Navigating Mullvad VPN's Features and Best Practices for Security Newbies

Hey everyone,

I’ve recently developed a strong interest in web and cybersecurity, which has led me to start my journey with Mullvad VPN. As I delve into the second year of my IT for the web degree, I aim to not only strengthen my digital defenses but also to gain a deeper understanding of web security’s complexities. I’d greatly appreciate any advice from this knowledgeable community.

I’m seeking tips on optimizing Mullvad’s features. For now, I’ve simply connected to a random server, but I’m eager to discover best practices and delve into the more nuanced settings and features. What about the advanced settings like DNS blocking or choosing between tunnel protocols? Is WireGuard the way to go, or is OpenVPN better for certain scenarios, or just let it on automatic? I’m also trying to understand split tunneling and when it might be useful. My online activities are pretty standard – browsing, streaming, a bit of torrenting, online shopping, and checking my college portal and/or some personal information here and there.

Furthermore, I’ve configured Mullvad VPN on my phone. Are there any specific considerations for mobile security that differ from desktop usage?

Lastly, as web security knowledge is invaluable and I believe essential for my academic pursuits, I’m keen to broaden my understanding beyond Mullvad. Could you recommend fundamental resources for a beginner? I’m looking for comprehensive material to familiarize myself with Mullvad’s offerings and to generally enhance my web security expertise. Any books, websites, or learning tools you could suggest would be of great help.

Thank you in advance for your assistance, and I’m looking forward to absorbing all the insights you have to offer!

Use WireGuard. Start by looking at Mullvads docs.

First of all, it’s very important to (a) understand the pros and cons of using a VPN, and to (b) understand what a VPN can and can’t do. The main purpose of a VPN is to hide your real public IP address from the outside world by providing the user with a private IP address. The private IP address is only known to those who can see it - - not the entire world. That doesn’t mean a bad actor can’t exploit the private IP address. Thus, VPN security alone is very limited.

A firewall is what provides the best internet security against all types of exploitation threats - - with or without a VPN.

I highly recommend MullvadVPN. Although MullvadVPN doesn’t have as many servers compared to some other VPN providers it doesn’t concern me at all. They have more than enough servers for my requirements. What I found really useful with MullvadVPN was being able to access websites that were blocked when using a different VPN. I consider their Interface very good. I have configured MullvadVPN with the following options: DAITA, Multihop, Obfuscation, DNS content blockers and also WireGuard. I had very serious problems with expressvpn and some problems with NordVPN. I also highly recommend checking out MullvadVPN website. Thanks for allowing me to comment. I hope it provides you with some information you requested.

# Best Cybersecurity Practices for Individuals

In the digital age, cybersecurity is paramount for protecting personal information, financial data, and privacy. This summary outlines the best cybersecurity practices for individuals, focusing on the use of Virtual Private Networks (VPNs) with the WireGuard protocol, blocking advertisements using uBlock Origin, and utilizing the Vivaldi browser. These practices are supported by academic research and industry standards, aiming to enhance individual security in the online environment.

## Virtual Private Networks (VPNs) with WireGuard Protocol

VPNs are essential tools for securing internet connections, ensuring data privacy, and bypassing geo-restrictions. Among various protocols, WireGuard stands out due to its simplicity, high performance, and modern cryptographic techniques (Donenfeld, 2017). WireGuard operates on a state-of-the-art cryptographic principle, offering faster and more reliable connections compared to traditional protocols like OpenVPN and IPSec (Donenfeld, 2017). Its lean codebase (~4000 lines) not only facilitates easier security audits but also minimizes vulnerabilities (Corbet, 2018). Therefore, for individuals concerned with cybersecurity, utilizing a VPN with the WireGuard protocol is recommended for its efficiency and robust security features.

- **References:**

- Donenfeld, J. A. (2017). WireGuard: Next Generation Kernel Network Tunnel. *Proceedings of the 2017 Network and Distributed System Security Symposium*.

- Corbet, J. (2018). The WireGuard VPN tunnel. *LWN.net*.

## Blocking Advertisements Using uBlock Origin

Advertisements are not merely nuisances; they are potential vectors for malware and privacy breaches. uBlock Origin, an open-source browser extension, excels in blocking advertisements, trackers, and malicious sites. Studies have shown that ad blockers like uBlock Origin can significantly reduce the risk of “malvertising” attacks, where cybercriminals embed malicious code within advertisements (Snyder et al., 2017). Furthermore, by eliminating unnecessary content, uBlock Origin enhances browsing speed and improves user experience. Given its effectiveness and efficiency, uBlock Origin is a critical tool for individuals aiming to safeguard their online activities.

- **References:**

- Snyder, P., Doerfler, P., Kanich, C., & McCoy, D. (2017). Fifteen Minutes of Unwanted Fame: Detecting and Characterizing Doxing. *Proceedings of the 2017 Internet Measurement Conference*.

## Using Vivaldi Browser

The choice of web browser is crucial for cybersecurity. Vivaldi, a browser designed with privacy and customization in mind, offers several features that bolster individual security. Unlike mainstream browsers, Vivaldi does not track user activities, providing a more private browsing experience (Vivaldi Technologies, 2020). It integrates with various privacy tools, including uBlock Origin, and supports encrypted sync of user data. Vivaldi’s unique user interface and customization options also allow users to tailor their browsing experience to their security needs, making it a preferred choice for security-conscious individuals.

- **References:**

- Vivaldi Technologies. (2020). Vivaldi Browser Help Pages.

## Conclusion

For individuals, adopting robust cybersecurity practices is essential in the face of increasing online threats. Utilizing a VPN with the WireGuard protocol, blocking advertisements with uBlock Origin, and choosing a privacy-focused browser like Vivaldi are effective strategies. These tools and practices, backed by academic research and industry standards, provide a strong foundation for securing personal data and enhancing privacy online. As cyber threats evolve, so too must our defenses, making the continuous adoption of advanced cybersecurity measures a necessity for all internet users.

Well, I think it is important to clarify some points, though. Your ISP, and really anybody, can see that you are connected to a VPN from your home IP/router and which one it is. They can’t see what you are doing with that connection, but they do know you are connected. So, because of the fact that you are using a VPN, and that particular VPN IP is doing things, some inference can be drawn. This is why it is extremely important that your VPN keeps no logs on its users and their activities, because they can be subpoenaed for that information. Mullvad is the only VPN with a provable pedigree in that regard as they were raided by authorities and those authorities came up empty handed.

If legislation changes in the future, to require VPN’s to record logs, they will be all but useless except for some niche cases.

I would avoid using Vivaldi, their browser has some serious compatibility issues with many websites. If you want the browser with the best security? Believe it or not, it is Edge. You need to tweak a lot of settings to get it that way, but it is the most secure, private, compatible and efficient browser out there for those that know what they are doing. I don’t praise Microsoft often, almost never, but Edge… they’re doing it right. Even if you use Linux, I recommend Edge.

Well, I think it is important to clarify some points, though. Your ISP, and really anybody, can see that you are connected to a VPN from your home IP/router and which one it is. They can’t see what you are doing with that connection, but they do know you are connected. So, because of the fact that you are using a VPN, and that particular VPN IP is doing things, some inference can be drawn.

An ISP knows whether a customer is using a VPN. However, the ISP doesn’t know the private IP address assigned to the customer by the VPN. The ISP also doesn’t know what kind of traffic is flowing through the VPN because the traffic is encrypted. Nothing can be inferred from encrypted traffic. Thus, the fact that a VPN is being used is meaningless information.

You’re correct regarding the importance of a no logging policy. However, that in and of itself isn’t protection against any bad actors that may know the private IP address.

Never faced any issue with ANY website. This is my daily driver. Thanks for the heads up about Edge. I’ll check it out.

They know exactly what IP you are reaching out to and connecting to. So, they know for a fact you are connected to Mullvad and what country you are connecting to. They don’t know the public facing IP on the other side of the server that is assigned to you, but they know the one you used to connect to the server.

They can then reference what kind of activity is happening from that country’s servers, and then raid those servers so it is important they have a no logging policy. It isn’t useless information and has in fact been used to raid servers and nail suspected criminals in some countries.

This isn’t just about “bad actors”, this is about avoiding detection from legal entities as well. In all reality, if hackers or “bad actors” want to get you through your VPN, they absolutely will and there’s nothing you can do to stop them. VPN’s are to protect you from governments and advertisers, or entities that are hindered by legal systems.

They know exactly what IP you are reaching out to and connecting to. So, they know for a fact you are connected to Mullvad and what country you are connecting to. They don’t know the public facing IP on the other side of the server that is assigned to you, but they know the one you used to connect to the server.

I don’t necessarily disagree with you, but some things need to be clarified. An ISP knows whether a customer is using a VPN, but it doesn’t know the IP address that the VPN assigned to the customer. The VPN host knows the VPN user’s activity - - that’s why the no logging policy is crucial to maintain privacy. However, the user’s ISP doesn’t know the type of VPN activity because the traffic is encrypted. The only information that the user’s ISP has is the IP address of the VPN server, not the IP address that the VPN host has assigned to the user.

They can then reference what kind of activity is happening from that country’s servers, and then raid those servers so it is important they have a no logging policy. It isn’t useless information and has in fact been used to raid servers and nail suspected criminals in some countries.

A user’s ISP doesn’t know anything about the traffic flowing through VPN server because all of that traffic is encrypted. The ISP can see scrambled traffic to and from the VPN, but not traffic to and from the VPN to the outside world. Only those who know the user’s P address that was assigned by the VPN know anything about that type of traffic. The user’s ISP doesn’t know what type of traffic is flowing to and from the VPN host to the outside world. The fact that the ISP knows that a customer is using a VPN doesn’t tell the ISP anything about the user’s type of traffic through the VPN

This isn’t just about “bad actors”, this is about avoiding detection from legal entities as well. In all reality, if hackers or “bad actors” want to get you through your VPN, they absolutely will and there’s nothing you can do to stop them. VPN’s are to protect you from governments and advertisers, or entities that are hindered by legal systems.

You’re correct. I mentioned bad actors because a VPN in and of itself doesn’t offer any protection against such entities - - this has zero relevance to privacy. My point is that VPN privacy shouldn’t be equated with security. This isn’t necessarily obvious to anyone unfamiliar with VPN technology.