Iirc there’s no such thing as VPN Chaining and even then (if it is which I guess the article might validate it) you’re not gaining any privacy or security benefit and you’re essentially trusting the VPNs you’re connecting to anyway. Simple as that.
The closest you’ll get is something like Proton’s secure core which does multi hop servers, actually does it and has a little bit of a benefit here over what you’re trying to do.
Maybe I’m just wrong but that’s where If I recall correctly
@doublehop yes one on router and one on your OS is the way to go. proton and mullvad are the best options available for this.
the odds that your adversary has not only compromised two vpns in different jurisdictions at the same time and correlate both accounts is extremely low. in fact, if this is unacceptable in your threat model then you probably should stay off the internet
Chaining WireGuard works beautifully, it is stable, & bug free for straightforward usecases (we tested with Amnezia + Proton without port forwarding / P2P / PMTUD etc) & so it will land in the next version, v055o, due a release once the lead developer is back from their vacay.
This is huge! Thanks for all the work you do. Honestly discovering rdns has improved my network security much more than almost every other measure combined (because it doesn’t depend on my router always existing). An awesome swiss knife.
off topic whitelists
Is there also any update on exporting whitelists for app isolation? I have a decently long list built now for common apps. Currently I am looking to create a github gist containing them, but using them this way would be hard.
Can you also post on the forum once it is live? I think it will be a great tool for a lot of folks here.