Not sure if it was just released today, but I got the email update about it just now. I’m pretty excited about this because I mostly just want VPN for web browsing, and the linux app kinda sucks.
Ngl, I’m very surprised and very pleased proton has lasted. They seem to be on track to remaining sustainable and true to their stated goals.
I haven’t run their paid tier VPN yet, because of the linux issues, but the free tier always worked well when I was between providers and deciding who to go with.
In a recent e-mail they mentioned an open Linux dev position, so hopefully the Linux client will catch up soon enough!
What Linux issues are those?
deleted by creator
No wireguard. Unable to launch on login for some DE.
Wireguard is up. Cannot speak to the other instances.
Also slow ass GUI, no auto-connect on startup. I wrote a script for this. Luckily the offer a CLI
How does Proton VPN compare to Mullvad? I’ve been using them for years and they really are anonymous. You don’t even provide an email to create your account.
If you’re satisfied with mullvad, i would stick to it. The main problem it runs into is that it doesn’t support port forwarding which is an issue if you use torrents a lot. That’s the main advantage that proton reserves.
I don’t like proton products. It feels like a false sense of security
Pretty neat. Paid plans only, though.
Their paid plans are really sweet tho. If I pick servers close to my location I get sub 40 ms ping, even tunneling through two servers, and you have basically unlimited bandwidth. Easily > 500 MBit/s.
And that’s only like 7.something €/$ per month, including all their other stuff, (500 GB cloud storage, E2EE calendar, multiple mail addresses and whatever else is to come).
There’s a lot of trust involved when using a VPN. Besides accessing things that are region blocked when you use a VPN you’re basically say “Here VPN company, look at all the connection im making” and you just have to hope they’re not logging anything. They might even tell you they’re not logging anything but how can you really know? And what is their intention is to not log anything but they fuck up and don’t implement that correctly?
It’s great to be critical, but if at the end you throw up your arms and go without a VPN you’re significantly less private.
You don’t need to stop every single attack vector - not even browsing on Tails will do that. But to go with a good VPN provider who has a history of not handing over data when subpoenaed is good