I started using Aegis as soon as I saw the update for the google authenticator that “securely stores” my authentication tokens…in google’s own severs…that get hacked all the time.
Don’t use proton pass to store your 2FA tokens, use something like Aegis for 2FA tokens instead, and be sure to password protect it with a password that you DON’T store inside of proton pass
With mullvad, proton or iVPN, just enable lockdown mode or what proton calls the “permanent” kill switch.
That should block all unprotected traffic with no issue
Edit, I used policy plus to delay my quality updates by 30 days and my feature updates by 365 days and a couple of days ago I paused my windows updates because I saw britec09 talking about how some of the more recent updates to windows 11 will cause bluescreens sometimes. So I’m not affected.
Session comes with its own anonymity network…you sometimes need a VPN to access it, but still.
And even though there’s no quantum encryption on it yet. Whoever would try to use a quantum computer to break in would still need to use it for quite awhile on hundreds of different servers each processing thousands of different people’s traffic at any time.
How to check if it’s working? ipleak(dot)net is very helpful for checking that.
use it to check if your VPN is leaking DNS traffic whenever you swap proxies, almost zero VPN providers leak DNS traffic when connected, but almost all of them leak DNS traffic whenever you swap proxies.
Proton is one that doesn’t leak…at least not on desktop.
It CAN leak DNS traffic sometimes on some mobile OSs
that would be cool too.