August 6th, 2024

Proton announces release of a new VPN protocol, "Stealth"

Proton has launched a new VPN protocol, Stealth, to bypass censorship and provide undetectable connections. It uses obfuscation techniques and is available on all Proton VPN plans, including free versions.

Read original articleLink Icon
DistrustSkepticismCuriosity
Proton announces release of a new VPN protocol, "Stealth"

Proton has introduced a new VPN protocol called Stealth, designed to bypass internet censorship and VPN blocks. Launched on August 6, 2024, Stealth aims to provide users with undetectable VPN connections, allowing access to restricted sites and social media even in regions with heavy censorship. Proton VPN was initially created in 2017 to offer a reliable and trustworthy VPN service, especially for users in authoritarian regimes. Over the years, Proton has developed various technologies to enhance privacy and circumvent censorship, including Secure Core VPN and alternative routing. Traditional VPN protocols are increasingly vulnerable to detection due to advancements in deep packet inspection technology. In contrast, Stealth is built from the ground up to avoid these issues, utilizing obfuscation techniques to disguise VPN traffic as regular HTTPS connections. It is available on all Proton VPN plans, including the free version, and can be activated on Android, Windows, macOS, and iOS devices. The development of Stealth was supported by community members living under restrictive regimes, and Proton emphasizes its commitment to providing internet privacy for all users. The protocol is designed to be adaptable to future challenges in the ongoing fight for online freedom.

- Proton VPN has launched a new protocol called Stealth to bypass censorship.

- Stealth provides undetectable VPN connections, enhancing user privacy.

- The protocol is available on all Proton VPN plans, including free versions.

- Stealth uses obfuscation to disguise VPN traffic as normal HTTPS connections.

- The development of Stealth was supported by community feedback from users in restrictive environments.

AI: What people are saying
The launch of Proton's new VPN protocol, Stealth, has generated a mix of skepticism and curiosity among users.
  • Many commenters express distrust towards Proton, citing concerns about data privacy and the company's history of data sharing.
  • There are questions about the technical details of the Stealth protocol, including its transparency and effectiveness against censorship.
  • Users are interested in comparisons with existing VPN protocols and whether Stealth can reliably bypass filters, especially in restrictive regions like China.
  • Some commenters suggest that the protocol may not significantly differ from established methods, raising doubts about its innovation.
  • Overall, there is a call for more detailed information and documentation regarding the protocol's implementation and performance.
Link Icon 26 comments
By @kelsey98765431 - 6 months
Don't trust companies that save and hand over data. Don't trust proprietary security solutions. If this is literally just TLS based vpn wrapping, it's no different from using an onion bridge to get to your VPN endpoint. Proton gives data to federal agencies. Proton keeps user data. Proton removed their warrant canary. Use something better.

EDIT: If you want a truly safe VPN, you will need to do some work on both adversary modeling and technical implementation. If you are just worried about your ISP (filesharing of legally protected digital backups), use whatever. If you are worried that your data may be collected by your VPN provider, use a series of tor/vpn multihop. If you are a paranoid mf, use a privacy coin to purchase a VPS and then connect to it via tor on a public wifi network, set up a .onion hidden service for your ssh/chisel/etc port, connect over tor to forward your tunnel port to localhost, use that tunnel to connect to a multihop VPN system. Suggestions include mullvad, PIA, cryptostorm, whatever you want really. Throw a VPS with generic openvpn in the middle of your multi-provider hops, again paid in a privacy coin. Pay a homeless man to colocate a physical server that has DRAC and luks along with something like AMD TSME, then run containerized multihop there aswell.

Basically if you want something done right, at least do some of it yourself.

By @WhatsName - 6 months
> Without going into too much detail, Stealth also establishes VPN connections in a specific and unique way that avoids alerting internet filters.

I began mistrusting Proton some time ago with their hit piece on RAM-only VPN server confirming my bias.

Let's assume any adversary interested in reversing that new protocol, what's the point of not being transparent on how this new and fancy obfuscation works.

The TOR project has a lot of innovation in censorship circumvention[1] while still being transparent to their userbase.

[1] https://snowflake.torproject.org/

By @tuetuopay - 6 months
It will be interesting how robust this new protocol is against traffic pattern analysis. A regular HTTPS connection has different patterns over time than a VPN, mainly because it carries only HTTPS and not all of the machine’s traffic; and only for a specific "website" (simplification here) instead of bundling the whole web to a "single server". The latter may be easier to evade, but the former will be hard.

Anyways kudos to them, and I can’t wait to see how it fares against China’s GFW.

By @pzmarzly - 6 months
Is there a good comparison of "undetectable" VPN protocols? Wireguard[0], Shadowsocks[1], VLess[2], VMess[3], Trojan[4], etc. All of them seemed to work for me during my recent trip to China.

[0] The article says Wireguard is easy to block, but in my experience GFW lets it through.

[1] https://shadowsocks.org

[2] https://xtls.github.io/en/development/protocols/vless.html

[3] https://xtls.github.io/en/development/protocols/vmess.html

[4] https://trojan-gfw.github.io/trojan/protocol

By @olalonde - 6 months
It seems their Android app is open source... Maybe the protocol could be reverse engineered?

https://github.com/ProtonVPN/android-app

PS: Tried their free plan in China and it won't connect ("Connection Timeout"). In fact, I had to use another VPN to get past their app's loading screen (guessing it got stuck while doing a request to their server)...

By @SahAssar - 6 months
Is this just a brand name for tunneling traffic over TLS on port 443 (which has been a thing for decades) or am I missing something here?
By @tptacek - 6 months
"Stealth" isn't a property of core VPN tunneling protocols --- establishing a secure channel is. Stealth is something you'd build on a transport underneath a VPN protocol. Completely replacing WireGuard or IPSEC just to beat DPI seems pretty silly.
By @apitman - 6 months
This is too light on details to determine if there's anything interesting here. Similar to others, these are my main concerns:

* Is this an open protocol?

* I would like to see a detailed comparison to similar solutions

* Looks like it's TCP so head-of-line blocking may cause performance issues.

* What prevents entities from detecting that all your traffic is going to a single endpoint, or just blocking known VPN servers directly?

By @daft_pink - 6 months
Will it work in China? You guys go back and forth about whether you trust VPN companies, but for me I’m just looking for something that works with 100% reliability in China.
By @nasaeclipse - 6 months
Does it work in China?

I would think it would've been best to keep this update "silent", so to speak, to avoid letting said parties know of this new protocol.

By @causal - 6 months
Awesome.

Question though: don't most VPN filters simply block a list of all known VPN endpoints? Maybe I missed something but I don't see how Proton's Stealth evades this simple filter?

By @_rs - 6 months
Is there documentation for the protocol anywhere, or is this going to be a proprietary protocol to Proton that doesn’t gain much adoption outside of their users? If their claims are true this could be a great alternative for certain use cases
By @sinkasapa - 6 months
I use protonvpn because I pay for protonmail. It is frustrating because I feel like I need to pay another VPN provider to get decent service. The client is ridiculously unstable and doesn't have the features found on other platforms. If you're not already using their mail services, use linux, and don't like being snubbed despite being a paying customer, look for another provider. Note that the stealth mode is not available for linux, just another way to tell their linux customers that they don't matter.
By @dtx1 - 6 months
Providers like petfect privacy have offered stuff like this for over a decade and they, like others, don't advertise their blatant misunderstandings[0] of the threat models people in censored countries face. I don't see why this is being shilled here so much, it's as close to an obvious honeypot as you'll ever see.

https://news.ycombinator.com/item?id=41079157

By @thayne - 6 months
> Stealth does this by using obfuscated TLS tunneling over TCP. This is different from most popular VPN protocols that typically use UDP

The reason most VPN protocols use UDP is for performance. With TCP, a single blocked packet can delay multiple streams. And fwiw, openvpn supports using TLS over TCP, but it is less performant than udp.

I would be more interested in a protocol that uses quic and looks like http/3

By @xezzed - 6 months
Friend of mine just tried this in Russia. DOESN'T WORK
By @saurik - 6 months
This was "published" now, but this same URL was discussed two years ago here about the same thing?

https://news.ycombinator.com/item?id=33170028

By @xeromal - 6 months
I'm interested to try this out for a game I'm banned from. My little brother did a thing little brothers tend to do (lol) and I got caught in the crossfire. This is my baseline test for all VPN services.
By @gr4vityWall - 6 months
This sounds more like a press release for a company than a technical overview of the protocol. Is there a reference implementation available?
By @commandersaki - 6 months
How does it address TCP over TCP reliability layer collision?

Reference: https://web.archive.org/web/20230310043036/http:/sites.inka....

By @brewdad - 6 months
I mainly use Proton to get around geo-blocks. FWIW, I tried this new protocol out on BBC iPlayer and it failed horribly. I tried the Wireguard UDP I normally use and streamed without any problem. It's a single data point but if the goal is to avoid sites knowing you are on a VPN, it isn't fit for purpose.
By @hypeatei - 6 months
> in the constantly evolving battle for online freedom, our work is not finished.

I'm assuming this boils down to a cat and mouse game, then? E.g. popular firewalls patch this and Proton releases an update to bypass filters?

Also, couldn't access this site directly because of corporate firewall, how ironic.

By @okneil - 6 months
I wonder what differentiates this from something like Stunnel?
By @KomoD - 6 months
Do we really need yet another VPN protocol?