Defeat censorship with Stealth, our new VPN protocol

We’ve developed a new VPN protocol, Stealth, that can avoid detection and let you bypass internet censorship and VPN blocks.

We’re pleased to announce Stealth, a new, undetectable VPN protocol that can bypass most firewalls and VPN blocking methods. You’ll be able to bypass advanced VPN blocks, access censored sites, and communicate with people on social media, even if your government is trying to restrict access.

Why is Stealth needed?

In 2017, we launched Proton VPN because there was no trustworthy, reliable, and freely available VPN service. Our motivation was simple. Because our services, such as Proton Mail, play a crucial role in ensuring freedom and privacy worldwide, we knew authoritarian governments would eventually try to block them.

But with Proton VPN, people can bypass those blocks and continue using Proton Mail. Over the past few years, Proton VPN has become an essential tool, helping ensure the free flow of information for tens of millions of people during crises and wars around the world.

Since we launched Proton VPN, we’ve continuously worked on technology to bypass surveillance and censorship. For example, in 2017, we launched Secure Core VPN, which provides greater privacy than typical VPN services.

In 2020, we launched alternative routing(new window), which bypasses VPN blocks by re-routing our connections over other hard-to-trace paths. Finally, in 2021, we released VPN Accelerator, a unique technology that provides connection speeds that are up to 400% faster, which is critically important for users in far-flung regions with slower internet.

As we have stepped up our efforts to build a more censorship-resistant VPN, authoritarian governments have also stepped up their efforts to block VPNs. Traditional VPN protocols (such as OpenVPN, IKEv2, and WireGuard) are relatively easy to recognize on a network. And as deep packet inspection (DPI) technology becomes more widespread, it will be easier and easier for authoritarian governments to detect and block VPNs using these protocols.

For years there have been various projects to try to obfuscate existing VPN protocols, but many of them are hacks on top of existing protocols that unfortunately no longer work very well.

We designed our Stealth protocol from the ground up to not have these issues. With Stealth enabled, your Proton VPN connection will be almost completely undetectable.

Stealth is available on all Proton VPN plans, including our Free plan, because everyone deserves online freedom. For now, you can use Stealth on our Android, macOS, and iOS apps.

How do I use Stealth?

To activate Stealth, open the Proton VPN app on your device.

  • On Android,  tap  →  Settings → Advanced → Protocol and choose Stealth.
  • On iOS and iPadOS, tap Settings → Security options → Protocol and choose Stealth.
  • On macOS, ProtonVPN in the macOS taskbar → PreferencesConnectionProtocol and select Stealth from the dropdown menu.

Stealth is not yet available on our Windows or Linux apps.

Learn more about changing VPN protocols

How does the Stealth VPN protocol work?

Stealth uses obfuscation to hide your VPN connection from censors. The general idea is to make VPN traffic look like “normal” traffic — or common HTTPS connections. Stealth does this by using obfuscated TLS tunneling over TCP. This is different from most popular VPN protocols that typically use UDP, making them easier to detect and block. Without going into too much detail, Stealth also establishes VPN connections in a specific and unique way that avoids alerting internet filters.

Despite these obfuscation features, the Stealth VPN protocol is also optimized for high performance and is compatible with our VPN Accelerator technology. Coupled with our lightweight internals, Stealth can achieve higher performance than older obfuscated VPN protocols that are generally built on top of OpenVPN over TCP.

The fight continues

We want to thank the members of the Proton community who helped us test the Stealth VPN protocol over the last couple of months. They live under restrictive censorship regimes, and Stealth would have been impossible to develop without their assistance. Thank you.

However, in the constantly evolving battle for online freedom, our work is not finished. Accordingly, we designed Stealth to be an extensible and adaptable VPN protocol that is flexible enough to meet new challenges.

The cause of freedom has no borders, and we must stand together for it to succeed. Tools like Proton VPN play a vital role in keeping the internet free. Our investment in technologies like Stealth is part of our commitment to provide internet privacy to everyone, regardless of their ability to pay.

Proton VPN will always be free, but if you would like to support our mission to keep the internet free and open to all, you can subscribe to a paid plan which offers even faster speeds and premium features.

P.S. We want to say thanks to the hundreds of Proton VPN community members who suggested names for our new protocol. Your top choice was Neutrino, which we liked a lot because of the connection to physics. And neutrinos can pass through all matter, making it even more appropriate. 

Unfortunately, we felt this name might cause confusion with a Web3 project, so we picked Stealth instead. This was another popular community suggestion, and its meaning is more obvious to those less familiar with physics.

Protege tu privacidad y tu seguridad en línea
Obtén Proton VPN gratis

Artículos relacionados

Proton VPN now operates one of the largest VPN server networks in the world.
At Proton VPN, we’ve reached a new milestone in our mission to make online privacy the default for everyone. Now offering over 5300 servers on six continents, Proton VPN is one of the largest and most popular VPN services in the world. And we’re grow
What is DNS security?
In this article, we’ll look at DNS security, what it means for your businesses, and how using Proton VPN provides your business with the DNS security it needs.  The Domain Name System (DNS) translates human-friendly domain names to numeric IP addres
Paris Olympics
The 2024 Summer Olympics in Paris begins this July. While you’ve likely already missed your chance to get a ticket and witness the best athletes from around the world in person, there are plenty of ways to enjoy the games from the comfort of your hom
Where to watch euros
Every four years, the entire continent of Europe turns its eyes to see who will be crowned as the continent’s champion of football (or soccer for the Americans).  This is the 17th edition of the UEFA European Football Championship, in which 24 natio
How to enable location services
  • Cuestiones básicas de privacidad
Location services refer to a combination of technologies used in devices like smartphones and computers that use data from your device’s GPS, WiFi, mobile (cellular networks), and sometimes even Bluetooth connections to determine and track your geogr
What is AirTag stalking?
In an era of “smart devices” that often double as spy devices, AirTags are tracking tools that are open about their function and can be vital in helping locate lost items (as anyone who has lost their car keys can attest to). However, as a recent cla