Proton VPN
105 results found
-
Defense Against Traffic Analysis
Implementing an option that makes traffic analysis, done by AI or otherwise, more difficult. Similar to what Mullvad has created with DAITA
128 votes -
Show server latency
without knowing if I'll get good latency makes people hesitant to subscribe for premium plans. Let people browse the servers and see the latency they get even if it's locked out for free users.
548 votes -
Add a censorship-resitant technology such as V2RAY or UPD-over-TCP.
Mullvad VPN uses Wireguard obfuscation (UDP2TCP). IVPN on iOS uses V2RAY. Those protocols allows to reliably bypass censorship. Proton on the other hand only has Stealth, which is unreliable and often disconnects.
Request : Add a censorship-resitant technology such as V2RAY or UPD-over-TCP.
Sources:
https://github.com/mullvad/udp-over-tcp
https://github.com/v2fly/v2ray-core
https://github.com/ivpn/ios-app/tree/main/IVPNClient/Models/V2Ray347 votes -
Detect when a server has high latency or slow speed and automatically change servers
Sometimes my connection speed seems to become very slow. I often disconnect and reconnect to re-establish a decent connection speed. It would useful if profiles allowed for an option to automatically change servers when high latency or slow speed is detected.
The option could select to reconnect to the best server in the same country or region or globally - based on a function of latency and speed.
214 votes -
Submit Linux package updates in official distro repos
Proton VPN is open source and uses well-known and established components of the NetworkManager stack. Due to these two things, there is virtually nothing standing in the way of the Proton VPN team from building and submitting packages officially to Linux distributions like Fedora, Debian, Ubuntu, EPEL, etc. Proton VPN is further enhanced by packaging upstream by increasing the availability of Proton VPN software packages in the global software package mirroring network (deterring censorship) and benefiting from improved transparency and openness by building packages through distribution-supported build systems, which are often reproducible.
The policies of most distros are friendly to…
283 votes -
Detect DNS leak and warn ProtonVPN users
An encrypted DNS (Called DoH - DNS over https) is said by you (in the later linked article) to "prevents our software from being able to see the DNS queries. This makes it very hard to block or reroute them."
causing DNS leak, which can be considered a serious privacy compromise IMO.
https://www.dnsleaktest.com
https://ipleak.netIt seems to be too severe not to warn user about it in case it is doable from the side of your application. I guess your app tries to read the DNS request and if is encrypted, it fails and can do some action, like displaying…
118 votes -
Re-enable access to API
Until recently, users could access the API (https://api.protonvpn.ch/vpn/logicals) to filter servers based on various criteria (e.g., country and server load) to ensure connection to a server that isn't overloaded. This ability was removed within the past few days. Support replied with the following:
…
Hello, Thank you for contacting us. Public access to the https://api.protonvpn.ch/vpn/logicals endpoint is no longer available due to internal changes. What you were using previously was not officially supported, and you can either use our native application to access the servers and their load, or manually download config files for a manual connection from https://account.protonvpn.com/downloads. If you need any19 votes -
Use Quantum-Resistant Cryptogtaphic Algorithm
OpenVPN uses TLS for encryption, Quantum Proof Algorithms including the four selected by NIST are provided by liboqs. The library is already present in repositories of many Linux Distros. liboqs is integrated in TLS, means no additional work is required for the client side. This would be very easy to implement in The VPN.
Much better alternative would be that Proton makes it's own Algorithm. It would be a good way to add it as an optional feature in the initial stages for testing.
446 votes -
IPV6 support in WireGuard Configuration Files
IPv6 is supported when using certain desktop apps, and so all of the IPV6 endpoints must also exist for the various VPN servers. However, they are omitted in the WireGuard configuration files when downloading directly (for example, for using wg-quick or other WireGuard application directly).
11 votes -
Improved feature list for Apple TV
Apple TV works OK but is bare on features compared to the Android TV app. Would like to see a more complete feature list for the Apple TV, such as split tunnelling, choosing with server within a country, which Protocol etc.
9 votes -
Add DoH and DNS-over-QUIC Support for Custom DNS on iOS
I'm excited to see that ProtonVPN iOS now supports custom DNS functionality.
However, I noticed that it currently only supports plaintext UDP DNS queries.
As a privacy-conscious user who chose Proton specifically for its commitment to privacy, I would like to request support for encrypted DNS protocols, specifically DNS-over-HTTPS (DoH) and DNS-over-QUIC.Privacy Concerns with Plaintext UDP DNS:
Even when using a VPN, plaintext UDP DNS poses several privacy risks:
1. DNS Query Visibility: While the VPN encrypts the connection between my device and the VPN server, DNS queries from the VPN server to the DNS resolver remain unencrypted and…7 votes -
Add the ability to set and use shortcuts for the Proton VPN browser extension
Browser extensions support (at least on Firefox) to set custom keyboard shortcuts for certain actions.
It would be great if Proton VPN browser extension had shortcuts for actions such as adding the current website to the split tunneling list.
7 votes -
Linux app for arm64 GUI and CLI
Hello, like many users, I use a low-power ARM64 machine for P2P downloads via Torrent. The problem is that there isn't a Linux ARM64 application yet, which prevents me from setting up the Port Forwarding as explained in the guides, since I have to use it through WireGuard instead of the official app.Is this release planned? Thanks.
7 votes -
I2P
I’d like to propose adding native support for the Invisible Internet Project (I2P) to enhance Proton VPN’s offerings.
I2P is a decentralized, anonymizing network that enables secure, private communication, complementing Proton’s existing Tor support. Integrating I2P could:
Appeal to privacy-focused users who use I2P for secure browsing, messaging, or file sharing.
Position Proton VPN as a leader in supporting multiple anonymity networks.
Simplify setup for users, as manual I2P configuration with VPNs can be complex.
Suggested features could include dedicated I2P servers, one-click connectivity (similar to your Tor integration), or optimized settings for I2P traffic (e.g., port forwarding or split…6 votes -
opt-in to MTE
Could you add opt-in to MTE for GrapheneOS newer devices please? There is a pull request open in your github:
https://github.com/ProtonVPN/android-app/pull/168
More details:
- Modify your: app/src/main/AndroidManifest.xml
<application
android:name=".ProtonApplicationHilt"
android:allowBackup="false"
android:memtagMode="async"
android:banner="@drawable/tvbanner"
android:icon="@mipmap/iclauncher"
android:label="@string/app_name"2: Add -> android:memtagMode="async"
GrapheneOS will gladly appreciate this. Thank you.
4 votes -
Kill Switch option in Profiles
Hi ProtonVPN team,
I’d love to see an option added to the profile creation process that lets users set up Kill Switch preferences right from the start. Specifically, it would be great to choose whether the Kill Switch is enabled or disabled for that profile, and also select between the standard and advanced modes.
This would give users more control over how each profile behaves based on their needs. For example, someone might want a profile with the advanced Kill Switch enabled for maximum protection, and another with it off for more flexibility.
Thanks for your time and for continuously…
5 votes -
Show server load before selecting secure core for each country feature, new version had removed this feature
The new version 4.1.13 did not display the server load before selecting. It is slow and troublesome to connect and found that the country server load is high and I have to switch to another country one by one to find out low server load country and this method is very inefficient and resulting proton and users unnecessary servers connecting and disconnecting. Hopefully this pre-display server load feature before secure core connection can be reinstated back into the new version.
6 votes -
Peer-to-Peer Mesh Networking with NAT Traversal
Enables direct peer-to-peer VPN networking, like Tailscale or ZeroTier. This would allow devices on my Proton VPN account to see and connect to each other using private IPs, as if on the same LAN.
This kind of functionality would be very helpful for cloud gaming, remote development, and device syncing, without needing a third-party solution.
Specifically, I’m asking for:
Private IPs for each device on the VPN
Peer-to-peer connectivity with NAT traversal
Optional routing via Proton servers when needed
Thank you for all your amazing work — this feature would make Proton VPN even more powerful.
4 votes -
Name IP addresses specified for split tunneling
It would be helpful to be able to name or tag IP addresses that are added to the split tunneling list. Names would help users avoid deleting an address by accident, and easily review the sites that have already been specified.
5 votes -
Proton VPN’s kill-switch isn’t Direct-Boot aware on GrapheneOS
On GrapheneOS, the updater runs before first unlock (BFU) to grab security patches, but Proton VPN’s kill-switch isn’t Direct-Boot aware. Enabling it brings up the VPN UI BFU, yet no network ever connects, so updates fail until you unlock the device.
Repro:
Install Proton VPN on GrapheneOS (e.g. Pixel 6 Pro 2025.05.15)
Turn on kill-switch
Reboot and stay at lock screen
Watch the BFU updater time out for lack of network
Impact:
Devices miss critical patches until next unlock, extending exposure to exploits.Fix:
• Mark the VPN service as android:directBootAware="true" in AndroidManifest.xml
• Move its config/certs into Device-Protected Storage…5 votes
- Don't see your idea?