Overview
WireGuard multihop routes your VPN traffic through two servers instead of one, adding an extra layer of privacy and making it significantly harder to trace your connection back to you. With multihop:- Traffic goes: Your Device → Entry Server → Exit Server → Internet
- Entry server knows your real IP but not your destination
- Exit server knows your destination but not your real IP
- No single server sees both your identity and your activity
Multihop is available on all platforms: Windows, Linux, macOS, Android, and iOS.
How Multihop Works
Connection Flow
Double Encryption
Multihop uses nested WireGuard tunnels:- Outer tunnel: Your device → Entry server (first layer of encryption)
- Inner tunnel: Entry server → Exit server (second layer of encryption)
- Your traffic: Encrypted twice until it reaches the exit server
The entry server cannot see your final destination because it’s encrypted in the inner tunnel. The exit server cannot see your real IP because you’re connecting from the entry server.
Privacy Benefits
| What They Know | Entry Server | Exit Server |
|---|---|---|
| Your real IP address | ✅ Yes | ❌ No (sees entry server IP) |
| Your destination | ❌ No (encrypted) | ✅ Yes |
| Your traffic content | ❌ No (encrypted) | ❌ No (encrypted by HTTPS/TLS) |
Enabling Multihop
Using the GUI
Select Servers (Optional)
- Entry server: First hop (closer to your location)
- Exit server: Final hop (where your traffic exits)
- Leave on Auto for optimal selection
Using the CLI
Verify Multihop is Active
Server Selection
Automatic Selection
Mullvad automatically chooses optimal servers based on:- Geographic proximity: Entry server closer to you
- Load balancing: Distributes load across servers
- Compatibility: Ensures both servers support required features
Manual Selection
- Select Both Servers
- Select Exit Only
- Select Entry Only
Choose specific entry and exit locations:
Server Pairing Rules
Additional constraints:- Entry and exit servers must both support WireGuard
- Both servers must support required features (DAITA, quantum resistance, etc.)
- Some obfuscation protocols may limit server selection
Performance Impact
Expected Overhead
- Latency: Additional 20-50ms due to extra hop
- Speed: Slight reduction (typically 10-20%) from double encryption
- Connection time: Longer initial connection (extra tunnel setup)
Factors Affecting Performance
- Geographic distance: Greater distance between servers = higher latency
- Server load: Congested servers impact speed
- Network path: Quality of connection between entry and exit servers
For optimal performance, choose entry and exit servers in nearby regions. For example: Germany → Netherlands instead of Australia → USA.
Bandwidth Considerations
Multihop uses approximately:- 1.05x bandwidth of single-hop (minimal overhead from tunnel headers)
- Same encryption efficiency (no extra padding unless DAITA enabled)
Use Cases
When to Use Multihop
✅ Recommended for:- High-risk journalism or whistleblowing
- Accessing content in restricted countries
- Maximum anonymity requirements
- Protecting against compromised servers
- Evading advanced traffic analysis
When Single-Hop is Sufficient
❌ Not necessary for:- Casual browsing or streaming
- Basic privacy protection
- Performance-critical applications (gaming, video calls)
- Limited bandwidth situations
Compatibility with Other Features
Multihop works with:- ✅ Quantum-resistant tunnels
- ✅ DAITA (applied to entry server)
- ✅ Obfuscation protocols
- ✅ Custom DNS
- ✅ Content blockers
- ✅ Split tunneling
Multihop with DAITA
When using DAITA with multihop:- DAITA is applied at the entry server
- Entry server must support DAITA
- Exit server does not need DAITA support
- “Direct only” mode affects entry server selection
With DAITA’s “Direct only” disabled, the app may automatically enable multihop when you select a non-DAITA server to ensure DAITA protection.
Multihop with Quantum Resistance
Multihop with Obfuscation
Obfuscation applies to the outer tunnel (device → entry server):Security Considerations
Threat Model
Multihop protects against:- Compromised single server: No single server sees full picture
- Correlation attacks: Harder to link entry and exit traffic
- Surveillance at exit point: Your real IP is hidden
- Traffic analysis: Additional obfuscation layer
What Multihop Does NOT Protect Against
Mullvad’s No-Logs Policy
Important notes:- Mullvad operates both servers (entry and exit)
- Same privacy policy applies to all servers
- No logs kept on any server
- No cross-correlation between servers
Multihop adds defense-in-depth but does not replace Mullvad’s fundamental privacy guarantees. Both single-hop and multihop benefit from Mullvad’s strict no-logs policy.
Troubleshooting
Connection Issues
If multihop connection fails:-
Check server availability
-
Try automatic selection
-
Disable temporarily
-
Check for conflicting settings
- Ensure entry and exit servers are different
- Verify both servers support required features
Performance Issues
If experiencing slow speeds:-
Choose closer servers: Reduce geographic distance
-
Check server load: Try different servers
- Disable unnecessary features: If DAITA is enabled, consider disabling for better performance
Entry Server Override
When DAITA’s “Direct only” is disabled:“The entry server for Multihop is currently overridden by DAITA.”This means DAITA is automatically selecting the entry server to ensure DAITA coverage. To manually select the entry server:
Best Practices
Optimal Server Placement
- Maximum Anonymity
- Balanced Performance
- Content Access
Entry and exit in different countries:
Combining Features
For maximum protection:Technical Details
Connection Configuration
From the source code (talpid-types/src/net/wireguard.rs:59-69):exit_peer is Some, multihop is active.
Endpoint Information
The entry endpoint is the first hop that receives your traffic:Relay Selection Logic
The relay selector ensures:- Entry and exit servers are different
- Both support required features (WireGuard, DAITA, etc.)
- Compatible with obfuscation settings
- Optimal based on location constraints
Platform-Specific Notes
Windows
- Full multihop support
- Native WireGuard driver (wireguard-nt)
Linux
- Full multihop support
- Kernel module or userspace (wireguard-go)
macOS
- Full multihop support
- Kernel extension
Android
- Full multihop support
- May impact battery life more than single-hop
- Consider power management settings
iOS
- Full multihop support
- Efficient implementation
- Minimal battery impact beyond single-hop
Migration and Settings
Upgrading from Single-Hop
Existing connections:- Enable multihop in settings
- App automatically disconnects and reconnects
- Previous server becomes exit server (if compatible)
- Entry server automatically selected
Settings Persistence
Multihop configuration persists across:- App restarts
- Device reboots
- App updates
- Server list updates
Related Features
- WireGuard Protocol - Base VPN protocol
- DAITA - Traffic analysis protection (applied to entry)
- Quantum-Resistant Tunnels - Post-quantum crypto on both hops
- Obfuscation - Applied to entry connection
- Local Network Access - Works with multihop