Defense Against Traffic Analysis
Implementing an option that makes traffic analysis, done by AI or otherwise, more difficult. Similar to what Mullvad has created with DAITA
-
desinflado
commented
I beg you, Proton. Paying for Proton Unlimited + Mullvad VPN is leaving me broke.
-
Bakkah Transport commented
Great source for local news and community updates. I really enjoyed browsing <strong><a href="https://cheshiretimes.co.uk/">Cheshire Times</a></strong>because the content is informative and easy to read. The clean design and regular updates make the website very useful.
-
Brom
commented
This and post quantum encryption is the thing stopping me from leaving mullvad for proton. AI is a current thread not a maybe. Its everywhere and a privacy company like proton should take it seriously.
-
Privacy-minded
commented
Also please don't just implement this in the ProtonVPN app, do it even for the manual Wireguard configurations for users of unsupported Linux distributions (where the official app is concerned). Implement atoggle option in the configurations download web page that enables a parameter within the configuration file or something like that if hopefully it's possible.
-
Privacy-minded
commented
This is such a *CRITICAL* and absolutely indispensable privacy feature and Proton really should have a responsibility to add it as an optional feature considering that they're for privacy. Governments around the world are getting more and more overreaching by the day and they're now increasingly deploying AIs or manual traffic analysis which renders VPN usage effectively useless to shield against mass surveillance and censorship. Proton has a responsibility to implement this feature request as optional. I don't care that it slows traffic down but giving the user's the choice to activate it or deactivate is the right thing to do to protect those who don't want to be part of a surveillance State. Please Proton, we need you guys to implement this. Also, for who was asking, the current 'Stealth Mode' doesn't do anything to protect against traffic analysis. Stealth mode merely makes VPN traffic look like regular HTTPS traffic, but doesn't do absolutely anything to protect against packet recognition and pattern analysis of network traffic by neither AI systems or human reviews. This feature request is ABSOLUTELY CRITICALLY IMPORTANT AND ABSOLUTELY ESSENTIAL!
-
G
commented
To compete with Mullvad.
-
Greenman
commented
This is extremely important for totalitarian countries such as China, Russia, and Iran.
-
R
commented
Would also like something like this on Proton, please.
-
Noname
commented
Indeed, Proton absolutely must provide a concrete solution to this type of surveillance, especially when the competition is innovating...
-
Sombody
commented
proton is getting old by the second by missing these features.
-
David
commented
Agree. Stealth helps, but it doesn’t really defeat traffic analysis. On many restrictive networks it still gets fingerprinted or blocked.
One practical improvement would be adding support for AmneziaWG as an additional stealth-class protocol. It’s open source, WireGuard-based, and specifically designed to reduce protocol fingerprinting by altering handshake and packet characteristics. Other VPNs already use it where TLS-style obfuscation isn’t enough.
This wouldn’t replace Stealth, just complement it. Protocol diversity is one of the few defenses that actually works against active traffic analysis.
-
Amua commented
I agree
-
Jason Vinion commented
This is a must have and is mandatory for privacy if proton wants to stay up to date with security concerns.
-
Lukas Mayer
commented
Proton's VPN is a significant part of my paid plan's value proposition.
As other services adapted to higher traffic analysis capabilities of adversaries and have heavily invested in research, even Proton's more secure 'Secure Core' technology feels very 'legacy' compared to the more advanced solutions that others have already mentioned here.
-
cpu world commented
Here's a comment you can post on the Proton VPN DAITA page about your UK IP connection issue:
I'm experiencing an interesting issue with UK IP connections that I'm hoping someone can help explain. When I connect to a UK server and try to access my WordPress website (https://thorpeparktickets.co.uk/), the site initially appears blocked or doesn't load properly. However, when I access other UK websites, they work perfectly fine. Strangely, if I refresh the page, my website then loads correctly.
This seems to happen consistently only with my WordPress site when using UK IPs from ProtonVPN. Other country IPs work fine for my site, and other UK sites work fine with UK IPs - it's just this specific combination that causes the initial loading issue.
Has anyone experienced similar behavior? Could this be related to:WordPress security plugins detecting VPN traffic patterns?
CDN/caching issues with UK-based servers?
Some kind of geo-blocking mechanism that's confused by the VPN connection?The fact that a simple refresh fixes it makes me think it might be a caching or initial handshake issue rather than a true block. Would love to hear if others have encountered this with WordPress sites and UK servers, and if DAITA might help with this kind of traffic analysis issue.
Any insights would be appreciated! -
charlie
commented
100 percent for this, yes it can reduce speed but if anyone doesn't like that trade off they don't have to use it. It should obviously be optional but it should definitely exist.
-
5UR
commented
+1
-
Anon
commented
Like NYM & Safing SPN
-
Vasiliy Wood
commented
+1
-
nifon
commented
Defense Against Traffic Analysis is mandatory for privacy and for peace of mind.