
The forwarded (NATed) packets are seen in the lower layers of WFP (OSI layer 2) as Ethernet frames only. The Hyper-V Virtual Ethernet Adapter passes traffic to and from guests without letting the host’s firewall inspect the packets in the same way normal packets are inspected. WSL2 uses Hyper-V virtual networking and therein lies the problem. This means that if there is a VPN tunnel up and running, the Linux guest’s traffic will be sent via the VPN with no leaks! However, if there is no active VPN tunnel, as is the case when the app is disconnected, connecting, reconnecting, or blocking (after an error occurred) then the Linux guest’s traffic will leak out on the regular network, even if “Always require VPN” is enabled. Network traffic from the Linux guest always goes out the default route of the host machine without being inspected by the normal layers of WFP. As such, all the blocking the app does in the firewall is ignored. Our investigations concluded that traffic from the Linux guest bypasses all normal layers of WFP (the firewall on the Windows host) and goes directly out onto the network. Recently, we got a report that said there were leaks from Linux under WSL2. As you read this we are working on a solution to this problem. Our investigation has shown that these leaks also occur on other VPN software, and even though we do not have a solution to present for now, we feel the need to address the problem. The laws protected the founders of TPB for quite some time, but eventually the American threats were sufficient to bend them.We have found that you could be leaking your Internet traffic when running Linux under WSL2 (Windows Subsystem for Linux 2). But as I said above, it depends on who are and who you’re hiding from. Laws do not seem to apply, regardless of where you are, if the government looking for you is important enough.Īs for the question about your data, Swedish law would of course be applicable to it if it is hosted on Swedish soil.

If you’re looking for that kind of protection I’m not sure there’s a VPN worth using. As for whether or not you’re protected from Government intervention, forcing Mullvad to log your activity, as with what happened with Proton recently, I don’t know. Is this a fact? Does Sweden have greater privacy laws? If I were to choose a Mullvad server in Sweden would the Swedish laws cover my privacy too?įrom what or whom do you want protection? Mullvad do not store logs, and you can pay for it in cash (even from abroad I think, via post), so the information available for an attacker is limited to begin with.
