#mullvad

2025-06-20

Und weiter geht der Daten-Exodus aus den USA.

Ich nutze es nicht, aber wer auf den #Google #Playstore nicht verzichten kann, der kann #Aurora versuchen.

Es bietet den Playstore via Dummy-Account. In Verbindung mit einem (#Mullvad) #VPN schon okeh.

Quelle (#fdroid):
f-droid.org/packages/com.auror

#Europe #NoPalantir #NoTrump

Victor von Voidvvv@mastodontech.de
2025-06-19

Es kristallisiert sich immer weiter heraus, das mein nächstes Handy wohl ein Google Pixel $version $zusatzbezeichnung mit #GrapheneOS wird, bei welchem dann #RethinkDNS und ein VPN (#Mullvad ?) den Datenverkehr lenken.

Vermutlich brauche ich ein Jahr, um es zu meiner Zufriedenheit zu konfigurieren 😆

#seufz

Snafu 🐦:linux: 🇺🇦snafu@digitalcourage.social
2025-06-16

First time I have a private #WiFi where I cannot use #Mullvad #VPN. Enabling it makes the speed drop to the point of the WiFi being unusable. Disabling Mullvad keeps the speed extremely low until I reconnect to the WiFi, then everything is normal again. Tried all kinds of settings in Mullvad without luck.

2025-06-15

Discovered Mullvad VPN

Very nice

mullvad.net/en

#Mullvad #VPN

#RethinkDNS bereitet mir unter #GrapheneOS seit einigen Tagen Probleme mit #Wireguard. Bisher hatte ich erfolgreich den Modus für Fortgeschrittene mit mehreren Profilen über #Mullvad angewandt. Doch seit kurzem habe ich ständig Verbindungsabbrüche zum Internet. Im einfachen Modus laufen alle Apps über einen Server von Mullvad - bis jetzt problemlos. Wo liegt hierbei das Problem?

2025-06-12

Mein Daten-Umzug nach Europa.
Die Nutzung von Werkzeugen, die keine Telemetrie haben und vorzugsweise aus Europa stammen.

Jetzt braucht es ein #VPN. NordVPN und Co hat jeder, aber wirklich europäische Anbieter gibts wenige.

Ich nutze #Mullvad. Vom Bezahlmodell bis zum Client simpel. Und nein, nicht jeder Streamingdienst geht "durch".

#Europe #NoPalantir #NoTrump

2025-06-08
Over the past few weeks I have been switching off of NixOS and going back to the previous OSes and distros I was using. Last week I migrated my VPS back to OpenBSD and I now feel like I can appreciate its simplicity even more. That's not the point of this though.

When migrating I was reminded of something @nemo@camp.crates.im previously said about only allowing ssh access to the IP addresses he know he uses. I thought I should try doing something similar especially because to me pf is way saner to use and manage than iptables.

The addresses I know I'll use are my home IPv4 address and the IPv4+6 addresses of the Mullvad enpoints I am likely to use.
Unfortunately I don't know what those public addresses are before connecting.

A quick script containing something like below (I didn't save it >_<) later, I was able to get all the addresses I needed for passing to pf.
for i in *.conf; do
wg-quick up $i
curl -s4 https://zx2c4.com/ip | sed 1q
# the connect timeout is there because a few of the endpoints had a not-working IPv6 address
curl --connect-timeout -s6 https://zx2c4.com/ip | sed 1q
wg-quick down $i
done
```

Now in my pf.conf I just had to do something like this which didn't seem that complicated after all. I just modelled it after my existing rule that I used for opening ports (I removed ssh from that rule in favour of this one). This can most definitely be made better, but at least it works!

explicitly allow home and vpn ip addresses

ssh_whitelist_ipv4 = "{

ipv4 addresses here

I put my home address at the top as is and then /24 ranges for the mullvad IPs because I was told they may change frequently

}"
ssh_whitelist_ipv6 = "{

ipv6 addresses here from mullvad

I figured that they won't change often so I simply pasted them as is without specifying prefix

}"

...

allow public ssh only to my normal home address and mullvad ips

pass in log on $ext_if inet proto tcp from $ssh_whitelist_ipv4 to ($ext_if) \
port ssh flags S/SA keep state
pass in log on $ext_if inet6 proto tcp from $ssh_whitelist_ipv6 to ($ext_if) \
port ssh flags S/SA keep state

After running for over a day, my /var/log/authlog still only shows my own connections and not some people across the globe spamming connections to invalid users.

saklas$ zgrep preauth /var/log/authlog.0.gz | grep -v vin | wc -l
3918
saklas$ grep preauth /var/log/authlog | grep -v vin | wc -l
1

I was previously using pf-badhost in place of fail2ban due to the latter not being available on OpenBSD, but pf-badhost didn't prevent active attacks while both of them still allowed those (initial) connections in the first place.
There's a much smaller likelihood of an attacker using the same Mullvad endpoints I use, and if they do I probably have bigger problems to worry about. I'm also pretty much always connected to my Wireguard VPN (separate post on my website for this later) and that would let me bypass this anyways. This setup is more of a failsafe if I'm unable to connect through the VPN, and a failsafe of that failsafe if things really go wrong is just using the Hetzner web console I guess.

After writing all this, I think it's better to just post this on my website and syndicate here.

#openbsd #mullvad #pf
2025-06-05

Erroneous warning about desktop app not being supported

lemm.ee/post/66019325

Snafu 🐦:linux: 🇺🇦snafu@digitalcourage.social
2025-06-03

Asking myself why #Mullvad for #Linux is telling me that I am using an "unsupported version" which I shall update. Is there a more official/newer version than 2025.6 from their official repo? 🤔

#VPN

2025-06-03

@sindastra @mullvadnet
On this web page there is an “Update” that says the new installer has been withdrawn because of problems. Kind of annoying that I had to go searching for an answer to figure out what was going on.

mullvad.net/en/blog/launching-

#mullvad #MullvadVPN

2025-06-01

Ça y est ! #FranceTravail n'aime plus l'IP de mon VPN (#mullvad).
Je me demandais quand est-ce que ça allait arriver.

2025-05-31

@prefec2 Nicht Mulwap sondern #Mullvad 😀
leta.mullvad.net/
Und aus meiner Sammlung:
qwant.com
startpage.com
metager.de/
search.brave.com/
swisscows.com/de

Bei einigen könnte aber durchaus letztendlich Google dahinter stecken. Zumindest lungert bei den Ergebnissen keine KI rum.

2025-05-30

#tailscale mit #mullvad zusammen läuft auch einwandfrei. Einfach den Mullvad-Adblock/Trackblock-DNS im tailscale als global DNS eintragen, fertig.

2025-05-29

WTH ​:ddHuh:​ #Mullvad

TechnoTenshi :verified_trans: :Fire_Lesbian:technotenshi@infosec.exchange
2025-05-28

Mullvad Leta is a search engine using third party search API's as a proxy, caching results to boost privacy and reduce costs. No ads, no tracking, no account required. Can be set as default in supported browsers.

leta.mullvad.net/

#Privacy #SearchEngine #Mullvad #CyberSecurity

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst