Your VPN’s “Quantum‑Safe” Badge Might Be Making You Easier to Track — The Hybrid TLS Mistake Vendors Aren’t Advertising
Post‑quantum “upgrades” often change the TLS handshake, not the tunnel’s bulk encryption. That shift can make your ClientHello rarer—and your VPN traffic easier to recognize without decryption.

Key Points
- 1Separate the hype from the mechanism: most “quantum‑safe” VPN claims upgrade key exchange, while bulk encryption stays AES‑GCM or ChaCha20‑Poly1305.
- 2Watch the handshake: hybrid TLS 1.3 can expose rare `supported_groups`/`key_share` values (e.g., `0x11ec`), sharpening fingerprints without decryption.
- 3Interrogate deployment details: tunnel-only post‑quantum differs from gateway or outbound TLS changes, which can quietly make VPN users easier to track.
A VPN can hide your IP address, mask your location, and keep café Wi‑Fi snoops out of your traffic. Now some VPNs promise something grander: protection from a future quantum computer.
That promise sounds like a clean upgrade—today’s privacy, plus tomorrow’s safety. Yet the first real “post‑quantum” changes many VPN companies are making aren’t happening where most people assume. The tunnel still usually encrypts your data with familiar ciphers like AES‑GCM or ChaCha20‑Poly1305. The “quantum‑safe” work is mostly about how the VPN negotiates keys at the start.
And that’s where a quieter problem emerges. The post‑quantum transition often changes what your device says about itself when it connects—especially if the product relies on TLS 1.3 in the tunnel, uses app-layer gateways, or modifies outward TLS behavior. The very “quantum‑safe” mechanism meant to protect you from “harvest now, decrypt later” can also make your traffic more distinctive to observers who do not need to break encryption to learn something about you.
A post‑quantum handshake can protect tomorrow’s secrets while making today’s connection easier to recognize.
— — TheMurrow Editorial
What VPN “quantum‑safe” marketing usually means (and what it doesn’t)
Most “quantum‑safe” claims in consumer networking follow that logic. They focus on key establishment—the part of a protocol that agrees on shared secrets—rather than on the bulk encryption that protects packets once a session is established. Bulk encryption in VPN tunnels remains, in most designs, standard and efficient: AES‑GCM or ChaCha20‑Poly1305.
A second pattern is just as consistent: the transition strategy is usually hybrid key exchange. Hybrid means combining a classical elliptic-curve share such as X25519 (an ECDH group) with a post‑quantum KEM (key encapsulation mechanism) such as Kyber or the NIST-standardized family now branded as ML‑KEM. Cloudflare’s documentation is explicit: hybrid lays groundwork while “maintaining the current security provided by X25519,” and it flags older Kyber hybrid identifiers as “Obsolete” while recommending ML‑KEM hybrids. (Cloudflare developer docs)
The consumer VPN market has begun to surface concrete implementations. Mullvad, for example, announced that “Quantum-resistant tunnels are now the default on desktop” in release 2025.2, describing WireGuard tunnels using Classic McEliece and ML‑KEM. ExpressVPN, according to TechRadar reporting in August 2025, added WireGuard and “made it quantum-secure” by integrating ML‑KEM. Those are meaningful steps—but they also illustrate the marketing gap: most of the action is in the handshake design, and handshake design is exactly where fingerprints form.
Practical takeaway
Hybrid key exchange: the sensible bridge—and the one that changes what’s observable
But hybrid is not just an internal engineering choice. In TLS 1.3, the client’s first message—ClientHello—is densely informative. It includes:
- `supported_groups`: the key agreement groups the client can use
- `key_share`: actual ephemeral key material for one or more groups
That means hybrid negotiation can become visible at the very first packet. A client that supports X25519MLKEM768 is not just “more secure”; it is also declaring a capability set that not all devices share. Cloudflare even publishes the TLS identifier values it uses in the field: X25519MLKEM768 is `0x11ec`, while an older Kyber hybrid is marked Obsolete and appears as `0x6399`. (Cloudflare developer docs)
Those identifiers matter because they are easy to observe on-path. An ISP, a corporate firewall, a Wi‑Fi operator, or a hostile network in a hotel does not need to decrypt anything to learn whether your ClientHello advertises `0x11ec`. They only need to see the handshake.
Expert voice, grounded in standards
Practical takeaway
The ClientHello fingerprint problem: privacy without decryption
Post‑quantum hybrids can make fingerprints sharper for a simple reason: not everyone offers the same groups. A user whose client advertises a rare hybrid group can become easier to single out in a crowd, even if the IP address changes behind a VPN. In other words, the VPN may hide your location while your TLS handshake quietly waves a distinctive flag.
The IETF’s own hybrid design work acknowledges a related risk in more technical terms: offering multiple hybrid combinations can bloat the ClientHello because each hybrid NamedGroup can include its own post‑quantum public key material. The draft explicitly discusses bloat and related concerns—exactly the kind of “side effect” that becomes operationally and privacy-relevant. (draft-ietf-tls-hybrid-design-09)
If your privacy tool makes your handshake rarer, it may also make you easier to spot.
— — TheMurrow Editorial
Practical takeaway
“Quantum‑safe” VPNs in the wild: what Mullvad and ExpressVPN illustrate
A careful reader should notice two things.
First, these are handshake-level changes applied to a VPN tunnel protocol (often WireGuard plus an added post‑quantum component). That’s compatible with the broader industry message: the bulk ciphers are still the familiar fast ones; the risk being addressed is long-term key compromise.
Second, these announcements are not, on their face, about TLS 1.3 ClientHello behavior. That matters because the fingerprint story applies most strongly when:
- the VPN tunnel itself uses TLS 1.3, or
- the VPN product includes TLS interception, HTTP proxying, or app-layer gateways, or
- the vendor’s “quantum-safe” feature alters the client’s outward-facing TLS behavior
Many readers will never encounter the fingerprinting downside because their VPN’s post‑quantum feature lives inside a tunnel handshake that does not present as public web TLS. Others may encounter it indirectly—through enterprise configurations, “secure web gateway” modes, or clients that standardize all outbound connections in ways that change handshake signatures.
Practical takeaway
The “feature flag” effect: named groups that announce who you are
Cloudflare’s operational documentation is helpful for engineers because it lists what hybrid groups it supports and how to enable them, including the recommended X25519MLKEM768 and an older “Obsolete” X25519Kyber768Draft00. It also publishes a compatibility matrix—Chrome/Edge/Firefox flags, BoringSSL and Go versions—that is invaluable for deployment planning. (Cloudflare developer docs)
That same matrix has a privacy implication: it implies that “who can speak `0x11ec`” is not universal. Observers don’t need a matrix; they can build one empirically. If a particular VPN client version, OS build, or library stack is among the few that consistently offers a specific hybrid group, that group becomes a probabilistic identifier.
This is not exotic. Fingerprinting thrives on small differences that correlate with software stacks. Adding a new, uncommon named group is the definition of a differentiator.
A 16‑bit group ID can become a surprisingly durable identifier when only a minority of clients send it.
— — TheMurrow Editorial
Practical takeaway
Why vendors under-discuss this: the incentives are misaligned
The standards community has already flagged some of the mechanics. The IETF hybrid design draft discusses the practical downside of offering multiple hybrid combinations: clients may end up sending multiple post‑quantum public keys because each hybrid named group carries its own PQ component. More bytes can mean more distinctiveness, and more distinctiveness can mean easier correlation across sessions. (draft-ietf-tls-hybrid-design-09)
Meanwhile, RFC 8446 gives clients latitude in which key shares to send. That latitude is good engineering, but it guarantees diversity. Diversity is great for resilience; it’s terrible for anonymity sets.
Multiple perspectives worth holding at once
- Privacy engineers will argue—also reasonably—that uniqueness is its own risk, and any new identifier in the handshake can be exploited before quantum computers are practical.
- Operators will point out that compatibility and performance constraints force tradeoffs; you can’t deploy ML‑KEM hybrids everywhere overnight.
All three views can be true at the same time. The editorial failure is pretending only one matters.
Practical takeaway
How to evaluate a “quantum‑safe VPN” claim without getting lost in math
What to look for in vendor documentation
- Where post‑quantum is used: tunnel handshake, web gateway TLS, or both
- Which algorithms: “ML‑KEM” is more informative than “quantum-proof”
- Whether the approach is hybrid (classical + PQ) and what the classical piece is (often X25519)
- Migration posture: do they mark older hybrids as obsolete, as Cloudflare does for Kyber-draft identifiers?
When vendors are vague, it’s often because the feature is not broadly deployed, or because “quantum-safe” is doing branding work rather than describing an architecture.
Questions that surface fingerprint risk
- Does enabling post‑quantum change ClientHello size or group list?
- Does the client send multiple key shares for multiple hybrid groups?
- Does the vendor aim to keep TLS handshakes consistent across platforms, or do Windows/macOS/Linux differ?
A company might not publish all answers, but the seriousness of the response is informative.
Practical takeaway
A future-proofing paradox worth taking seriously
Yet privacy products are judged in the present tense. A VPN’s mission is not only to protect your data from decryption; it’s to reduce what observers can infer about you right now. When “quantum-safe” features shift handshake characteristics, the VPN can become a tool that hardens confidentiality while weakening anonymity—especially for users whose threat model includes network surveillance and correlation.
A mature industry response would look like this: vendors keep adopting ML‑KEM hybrids to protect long-lived secrets, while also engineering clients so that post‑quantum support does not create small, rare, stable identifiers. The standards give room to maneuver; the market needs pressure to use it wisely.
The most sophisticated take is also the simplest: security improvements are real, and side effects are real. Readers deserve both truths at once.
1) What does “quantum-safe” mean for a VPN, in plain English?
2) Does “quantum-safe” mean the VPN uses new encryption for all my traffic?
3) What is hybrid key exchange, and why is everyone using it?
4) How can post-quantum TLS create a tracking risk if it’s encrypted?
5) Are Mullvad and ExpressVPN “quantum-safe,” and does that cause fingerprinting?
Frequently Asked Questions
What does “quantum-safe” mean for a VPN, in plain English?
Most of the time it means the VPN has upgraded the key exchange used to start a secure session, often using a hybrid of classical ECDH (like X25519) plus a post‑quantum KEM (like ML‑KEM). Your data inside the tunnel is usually still encrypted with standard fast ciphers such as AES‑GCM or ChaCha20‑Poly1305.
Does “quantum-safe” mean the VPN uses new encryption for all my traffic?
Usually, no. The bulk encryption inside VPN tunnels is typically unchanged; the post‑quantum component is mainly about preventing record now, decrypt later attacks against session keys. That distinction matters because it explains why vendors can honestly say “post‑quantum” while the tunnel still uses familiar symmetric encryption for speed and compatibility.
What is hybrid key exchange, and why is everyone using it?
Hybrid key exchange combines a classical method (commonly X25519) with a post‑quantum method (ML‑KEM, previously Kyber variants). Cloudflare describes hybrid as maintaining current security while adding post‑quantum protection, and it marks older Kyber hybrids as obsolete while recommending ML‑KEM hybrids. Hybrid reduces the risk of betting on a single new algorithm too early.
How can post-quantum TLS create a tracking risk if it’s encrypted?
Tracking does not require decryption. In TLS 1.3, the ClientHello reveals parameters like `supported_groups` and `key_share`. If a client offers uncommon hybrid groups (Cloudflare’s recommended X25519MLKEM768, for example), that capability can become part of a TLS fingerprint, making the connection more distinguishable even when content remains encrypted.
Are Mullvad and ExpressVPN “quantum-safe,” and does that cause fingerprinting?
Public statements indicate Mullvad (release 2025.2) and press reporting about ExpressVPN (Aug 2025) focus on WireGuard tunnel changes using post‑quantum mechanisms like ML‑KEM. Those claims are primarily about tunnel handshake security, not necessarily about outbound web TLS behavior. Fingerprinting concerns apply most strongly when















