nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqn0mqwt3tnykvre4j5578g8qxykt5ucza8mf28a7yeswek3th402qu5nhm6 mind elaborating on why you're sunsetting OpenVPN use? I'm confused, but curious

Reply to this note

Please Login to reply.

Discussion

nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqvfsh0lc55aflrzwcpmpdc5zl9atjc2hfh6y8shqzlvxc5rad6tvqk3mgpy

We blogged about this here:

https://mullvad.net/blog/removing-openvpn-15th-january-2026

For further questions, please contact our Support Team.

support at mullvadvpnt dot net

That really sucks. Wireguard intentionally doesn't support working without UDP. Unlike OpenVPN, a Wireguard server can never work with TCP only and can never be placed on the other side of a Tor connection, meaning that you will no longer be able to hide your IP address from Mullvad VPN.

VPN after Tor is a good way to tunnel a UDP connection over Tor, as well as being an ethical way to bypass the blacklist of sites blocking Tor exit nodes.

I'm disappointed in you guys. Everybody has a different threat model, and I don't think it's right to funnel every user into the same setup. If you aren't going to be the source of these options for users anymore then do you have any advice for users who might have wanted to continue to be able to use VPN after Tor going into the future? Should they set up their own VPN that actually does what they need? Should they compromise on their information security? Something else?