Mullvad is working on adding QUIC obfuscation in their VPN clients

IVPN never worked for me while I was in China (Android, it just kept loading infinitely), while Mullvad did (Proton VPN almost never worked). Keep in mind this was before they introduce Shadowsocks.

You seem to have a black and white view of censorship. QUIC over HTTP obfuscation will help many people bypass light-to-medium censorship while keeping connection reliability. I never said it could bypass advanced censorship systems , despite you apparently interpreting it that way.


And again, I repeat that the GFW doesn’t, at least not universally, block all Mullvad VPN IPs.

They have already added it for the beta channel: Release 2025.9-beta1 ¡ mullvad/mullvadvpn-app ¡ GitHub

I’m using it right now on Linux, they don’t have a lot of servers for it yet but its early days.

I had been looking for a paid proxy service that used vless+reality or trojan tbh.. I don’t want to set it up myself then I would have to secure it :frowning:

To summarize the thread a little bit for lay people: are there any commercial/non commercial providers which lead the pack in terms of censorship resistance? Mullvad, IVPN, Nym, Amnezia, Tor, I2P?

2 Likes

Good question thanks. We should precise though that as @anon80779245 said that there are nuances in the effectiveness of censorship circumvention providers depending on the network.

I would phrase it like this : what are the most reliable providers in the worst cases (Iran, Turkmenistan, China, Myanmar, Russia, Cuba etc) ?

Or “if my country becomes a full digital authoritarian hell, which are the providers the most likely to save me? “

Plus Windscribe, Psiphon…?

Reading the messages above, it seems that IVPN and Proton are less reliable than Mullvad in China.

To answer my question, from what I have read, I have the impression that Mullvad, TOR and maybe Windscribe and Amnezia are the most reliable in heavy restricted countries.

Who they? Mullvad?

Some people reportedly use satellite ISPs such as Starlink to avoid compromised networks (ISPs enforcing censorship) entirely.

1 Like

Good luck bringing a Starlink dish into China.

Not on PG’s list of recommendations, but you could have a look at Xeovo.

Disclaimer: I have never tried their service. Just sharing because an acquaintance used them on a trip to China around a year ago.

Hard to trust a VPN company that you don’t know enough about or that a company doesn’t share more about themselves or the people behind it.

But the website is well made and does present itself one with legitimacy. But not knowing who or how many are behind it, it’s not ideal for me. PG recommended ones are different in this regard.

1 Like

I don’t think this would be particularly difficult. I read that people routinely do it in Turkey, Iran, and other places. If you can get service at all, it’s probably a much more reliable, albeit more expensive, method of accessing the Internet than VPNs engaged in a cat and mouse game with local ISPs.

The underground market is easy to access in Iran and Turkey, but you don’t fuck with China. They operate on another level and this sort of thing is not taken lightly.

It doesn’t sound like you’ve been to China before. I’m not going to get into a debate about hypotheticals. What I will say is that no one sane will ever fuck around with the Chinese authorities, especially Customs! Good luck if you ever think about smuggling Starlink into China.

1 Like

Is it illegal though?

Thanks for the recommendation!! I gave it a whirl, the setup was easy on Linux and the speed was very good.. That Trojan(WS+TLS) protocol in wireshark looks just like a regular https connection. I’m not trying to access any restrictive countries just like a bit more privacy :smiley: This works well for me, thanks again!

I haven’t been, and never plan on going. This is purely hypothetical. You might not even need to smuggle anything into the country. I don’t know how Starlink works in detail, but you may be able to use locally sourced equipment. It is entirely plausible that some people are using it, but for obvious reasons they keep that information to themselves.

I think it’s overkill for now. china still relies a bit om western tech and more importantly they want to export their tech abroad. for that reason China becoming a North Korea - like intranet is not likely in the near future.

1 Like

A few years ago I read on Pine64 blog about FemtoStar, an independent satellite communication infrastructure in development that doesn’t require ground infrastructure to operate. I wonder if there’s been any progress.

Sorry I’m dumb, not technical at all, is QUIC/http3 any improvement to privacy or not? I see I can enable this option in my app, but I seen it uses udp, so I turned it off (I use Tor(tcp))?

I was wondering the same thing myself. Does QUIC obfuscation have any benefit in a Western country?

Obfuscations are for places where Wireguard is directly blocked. So no, not useful in the Western world. Perhaps soon in the UK seeing how things are going.

1 Like

Thanks @123 for including Nym in the comparison. While the Nym network wasn’t originally designed specifically for censorship resistance, it’s become a key development focus for both our mixnet and NymVPN.

Current status and roadmap: We published our censorship resistance roadmap in January 2025:

  • “Dragon” phase completed - NymVPN “Fast” mode now uses client-side AmneziaWG (instead of the standard WireGuard)

  • “Ox” and “Monkey” phases - API improvements and first pluggable transport are launching for beta-testing end of September, with public release expected by mid-October

  • Future phases will add more pluggable transport options based on user needs and geographic requirements

If you’re in a region with internet restrictions, we’d especially value your feedback and testing experience in the main NymVPN thread: https://discuss.privacyguides.net/t/nym-and-nymvpn-next-gen-privacy-with-mixnet-and-vpn-service/25072.

1 Like