetuopay on 8/6/24, 5:56 PM
Anyways kudos to them, and I can’t wait to see how it fares against China’s GFW.
by pzmarzly on 8/6/24, 5:59 PM
[0] The article says Wireguard is easy to block, but in my experience GFW lets it through.
[2] https://xtls.github.io/en/development/protocols/vless.html
[3] https://xtls.github.io/en/development/protocols/vmess.html
by olalonde on 8/6/24, 6:15 PM
https://github.com/ProtonVPN/android-app
PS: Tried their free plan in China and it won't connect ("Connection Timeout"). In fact, I had to use another VPN to get past their app's loading screen (guessing it got stuck while doing a request to their server)...
by SahAssar on 8/6/24, 6:06 PM
by tptacek on 8/6/24, 6:17 PM
by apitman on 8/6/24, 6:26 PM
* Is this an open protocol?
* I would like to see a detailed comparison to similar solutions
* Looks like it's TCP so head-of-line blocking may cause performance issues.
* What prevents entities from detecting that all your traffic is going to a single endpoint, or just blocking known VPN servers directly?
by daft_pink on 8/6/24, 6:25 PM
by nasaeclipse on 8/6/24, 5:53 PM
I would think it would've been best to keep this update "silent", so to speak, to avoid letting said parties know of this new protocol.
by causal on 8/6/24, 5:59 PM
Question though: don't most VPN filters simply block a list of all known VPN endpoints? Maybe I missed something but I don't see how Proton's Stealth evades this simple filter?
by _rs on 8/6/24, 5:56 PM
by sinkasapa on 8/6/24, 10:42 PM
by dtx1 on 8/6/24, 5:59 PM
by thayne on 8/6/24, 6:40 PM
The reason most VPN protocols use UDP is for performance. With TCP, a single blocked packet can delay multiple streams. And fwiw, openvpn supports using TLS over TCP, but it is less performant than udp.
I would be more interested in a protocol that uses quic and looks like http/3
by xezzed on 8/6/24, 8:08 PM
by saurik on 8/6/24, 9:36 PM
by xeromal on 8/6/24, 5:49 PM
by gr4vityWall on 8/6/24, 6:27 PM
by commandersaki on 8/7/24, 9:51 AM
Reference: https://web.archive.org/web/20230310043036/http:/sites.inka....
by brewdad on 8/6/24, 6:31 PM
by hypeatei on 8/6/24, 5:59 PM
I'm assuming this boils down to a cat and mouse game, then? E.g. popular firewalls patch this and Proton releases an update to bypass filters?
Also, couldn't access this site directly because of corporate firewall, how ironic.
by okneil on 8/6/24, 5:59 PM
by KomoD on 8/6/24, 6:18 PM