I use Surfshark, and the protocol options I have are: Open VPN TCP Open VPN UDP WireGuard
Which should I be using?
Also I have QbitTorrent (Win11), and was curious if the version mattered at all
I use Surfshark, and the protocol options I have are: Open VPN TCP Open VPN UDP WireGuard
Which should I be using?
Also I have QbitTorrent (Win11), and was curious if the version mattered at all
I use WireGuard personally. OpenVPN has been around a long time, and is very configurable. That can be a benefit if you need some specific configuration, but it can also mean more opportunities to configure your connection in a less-secure way (e.g. selecting on older, less strong encryption algorithm). WireGuard is much newer and supports fewer options. For example it only does one encryption algorithm, but it’s one of the latest and most secure. WireGuard also tends to have faster transfer speeds, I believe because many of OpenVPN’s design choices were made long ago. Those design choices made sense for the processors available at the time, but simply aren’t as performant on modern multi core CPUs. WireGuard’s more recent design does a better job of taking advantage of modern processors so it tends to win speed benchmarks by a significant margin. That’s the primary reason I went with WireGuard.
In terms of vulnerabilities, it’s tough to say which is better. OpenVPN has the longer track record of course, but its code base is an order of magnitude larger than WireGuard’s. More eyes have been looking at OpenVPN’s code for more time, but there’s more than 10x more OpenVPN code to look at. My personal feeling is that a leaner codebase is generally better for security, simply because there’s fewer lines of code in which vulnerabilities can lurk.
If you do opt for OpenVPN, I believe UDP is generally better for performance. TCP support is mainly there for scenarios where UDP is blocked, or on dodgy connections where TCP’s more proactive handling of dropped packets can reduce the time before a lost packet gets retransmitted.
It’s great that you brought up TCP vs UDP. And you are totally right about TCP being a bit slower, higher overhead, but it’s there for situations where UDP is blocked.
I’ve used my VPN at all sorts of hotels, coffeeshops, etc. I’d say 1 in 10 places block UDP (or more likely don’t properly route UDP). If you’re using a SIM card, you won’t have any issues.
However, it’s worth mentioning that WireGuard is UDP only. There are some hacks/workarounds to have it work over TCP, but then you’re going to need to find WireGuard clients that also supports these hacks (which is possible on computers, but harder on cellphones/tablets).
If you want something that “just works” under all conditions, then you’re looking at OpenVPN. Bonus, if you want to marginally improve the chance that everything just works, even in the most restrictive places (like hotel wifi), have your VPN used port 443 for TCP and 53 for UDP. These are the most heavily used ports for web and DNS. Meaning you VPN traffic will just “blend in” with normal internet noise (disclaimer: yes, deep packet inspection exists, but rustic hotel wifi’s aren’t going to be using it ;)
Thank you, I changed my options in QB over to that, and set it as my default connection type in Surfshark as well