Skip to content

Nested VPNs

When you route all traffic through a single VPN provider, you shift trust from your ISP to your VPN provider. That provider now sees:

  • Your real IP address (they know who you are)
  • Every destination you connect to (they know what you do)
  • All your DNS queries
  • Data volumes and timing patterns

You traded one observer for another. If your VPN provider were to log, get subpoenaed, or get compromised, they have everything your ISP used to have. Plus they know your actual identity through your payment method or account.

This is not a criticism of VPN providers. It is the reality of the architecture. Single-hop VPN shifts trust. It does not eliminate it.

Nested VPNs route your traffic through multiple providers in sequence. Each provider only sees part of the picture. No single provider has both your identity AND your activity.

This is the same principle Tor uses: split knowledge across multiple nodes so no single operator can correlate who you are with what you do.

The simplest nested configuration uses two providers:

Wirebump -> VPN #1 -> VPN #2 -> Internet
ProviderWhat they see
VPN #1Your real IP address, but only a connection to VPN #2. No destinations, no DNS queries, no content.
VPN #2All your traffic and DNS queries, but only VPN #1’s IP address. Not yours.

No single provider has both your identity and your browsing activity.

VPN #1 knows who you are but not what you do. VPN #2 knows what you do but not who you are.

For additional separation, add a middle node:

Wirebump -> VPN #1 (entry) -> VPN #2 (middle) -> VPN #3 (exit) -> Internet
ProviderWhat they see
VPN #1 (entry)Your real IP connecting to VPN #2. Nothing else.
VPN #2 (middle)VPN #1 connecting to VPN #3. No endpoints, no identity.
VPN #3 (exit)VPN #2’s IP and all your actual traffic.

The middle node sees neither your identity nor your destinations. It only knows the previous and next hops in the chain.

Nested VPNs and Tor share the same core idea: split knowledge across multiple operators.

AspectTorWirebump Nested VPNs
Circuit structureEntry, relay, exitEntry, middle (optional), exit
Circuit rotationAutomatic (every 10 min)Manual (you choose when)
Traffic paddingYes (constant bandwidth)No
LatencyHigher (more hops, padding)Lower (direct VPN connections)
ThroughputLimited by relay capacityLine-speed with parallel connections
Provider selectionTor network assignsYou choose each layer

Key differences:

  • Rotation: Tor rotates circuits automatically. Wirebump does not. You rebuild or switch circuits when you want to.
  • Padding: Tor adds traffic padding to obscure timing patterns. Wirebump does not (though Mullvad VPN DAITA adds similar protection at the cost of throughput).
  • Control: You pick which providers sit at each layer and in which countries. With Tor, the network assigns nodes.

Wirebump gives you a platform for experimenting with circuit topologies. How you use it determines the privacy/performance tradeoffs.

In the circuit builder, add layers to your circuit. Each layer can use a different provider (Proton VPN or Mullvad VPN) and a different geographic location.

Layer configuration showing multi-hop setup

The screenshot shows a 3-layer circuit with the exit layer selected. You choose the provider and country for each layer independently.

Each hop adds latency. Your traffic travels through an additional server, potentially in a different geographic region.

Expect:

  • 2-hop circuit: modest latency increase (varies by server locations)
  • 3-hop circuit: noticeable but often acceptable for most use cases

The actual impact depends on server selection. Choosing servers in the same region minimizes geographic latency. Choosing servers on different continents maximizes provider diversity but adds travel time.

Test with the circuit latency indicator in the header to see real numbers for your specific configuration.

ScenarioSingle VPNNested VPN
Hide traffic from ISPSufficientOverkill
Distrust a single providerRiskyAppropriate
High-stakes research or journalismInsufficientConsider it
Casual browsingFineUnnecessary overhead
Legal/compliance requirementsCheck requirementsMay be required

Nested VPNs are not for everyone. They add complexity and latency. For most users, a single reputable VPN provider is sufficient.

But if your threat model includes the possibility that a VPN provider could be compelled to log, compromised, or operating dishonestly, nested VPNs reduce the damage any single point of failure can cause.

For a deeper look at the cryptographic and operational properties of split knowledge:

  • Split Knowledge - Why no single provider can reconstruct the full picture

Nested VPNs and parallel connections are not mutually exclusive. You can run multiple nested circuits in parallel to get both:

  • Split knowledge from nesting (privacy)
  • Aggregated throughput from parallel paths (speed)

See Nested + Parallel for configuration details.


Proton VPN is a registered trademark of Proton AG. Mullvad and Mullvad VPN are trademarks of Mullvad VPN AB.