My Apply
My Apply



Building a more secure, accessible and resilient WireGuard VPN protocol

Virtual Private Networks (VPN) are used around the world as both an internet access and privacy tool, enabling the circumvention of state-imposed blocks and helping individuals protect their personal information while online. Unfortunately, most VPNs rely on underlying protocols that have numerous, widely known vulnerabilities, massive codebases, and significant performance issues. Furthermore, these protocols are increasingly being targeted by repressive governments seeking to prevent users from overcoming censorship. WireGuard was created to address these issues. WireGuard features a lightweight codebase, extensive security review, and integration of many important security features lacking in previous protocols such as a "fail-closed" feature (forcing a more secure connection by default).

The WireGuard protocol is relatively new, but it has experienced skyrocketing adoption for Linux kernel and acclaim for its approach as a simpler yet more secure VPN option. This project will advance this effort, allowing more concentrated focus on developing and improving WireGuard, such as through more dedicated operating system (e.g. kernel) development, project code maintenance and improvement, bug tracking, development of client software for users, further research into improving the protocol, and ecosystem development to raise awareness and adoption of WireGuard.

Get the word out

Current project status

Just an idea (Pre-alpha)
It exists! (Alpha/Beta)
It's basically done (Release)
People use it (Production)

Funding to date

2018 $250,000 12 months
Internet Freedom Fund

Total Funding: $250,000

Addressed problems

  • Blocking, filtering, or modification of political, social, and/or religious content (including apps)
  • Technical attacks against government critics, journalists, and/or human rights organizations (Cyberattacks)
  • Restrictive Internet filtering by technical methods (IP blocking, DNS filtering, TCP RST, DPI, etc.)
  • Localized or nationwide communications shut down or throttling (Blackouts)
  • Repressive surveillance or monitoring of communication
  • Policies, laws, or directives that increase surveillance, censorship, and punishment
  • Government practices that hold intermediaries (social networks or ISPs) liable for user content


  • Access to the Internet
  • Awareness of privacy and security threats
  • Privacy enhancement
  • Security from danger or threat online


  • Deploying technology
  • Software or hardware development
  • Testing
  • Research
  • Technology development


  • Youth
  • General public
  • Women
  • Sexual minorities
  • Ethnic minorities
  • Activists
  • Journalists
  • Advocacy groups/NGOs
  • Academia
  • Technologists
  • Entrepreneurs
  • Government
  • Other

Region(s) archive

  • Global

Project status

  • People Use It. (Production)
  • It Exists! (Alpha/Beta)

Technology attributes

  • Application deployment
  • Cryptography
  • Desktop App
  • Desktop client
  • Hardware/Embedded device(s)
  • Mobile application (clientside)
  • Networking
  • Other
  • Sensitive data
  • Server daemon
  • Unmanaged language
  • User interface/experience
  • Web API/Mobile application (serverside)
  • Web application
  • Wireless Communication
  • Anonymity

We wrote about it