# "[[WireGuard]] is the future"
September 27, 2017: https://mullvad.net/en/blog/2017/9/27/wireguard-future/
We've been either first or early adopters in
- not requiring any personal information from customers
- supporting OpenVPN (among consumer-targeted VPN services)
- providing a custom, open-source VPN app for Windows, macOS, and Linux
- supporting IPv6
- preventing DNS, Teredo, and IPv6 leaks
- accepting anonymous payments with Bitcoin and cash
- supporting traffic obfuscation (through obfsproxy).
### [[WireGuard]] is our wish list
Back in early 2015, [we were asked by TorrentFreak](https://torrentfreak.com/anonymous-vpn-service-provider-review-2015-150228) which cryptographic primitives we recommend. Our answer: "...ideally we would recommend Ed25519 for certificates, Curve25519 for key exchange (ECDHE), and ChaCha20-Poly1305 for data streams but that suite isn’t supported by OpenVPN." These are the exact primitives that WireGuard contains, but at that time, they were nothing more than a wish list.
### Simple, sound, solid
We find [[WireGuard]] beneficial for a number of reasons. Its **simplistic design** in few lines of code makes it easier for sysadmins and developers to integrate it correctly – and harder for them to get it wrong.
WireGuard is also **cryptographically opinionated**. In other words, it supports only one cryptographic suite and that's it. *Supporting multiple suites, so-called "cipher agility," may sound more optimal, but history has shown that this introduces unnecessary complexity and leads to security vulnerabilities*. The WireGuard protocol design, however, allows for changing to a new suite should there ever be a problem.
The algorithms that the WireGuard developers chose to use are based on a combination of **solid theoretical work, great performance, and sound design**. They have **no state- and data-dependent variations in timing**, thereby reducing the risk of certain cryptographic attacks.
### Mass adoption is only a matter of time
As part of our continued efforts to spearhead the adoption of this technology, our intention is to make WireGuard our default VPN protocol. We encourage others to do likewise. Currently, only a small number of services are experimenting with WireGuard. But as awareness of its potential spreads, adoption of WireGuard will grow considerably.
We believe that WireGuard is improving not only our own products but also the world as a whole, which is why [Mullvad's donation to WireGuard](https://mullvad.net/blog/2017/7/13/mullvad-donates-wireguard/) was a no-brainer (you can also [donate to WireGuard](https://www.wireguard.com/donations/)). **But more specifically, WireGuard will move the world one step closer to our own vision – of making mass surveillance ineffective**.