Recent from talks
Nothing was collected or created yet.
Mullvad
View on Wikipedia
Desktop client | |
| Developer | Mullvad VPN AB[1] |
|---|---|
| Type | Virtual private network |
| Launch date | March 2009 |
| Platform(s) | Android, iOS, Linux, macOS, Windows (official app) |
| Website |
|
| Mullvad | |
|---|---|
| Stable release(s) | |
| Repository | |
| Website | mullvad |
Mullvad is a commercial VPN service based in Sweden. The name "Mullvad" is the word for "mole" in the Swedish language. Mullvad operates using the WireGuard and OpenVPN protocols. It also supports Shadowsocks as a bridge protocol for censorship circumvention. Mullvad's VPN client software is publicly available under the GPLv3, a free and open-source software license.[5][6][7]
History
[edit]Mullvad was launched in March 2009 by Amagicom AB in Göteborg,[8][9] and it had begun by supporting connections via the OpenVPN protocol in 2009.[10] Mullvad was an early adopter and supporter of the WireGuard protocol, announcing the availability of the new VPN protocol in March 2017[11] and making a "generous donation" supporting WireGuard development between July and December 2017.[12]
In September 2018, the cybersecurity firm Cure53 performed a penetration test on Mullvad's macOS, Windows, and Linux applications.[13] Seven issues were found which were addressed by Mullvad.[14] Cure53 tested only the applications and supporting functions. No assessment was made on the Mullvad server-side and back end.[13]
In October 2019, Mullvad partnered with Mozilla to utilize Mullvad's WireGuard servers for Mozilla VPN.[15]
In April 2020, Mullvad partnered with Malwarebytes and provided WireGuard servers for their VPN service, Malwarebytes Privacy.[16]
In May 2022, Mullvad started officially accepting Monero.[17]
On 18 April 2023, Mullvad's head office in Gothenburg was visited by officers from the National Operations Department of the Swedish Police Authority who had a search warrant to seize computers being used by Mullvad containing customer data. Mullvad demonstrated that in accordance with their policies, no such data existed on their systems. After consulting with the prosecutor, the officers left without seizing any equipment or obtaining customer information. Mullvad had released a public statement in relation to this information in a blog post on their website two days later, also mentioning that it was their first time that their offices had been searched by authorities.[18] In a letter sent to Mullvad nine days after the search, the Swedish Police Authority stated that they had conducted the search at the request of Germany for an ongoing investigation. The investigation involved a blackmail attack that targeted several institutions in the state of Mecklenburg-Western Pomerania which revealed IP addresses that were traced back to Mullvad's VPN service.[19]
On 29 May 2023, Mullvad announced that they would be removing support for port forwarding, effective on 1 July 2023. This was done due to the use of port forwarding for illegal activities, with this causing interference by law enforcement, Mullvad IP addresses getting blacklisted, and hosting providers canceling their services.[20]
Service
[edit]A TechRadar review noted in 2019 that "Mullvad's core service is powerful, up-to-date, and absolutely stuffed with high-end technologies".[5] Complementing its use of the open-source OpenVPN and WireGuard protocols, Mullvad includes "industrial strength" encryption (employing AES-256 GCM methodology), 4096-bit RSA certificates with SHA-512 for server authentication, perfect forward secrecy, multiple layers of DNS leak protection, IPv6 leak-protection, and multiple "stealth options" to help bypass government or corporate VPN blocking.[5]
Mullvad provides VPN client applications for computers running the Windows, macOS and Linux operating systems. As of April 2020[update], native iOS and Android Mullvad VPN clients using the WireGuard protocol are available. iOS and Android mobile operating system users can also configure and use built-in VPN clients or the OpenVPN or WireGuard apps to access Mullvad's service.[21]
Privacy
[edit]Providing personal information used to identify users such as email addresses and phone numbers is not required during Mullvad's registration process. Instead, a unique 16-digit account number is anonymously generated for each newly registered user, and this account number is used to log in to the Mullvad on other devices.[22]
For anonymity purposes, Mullvad accepts the anonymous payment methods of cash and Monero. Payment for the service can also be made via bank wire-transfer, credit card, Bitcoin, Bitcoin Cash, PayPal, Swish, EPS Transfer, Bancontact, iDEAL, Przelewy24, and vouchers sold by multiple resellers.[5][23][24] Payments made via cryptocurrency have a 10% discount.[25] In June 2022, the service announced that it will no longer offer new recurring subscriptions, as this further reduces the amount of personal information that will have to be stored.[26]
Mullvad does not log VPN users' IP addresses, the VPN IP address used, browsing-activity, bandwidth, connections, session duration, timestamps, and DNS-requests.[5][22]
Mullvad has many privacy-focused features built into their VPN. Instances include multi-hop, which routes all traffic through an additional Mullvad server before it arrives at its destination,[27] the ability to add a quantum-resistant key exchange to the encryption process, making all data encrypted resistant to quantum computer related attacks,[28] and Defense against AI-guided Traffic Analysis (DAITA), which ensures all packets are the same size and also inserts random network traffic (significantly increasing bandwidth usage), though this is only enabled on select servers.[29]
Mullvad has been actively campaigning against the EU's Regulation to Prevent and Combat Child Sexual Abuse (a.k.a. Chat Control), which would require service providers to scan all users' online communications, even encrypted services, arguing that it would make all methods of online communication viewable and thus not private and not anonymous.[30][31]
Reception
[edit]While Mullvad has been noted for "taking a strong approach to privacy and maintaining good connection speeds", the VPN client setup and interface has been noted as being more onerous and technical than most other VPN providers especially on some client platforms.[32] However, a follow-up review by the same source in October 2018 notes, "Mullvad has a much improved, modern Windows client (and one for Mac, too)". A PC World review, also from October 2018, concludes, "With its commitment to privacy, anonymity (as close as you can realistically get online), and performance Mullvad remains our top recommendation for a VPN service".[21]
In November 2018, TechRadar noted Mullvad VPN as one of five VPN providers to answer a set of questions for trustworthiness verification posed by the Center for Democracy and Technology.[33][34] In March 2019, a TechRadar review noted slightly substandard speeds.[23] However, a TechRadar review later that year, published on 11 June 2019, stated that Mullvad VPN "speeds are excellent".[5] This is also supported by a 2024 CNET review that demonstrated 13.5% speed loss in March 2024 tests.[35] While the latter review notes a shortcoming for mobile users in that Mullvad had not provided mobile VPN client apps,[5] Mullvad apps for both Android and iOS are now available.
The non-profit Freedom of the Press Foundation, in their "Choosing a VPN" guide, lists Mullvad amongst the five VPNs that meet their recommended settings and features for VPN use as a tool for anonymizing online activity.[36]
Other products
[edit]| Mullvad Browser | |
|---|---|
| Developers | Mullvad VPN and Tor Project |
| Stable release | 15.0.1[37] |
| Repository | github |
| Engine | Gecko |
| Operating system | |
| License | Mozilla Public License[38] |
| Website | mullvad |
Browser
[edit]On 3 April 2023, Mullvad Browser was released, developed by the Tor Project team and distributed by Mullvad.[39] It has similar privacy and security settings levels to Tor Browser, with an exception being that it operates independently of the Tor network and is meant to be used with a VPN service instead, either Mullvad VPN or another trusted provider.[40] Mullvad Browser has been programmed to minimize the risk of users being tracked and fingerprinted.[41][42] It attempts to achieve this through several measures:
- Private mode is enabled by default. This means that cookies are never saved between sessions.
- It utilizes Firefox's "resist fingerprinting" feature.
- First-party isolation is in place, in which cookies are placed in separate cookie jars so that trackers cannot connect to each other to build a profile of its user.
- No collection of telemetry data.[43]
Search engine
[edit]On 20 June 2023, Mullvad announced the Mullvad Leta search engine. Mullvad Leta uses the Google Search and Brave Search APIs as a proxy and caches each search for 30 days. When a user inputs a web query, the service checks if it has a cache of the search before making a call to the Google Search or Brave Search API.[44] The service was initially only accessible to devices that had Mullvad VPN turned on,[45] before being opened to the general public on 4 March 2025. Mullvad VPN announced on November 6, 2025, that Mullvad Leta would be shut down on November 27, 2025[46].
Public DNS
[edit]Mullvad also offers public DNS servers that offer DNS over HTTPS, DNS over TLS, and various content-blocking filters.[47]
See also
[edit]References
[edit]- ^ "Doing the corporate shuffle (Updated)". Mullvad VPN. 3 February 2020. Retrieved 5 February 2020.
- ^ "About". Mullvad VPN.
- ^ mullvad. "Release android/2025.7 · mullvad/mullvadvpn-app". Retrieved 8 September 2025.
- ^ a b c mullvad. "Release 2025.13 · mullvad/mullvadvpn-app". Retrieved 11 November 2025.
- ^ a b c d e f g Williams, Mike (11 June 2019). "Mullvad VPN review". TechRadar.com. Archived from the original on 13 June 2019. Retrieved 7 December 2019.
- ^ Newman, Lily Hay (3 April 2023). "Tor Project's New Privacy-Focused Browser Lets You Layer a VPN". Wired. Retrieved 23 December 2023.
- ^ "mullvadvpn-app/LICENSE.md at main · mullvad/mullvadvpn-app". Mullvad – via GitHub.
- ^ [1]
- ^ "What is privacy?". Mullvad VPN. Archived from the original on 6 December 2019. Retrieved 7 December 2019.
- ^ "Services". Archived from the original on 25 September 2009.
- ^ "Test WireGuard with Mullvad". Mullvad. 27 June 2019. Retrieved 27 June 2019.
- ^ "Donations". WireGuard.com. Silver company donors. Archived from the original on 24 June 2019. Retrieved 24 June 2019.
- ^ a b "Pentest-Report Mullvad VPN Clients 09.2018" (PDF). Retrieved 29 April 2025.
- ^ "Read results of security audit on Mullvad app - Blog". Mullvad VPN. 24 September 2018.
- ^ Salter, Jim (22 July 2020). "We test Mozilla's new Wireguard-based $5/mo VPN service". Ars Technica. Archived from the original on 23 July 2020.
- ^ Labs, Malwarebytes (23 April 2020). "Introducing Malwarebytes Privacy". Malwarebytes Labs. Retrieved 29 September 2020.
- ^ "We now accept Monero - Blog". Mullvad VPN. 3 May 2022. Retrieved 5 May 2022.
- ^ "Mullvad VPN was subject to a search warrant. Customer data not compromised". Mullvad VPN. 20 April 2023. Archived from the original on 17 June 2023.
- ^ "Update: The Swedish authorities answered our protocol request". Mullvad VPN. 2 May 2023. Archived from the original on 26 June 2023. Retrieved 29 June 2023.
- ^ "Removing the support for forwarded ports". Mullvad VPN. 29 May 2023. Archived from the original on 23 June 2023. Retrieved 29 June 2023.
- ^ a b Singleton, Sam (26 February 2025). "Mullvad VPN review: The ultimate privacy-first VPN". PCWorld.
- ^ a b "Mullvad review: A VPN that's all about privacy". Macworld.com. 28 August 2019. Archived from the original on 14 September 2019. Retrieved 14 December 2019.
- ^ a b Athow, Desire (19 March 2019). "The best Linux VPN 2019". TechRadar.com. Archived from the original on 27 June 2019. Retrieved 27 June 2019.
- ^ "Mullvad Partners". Mullvad. Retrieved 26 October 2024.
- ^ "Mullvad Pricing". Mullvad. Retrieved 26 October 2024.
- ^ Castro, Chiara (22 June 2022). "Mullvad VPN axes recurring subscriptions in the name of privacy". TechRadar. Archived from the original on 3 July 2022.
- ^ "Mullvad WireGuard Multihop". Mullvad. Retrieved 17 November 2024.
- ^ "Post-Quantum Resistance Mullvad". Mullvad. Retrieved 17 November 2024.
- ^ "DAITA Mullvad". Mullvad. Retrieved 17 November 2024.
- ^ Nasi, Michele (7 March 2023). "Scansione delle chat degli utenti: l'Europa potrebbe spiare i contenuti personali". IlSoftware.it (in Italian). Retrieved 10 March 2023.
- ^ Claburn, Thomas. "German Digital Committee heaps scorn on Chat Control". The Register. Retrieved 20 April 2023.
- ^ Paul, Ian (19 June 2017). "Mullvad review: The VPN that doesn't want to get to know you". PC World. Archived from the original on 22 December 2017.
- ^ Li, Harold. "Use this checklist to find a VPN you can trust". TechRadar.com. Archived from the original on 3 November 2018. Retrieved 27 June 2019.
- ^ "Unedited Answers: Signals of Trustworthy VPNs". Center for Democracy and Technology. 7 March 2019. Archived from the original on 18 April 2019. Retrieved 27 June 2019.
- ^ Tomaschek, Attila (29 May 2024). "Mullvad VPN Review 2024: A Budget-Friendly VPN That Pairs Excellent Speeds With Cutting-Edge Privacy". CNET.
- ^ Huerta, David (15 February 2022). "An in-depth guide to choosing a VPN". Freedom of the Press Foundation. Retrieved 11 April 2023.
- ^ mullvad. "Release 15.0.1 · mullvad/mullvad-browser". Retrieved 17 November 2025.
- ^ "Mullvad browser - Privacy-focused browser for Linux, macOS and Windows". GitHub.
- ^ "We've Teamed Up With Mullvad VPN to Launch the Mullvad Browser". The Tor Project. 3 April 2023. Retrieved 6 April 2023.
- ^ Castro, Chiara (6 April 2023). "Mullvad browser: the privacy of Tor, with the perks of a VPN". TechRadar. Retrieved 7 March 2025.
- ^ Rudra, Sourav (4 April 2023). "Mullvad VPN and Tor Project Unite to Create a New Browser That Puts Privacy First". It's FOSS. Retrieved 6 April 2023.
- ^ Clark, Mitchell (3 April 2023). "The Mullvad browser protects privacy using standard VPNs". The Verge. Retrieved 6 April 2023.
- ^ Castro, Chiara (6 April 2023). "Mullvad browser: the privacy of Tor, with the perks of a VPN". TechRadar. Retrieved 4 October 2024.
- ^ "Mullvad Leta FAQ". Mullvad Leta. Archived from the original on 26 June 2023. Retrieved 29 June 2023.
- ^ "Introducing Mullvad Leta: a search engine used in the Mullvad Browser". Mullvad VPN. 20 June 2023. Archived from the original on 29 June 2023. Retrieved 29 June 2023.
- ^ "Shutting down our search proxy Leta". Mullvad VPN. 6 November 2025. Retrieved 16 November 2025.
- ^ "DNS over HTTPS and DNS over TLS". Mullvad VPN. 6 December 2024. Retrieved 14 December 2024.
External links
[edit]Mullvad
View on GrokipediaMullvad is a virtual private network (VPN) service provider headquartered in Gothenburg, Sweden, founded in March 2009 by Fredrik Strömberg and Daniel Berntsson as a response to increasing concerns over digital surveillance and censorship.[1][2]
Operated by Mullvad VPN AB, a subsidiary of Amagicom AB wholly owned by its founders, the service prioritizes user anonymity by requiring no personal information, email addresses, or traditional account identifiers—instead using randomly generated account numbers—and accepts payments exclusively in fixed amounts via cash, cryptocurrency, or bank wire without linking to identities.[1][3]
Mullvad enforces a strict no-logging policy for user activity and metadata, has undergone independent audits to substantiate these claims, and employs protocols like WireGuard and OpenVPN alongside innovations such as multihop routing, encrypted DNS over the VPN tunnel, and quantum-resistant encryption to counter advanced threats.[4][3]
The company maintains open-source client applications, collaborates with organizations like the Tor Project on tools such as the Mullvad Browser, and commits to long-term independence without external investment or sale, driven by an idealistic vision of rendering mass surveillance impractical.[3][2][5]
History
Founding and Early Years
Mullvad VPN was launched in March 2009 by Amagicom AB, a Swedish company founded by Fredrik Strömberg and Daniel Berntsson in Gothenburg.[1] The service's development originated in the summer of 2008, driven by the founders' idealistic commitment to privacy as a cornerstone of civilized society and their aim to render censorship and mass surveillance impractical through technological means.[2][1] Amagicom AB's name draws from the ancient Sumerian term "ama-gi," which translates to "freedom" and underscores the emphasis on secure, unrestricted communication.[1] From inception, Mullvad prioritized user anonymity and minimal data retention, operating without requiring personal information for account creation or usage.[1] The initial service relied on the OpenVPN protocol for secure connections, establishing a foundation for encrypted tunneling that aligned with its privacy-focused ethos.[6] Early operations grew organically without external investment, reflecting the founders' vision of sustainable, principle-driven entrepreneurship rather than profit maximization.[2] Key innovations in the nascent phase included the introduction of Bitcoin payments in July 2010, enabling pseudonymous transactions, followed by cash payment options in September 2010 to further accommodate anonymous users.[1] These features distinguished Mullvad from contemporaries by minimizing traceable financial interactions, reinforcing its commitment to user sovereignty amid rising concerns over digital surveillance in the late 2000s.[6] By addressing early security vulnerabilities, such as those related to OpenVPN in 2014, the service demonstrated proactive resilience during its formative years.[1]Expansion and Technological Advancements
In 2016, Mullvad expanded its server infrastructure by 150%, increasing from 23 to 59 servers and adding locations in 13 new countries including Austria, Belgium, Bulgaria, Czech Republic, Denmark, Italy, Lithuania, Norway, Romania, Singapore, Spain, Switzerland, and the United Kingdom.[7] The company also hired two full-time employees and released updated client software with signed releases for enhanced security verification, alongside introducing SOCKS5 proxy support on all servers and upgrading server hardware to bolster protection against vulnerabilities.[7] By 2017, server capacity grew further by 175% to 162 locations across 27 countries, while the team expanded with four additional employees and three consultants.[8] That year, Mullvad became an early adopter of the WireGuard protocol, announcing its availability in March and contributing significantly to its development to prioritize speed and simplicity over legacy options like OpenVPN.[9] In December, the company introduced a post-quantum secure VPN tunnel, employing hybrid encryption schemes resistant to potential quantum computing threats, marking an proactive step in cryptographic advancement.[10] Subsequent years saw continued infrastructure scaling, with Mullvad operating over 700 servers in 49 countries by 2025, emphasizing owned and rented hardware for reliability.[11] In 2019, the company launched its System Transparency initiative, aiming to verify server software integrity through open-source firmware ports and partnerships, such as with Mozilla for shared server resources.[1] This evolved in January 2022 with the deployment of RAM-only WireGuard servers to eliminate persistent storage risks, expanding to over 20 servers by late 2024 with plans for broader rollout in 2025.[1][12] Technological progress accelerated in 2024 with the introduction of DAITA (Defense Against AI-guided Traffic Analysis), a feature using fixed packet sizes, randomized background traffic, and data distortion to counter machine learning-based metadata analysis that could deanonymize encrypted VPN flows even without content decryption.[13] DAITA rolled out progressively across platforms, reaching Linux and macOS in September 2024, Android in October 2024, and iOS shortly thereafter, with a version 2 update in 2025 enhancing performance against AI fingerprinting.[14][15] In September 2025, Mullvad implemented QUIC obfuscation for WireGuard on desktop apps (version 2025.9), tunneling UDP traffic via HTTP/3 to masquerade it as innocuous web activity, aiding circumvention in censored environments like China and Russia; mobile support followed in October.[16] These developments reflect Mullvad's focus on verifiable, forward-looking privacy enhancements amid growing surveillance capabilities.[1]Legal and Regulatory Challenges
In April 2023, Swedish police executed a search warrant at Mullvad VPN's offices in an attempt to seize servers and computers containing customer connection data linked to a criminal investigation.[17] The company successfully challenged the scope of the warrant, arguing under Swedish law that authorities lacked reasonable grounds to expect relevant data on the premises, as Mullvad maintains a verified no-logs policy with no stored user activity or metadata.[17] No customer information was found or compromised, demonstrating the practical enforcement of Mullvad's privacy commitments despite law enforcement demands.[18] Mullvad operates under Swedish jurisdiction, which imposes no mandatory data retention requirements on VPN providers, unlike the repealed Law on Electronic Communications (LEK) that previously applied to telecommunications but exempts encrypted VPN traffic.[19] The company complies with the General Data Protection Regulation (GDPR) for minimal operational data, such as payment processing, but explicitly states it cannot be compelled to log user activity or metadata for surveillance purposes.[20] In response to formal requests, Mullvad refers authorities to its no-logs policy and, if necessary, would consider service shutdown over forced spying.[20] Broader regulatory pressures in the European Union pose ongoing challenges, with an EU expert group in March 2025 identifying VPN services as obstacles to law enforcement investigations, potentially leading to targeted legislation.[21] Mullvad has opposed proposals for encryption backdoors or expanded surveillance, such as under the Swedish Covert Surveillance of Data Act (effective 2020–2025), which allows limited metadata access for national security but does not mandate provider-side logging.[22] These tensions highlight VPN providers' vulnerability to evolving EU-wide rules prioritizing investigative access over privacy, though Sweden's framework remains relatively permissive compared to jurisdictions like the UK or Australia with stricter retention mandates.[19]Company and Operations
Ownership Structure and Location
Mullvad VPN is operated by Mullvad VPN AB, a wholly-owned subsidiary of Amagicom AB, which was founded on April 23, 2009, in Sweden by Fredrik Strömberg and Daniel Berntsson.[1] Amagicom AB, meaning "free communication" in a constructed term, serves as the parent entity and maintains full control over the VPN service without external investors, venture capital, or plans for acquisition, as affirmed by the founders in 2021.[2] This structure ensures operational independence, with the founders actively involved in decision-making to prioritize privacy-focused development over profit maximization.[1] Amagicom AB is privately held, with 100% ownership divided equally between Strömberg and Berntsson, who each own 50% of the shares and remain the sole shareholders as of the latest public statements.[2] [1] The company is headquartered in Gothenburg, Sweden, at Box 53049, with the postal code 400 14, operating under Swedish corporate law as an aktiebolag (AB), a private limited company structure that limits public disclosure of detailed financials beyond annual reports filed with Swedish authorities.[1] This location subjects Mullvad to Sweden's Electronic Communications Act, which influences data retention obligations but aligns with the company's no-logs policy commitments, though it places it within the Fourteen Eyes intelligence-sharing alliance.[23]Business Model and Pricing
Mullvad operates a subscription-based business model, deriving all revenue exclusively from customer payments for VPN access without reliance on advertising, data sales, or affiliate partnerships.[24] The company, structured as a private entity under Amagicom AB in Sweden, prioritizes long-term sustainability over profit maximization or acquisition, having committed since its 2008 inception to idealistic goals of enhancing user privacy rather than pursuing sale or expansion into data-driven revenue streams.[2] This approach avoids common industry practices like tiered plans or upselling, focusing instead on uniform service delivery to maintain operational transparency and user trust.[25] Pricing remains fixed at €5 per month (approximately $5.40–$5.80 USD, depending on exchange rates) across all subscription durations, including one month, one year, or even one decade, with no discounts for longer commitments to promote flexibility and discourage lock-in effects.[26] This structure, unchanged since 2009, positions Mullvad as one of the more affordable VPN options on a per-month basis, though it eschews promotional trials or bundles to align with its privacy ethos.[25] Value-added tax (VAT) is included in the quoted price for applicable regions.[26] To support anonymity, Mullvad accepts a range of payment methods, including cash sent by mail, cryptocurrencies such as Monero and Bitcoin, and bank transfers, which minimize traceable personal data compared to credit cards or PayPal.[27] [28] Accounts use randomly generated numbers rather than emails or identifiers, enabling sign-up without personal verification, though non-anonymous payments may retain minimal transaction records for billing compliance under regulations like GDPR.[4] This payment flexibility reinforces the model's emphasis on user control over privacy, even at the cost of higher administrative overhead.[29]VPN Service Features
Protocols and Encryption
Mullvad VPN supports two tunneling protocols: WireGuard as the primary and default option across its client applications, and OpenVPN as a legacy alternative scheduled for complete removal on January 15, 2026.[30] WireGuard employs state-of-the-art cryptography, including ChaCha20 symmetric encryption authenticated with Poly1305 (per RFC 7539 AEAD), Curve25519 for elliptic curve Diffie-Hellman key exchange, BLAKE2s hashing (RFC 7693), HKDF key derivation (RFC 5869), and a Noise_IK handshake over UDP for secure session establishment.[31] This design results in a compact codebase of under 7,000 lines, minimizing the attack surface compared to alternatives like OpenVPN or IPsec, while enabling high performance without requiring activity logging.[31] For OpenVPN, Mullvad enforces strict configurations limited to TLS 1.3 on the control channel with ciphers TLS_CHACHA20_POLY1305_SHA256 and TLS_AES_256_GCM_SHA384 (minimum TLS 1.2), and data channel options of ChaCha20-Poly1305 or AES-256-GCM.[3] Server authentication relies on 4096-bit RSA certificates signed with SHA512, with perfect forward secrecy via 4096-bit Diffie-Hellman parameters and ephemeral Diffie-Hellman (DHE) key exchange; keys re-exchange every 60 minutes.[3] These measures prioritize security by excluding weaker legacy ciphers and ensuring forward secrecy, though OpenVPN's larger codebase and complexity make it less efficient than WireGuard.[31] In Mullvad's implementation, WireGuard keys rotate every two weeks to mitigate static IP correlation risks, with public keys cleared from server RAM after 600 seconds of inactivity; the protocol supports up to five simultaneous devices per account via unique keys.[31] Both protocols route all traffic through Mullvad's servers, but WireGuard's simplicity and speed position it as the recommended choice for most users, with no observed increase in leak vulnerabilities when properly configured.[31]Server Network and Infrastructure
Mullvad maintains a global network comprising 710 VPN servers distributed across 49 countries and 89 cities, utilizing infrastructure from 15 distinct hosting providers.[32] This setup ensures broad geographic coverage without reliance on virtual servers or fabricated locations, as all servers are physically situated in the listed jurisdictions.[33] The company sources servers either through direct ownership, over which it exercises physical control, or via dedicated rentals that preclude shared hosting arrangements.[33] To enhance security and preclude persistent data storage, Mullvad's entire VPN infrastructure operates on RAM-only servers, eliminating disks entirely; this migration was fully completed on September 20, 2023.[34] Servers run a custom-hardened Linux kernel based on Ubuntu LTS, with isolated remote management via bastion hosts to prevent direct access by providers.[33] High-speed fiber wavelength connections link key data centers in Amsterdam to hubs in Frankfurt, London, Paris, Malmö, and Zurich, optimizing inter-server traffic routing.[33] The infrastructure undergoes periodic independent audits, with the fourth review by Cure53 completed in June 2024 confirming implemented security measures, and a subsequent audit scheduled for 2025.[35] This diskless design aligns with Mullvad's no-logs policy by ensuring no residual data survives server reboots or power cycles, thereby minimizing forensic risks in the event of seizures or compelled access.[33]Client Applications and Usability
Mullvad offers native VPN client applications for Windows 10 and later, macOS, various Linux distributions including Ubuntu and Debian, Android 8.0 and above, and iOS.[36][37][38] The applications are open-source and available via official downloads or GitHub releases, enabling users to verify the software independently.[39] Account setup requires no personal information; users generate a 16-digit account number for anonymous access, with payments accepted via cash, crypto, or other methods to maintain privacy.[40] The desktop clients for Windows, macOS, and Linux feature a minimalistic interface prioritizing simplicity, where users can connect to the VPN with one click after login, automatically selecting optimal WireGuard servers for speed and reliability.[40] Usability enhancements include an always-on kill switch that blocks all internet traffic upon connection failure or app closure, preventing data leaks; split tunneling to route specific apps or domains outside the VPN; and options for custom local DNS servers.[40][41] Advanced configurations, such as WireGuard key rotation and traffic obfuscation, are accessible via settings without requiring command-line intervention, though Linux users can also utilize CLI tools for scripting. Additional settings include Device IP version, which controls the IP protocol (IPv4, IPv6, or automatic) for the initial connection to relay servers, distinct from In-tunnel IPv6, which governs routing of IPv6 traffic through the tunnel and is normally not needed on Windows unless accessing IPv6-only destinations.[40] Reviews note the consistent, user-friendly design across desktop platforms, with intuitive server selection and real-time connection status indicators.[42][43] Mobile applications for Android and iOS mirror desktop functionality, supporting WireGuard for efficient performance on limited resources, with automatic connection on untrusted networks via app settings.[38][40] Key features include split tunneling, kill switch, and recent additions like QUIC-based obfuscation rolled out in version 2025.8 on October 20, 2025, to disguise WireGuard traffic and evade censorship in restrictive environments.[44] Android-specific updates, such as multihop routing introduced in version 2025.1 on March 29, 2025, allow chaining servers for enhanced anonymity, configurable within the app.[45] iOS improvements have addressed earlier interface limitations, providing smoother navigation and blocking features, though platform restrictions limit some desktop-level customizations, including the lack of options to enable, disable, or configure IPv6 tunneling due to iOS VPN framework constraints.[40][43] App verification tools ensure authenticity before installation, bolstering trust in mobile deployments.[46] Complementing the VPN clients, Mullvad provides the Mullvad Browser, a modified Firefox ESR version developed with the Tor Project, focusing on anti-fingerprinting and reduced tracking rather than VPN integration.[47] It enforces uniform window sizes, isolates cookies per domain, and disables telemetry for usability in privacy-sensitive scenarios, downloadable for Windows 10+, macOS, and Linux.[48] A separate Firefox extension adds VPN-specific tools like IP/DNS leak detection, proxy chaining, and a browser-level kill switch, enhancing control without full browser replacement.[49][50] These tools promote layered privacy but require manual configuration for optimal usability alongside the core VPN app.[47]
Privacy and Security Measures
Anonymity and Account Management
Mullvad enables account creation without requiring any personal identifying information, such as a username, email address, or password. Users generate a unique random account number—currently 16 alphanumeric characters long for improved security—upon initial subscription purchase, which serves as the sole identifier for accessing the service. This approach eliminates traditional registration hurdles that could link users to real-world identities, aligning with the company's policy of minimizing data collection to preserve user anonymity.[4][51] Account management relies on this number for login and subscription handling via the Mullvad app or website, with no associated personal profiles or recovery options available. If an account number is lost, users cannot retrieve it, as no backup identifiers or support tickets are maintained; instead, a new account must be created, transferring any unused credit manually if possible. This design prioritizes privacy over convenience, preventing the storage of recoverable user data that could be subpoenaed or compromised. Subscriptions are prepaid in fixed increments, such as €5 per month, funded through the account dashboard without ongoing billing tied to external financial records.[4][52][53] To support anonymous funding, Mullvad accepts payments via privacy-focused methods including cash sent by mail, cryptocurrencies like Monero and Bitcoin, and prepaid cards, alongside conventional options like credit cards that are processed without retaining linking metadata. Cash payments, for instance, allow complete detachment from digital trails, as vouchers are mailed without requiring sender details beyond the account number. The company processes these without logging activity metadata or associating payments with IP addresses beyond immediate verification, ensuring that even payment records do not compromise user anonymity unless legally compelled.[4][27][28] This framework extends to operational anonymity, where the VPN app connects using the account number without transmitting personal data to servers, and no session logs are kept to correlate usage patterns. Independent audits have verified the absence of persistent identifiers, reinforcing claims of non-attributable access, though users must still manage their own operational security, such as avoiding reuse of account numbers across devices or networks. Limitations include the inability to automate renewals anonymously without recurring traceable payments, potentially requiring manual intervention.[29][4]No-Logs Policy and Independent Audits
Mullvad operates under a strict no-logs policy, committing to store no user activity data, including connection timestamps, original IP addresses, session bandwidth, or traffic destinations. The company retains only ephemeral data necessary for active VPN sessions, such as temporary WireGuard keys generated upon connection and deleted immediately after disconnection, ensuring no persistent identifiers link sessions to accounts. Accounts are identified solely by randomly generated numbers without requiring personal information like email addresses, and payment methods support anonymity through options like cash or Monero. This minimal retention approach is designed to prevent any reconstruction of user activity even under legal compulsion.[4][54] The policy's implementation has been scrutinized through multiple independent security audits of Mullvad's VPN infrastructure and server code, which explicitly examined for unauthorized logging or data leakage. A 2022 audit of VPN servers by a Gothenburg-based security firm confirmed no information leakage or customer data logging mechanisms. Subsequent infrastructure audits by Cure53 in 2020 and 2024 similarly found no personally identifiable information (PII) retention or privacy leaks, with the 2024 review of WireGuard and OpenVPN relay code identifying only two low- to medium-severity issues unrelated to logging, while affirming a strong overall security posture. A 2023 audit by Radically Open Security reviewed server access and deployment pipelines, recommending auditable login tracking but uncovering no evidence of customer data persistence. These audits, focusing on source code and operational systems, corroborate the absence of logging capabilities.[55][56][35][57] Real-world validation occurred during a Swedish police raid on April 18, 2023, when the National Operations Department executed a search warrant at Mullvad's offices seeking customer data related to an investigation. Officers seized servers and computers but departed without obtaining any user information, as no logs or identifying data existed to seize. Mullvad's subsequent request for disclosure protocols from authorities confirmed zero customer data was accessed or retained, demonstrating the policy's effectiveness against compelled disclosure. Client-side audits, such as Cure53's 2020 review and X41 D-Sec's 2024 assessment, further support secure non-logging by identifying only minor, non-persistent vulnerabilities in the applications. A 2025 web app audit by Assured AB detected no critical or high-severity flaws, reinforcing endpoint integrity.[17][18][58][59][60]Response to Government Inquiries and Raids
On April 18, 2023, at least six officers from Sweden's National Operations Department (NOA) visited Mullvad's office in Gothenburg with a search warrant authorizing the seizure of computers containing customer data linked to an IP address identified in an ongoing criminal investigation.[17] The warrant stemmed from police efforts to trace activity associated with the VPN service, but Mullvad staff informed the officers that no user logs or personal data were retained, as per the company's strict no-logs policy.[17] Consequently, the police departed without confiscating any equipment or obtaining identifiable information, confirming that Mullvad held no relevant records.[17][61] Mullvad publicly disclosed the incident on April 20, 2023, via its official blog, emphasizing that the event validated its privacy commitments and that customer anonymity remained intact.[17] The company had previously operated for over 14 years without any reported law enforcement visits, a claim substantiated by this first encounter yielding no data.[62] In a follow-up on May 2, 2023, Mullvad shared the authorities' response to its request for the search protocol, which clarified that the probe involved an IP address routing through Mullvad but provided no specifics on the underlying offense, maintaining the investigation's confidentiality.[62] This raid highlighted Mullvad's operational design to resist data disclosure: account numbers are randomly generated without ties to personal identifiers, payments can be anonymous (e.g., via cash or cryptocurrency), and servers retain no activity logs.[17] Independent analyses post-incident, including from cybersecurity outlets, affirmed the event as empirical proof of Mullvad's no-logs adherence, distinguishing it from providers compelled to retain data under legal mandates in other jurisdictions.[18] No further government actions or inquiries against Mullvad have been publicly documented as of October 2025.[62]Performance Evaluations
Speed and Latency Testing
Independent evaluations of Mullvad VPN's performance, primarily using the WireGuard protocol for its efficiency, reveal competitive download speeds with moderate latency increases attributable to encryption overhead and geographical distance. Tests conducted via tools such as Ookla Speedtest on high-speed baseline connections (often 400+ Mbps unprotected) show average speed losses ranging from 8% to 39%, depending on server proximity and load.[42][63][64] In CNET's March and August 2025 assessments across macOS and Windows, Mullvad averaged a 24% speed reduction overall, with stable results including 7% loss to nearby European servers from Ohio. Download speeds reached 350 Mbps to New York servers on macOS and 280 Mbps on Windows, dropping to 250-290 Mbps (macOS) and 190-220 Mbps (Windows) for Australian connections; upload speeds followed similar patterns but were less emphasized in reporting. WireGuard proved consistently faster than OpenVPN in most scenarios, though OpenVPN occasionally edged it on Windows.[42] VPNMentor's 2025 tests highlighted variability, with 27% average loss on nearby servers and 39% on distant ones using WireGuard exclusively; some connections even exceeded baseline speeds, while outliers dropped up to 45% due to potential overcrowding. Latency remained under 85 ms on local servers, adequate for real-time applications like gaming, but elevated on remote ones, aligning with typical VPN-induced delays of 50-150 ms reported elsewhere for European servers.[63][11]| Source | Test Year | Average Speed Loss | Latency Notes |
|---|---|---|---|
| CNET | 2025 | 24% overall | Minimal (e.g., 7% loss nearby); stable across OS |
| VPNMentor | 2025 | 27% nearby, 39% distant | <85 ms local; higher distant |
| AllAboutCookies | 2025 | 8% overall | Not specified |
