Pretty much what the title says. I have a subscription to Proton as well as Mullvad. I’ve ordered a router and I plan on running Proton on the router and Mullvad on the device I’m using, or vice versa. I would just like to know with absolute certainty that doing this won’t somehow put my Proton account at risk, before I actually do it; I rely on my Proton account for a lot of things. I know there are automated systems in place that detect abuse, especially with respect to DDoS and whatnot. I do not do anything related to DDoS or anything similar, so my account will never be flagged for anything of that nature correctly. I really can’t see how/why daisy chaining with another VPN could reasonably be construed as an abuse of the service, but I actually do worry about that in all honesty, whether or not I should. If there’s any way something like that might happen, I’ll abandon the idea as it would concern my Proton account and figure some other means of accomplishing this. Thanks.

  • S. G. TallentyreOP
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    2
    ·
    edit-2
    6 months ago

    If you are worried about traffic correlation analysis, then yes 2 VPNs will help.

    I am trying to obfuscate my traffic fingerprint as much as possible, yes.

    The outer VPN is the one where you have increased traffic due to 2 VPNs.

    So, does it (roughly) just double the amount of traffic by adding the second one, or…?

     

    Edit:

    I’m not sure why I was downvoted. Advanced traffic analysis techniques already exist. I can only imagine that as soon as methods sufficient to fingerprint innocuous use of the clearnet at significant scale become feasible, that is exactly what will happen. I see nothing inherently irrational about having a threat model that makes some reasonable attempt to account for that.