Outline VPN
Outline VPN is an open-source software suite developed by Jigsaw, a technology incubator owned by Alphabet Inc., designed to enable individuals and organizations to easily deploy and manage their own Shadowsocks proxy servers on cloud infrastructure for circumventing internet censorship and accessing restricted content.[1][2] The tool consists of an Outline Manager application for server setup and administration, which automates deployment on providers such as DigitalOcean or AWS, and client applications available for Windows, macOS, iOS, Android, and Linux that connect via access keys shared by the server operator.[3][4] Launched in 2018, Outline prioritizes simplicity and resistance to detection, leveraging the Shadowsocks protocol's obfuscation to evade blocking by authoritarian regimes, though it functions as a per-application SOCKS proxy rather than encrypting all device traffic like traditional VPNs.[5][6] The software's defining characteristic is its user-controlled model, allowing operators to host servers anonymously without reliance on third-party VPN providers, thereby reducing risks of centralized surveillance or shutdowns, as evidenced by its adoption in regions with heavy censorship such as China and Iran where server IPs have occasionally faced blocks despite obfuscation efforts.[7][8] Jigsaw maintains that Outline usage is untracked by the company or Google, with no data collection or monetization, supported by its open-source code available on GitHub for public audit.[9][2] However, security analyses have highlighted limitations, including potential vulnerabilities from misconfiguration and the protocol's focus on evasion over comprehensive encryption, leading some experts to caution against its use for highly sensitive activities without additional safeguards.[10] Despite these concerns, Outline has been praised for democratizing secure access tools, with integrations like DigitalOcean partnerships facilitating rapid setup for non-technical users in crisis situations.[11][7]History and Development
Origins and Launch
Outline VPN was developed by Jigsaw, an Alphabet Inc. technology incubator established in February 2016 from the former Google Ideas think tank, with a focus on creating tools to counter digital threats and promote open societies.[12] The project stemmed from Jigsaw's broader efforts to enable secure, censorship-resistant internet access, targeting users such as activists, journalists, and organizations in restrictive regimes who require self-hosted solutions to avoid reliance on potentially compromised commercial VPN providers.[13] The software was publicly launched on March 22, 2018, as an open-source tool built around the Shadowsocks proxy protocol, which facilitates obfuscated traffic to evade detection and blocking by firewalls.[13] This release included the Outline Manager application for server deployment on cloud platforms like DigitalOcean, AWS, and Google Cloud, emphasizing ease of setup through automated scripts and key-based access sharing without needing advanced networking knowledge.[13][14] Initial distribution occurred via GitHub repositories under the Apache 2.0 license, encouraging transparency and third-party scrutiny, with early adoption driven by its utility in high-censorship contexts such as during protests or media blackouts.[2] The launch positioned Outline as a peer-to-peer accessible alternative to traditional VPNs, prioritizing user control over data routing and server location to mitigate risks from centralized logging or shutdowns.[1]Evolution and Updates
Following its initial release in March 2018, Outline VPN expanded platform availability beyond Windows, Android, and Chrome OS to include iOS and macOS clients, enabling broader deployment for censorship circumvention via self-hosted Shadowsocks servers.[15][13] Client updates progressed incrementally; for instance, version 1.10.0 for iOS and macOS, released on March 3, 2023, added support for 11 languages and upgraded the tun2socks library to v3.1.0 for improved UDP handling and connectivity.[16] Server-side enhancements in 2024 focused on operational robustness, with v1.8.0 on January 25 introducing API extensions for granular key management (e.g., single-key retrieval and custom IDs) alongside flexible ulimit configurations for better performance under load.[17] Later releases emphasized metrics and privacy; v1.10.0 on August 30 added opt-in per-ASN usage tracking while ceasing default key usage data sharing, and v1.11.0 on November 14 incorporated ASN/tunnel-time metrics and multi-server infrastructure support.[17] A pivotal shift occurred in February 2025, when updates to Client v1.15.0, Manager v1.17.0, and Server v1.12.0 introduced Shadowsocks-over-WebSockets to masquerade traffic as standard web communications, countering advanced detection, plus Caddy integration for custom configurations and enhanced metrics for provider-scale operations—marking Outline's transition from a basic DIY tool to a platform sustaining over 30 million monthly users across global providers.[18] Servers now auto-update for security patches, ensuring ongoing resilience without manual intervention.[19]Technical Components
Server Deployment
The deployment of Outline VPN servers is primarily managed through the Outline Manager desktop application, developed by Jigsaw and available for Windows, macOS, and Linux operating systems. This tool abstracts complex server provisioning, allowing non-experts to establish a Shadowsocks-based proxy server resistant to common blocking techniques. Deployment options include automated integration with cloud providers or manual setup on user-controlled Linux hosts, emphasizing user control over server location to minimize latency and enhance evasion of regional censorship.[20] Automated cloud deployment leverages partnerships with providers like DigitalOcean, AWS, and Google Cloud, where the Manager initiates a one-click creation of a virtual private server (VPS) droplet or instance. Users select from available data centers, such as those in the United States, Germany, or Singapore, to route traffic through jurisdictions with favorable internet policies. The process automatically handles OS installation (typically Ubuntu or Debian), Docker container orchestration for the Shadowsocks proxy and API management server, and basic firewall configuration via ufw or iptables. Minimum hardware requirements include 1 GB RAM and 1 CPU core, with monthly costs starting at approximately $5 USD depending on the provider and instance size; for instance, DigitalOcean's basic droplet meets these specs at $6 per month as of 2023 pricing.[20][14] Manual deployment, referred to as "Set up Outline anywhere," requires SSH root access to a fresh Linux server without prior VPN software. The Manager connects via SSH, downloads and executes an installation script that installs Docker (version 20+ recommended), pulls the official Outline Server image from Docker Hub, and configures the shadowbox management binary written in Go alongside the Node.js-based API server. This setup provisions a Shadowsocks instance with obfuscation plugins for traffic disguise, generates a self-signed SSL certificate for API access, and sets up port forwarding (default Shadowsocks port 443 for HTTPS mimicry). Prerequisites encompass a public IP address, open ports (TCP 22 for SSH, 443 for proxy), and sufficient outbound bandwidth (at least 100 Mbps recommended for multiple users); the entire process completes in under 5 minutes on compatible hardware.[14][21] Post-deployment, the server exposes a REST API for key management, enabling the creation of up to 100 access keys by default, each representing a unique Shadowsocks configuration URL shareable with clients. Resource scaling involves upgrading VPS specs or deploying multiple servers, though Outline lacks native load balancing; users monitor via the Manager's dashboard, which reports metrics like data usage and active keys. Self-hosting on-premises hardware follows similar Docker-based steps but demands static IP and manual DNS setup, increasing complexity for non-cloud environments.[14][22]Client Software
The Outline Client is an open-source application designed to connect end-users to a VPN server deployed via the Outline Manager, routing internet traffic through the Shadowsocks protocol to enable access to restricted content and enhance privacy.[2] It features a streamlined interface that requires users to input a unique access key—generated by the server administrator—for authentication and connection, after which a single toggle activates the VPN tunnel.[20] This key-based system supports easy sharing of access among multiple users without complex configuration, though data usage limits can be enforced server-side by the manager.[1] Supported platforms include Windows, macOS, iOS, Android, and Linux, with clients available via official app stores (Google Play, Apple App Store) or direct downloads from verified sources to ensure integrity.[2] Installation involves downloading the appropriate binary or app package, followed by adding the access key through the app's settings menu; no root or administrative privileges are typically required beyond standard app permissions for network access.[20] On mobile devices, the client integrates with system VPN APIs for seamless operation, while desktop versions operate as proxy clients that can be set to tunnel all or selective traffic, though split-tunneling is not natively configurable in the standard client.[23] Technically, the client implements the Shadowsocks proxy protocol, which provides obfuscation to mimic regular HTTPS traffic and resist deep packet inspection by censors, using AES encryption variants configurable on the server side.[2] It leverages the Outline SDK for cross-platform networking, ensuring compatibility with any Shadowsocks-compatible server beyond those created by Outline Manager.[1] Security audits, including one conducted by Cure53 in 2024, have verified the client's resistance to common vulnerabilities like DNS leaks and IP exposure, though users must trust the access key provider for endpoint security.[1] The software's open-source nature allows inspection of its codebase on GitHub, with updates released periodically to address protocol improvements and platform compatibility.[2]Underlying Protocol
Outline VPN relies on the Shadowsocks protocol to establish encrypted proxy connections between clients and servers, enabling traffic routing that evades detection by censors.[24] Shadowsocks functions as a lightweight SOCKS5 proxy with integrated encryption, distinguishing it from traditional VPN protocols like OpenVPN or WireGuard by prioritizing obfuscation over comprehensive network-layer tunneling; it proxies selected application traffic rather than encapsulating all device IP packets, though Outline's client software presents this as a unified VPN interface for ease of use.[24] This design choice stems from Shadowsocks's origins in 2012 as a tool for bypassing the Great Firewall of China, where its minimal handshake and traffic mimicking reduce identifiable signatures.[25] The protocol employs the ChaCha20-IETF-Poly1305 authenticated encryption with associated data (AEAD) cipher for securing data streams, providing 256-bit symmetric encryption resistant to common cryptanalytic attacks while maintaining high performance on resource-constrained devices.[24] Outline's server implementation supports multiple users sharing a single port through credential testing—attempting authentication keys sequentially until a match succeeds—along with features like replay protection via a history buffer of up to 10,000 connections to mitigate denial-of-service risks.[24] Configuration updates can be applied dynamically without restarts using signals like SIGHUP, and metrics for monitoring, such as IP geolocation via MaxMind databases, are exposed via Prometheus endpoints.[24] To counter advanced blocking techniques, Outline has evolved to include Shadowsocks-over-WebSockets encapsulation, introduced around 2025 in collaboration with organizations like ASL19, which disguises proxy traffic as standard HTTPS WebSocket streams, further blending it with legitimate web activity.[18] This layered obfuscation exploits the ubiquity of WebSockets in modern web applications, making deep packet inspection less effective; for instance, it addresses active probing and protocol fingerprinting that plagued earlier deployments.[26] Unlike handshake-heavy protocols, Shadowsocks's stateless nature minimizes connection overhead, with empirical tests showing it sustains throughput under high-latency censorship environments where alternatives fail.[22] These attributes contribute to Outline's resilience, as evidenced by its deployment in regions with stringent controls, though it requires server-side key management to prevent unauthorized access.[25]Features and Capabilities
Ease of Setup and Management
Outline VPN's setup process is designed for accessibility, enabling users to deploy a personal VPN server via the Outline Manager desktop application, which supports Windows, macOS, and Linux. The Manager guides users through selecting a cloud provider—such as DigitalOcean, AWS, or Google Cloud—provisioning a virtual server, and automatically installing the server software using Docker containers, typically completing the initial deployment in under five minutes once a cloud account is established.[20][3] This streamlined approach contrasts with traditional VPN configurations like OpenVPN, which often require manual scripting and extended troubleshooting for non-experts.[21] Post-setup, management occurs entirely within the Outline Manager interface, where administrators can generate, distribute, and revoke access keys for clients without server-side reconfiguration. The app provides real-time metrics on data usage per key and overall server load, facilitating scalability for small teams or individuals by allowing key deactivation to limit access.[1] Updates to the server software are handled automatically through the Manager, reducing maintenance overhead, though users must ensure their cloud instance meets minimum requirements like 1 GB RAM and Ubuntu 20.04 or later.[20] Empirical user reports confirm this simplicity, with deployments on VPS providers like DigitalOcean achievable in minutes via one-click integration, though initial cloud billing setup adds preparatory time.[27] Limitations in ease arise for users lacking cloud infrastructure familiarity, as server deployment assumes access to a VPS or dedicated host, potentially incurring costs starting at $5 monthly for basic instances.[28] Nonetheless, the tool's abstraction of underlying Shadowsocks protocol complexities—via pre-built binaries and automated scripting—prioritizes usability over customization, making it suitable for censorship circumvention in restricted environments without deep networking expertise.[6]Access Sharing and Scalability
Outline VPN facilitates access sharing through its Outline Manager application, which generates unique access keys that can be distributed to multiple users without requiring individual account setups or centralized authentication. These keys, based on the Shadowsocks protocol, allow recipients to connect via the Outline Client app on desktop or mobile devices, enabling straightforward dissemination to trusted individuals such as family or colleagues.[22][29] Administrators can revoke or monitor keys directly from the Manager, supporting data limits per key to prevent overuse, though enforcement relies on server-side configuration rather than real-time tracking.[18] Scalability in Outline VPN is inherently tied to the hosting infrastructure, as the system deploys on user-controlled servers like DigitalOcean droplets or cloud instances, with no inherent cap on concurrent connections beyond hardware and bandwidth constraints. Official documentation indicates that a single server can manage over a thousand active access keys efficiently, leveraging optimized key validation that prioritizes recent connections to minimize latency.[30] For larger deployments, service providers have scaled to thousands of clients by deploying multiple servers or enhancing resources, as evidenced by Jigsaw's updates enabling dynamic key management for high-volume sharing.[18] However, empirical reports highlight limitations: throughput may degrade under heavy load due to single-port multiplexing in Shadowsocks, potentially reducing speeds from hundreds of Mbps to under 2 Mbps on underprovisioned servers during peak usage.[30] Unlike commercial VPNs with enforced device limits (e.g., five simultaneous connections), Outline's model permits unlimited sharing limited only by the server's capacity, promoting flexibility for community or small-scale provider use but requiring manual scaling via additional servers for enterprise-level demands.[31] This decentralized approach enhances resilience against blocking but introduces variability in performance, as scalability depends on factors like CPU, RAM, and network provisioning rather than proprietary optimizations.[25]Integration with Cloud Providers
Outline VPN's Manager software facilitates integration with cloud providers through automated deployment workflows that provision virtual machines, install server software, and configure access keys with minimal user intervention. Primary supported providers include DigitalOcean, Amazon Web Services (AWS), and Google Cloud Platform (GCP), enabling users to select a data center location for optimized latency and censorship circumvention.[32][33] The process begins with user authentication via API keys or credentials for the chosen provider, after which the Manager handles VM creation—typically a lightweight Linux instance with 1 GB RAM and 1 vCPU sufficient for small-scale use—followed by Docker-based installation of the Shadowsocks protocol implementation underlying Outline.[20][27] This integration emphasizes simplicity over custom infrastructure management, contrasting with manual VPN setups that require SSH access and script execution; for instance, DigitalOcean offers a streamlined "guided installation" partnership, reducing setup time to under five minutes for eligible plans starting at $5 USD monthly.[34][20] AWS and GCP deployments similarly leverage the providers' compute engines, with Outline automating firewall rules for ports like 443 (used for obfuscated traffic) and generating unique access keys for client distribution.[33] Users must ensure compliance with provider terms, as VPN usage may trigger resource monitoring or throttling in high-traffic scenarios, though empirical reports indicate reliable performance for up to 100 concurrent connections on basic instances.[35] Beyond automated options, Outline supports manual integration with any Linux-based VPS from other providers, such as Linode or Vultr, via SSH key deployment of the server Docker image (outline/[shadowsocks](/page/Shadowsocks)), allowing flexibility for cost-sensitive or regionally restricted users.[27] This extensibility relies on the open-source nature of the Outline Server repository, hosted on GitHub under Jigsaw-Code, where contributors have documented adaptations for providers lacking native Manager support, including custom scripting for IPsec or WireGuard hybrids.[14] Scalability integrations involve programmatic server management through cloud APIs, though Outline prioritizes self-hosted control over provider-managed VPN services to mitigate logging risks inherent in commercial offerings.[25] Operational costs scale with bandwidth and instance size; for example, a GCP e2-micro instance (free tier eligible in some regions) handles light loads, while AWS t3.micro equivalents incur ~$7-10 USD monthly for persistent use.[36]
Security and Privacy Analysis
Encryption and Obfuscation Mechanisms
Outline VPN implements encryption through the Shadowsocks protocol, which functions as a SOCKS5 proxy with integrated cryptographic protections rather than a full-system VPN tunnel.[37] The protocol mandates the use of Authenticated Encryption with Associated Data (AEAD) ciphers to secure data streams, providing simultaneous confidentiality, integrity, and authenticity for transmitted payloads.[38] Specifically, Outline enforces AEAD_CHACHA20_POLY1305 as the compliant cipher, a stream cipher construction approved by the IETF that combines ChaCha20 for encryption with Poly1305 for message authentication, resistant to known cryptanalytic attacks when keys are properly managed.[14] This cipher operates over TCP and UDP, with keys derived from per-access-key secrets to enable dynamic, revocable connections without central certificate authorities.[39] For obfuscation, Shadowsocks avoids protocol fingerprints that deep packet inspection (DPI) systems target by using a minimal, variable-length handshake followed by continuous encrypted streams that resemble generic TCP traffic, lacking standard TLS handshakes or identifiable headers.[40] Outline bolsters this with built-in probing resistance, where servers ignore or randomly respond to unauthenticated probes—synthetic packets sent by censors to elicit confirmatory replies—thus mitigating active detection without relying on external plugins like obfs4.[14] This design reduces the protocol's visibility in high-censorship environments, as the encrypted payloads do not exhibit periodic patterns or fixed-size chunks exploitable by machine learning-based classifiers.[41] Further enhancements in Outline include optional Shadowsocks-over-WebSockets transport, which encapsulates proxy traffic within WebSocket frames to mimic legitimate web browsing sessions over port 443, evading port-based blocks and superficial DPI. However, these mechanisms prioritize lightweight circumvention over perfect forward secrecy or post-quantum resistance, with encryption relying on symmetric keys shared via out-of-band access keys rather than Diffie-Hellman exchanges.[42] Empirical tests as of 2020 identified passive detection risks through traffic volume analysis or timing side-channels, though AEAD usage prevents decryption without keys.[40]Strengths in Censorship Resistance
Outline VPN's primary strength in censorship resistance stems from its use of the Shadowsocks protocol, which employs stream cipher encryption with built-in obfuscation to mimic innocuous traffic patterns, thereby evading deep packet inspection (DPI) and active probing techniques commonly deployed by national firewalls.[1] This protocol resists protocol fingerprinting more effectively than legacy VPN standards, as it avoids easily identifiable packet headers and handshakes, allowing sustained connectivity in environments with advanced traffic analysis.[1] Self-deployment capabilities enable users or organizations to host servers on arbitrary cloud infrastructure, circumventing blocks on known commercial VPN IP ranges by selecting unmonitored endpoints and regenerating access keys rapidly upon detection.[1] Private key-based access management further limits server exposure, as only authorized clients can connect, reducing the incentive for censors to invest resources in blocking low-profile instances.[1] Protocol evolutions, such as Shadowsocks-over-WebSockets introduced in 2025, encapsulate traffic within standard web protocols and route via content delivery networks (CDNs), disguising VPN flows as routine HTTPS requests and bypassing protocol allowlists or IP-based filtering.[18] This double-encryption layer has proven resilient in testing against Iranian censorship during the 2022 protests, where integrated services like BeePass maintained access for millions amid widespread disruptions.[18] The Outline SDK facilitates embedding circumvention directly into third-party applications, eliminating the need for discrete VPN clients that censors routinely target via app store bans or traffic signatures, as evidenced by a 1,500% daily increase in Android users in Iran during 2022 internet shutdowns.[43] User reports and independent audits affirm its reliability against DNS poisoning, content filtering, and IP blocks where alternatives fail, though effectiveness depends on timely server rotation.[1]Known Vulnerabilities and Limitations
Outline VPN, built on the Shadowsocks protocol, functions as a SOCKS5 proxy rather than a comprehensive VPN tunnel, limiting its protection to application-specific traffic routing and exposing non-proxied traffic, such as DNS queries or system services, to potential leaks if client configurations are incomplete.[37] This proxy nature contrasts with full VPNs, which encapsulate all device traffic, and requires users to manually route applications through the proxy to avoid exposure, increasing misconfiguration risks.[44] The Shadowsocks protocol underpinning Outline is susceptible to detection by advanced censorship systems, such as China's Great Firewall, which employs passive traffic analysis—focusing on initial packet lengths (160–700 bytes) and high entropy (>7)—followed by active probing with replay or random payloads to confirm and block servers.[40] Outline addressed a specific probing vulnerability lacking replay protection in its February 2020 server update (v1.1.0), but ongoing detection evolves, with probes originating from over 12,300 Chinese IPs and blocking delays ranging from 0.28 seconds to 570 hours.[40][45] A July 2024 penetration test by Cure53 on the Outline SDK identified two security vulnerabilities requiring immediate attention: server-side request forgery (SSRF) into internal networks via unfiltered proxy handlers (JIG-03-006) and denial-of-service (DoS) from large concurrent payloads (JIG-03-012), alongside medium-severity issues like predictable DNS transaction IDs enabling response forgery (JIG-03-002) and low-severity concerns such as absent read/connect timeouts risking resource exhaustion (JIG-03-007, JIG-03-011).[46] Additional findings included cryptographic limitations, such as hardcoded HKDF-SHA1 reducing agility and effective key strength (JIG-03-003, JIG-03-004) and MD5 usage in key derivation necessitating password complexity checks (JIG-03-010), with recommendations for timeouts, payload limits, and alternative key derivation functions.[46] One noted connection leakage issue (JIG-03-008) was promptly fixed by the Jigsaw team post-audit.[46] Earlier 2018 audits by Radically Open Security and Cure53 revealed input validation flaws in client and manager components, potentially allowing remote code execution through malicious ss:// URLs or compromised DigitalOcean droplets, which were mitigated via a new ShadowsocksConfig library and code updates.[47] Self-hosting dependencies introduce further limitations, including vulnerability to server provider logging or compromise, lack of built-in kill switches, and frequent IP blocking by censors, necessitating server relocation.[48] Outline's design prioritizes censorship circumvention over enterprise-grade security, forgoing features like perfect forward secrecy in all modes and relying on AEAD ciphers that, while robust, do not match the audited tamper-resistance of protocols like WireGuard.[40][49]Usage Contexts and Empirical Effectiveness
Adoption for Bypassing Restrictions
Outline VPN has gained substantial adoption in nations enforcing widespread internet censorship, where individuals, activists, and organizations deploy it to access prohibited content, social media platforms, and communication tools. Its self-hosted model, leveraging the Shadowsocks protocol, enables users to rapidly establish private servers, circumventing blocks on commercial VPNs that governments frequently target through IP blacklisting or protocol detection.[18][43] A notable surge in usage occurred during the 2022 Iranian protests following Mahsa Amini's death, with Outline VPN downloads on Android devices rising 1,500% as demonstrators bypassed near-total internet shutdowns and selective throttling imposed by the regime.[43] This effectiveness stemmed from Outline's obfuscation capabilities, which masked traffic to evade ISP-level disruptions varying across providers. In similar contexts, such as Russia's post-2022 invasion blocks on Western media and VPN protocols under Roskomnadzor mandates, Outline's decentralized setup has allowed sustained access despite targeted restrictions on known circumvention tools.[18][50] By February 2025, Outline and its associated SDK supported over 30 million monthly users worldwide in resisting censorship, including integrations into apps like news aggregators for seamless, app-specific tunneling that complicates broad-spectrum blocks.[18][43] Providers such as BeePass in Iran have incorporated Outline's infrastructure to optimize tunnel reliability amid dynamic blocking, with data on session durations and autonomous system paths informing adaptations to local threats.[18] To counter advancing tactics like protocol allow-lists, Jigsaw introduced Shadowsocks-over-WebSockets in early 2025, disguising VPN traffic as routine HTTPS to enhance evasion in high-surveillance environments.[18] These developments underscore Outline's role in enabling persistent connectivity, though adoption remains concentrated in regions where censorship intensity drives demand, with empirical success tied to proactive server management and protocol updates.[18][43]Real-World Performance Data
Independent tests of Outline VPN, leveraging the Shadowsocks protocol for lightweight obfuscation, reveal performance that varies significantly with server specifications, geographic proximity to users, cloud provider, and concurrent connections. In a 2023 evaluation using an OVH VPS with 1 GB RAM and 1 CPU core, Outline achieved download speeds of 75 Mbps and upload speeds of 32 Mbps over an LTE baseline of 79 Mbps download and 25 Mbps upload, with ping latency increasing from 82 ms to 139 ms.[51] This setup demonstrated lower jitter (1.7 ms) compared to alternatives like OpenVPN, which yielded only 20 Mbps download and 3 Mbps upload under similar conditions, highlighting Outline's efficiency advantage due to reduced protocol overhead.[51] A more recent 2024 test from Tbilisi, Georgia, to a Paris server over 100 Mbps Wi-Fi reported Outline sustaining 36.05 Mbps download and 29.48 Mbps upload against a baseline of 87.28 Mbps download and 78.41 Mbps upload, with idle ping at 75 ms—indicating a moderate speed penalty attributable to encryption but retaining viability for browsing and streaming.[52] However, user-reported benchmarks often show greater degradation; for instance, a May 2024 forum post detailed throughput dropping to 1.5 Mbps from a 300 Mbps baseline, potentially due to suboptimal server sizing or ISP throttling.[53] Earlier assessments in 2018 using Ookla tools similarly noted substantial reductions in download/upload speeds and elevated latency, underscoring setup-dependent limitations on low-end instances.[54]| Test Source | Date | Download (Mbps) | Upload (Mbps) | Ping/Latency (ms) | Baseline Context |
|---|---|---|---|---|---|
| IdolsGate (OVH VPS) | 2023 | 75 | 32 | 139 (ping) | LTE: 79/25 Mbps, 82 ms ping[51] |
| NoProx (Paris server) | 2024 | 36.05 | 29.48 | 75 (idle) | 100 Mbps Wi-Fi: 87.28/78.41 Mbps[52] |
| Reddit User Report | May 2024 | 1.5 | N/A | N/A | 300 Mbps normal[53] |