Skip to content

Proton VPN

105 results found

  1. Defense Against Traffic Analysis

    Implementing an option that makes traffic analysis, done by AI or otherwise, more difficult. Similar to what Mullvad has created with DAITA

    128 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. Show server latency

    without knowing if I'll get good latency makes people hesitant to subscribe for premium plans. Let people browse the servers and see the latency they get even if it's locked out for free users.

    548 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Planned  ·  17 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. Add a censorship-resitant technology such as V2RAY or UPD-over-TCP.

    Mullvad VPN uses Wireguard obfuscation (UDP2TCP). IVPN on iOS uses V2RAY. Those protocols allows to reliably bypass censorship. Proton on the other hand only has Stealth, which is unreliable and often disconnects.

    Request : Add a censorship-resitant technology such as V2RAY or UPD-over-TCP.

    Sources:

    https://github.com/mullvad/udp-over-tcp
    https://github.com/v2fly/v2ray-core
    https://github.com/ivpn/ios-app/tree/main/IVPNClient/Models/V2Ray

    347 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  4. Detect when a server has high latency or slow speed and automatically change servers

    Sometimes my connection speed seems to become very slow. I often disconnect and reconnect to re-establish a decent connection speed. It would useful if profiles allowed for an option to automatically change servers when high latency or slow speed is detected.

    The option could select to reconnect to the best server in the same country or region or globally - based on a function of latency and speed.

    214 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    6 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  5. Submit Linux package updates in official distro repos

    Proton VPN is open source and uses well-known and established components of the NetworkManager stack. Due to these two things, there is virtually nothing standing in the way of the Proton VPN team from building and submitting packages officially to Linux distributions like Fedora, Debian, Ubuntu, EPEL, etc. Proton VPN is further enhanced by packaging upstream by increasing the availability of Proton VPN software packages in the global software package mirroring network (deterring censorship) and benefiting from improved transparency and openness by building packages through distribution-supported build systems, which are often reproducible.

    The policies of most distros are friendly to…

    283 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  6. Detect DNS leak and warn ProtonVPN users

    An encrypted DNS (Called DoH - DNS over https) is said by you (in the later linked article) to "prevents our software from being able to see the DNS queries. This makes it very hard to block or reroute them."
    causing DNS leak, which can be considered a serious privacy compromise IMO.
    https://www.dnsleaktest.com
    https://ipleak.net

    It seems to be too severe not to warn user about it in case it is doable from the side of your application. I guess your app tries to read the DNS request and if is encrypted, it fails and can do some action, like displaying…

    118 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Under review  ·  0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  7. Re-enable access to API

    Until recently, users could access the API (https://api.protonvpn.ch/vpn/logicals) to filter servers based on various criteria (e.g., country and server load) to ensure connection to a server that isn't overloaded. This ability was removed within the past few days. Support replied with the following:

    Hello, Thank you for contacting us. Public access to the https://api.protonvpn.ch/vpn/logicals endpoint is no longer available due to internal changes. What you were using previously was not officially supported, and you can either use our native application to access the servers and their load, or manually download config files for a manual connection from https://account.protonvpn.com/downloads. If you need any

    19 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    4 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  8. Use Quantum-Resistant Cryptogtaphic Algorithm

    OpenVPN uses TLS for encryption, Quantum Proof Algorithms including the four selected by NIST are provided by liboqs. The library is already present in repositories of many Linux Distros. liboqs is integrated in TLS, means no additional work is required for the client side. This would be very easy to implement in The VPN.

    Much better alternative would be that Proton makes it's own Algorithm. It would be a good way to add it as an optional feature in the initial stages for testing.

    446 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    7 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  9. IPV6 support in WireGuard Configuration Files

    IPv6 is supported when using certain desktop apps, and so all of the IPV6 endpoints must also exist for the various VPN servers. However, they are omitted in the WireGuard configuration files when downloading directly (for example, for using wg-quick or other WireGuard application directly).

    11 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  10. Improved feature list for Apple TV

    Apple TV works OK but is bare on features compared to the Android TV app. Would like to see a more complete feature list for the Apple TV, such as split tunnelling, choosing with server within a country, which Protocol etc.

    9 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  11. Add DoH and DNS-over-QUIC Support for Custom DNS on iOS

    I'm excited to see that ProtonVPN iOS now supports custom DNS functionality.
    However, I noticed that it currently only supports plaintext UDP DNS queries.
    As a privacy-conscious user who chose Proton specifically for its commitment to privacy, I would like to request support for encrypted DNS protocols, specifically DNS-over-HTTPS (DoH) and DNS-over-QUIC.

    Privacy Concerns with Plaintext UDP DNS:
    Even when using a VPN, plaintext UDP DNS poses several privacy risks:
    1. DNS Query Visibility: While the VPN encrypts the connection between my device and the VPN server, DNS queries from the VPN server to the DNS resolver remain unencrypted and…

    7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  12. Add the ability to set and use shortcuts for the Proton VPN browser extension

    Browser extensions support (at least on Firefox) to set custom keyboard shortcuts for certain actions.

    It would be great if Proton VPN browser extension had shortcuts for actions such as adding the current website to the split tunneling list.

    7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  13. Linux app for arm64 GUI and CLI

    Hello, like many users, I use a low-power ARM64 machine for P2P downloads via Torrent. The problem is that there isn't a Linux ARM64 application yet, which prevents me from setting up the Port Forwarding as explained in the guides, since I have to use it through WireGuard instead of the official app.Is this release planned? Thanks.

    7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  14. I2P

    I’d like to propose adding native support for the Invisible Internet Project (I2P) to enhance Proton VPN’s offerings.

    I2P is a decentralized, anonymizing network that enables secure, private communication, complementing Proton’s existing Tor support. Integrating I2P could:

    Appeal to privacy-focused users who use I2P for secure browsing, messaging, or file sharing.
    Position Proton VPN as a leader in supporting multiple anonymity networks.
    Simplify setup for users, as manual I2P configuration with VPNs can be complex.
    Suggested features could include dedicated I2P servers, one-click connectivity (similar to your Tor integration), or optimized settings for I2P traffic (e.g., port forwarding or split…

    6 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  15. opt-in to MTE

    Could you add opt-in to MTE for GrapheneOS newer devices please? There is a pull request open in your github:

    https://github.com/ProtonVPN/android-app/pull/168

    More details:

    1. Modify your: app/src/main/AndroidManifest.xml

    <application
    android:name=".ProtonApplicationHilt"
    android:allowBackup="false"
    android:memtagMode="async"
    android:banner="@drawable/tvbanner"
    android:icon="@mipmap/ic
    launcher"
    android:label="@string/app_name"

    2: Add -> android:memtagMode="async"

    GrapheneOS will gladly appreciate this. Thank you.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  16. Kill Switch option in Profiles

    Hi ProtonVPN team,

    I’d love to see an option added to the profile creation process that lets users set up Kill Switch preferences right from the start. Specifically, it would be great to choose whether the Kill Switch is enabled or disabled for that profile, and also select between the standard and advanced modes.

    This would give users more control over how each profile behaves based on their needs. For example, someone might want a profile with the advanced Kill Switch enabled for maximum protection, and another with it off for more flexibility.

    Thanks for your time and for continuously…

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  17. Show server load before selecting secure core for each country feature, new version had removed this feature

    The new version 4.1.13 did not display the server load before selecting. It is slow and troublesome to connect and found that the country server load is high and I have to switch to another country one by one to find out low server load country and this method is very inefficient and resulting proton and users unnecessary servers connecting and disconnecting. Hopefully this pre-display server load feature before secure core connection can be reinstated back into the new version.

    6 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  18. Peer-to-Peer Mesh Networking with NAT Traversal

    Enables direct peer-to-peer VPN networking, like Tailscale or ZeroTier. This would allow devices on my Proton VPN account to see and connect to each other using private IPs, as if on the same LAN.

    This kind of functionality would be very helpful for cloud gaming, remote development, and device syncing, without needing a third-party solution.

    Specifically, I’m asking for:

    Private IPs for each device on the VPN

    Peer-to-peer connectivity with NAT traversal

    Optional routing via Proton servers when needed

    Thank you for all your amazing work — this feature would make Proton VPN even more powerful.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  19. Name IP addresses specified for split tunneling

    It would be helpful to be able to name or tag IP addresses that are added to the split tunneling list. Names would help users avoid deleting an address by accident, and easily review the sites that have already been specified.

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  20. Proton VPN’s kill-switch isn’t Direct-Boot aware on GrapheneOS

    On GrapheneOS, the updater runs before first unlock (BFU) to grab security patches, but Proton VPN’s kill-switch isn’t Direct-Boot aware. Enabling it brings up the VPN UI BFU, yet no network ever connects, so updates fail until you unlock the device.

    Repro:

    Install Proton VPN on GrapheneOS (e.g. Pixel 6 Pro 2025.05.15)

    Turn on kill-switch

    Reboot and stay at lock screen

    Watch the BFU updater time out for lack of network

    Impact:
    Devices miss critical patches until next unlock, extending exposure to exploits.

    Fix:
    • Mark the VPN service as android:directBootAware="true" in AndroidManifest.xml
    • Move its config/certs into Device-Protected Storage…

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
← Previous 1 3 4 5 6
  • Don't see your idea?

Feedback and Knowledge Base