nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqn0mqwt3tnykvre4j5578g8qxykt5ucza8mf28a7yeswek3th402qu5nhm6 mind elaborating on why you're sunsetting OpenVPN use? I'm confused, but curious
Today we're launching Mullvad VPN loader - a new application for installing the Mullvad VPN desktop app on Windows and macOS which is both fast and secure.
Read more here: https://mullvad.net/blog/launching-mullvad-vpn-loader
Discussion
nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqvfsh0lc55aflrzwcpmpdc5zl9atjc2hfh6y8shqzlvxc5rad6tvqk3mgpy
We blogged about this here:
https://mullvad.net/blog/removing-openvpn-15th-january-2026
For further questions, please contact our Support Team.
support at mullvadvpnt dot net
That really sucks. Wireguard intentionally doesn't support working without UDP. Unlike OpenVPN, a Wireguard server can never work with TCP only and can never be placed on the other side of a Tor connection, meaning that you will no longer be able to hide your IP address from Mullvad VPN.
VPN after Tor is a good way to tunnel a UDP connection over Tor, as well as being an ethical way to bypass the blacklist of sites blocking Tor exit nodes.
I'm disappointed in you guys. Everybody has a different threat model, and I don't think it's right to funnel every user into the same setup. If you aren't going to be the source of these options for users anymore then do you have any advice for users who might have wanted to continue to be able to use VPN after Tor going into the future? Should they set up their own VPN that actually does what they need? Should they compromise on their information security? Something else?