TheMurrow

Your VPN’s “Quantum‑Safe” Badge Might Be Making You Easier to Track — The Hybrid TLS Mistake Vendors Aren’t Advertising

Post‑quantum “upgrades” often change the TLS handshake, not the tunnel’s bulk encryption. That shift can make your ClientHello rarer—and your VPN traffic easier to recognize without decryption.

By TheMurrow Editorial
March 17, 2026
Your VPN’s “Quantum‑Safe” Badge Might Be Making You Easier to Track — The Hybrid TLS Mistake Vendors Aren’t Advertising

Key Points

  • 1Separate the hype from the mechanism: most “quantum‑safe” VPN claims upgrade key exchange, while bulk encryption stays AES‑GCM or ChaCha20‑Poly1305.
  • 2Watch the handshake: hybrid TLS 1.3 can expose rare `supported_groups`/`key_share` values (e.g., `0x11ec`), sharpening fingerprints without decryption.
  • 3Interrogate deployment details: tunnel-only post‑quantum differs from gateway or outbound TLS changes, which can quietly make VPN users easier to track.

A VPN can hide your IP address, mask your location, and keep café Wi‑Fi snoops out of your traffic. Now some VPNs promise something grander: protection from a future quantum computer.

That promise sounds like a clean upgrade—today’s privacy, plus tomorrow’s safety. Yet the first real “post‑quantum” changes many VPN companies are making aren’t happening where most people assume. The tunnel still usually encrypts your data with familiar ciphers like AES‑GCM or ChaCha20‑Poly1305. The “quantum‑safe” work is mostly about how the VPN negotiates keys at the start.

And that’s where a quieter problem emerges. The post‑quantum transition often changes what your device says about itself when it connects—especially if the product relies on TLS 1.3 in the tunnel, uses app-layer gateways, or modifies outward TLS behavior. The very “quantum‑safe” mechanism meant to protect you from “harvest now, decrypt later” can also make your traffic more distinctive to observers who do not need to break encryption to learn something about you.

A post‑quantum handshake can protect tomorrow’s secrets while making today’s connection easier to recognize.

— TheMurrow Editorial

What VPN “quantum‑safe” marketing usually means (and what it doesn’t)

The central security fear that drives post‑quantum messaging is not that quantum computers will magically read encrypted VPN traffic in real time. The near-term concern is record now, decrypt later: an adversary records encrypted sessions today, then later uses a powerful quantum computer to recover the session keys and decrypt old captures. Cloudflare has framed the urgency in exactly those terms for TLS key agreement, where protecting the handshake protects the secrecy of later traffic if recordings are stored for years. (Cloudflare blog: post‑quantum zero trust)

Most “quantum‑safe” claims in consumer networking follow that logic. They focus on key establishment—the part of a protocol that agrees on shared secrets—rather than on the bulk encryption that protects packets once a session is established. Bulk encryption in VPN tunnels remains, in most designs, standard and efficient: AES‑GCM or ChaCha20‑Poly1305.

A second pattern is just as consistent: the transition strategy is usually hybrid key exchange. Hybrid means combining a classical elliptic-curve share such as X25519 (an ECDH group) with a post‑quantum KEM (key encapsulation mechanism) such as Kyber or the NIST-standardized family now branded as ML‑KEM. Cloudflare’s documentation is explicit: hybrid lays groundwork while “maintaining the current security provided by X25519,” and it flags older Kyber hybrid identifiers as “Obsolete” while recommending ML‑KEM hybrids. (Cloudflare developer docs)

The consumer VPN market has begun to surface concrete implementations. Mullvad, for example, announced that “Quantum-resistant tunnels are now the default on desktop” in release 2025.2, describing WireGuard tunnels using Classic McEliece and ML‑KEM. ExpressVPN, according to TechRadar reporting in August 2025, added WireGuard and “made it quantum-secure” by integrating ML‑KEM. Those are meaningful steps—but they also illustrate the marketing gap: most of the action is in the handshake design, and handshake design is exactly where fingerprints form.

Practical takeaway

When a VPN says “quantum‑safe,” ask: Which part? If the answer is “our key exchange,” you are discussing handshake metadata as much as cryptographic strength.

Hybrid key exchange: the sensible bridge—and the one that changes what’s observable

Hybrid key exchange is popular because it reduces regret. If the post‑quantum algorithm later turns out weaker than hoped, the classical half still provides security; if a quantum computer breaks the classical half, the post‑quantum half still stands. That “belt-and-suspenders” logic explains why operators like Cloudflare have deployed hybrids such as X25519MLKEM768 and why standards work now focuses on formalizing ECDHE‑ML‑KEM combinations. (Cloudflare developer docs; IETF drafts)

But hybrid is not just an internal engineering choice. In TLS 1.3, the client’s first message—ClientHello—is densely informative. It includes:

- `supported_groups`: the key agreement groups the client can use
- `key_share`: actual ephemeral key material for one or more groups

That means hybrid negotiation can become visible at the very first packet. A client that supports X25519MLKEM768 is not just “more secure”; it is also declaring a capability set that not all devices share. Cloudflare even publishes the TLS identifier values it uses in the field: X25519MLKEM768 is `0x11ec`, while an older Kyber hybrid is marked Obsolete and appears as `0x6399`. (Cloudflare developer docs)

Those identifiers matter because they are easy to observe on-path. An ISP, a corporate firewall, a Wi‑Fi operator, or a hostile network in a hotel does not need to decrypt anything to learn whether your ClientHello advertises `0x11ec`. They only need to see the handshake.

Expert voice, grounded in standards

The flexibility that makes this tricky is built into TLS itself. RFC 8446 (TLS 1.3) notes that clients may send key shares only for a subset of supported groups, because pre-generating shares for new groups can be inefficient if those groups are rarely supported. That sensible performance choice also means different implementations can behave differently in ways that become measurable. (RFC 8446)

Practical takeaway

Hybrid is defensible cryptography. It is also a behavior change, and behavior is what fingerprinting systems measure.

The ClientHello fingerprint problem: privacy without decryption

Even readers who have never heard of JA3 have felt its downstream effects. Websites and anti-bot systems increasingly infer “what kind of client are you?” by looking at handshake parameters: extension lists, cipher suite ordering, and—crucially—supported groups and key shares. Newer approaches such as JA4 extend that basic idea. Industry explainers explicitly point to `key_share` and group selection as part of the fingerprint surface. (Scrapfly explainer on JA3 key-share)

Post‑quantum hybrids can make fingerprints sharper for a simple reason: not everyone offers the same groups. A user whose client advertises a rare hybrid group can become easier to single out in a crowd, even if the IP address changes behind a VPN. In other words, the VPN may hide your location while your TLS handshake quietly waves a distinctive flag.

The IETF’s own hybrid design work acknowledges a related risk in more technical terms: offering multiple hybrid combinations can bloat the ClientHello because each hybrid NamedGroup can include its own post‑quantum public key material. The draft explicitly discusses bloat and related concerns—exactly the kind of “side effect” that becomes operationally and privacy-relevant. (draft-ietf-tls-hybrid-design-09)

If your privacy tool makes your handshake rarer, it may also make you easier to spot.

— TheMurrow Editorial
Two fields
TLS 1.3’s ClientHello can include two separate group-related fields—`supported_groups` and `key_share`—that help determine fingerprints. That is part of RFC 8446.

Practical takeaway

If you care about anonymity, you should care about whether your VPN client makes your TLS handshake more unique, not just more secure.

“Quantum‑safe” VPNs in the wild: what Mullvad and ExpressVPN illustrate

Concrete examples help clarify what is—and is not—being promised. Mullvad’s announcement is unusually direct: in 2025.2, “Quantum-resistant tunnels are now the default on desktop,” using WireGuard with a quantum-resistant mechanism involving Classic McEliece and ML‑KEM. ExpressVPN’s reported move in August 2025 describes a WireGuard rollout paired with ML‑KEM for post‑quantum security. (Mullvad blog; TechRadar)

A careful reader should notice two things.

First, these are handshake-level changes applied to a VPN tunnel protocol (often WireGuard plus an added post‑quantum component). That’s compatible with the broader industry message: the bulk ciphers are still the familiar fast ones; the risk being addressed is long-term key compromise.

Second, these announcements are not, on their face, about TLS 1.3 ClientHello behavior. That matters because the fingerprint story applies most strongly when:

- the VPN tunnel itself uses TLS 1.3, or
- the VPN product includes TLS interception, HTTP proxying, or app-layer gateways, or
- the vendor’s “quantum-safe” feature alters the client’s outward-facing TLS behavior

Many readers will never encounter the fingerprinting downside because their VPN’s post‑quantum feature lives inside a tunnel handshake that does not present as public web TLS. Others may encounter it indirectly—through enterprise configurations, “secure web gateway” modes, or clients that standardize all outbound connections in ways that change handshake signatures.
2025.2 / Aug 2025
Consumer VPN post‑quantum milestones are already dated and deployable: Mullvad 2025.2 and reporting on ExpressVPN in August 2025.

Practical takeaway

When you evaluate a vendor’s post‑quantum story, separate tunnel design (WireGuard/TLS) from outbound web TLS behavior. They are not the same privacy risk.

The “feature flag” effect: named groups that announce who you are

In a perfect privacy world, your client looks like everyone else’s. Post‑quantum deployment pushes in the other direction: a subset of clients and stacks adopt new groups earlier, making them distinguishable.

Cloudflare’s operational documentation is helpful for engineers because it lists what hybrid groups it supports and how to enable them, including the recommended X25519MLKEM768 and an older “Obsolete” X25519Kyber768Draft00. It also publishes a compatibility matrix—Chrome/Edge/Firefox flags, BoringSSL and Go versions—that is invaluable for deployment planning. (Cloudflare developer docs)

That same matrix has a privacy implication: it implies that “who can speak `0x11ec`” is not universal. Observers don’t need a matrix; they can build one empirically. If a particular VPN client version, OS build, or library stack is among the few that consistently offers a specific hybrid group, that group becomes a probabilistic identifier.

This is not exotic. Fingerprinting thrives on small differences that correlate with software stacks. Adding a new, uncommon named group is the definition of a differentiator.
0x11ec / 0x6399
Cloudflare lists deployed TLS group identifiers: `0x11ec` for X25519MLKEM768 (recommended) and `0x6399` for an older Kyber hybrid (obsolete).

A 16‑bit group ID can become a surprisingly durable identifier when only a minority of clients send it.

— TheMurrow Editorial

Practical takeaway

If a VPN “turns on post‑quantum TLS” without thinking about fingerprint uniformity, it may trade one long-term threat for a near-term tracking surface.

Why vendors under-discuss this: the incentives are misaligned

VPN marketing rewards simple narratives: “quantum-safe” sounds like a binary. Either you have it or you don’t. Fingerprinting, by contrast, is probabilistic and messy. A company can truthfully say “we use ML‑KEM” and still fail to explain how that changes handshake size, group ordering, or `key_share` behavior—details that matter to tracking resistance.

The standards community has already flagged some of the mechanics. The IETF hybrid design draft discusses the practical downside of offering multiple hybrid combinations: clients may end up sending multiple post‑quantum public keys because each hybrid named group carries its own PQ component. More bytes can mean more distinctiveness, and more distinctiveness can mean easier correlation across sessions. (draft-ietf-tls-hybrid-design-09)

Meanwhile, RFC 8446 gives clients latitude in which key shares to send. That latitude is good engineering, but it guarantees diversity. Diversity is great for resilience; it’s terrible for anonymity sets.

Multiple perspectives worth holding at once

- Security engineers will argue—reasonably—that post‑quantum handshakes reduce catastrophic long-term risk, and hybrid keeps current security intact.
- Privacy engineers will argue—also reasonably—that uniqueness is its own risk, and any new identifier in the handshake can be exploited before quantum computers are practical.
- Operators will point out that compatibility and performance constraints force tradeoffs; you can’t deploy ML‑KEM hybrids everywhere overnight.

All three views can be true at the same time. The editorial failure is pretending only one matters.
Two knobs
Hybrid TLS affects fingerprints via at least two observable levers in the first TLS 1.3 flight: (1) `supported_groups`, and (2) `key_share`.

Practical takeaway

Ask vendors not only whether they support post‑quantum, but how they minimize fingerprint variance across clients.

How to evaluate a “quantum‑safe VPN” claim without getting lost in math

Readers don’t need to become cryptographers to ask better questions. They need a checklist that maps marketing terms to protocol realities.

What to look for in vendor documentation

A credible post‑quantum story should be specific about:

- Where post‑quantum is used: tunnel handshake, web gateway TLS, or both
- Which algorithms: “ML‑KEM” is more informative than “quantum-proof”
- Whether the approach is hybrid (classical + PQ) and what the classical piece is (often X25519)
- Migration posture: do they mark older hybrids as obsolete, as Cloudflare does for Kyber-draft identifiers?

When vendors are vague, it’s often because the feature is not broadly deployed, or because “quantum-safe” is doing branding work rather than describing an architecture.

Questions that surface fingerprint risk

If the product touches TLS 1.3 to websites (directly or via gateway modes), ask:

- Does enabling post‑quantum change ClientHello size or group list?
- Does the client send multiple key shares for multiple hybrid groups?
- Does the vendor aim to keep TLS handshakes consistent across platforms, or do Windows/macOS/Linux differ?

A company might not publish all answers, but the seriousness of the response is informative.

Practical takeaway

The best vendors will treat post‑quantum as a migration, not a badge. Migration means compatibility, deprecation, and privacy impact assessments.

A future-proofing paradox worth taking seriously

Post‑quantum cryptography is not a fad. Cloudflare’s deployment posture and IETF standardization work around ECDHE‑ML‑KEM hybrids show that major infrastructure players expect these mechanisms to become normal. (Cloudflare developer docs; IETF drafts)

Yet privacy products are judged in the present tense. A VPN’s mission is not only to protect your data from decryption; it’s to reduce what observers can infer about you right now. When “quantum-safe” features shift handshake characteristics, the VPN can become a tool that hardens confidentiality while weakening anonymity—especially for users whose threat model includes network surveillance and correlation.

A mature industry response would look like this: vendors keep adopting ML‑KEM hybrids to protect long-lived secrets, while also engineering clients so that post‑quantum support does not create small, rare, stable identifiers. The standards give room to maneuver; the market needs pressure to use it wisely.

The most sophisticated take is also the simplest: security improvements are real, and side effects are real. Readers deserve both truths at once.

1) What does “quantum-safe” mean for a VPN, in plain English?

Most of the time it means the VPN has upgraded the key exchange used to start a secure session, often using a hybrid of classical ECDH (like X25519) plus a post‑quantum KEM (like ML‑KEM). Your data inside the tunnel is usually still encrypted with standard fast ciphers such as AES‑GCM or ChaCha20‑Poly1305.

2) Does “quantum-safe” mean the VPN uses new encryption for all my traffic?

Usually, no. The bulk encryption inside VPN tunnels is typically unchanged; the post‑quantum component is mainly about preventing record now, decrypt later attacks against session keys. That distinction matters because it explains why vendors can honestly say “post‑quantum” while the tunnel still uses familiar symmetric encryption for speed and compatibility.

3) What is hybrid key exchange, and why is everyone using it?

Hybrid key exchange combines a classical method (commonly X25519) with a post‑quantum method (ML‑KEM, previously Kyber variants). Cloudflare describes hybrid as maintaining current security while adding post‑quantum protection, and it marks older Kyber hybrids as obsolete while recommending ML‑KEM hybrids. Hybrid reduces the risk of betting on a single new algorithm too early.

4) How can post-quantum TLS create a tracking risk if it’s encrypted?

Tracking does not require decryption. In TLS 1.3, the ClientHello reveals parameters like `supported_groups` and `key_share`. If a client offers uncommon hybrid groups (Cloudflare’s recommended X25519MLKEM768, for example), that capability can become part of a TLS fingerprint, making the connection more distinguishable even when content remains encrypted.

5) Are Mullvad and ExpressVPN “quantum-safe,” and does that cause fingerprinting?

Public statements indicate Mullvad (release 2025.2) and press reporting about ExpressVPN (Aug 2025) focus on WireGuard tunnel changes using post‑quantum mechanisms like ML‑KEM. Those claims are primarily about tunnel handshake security, not necessarily about outbound web TLS behavior. Fingerprinting concerns apply most strongly when
T
About the Author
TheMurrow Editorial is a writer for TheMurrow covering technology.

Frequently Asked Questions

What does “quantum-safe” mean for a VPN, in plain English?

Most of the time it means the VPN has upgraded the key exchange used to start a secure session, often using a hybrid of classical ECDH (like X25519) plus a post‑quantum KEM (like ML‑KEM). Your data inside the tunnel is usually still encrypted with standard fast ciphers such as AES‑GCM or ChaCha20‑Poly1305.

Does “quantum-safe” mean the VPN uses new encryption for all my traffic?

Usually, no. The bulk encryption inside VPN tunnels is typically unchanged; the post‑quantum component is mainly about preventing record now, decrypt later attacks against session keys. That distinction matters because it explains why vendors can honestly say “post‑quantum” while the tunnel still uses familiar symmetric encryption for speed and compatibility.

What is hybrid key exchange, and why is everyone using it?

Hybrid key exchange combines a classical method (commonly X25519) with a post‑quantum method (ML‑KEM, previously Kyber variants). Cloudflare describes hybrid as maintaining current security while adding post‑quantum protection, and it marks older Kyber hybrids as obsolete while recommending ML‑KEM hybrids. Hybrid reduces the risk of betting on a single new algorithm too early.

How can post-quantum TLS create a tracking risk if it’s encrypted?

Tracking does not require decryption. In TLS 1.3, the ClientHello reveals parameters like `supported_groups` and `key_share`. If a client offers uncommon hybrid groups (Cloudflare’s recommended X25519MLKEM768, for example), that capability can become part of a TLS fingerprint, making the connection more distinguishable even when content remains encrypted.

Are Mullvad and ExpressVPN “quantum-safe,” and does that cause fingerprinting?

Public statements indicate Mullvad (release 2025.2) and press reporting about ExpressVPN (Aug 2025) focus on WireGuard tunnel changes using post‑quantum mechanisms like ML‑KEM. Those claims are primarily about tunnel handshake security, not necessarily about outbound web TLS behavior. Fingerprinting concerns apply most strongly when

More in Technology

You Might Also Like