Skip to content

Proton VPN

3 results found

  1. Detect DNS leak and warn ProtonVPN users

    An encrypted DNS (Called DoH - DNS over https) is said by you (in the later linked article) to "prevents our software from being able to see the DNS queries. This makes it very hard to block or reroute them."
    causing DNS leak, which can be considered a serious privacy compromise IMO.
    https://www.dnsleaktest.com
    https://ipleak.net

    It seems to be too severe not to warn user about it in case it is doable from the side of your application. I guess your app tries to read the DNS request and if is encrypted, it fails and can do some action, like displaying…

    112 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Under review  ·  0 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. Sync configurations between different devices

    Sync configurations like profiles etc. between the different devices.

    143 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Under review  ·  6 comments  ·  New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. ProtonVPN, add VPN traffic obfuscation, like a ScrambleSuit

    As internet censorship tightens across the world, governments are becoming more and more concerned about preventing the use of VPN to circumvent their restrictions.

    A new internet traffic monitoring technology known as Deep Packet Inspection (DPI) has been proven to successfully block OpenVPN traffic regardless of the port used being 80, 443 or even 53. To sum up: everyone who uses the internet needs to be aware of Deep Packet Inspection. DPI is a next-generation technology capable of inspecting every byte of every traffic packet that passes through a DPI device, that means packet headers, types of applications and actual…

    30 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  • Don't see your idea?

Feedback and Knowledge Base