Skip to content

Masq

My feedback

19 results found

  1. 591 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  2. 9 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  3. 693 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  4. 392 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  5. 33 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Masq commented  · 

    fwiw, it seems like using an RFC1918 IP address will allow for connections while still on VPN. However, since DNS is going through the tunnel, the external DNS server isn't going to know your local devices.

    If there was an option/setting within the app to for example whitelist a TLD like .local for local connections, I think that would be an optimal way to solve this. (since protonVPN doesn't know what DNS queries are going to be ones that resolve locally vs externally and they shouldn't send all things locally because that would then leak out information).

    Masq supported this idea  · 
  6. 446 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  7. 781 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Planned  ·  38 comments  ·  Proton VPN » New feature  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  8. 101 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  9. 1,447 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  10. 885 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  11. 1,687 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  12. 274 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Masq commented  · 

    This should work similarly to how the folders and labels work in Mail; a dead-simple drag-and-drop functionality to rearrange how calendars show up in the UI is extremely important and feels like a weird function to be completely absent from Calendar for several years.

    Masq supported this idea  · 
  13. 2,585 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    An error occurred while saving the comment
    Masq commented  · 

    I was awaiting the feature request earlier that was for a second password for Proton Pass... But I believe that was misunderstood. I do like the "second password" on top of the original password feature.

    However, my main use case is actually storing my Proton service password within Proton Pass itself. If I move devices, etc. I need to know the Proton service password to be able to access Proton Pass, but it's a random password generated by and stored within Proton Pass. A chicken and egg scenario.

    With this feature, we're hoping that we have a separate password to login to Proton Pass so that we can store the other Proton Services password within Proton Pass and not get locked out from everything (that way we can have a very strong Proton Services Password that doesn't need to be memorable).

    Hopefully this comment helps! Thanks for all your work on these fantastic products/services!

    Masq supported this idea  · 
  14. 317 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  15. 1,787 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  16. 848 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  17. 668 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  18. 1,742 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
    Masq supported this idea  · 
  19. 1,835 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)