Skip to content

Split Knowledge

Split knowledge means dividing sensitive information across multiple parties so that no single party has enough to reconstruct the complete picture. In the context of VPNs: no single provider sees both who you are AND what you do online.

This is the same principle behind Tor, multi-party computation, and many cryptographic protocols. You distribute trust across independent entities. Even if one is compromised or compelled to log, they only have a fragment.

When you route traffic through a single VPN provider, you shift observation from your ISP to your VPN. The provider now sees:

Your VPN Provider SeesYour ISP Used to See
Your real IP addressYour real IP address
Every destination you connect toEvery destination you connect to
All your DNS queriesAll your DNS queries
Data volumes and timingData volumes and timing

You traded one observer for another. The VPN provider knows both your identity (from your IP and payment method) and your activity (every site, every query, every connection).

This is not a critique of VPN providers. It is the architecture. Single-hop VPN shifts trust. It does not eliminate it.

Chain two or more VPN providers. Each provider sees only part of the picture.

Your Device -> Wirebump -> Provider A -> Provider B -> Internet
ProviderKnowsDoes Not Know
Provider A (entry)Your real IP addressYour destinations, DNS queries, traffic content
Provider B (exit)Your destinations, DNS queries, traffic contentYour real IP address

Neither provider has both pieces.

Provider A knows who you are but only sees encrypted traffic to Provider B. Provider B sees what you do but only sees Provider A’s IP, not yours.

Using the same provider at both hops defeats the purpose. Same provider = same trust boundary = same logs = same legal jurisdiction = no split.

ConfigurationSplit Knowledge?
Mullvad VPN -> Mullvad VPNNo. Same company, same potential logging.
Proton VPN -> Proton VPNNo. Same company, same potential logging.
Mullvad VPN -> Proton VPNYes. Different companies, different jurisdictions.
Proton VPN -> Mullvad VPNYes. Different companies, different jurisdictions.

Different providers means:

  • Different legal jurisdictions. Swiss law differs from Swedish law. A subpoena in one country does not automatically reach the other.
  • Different infrastructure. Separate data centers, separate systems, separate access controls.
  • Different incentives. Two independent companies would need to collude and correlate their data to reconstruct your activity.

For additional separation:

Your Device -> Wirebump -> Entry -> Middle -> Exit -> Internet
ProviderKnowsDoes Not Know
EntryYour real IPDestinations, middle’s destinations, content
MiddleEntry’s IP, Exit’s IPYour real IP, your destinations, content
ExitYour destinations, trafficYour real IP (only sees middle’s IP)

The middle provider sees neither your identity nor your final destinations. It only knows the previous and next hop in the chain.

This mirrors Tor’s guard/relay/exit architecture, applied to commercial VPN providers with better performance characteristics.

Wirebump supports multiple accounts per provider. You can have:

  • Multiple Mullvad VPN accounts (different payment methods, different account numbers)
  • Multiple Proton VPN accounts
  • Any combination of the above

This enables configurations where even “same provider” hops use genuinely separate accounts with no link between them. Pay for one account with cryptocurrency, another with a different payment method, and they are operationally independent.

See VPN Providers for account configuration details.

Go to Settings and add accounts for at least two providers (or two accounts from the same provider if you have genuinely separate accounts).

In the circuit builder, create a multi-layer circuit:

  • Layer 0 (entry): Provider A
  • Layer 1 (exit): Provider B

Your traffic routes through Provider A first, then exits through Provider B. The “nested” topology ensures each layer only sees what it needs to.

Deploy the circuit. All LAN traffic now routes through the split-knowledge path.

For detailed configuration steps:

What Split Knowledge Does Not Protect Against

Section titled “What Split Knowledge Does Not Protect Against”

Split knowledge improves your privacy posture. It does not provide complete anonymity.

Timing patterns can still reveal information. If you connect to Provider A at 3:14:23 PM and traffic exits Provider B at 3:14:24 PM, an adversary observing both points could correlate the timing.

Mitigation: Mullvad VPN offers DAITA (Defense Against AI-guided Traffic Analysis) which adds traffic padding to obscure patterns. This trades throughput for additional protection.

Your browser, operating system, and application behaviors can fingerprint you regardless of VPN configuration.

If both providers actively collaborate and share logs in real-time, they could reconstruct your activity. The defense is choosing providers in different jurisdictions with different ownership and no business relationship.

Volume of traffic, connection timing, session duration. These reveal patterns even when content is encrypted.

ScenarioSingle VPNSplit Knowledge
Hide browsing from ISPSufficientOverkill
General privacy improvementFineBetter, if you have concerns
Distrust any single providerRiskyAppropriate
Legal/regulatory requirementsCheck specificsMay be required
High-stakes research or journalismInsufficientStrongly consider
Adversary can compel one providerExposedProtected (partial info only)

For most casual use, a single reputable VPN provider is fine. Split knowledge is for when your threat model includes the possibility that a VPN provider could be compromised, compelled, or untrustworthy.

Key PointDetail
What is split knowledge?No single entity sees both your identity and your traffic
How do you achieve it?Chain different VPN providers
Same provider at both hops?Defeats the purpose
Different providers?Different jurisdictions, different trust boundaries
What remains exposed?Timing correlations, traffic patterns, endpoint fingerprints
When does it matter?High-stakes scenarios where single-provider trust is insufficient

Split knowledge does not eliminate trust. It distributes it. The right configuration depends on your threat model, your risk tolerance, and how much latency you are willing to accept.


Mullvad and Mullvad VPN are trademarks of Mullvad VPN AB. Proton VPN is a registered trademark of Proton AG.