{"id":14027,"date":"2025-10-26T08:36:08","date_gmt":"2025-10-26T15:36:08","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=14027"},"modified":"2025-10-26T09:37:02","modified_gmt":"2025-10-26T16:37:02","slug":"mullvad-hides-vpn-traffic-inside-https-with-quic-obfuscation","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/10\/26\/mullvad-hides-vpn-traffic-inside-https-with-quic-obfuscation\/","title":{"rendered":"Mullvad Hides VPN Traffic Inside HTTPS With QUIC Obfuscation"},"content":{"rendered":"\n<p>A concise presentation on QUIC which was just added to <a href=\"https:\/\/mullvad.net\/en\" target=\"_blank\" rel=\"noreferrer noopener\">Mullvad VPN<\/a> and how it works to stop VPN detection and firewall blocking. Primarily this is a concern for people in countries like Russia, China&#8230; Though, even in &#8220;free&#8221; countries like the US, ISPs are using deep packet inspection to fingerprint what sites you&#8217;re using even if using a VPN and encryption, all because that data is valuable. And all these megacorps are acting as the arms of government, gobbling up data that then gets sold to governments evading constitutional safeguards. So if you care about privacy, I can&#8217;t recommend Mullvad VPN enough, and you can pay anonymously with Bitcoin, Lightning, and Monero. Also, for people in western nations, they have DAITA, Defense against AI Traffic Analysis, which adds noise and makes all packets the same size&#8230; Consequently, <a href=\"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/10\/26\/the-west-is-destroying-online-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Michigan is floating a law to make VPNs illegal<\/a>, so QUIC could become necessary in the US.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Mullvad Hides VPN Traffic Inside HTTPS With QUIC Obfuscation\" width=\"1290\" height=\"726\" src=\"https:\/\/www.youtube.com\/embed\/pZiG8r-diTM?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_c61faeaa-339d-46d9-9e9c-25a1d73ee9db\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p><a href=\"https:\/\/mullvad.net\/en\/blog\/quic-obfuscation-now-available-on-android-and-ios\">https:\/\/mullvad.net\/en\/blog\/quic-obfuscation-now-available-on-android-and-ios<\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">QUIC Obfuscation now available on Android and iOS<\/h1>\n\n\n\n<p>October 19, 2025 <a href=\"https:\/\/mullvad.net\/en\/blog\/tag\/features\">Features<\/a>&nbsp;<a href=\"https:\/\/mullvad.net\/en\/blog\/tag\/app\">App<\/a>&nbsp;<\/p>\n\n\n\n<p>We are pleased to announce that our latest obfuscation feature, QUIC, aimed at helping users bypass firewalls and censorship, is now available on Android and iOS.<\/p>\n\n\n\n<p>Our QUIC obfuscation tunnels WireGuard traffic, making it harder for firewalls to detect and block it. With this update, our app should become more usable in countries and networks where WireGuard traffic and <a href=\"https:\/\/mullvad.net\/help\/connecting-to-mullvad-vpn-from-restrictive-locations\" target=\"_blank\" rel=\"noreferrer noopener\">our other obfuscation methods<\/a> are restricted or blocked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Enable QUIC Obfuscation<\/h2>\n\n\n\n<p>To use the new QUIC obfuscation, make sure you have at least version <strong>2025.8 on Android<\/strong> or <strong>2025.8 on iOS<\/strong>.<\/p>\n\n\n\n<p>With the default settings, the app will automatically try QUIC after a few failed connection attempts. You can configure the app to always use QUIC obfuscation by following the instructions below.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Go to Settings \u2192 VPN Settings \u2192 Wireguard obfuscation \u2192 QUIC.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><img decoding=\"async\" src=\"https:\/\/mullvad.net\/media\/uploads\/2025\/quic-android.png\" alt=\"\" style=\"width:326px;height:auto\"\/><\/figure>\n\n\n\n<p>You can read more about QUIC and our QUIC obfuscation <a href=\"https:\/\/mullvad.net\/blog\/introducing-quic-obfuscation-for-wireguard\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p><strong>This feature is only required if you have trouble connecting, or are located in a restrictive location. There are no performance or privacy benefits of enabling this feature.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A concise presentation on QUIC which was just added to Mullvad VPN and how it works to stop VPN detection and firewall blocking. Primarily this is a concern for people in countries like Russia, China&#8230; Though, even in &#8220;free&#8221; countries like the US, ISPs are using deep packet inspection to fingerprint what sites you&#8217;re using [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,7],"tags":[],"class_list":["post-14027","post","type-post","status-publish","format-standard","hentry","category-tech","category-world"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/14027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=14027"}],"version-history":[{"count":3,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/14027\/revisions"}],"predecessor-version":[{"id":14032,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/14027\/revisions\/14032"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=14027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=14027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=14027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}