Google has known about a bug that breaks VPN apps for 7 months, leaving users exposed with no warning or error, just a VPN app that stopped working in the background.

If you're using ANY VPN on Android, you can help us by getting Google's attention to fix it.

We first reported this bug to Google in September 2025.

Others like @mullvadnet and Wireguard reported it even earlier, in August.

Google's response? "I don't see anything unusual."

Here's what's actually happening ⤵️

The bug corrupts Android's network stack at the system level after a VPN update, causing users to blame their VPN provider.

Restarting the app doesn't help, with the only fix being a full device reboot or VPN app reinstall, something which most users never figure out.

This affects several VPN providers on Android 16, and only Google has the access to diagnose it properly.

After 7 months of waiting, we're now asking publicly: Google, when are you fixing this?

Google Issue Tracker

@protonprivacy

MF J6 on a raft, this is why I see ads where I didn't expect them as VPN (Wireguard) is connected to a router using PiHole DNS.

@protonprivacy Will Proton ever create / sponsor a cell phone OS to be a true google replacement?
Second donation to GrapheneOS by the Proton Foundation - GrapheneOS Discussion Forum

GrapheneOS discussion forum

GrapheneOS Discussion Forum
@protonprivacy I thought grapheneos still depends on google to fix bugs in the underlying AOSP, I'm talking a Linux OS that can run android apps
@semitones @protonprivacy as far as I know, not in AOSP, because this is open source and I have read or heard that gos is fixing things Google doesn't fix.
@protonprivacy @semitones That was 2 years back as per the link. They need regular support. Please prioritize this.

@protonprivacy @semitones

Or we could stop the grift & circle jerk. Release your source code so we can make secure email a real standard. Stop releasing to the play store entirely & teach people to install their own apps safely.

Start initiatives to teach children about public private keys, identity verification, trust, & best practices.

Be a man proton.

Or are the normie dollars making you salivate? With fascism on their doorstep, you do have more customers, better bank on their ignorance…

@rusty__shackleford @protonprivacy @semitones
Proton: "hey google is ignoring this issue, lets make them fix it"

You: "you are not 1000% perfect, Proton! Man up! Greedy fucks!"

@ItsePerkele @protonprivacy @semitones

Me: Fuck google

Me: Fuck proton too

@rusty__shackleford @protonprivacy @semitones

Dont let perfection be the enemy of good.

Or something like that.

@ItsePerkele @protonprivacy @semitones

Or, and this is a wild concept... we can hold everyone accountable. Crazy, I know.

@ItsePerkele @rusty__shackleford @protonprivacy @semitones

Rudeness aside. There is a compelling reason to ditch google as fast as possible. Security and personal control. We need to rapidly shift the center from a market focus on helpless users who want to be fed and diapered to people that want to own their own lives before we get lobbied and legislated out of existence.

@semitones @protonprivacy To be a true Google replacement, all of the vendors would have to write their drivers so that they could be incorporated into either Android or this new probably Linux-based phone operating system. We already have solutions that work for one or two or twelve different models or vendors, but all of the rest of the cell phone ecosystem is currently out of reach. I propose an alternative, a version of Android that belongs to the community, but will use the vendor's drivers and can replace Google Android with the community android. Google will, of course, attempt to make that technically impossible and illegal if they can, because that's what monopolies do.
@wpeckham @protonprivacy that would have to be a fork of android AOSP, right? To keep google from making breaking changes?

@protonprivacy @mullvadnet Since you are saying that only Google can inspect the issue, can one correctly assume that in projects as @GrapheneOS VPNs are not affected?

Because on personal anecdote, I cannot recall an issue forcing a reboot in the last months regarding VPN use. 

@raisondetredev @protonprivacy @mullvadnet @GrapheneOS happens very frequently. It's a real bug. And both reinstall and reboot are required.

@protonprivacy You could never rely on Google network stack.

And by the way, Apple is also bypassing VPN sometimes.

https://www.kuketz-blog.de/warnung-android-leakt-beim-connectivity-check-daten-an-vpn-verbindungen-vorbei/

"We have looked into the feature request you have reported and would like to inform you that this is working as intended. We do not think such an option would be understandable by most users, so we don’t think there is a strong case for offering this."

And the arrogance Google is showing is not new as well and gives me the feeling this is not a bug but it works as designed

Warnung: Android leakt beim Connectivity-Check Daten an VPN-Verbindungen vorbei

Aktuell prüfe ich für die Artikelserie »Custom-ROMs« gerade das Datensendeverhalten bekannter Android-ROMs. Dabei ist mir etwas aufgefallen, was ich nachfolgend…

@protonprivacy I've had this happen to me on Mullvad, Proton, and my Wireguard link to my home router. And honestly, from the description, I think the issue may be even older, as I'm almost positive the DDG local tracker blocker used to do this.

I had no idea it was an known issue in Android itself.

Thanks for bringing it to light.

@protonprivacy @mullvadnet

Making sure I'm reading this correctly:

If you're running Android (or an Android variant) and your VPN app updates, the only way to stop this issue is to:

1. Reboot your phone after the VPN update

OR

2. Keep the phone on, delete the VPN app, and reinstall the app

Am I correct in reading that one or the other approaches will fix this?

IE, restarting your phone after an update eliminates the need to delete and reinstall the app?

(and thank you, and Google wtaf)

@funnymonkey @protonprivacy @mullvadnet can confirm that the second worked for my Samsung phone, and not the first. Yes, wtaf.
@protonprivacy @mullvadnet is this an issue in @GrapheneOS too or was it fixed there?

@protonprivacy @mullvadnet

are you guys still Trump supporters?

@protonprivacy @mullvadnet thanks for stepping in and telling us 🫶
@protonprivacy @mullvadnet
Who gets hurt most:
Not the average user streaming Netflix. The people most exposed are exactly the people VPNs exist to protect i.e. journalists in hostile environments, activists, whistleblowers, people in countries where unencrypted traffic gets people killed. Silent VPN failure in those contexts isn't inconvenient. It's dangerous.

@protonprivacy @mullvadnet

As someone who's done plenty of Android testing in IPv6-mostly/only environments, this is not even slightly surprising, Android's networking state machine is a huge mess

@protonprivacy and why didn't you inform your users and paying customers? because I don't recall any email from Proton on this topic...
@protonprivacy @mullvadnet I had decided long ago not to use VPNs on Android because it didn't actually help. Connecting to the onion network and using Tor tools does kind of help but only solves half of the problem. far better to work from Linux instead of Android where you have the option but in my case that means not using the cell phone for that particular traffic or anything that requires real security.

@protonprivacy @mullvadnet

We need an android alternative we the people own.

@protonprivacy @mullvadnet does anyone know if this is an issue on @GrapheneOS as well or if its been patched there.