One of the selling points Jason had for WireGuard is that it’s less likely to be misconfigured

I’d probably argue WireGuard is security first, and can be used for privacy

IIRC the saving of IP addresses in memory is part of the design to allow you to keep connected to the VPN even if your network connection changes, e.g. when switching from WiFi to 5G

Not to say there aren’t any downsides, just that you already need to implicitly trust your VPN provider either way

The UDP only issue is really unfortunate for networks that try to block anything not HTTP

@Tibert@compuverse.uk
link
fedilink
English
75M

On the website :

Wireguard is clearly seen by firewalls as a VPN by only allowing UDP packets

However proton Vpn în their app, they have a “wireguard TCP” setting.

Which is also confusing as on their wireguard marketing page, there is a faq where they say openvpn supports tcp in a ways as it supports TCP but not wireguard.

flatbield
link
fedilink
English
15M

This is my issue with Wireguard. It is not good a firewall traversal. On restrictive nets really you have to get out via TLS port 443. No other way often works. So for the traveler OpenVPN TCP option can be way better. Nice to see Proton has a solution.

The other problem with Wireguard is that it is not necessarily as anonymous. The good VPN providers had to do special things to make that so.

Other then that, Wireguard is wonderful in terms of performance and presumably security too.

@nixfreak@sopuli.xyz
link
fedilink
English
25M

WireGuard supports UDP/TCP

@smollittlefrog@lemdro.id
link
fedilink
English
12
edit-2
5M

Proton uses their own Stealth Protocol, which puts a TCP/TLS wrapper around the Wireguard protocol.

Wireguard has a cooler logo

Mousepad
link
fedilink
English
15M

It isn’t even close. I’m glad this makes the decision so easy!

@HellAwaits@lemm.ee
link
fedilink
English
35M

For edgy 5-year-olds, maybe

@quicksand@lemm.ee
link
fedilink
English
275M

Dragon would totally beat keyhole in a fight

ƊƲƘЄƬӇƠƦƖƠƝ
link
fedilink
English
45M

Depends on if there’s a LARGER dragon behind the keyhole.

@QuazarOmega@lemy.lol
link
fedilink
English
45M

I bet the fire noodle could pass through the hole

Create a post

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • 1 user online
  • 15 users / day
  • 90 users / week
  • 268 users / month
  • 1.79K users / 6 months
  • 1 subscriber
  • 541 Posts
  • 8.82K Comments
  • Modlog