Even if you have encrypted your traffic with a VPN, advanced traffic analysis is a growing threat against your privacy. Therefore, we have developed DAITA – a feature available in our VPN app. Through constant packet sizes, random background traffic and data pattern distortion, we are taking the bat...
The Maybenot Framework (FOSS) is how Mulvad pulls this off, and if you run your own VPN you can use this too! Mulvad is a contributor (and funder), so good on them.
Edit: for those interested, Mulvad's client is a fork of Wireguard with Maybenot incorporated as a submodule. Cool stuff: https://github.com/mullvad/wireguard-go
Hey they did support it until they were getting difficult legal contacts because some users were abusing it, and getting turned away by different hosting providers.
They shut it down to protect the rest of us who use it without abusing it.
Unfortunately port forwarding also allows avenues for abuse, which in some cases can result in a far worse experience for the majority of our users. Regrettably individuals have frequently used this feature to host undesirable content and malicious services from ports that are forwarded from our VPN servers. This has led to law enforcement contacting us, our IPs getting blacklisted, and hosting providers cancelling us.
The result is that it affects the majority of our users negatively, because they cannot use our service without having services being blocked.
I know the port forwarding thing can be a deal-breaker for some people, but it's not Mullvad's fault that they needed to remove this to be able to continue providing quality services for the rest of their customer base.
This is sadly one of those "this is why we can't have nice things" type deals because when enough people abuse it, it becomes a problem. I have no ill will towards Mullvad for taking it away when it became financially and legally foolish to continue doing so.
It will all end with us back on dialup speeds once the counter-DAITA throughput machine learning de-obfuscation analysis of defense against AI guided traffic analysis of proxy anomised packets starts. I think I might just read a book.
Imagine a future where you and your VPN connection maintain 10mbps of constant, uniform traffic at all times. That solves the problem too, if the noise is aways high, you can't see the signal