I've noticed it too. I seem to have to disconnect and switch servers at least once a day. The capchas are getting out of hand too, but I wasn't sure if that had to do with the intense AI company scraping going on in general or my VPN use.
Proton
Empowering you to choose a better internet where privacy is the default. Protect yourself online with Proton Mail, Proton VPN, Proton Calendar, Proton Drive. Proton Pass and SimpleLogin.
Proton Mail is the world's largest secure email provider. Swiss, end-to-end encrypted, private, and free.
Proton VPN is the world’s only open-source, publicly audited, unlimited and free VPN. Swiss-based, no-ads, and no-logs.
Proton Calendar is the world's first end-to-end encrypted calendar that allows you to keep your life private.
Proton Drive is a free end-to-end encrypted cloud storage that allows you to securely backup and share your files. It's open source, publicly audited, and Swiss-based.
Proton Pass Proton Pass is a free and open-source password manager which brings a higher level of security with rigorous end-to-end encryption of all data (including usernames, URLs, notes, and more) and email alias support.
SimpleLogin lets you send and receive emails anonymously via easily-generated unique email aliases.
This is an issue to take up with individual website operators.
Almost every large website is going to be protected by both a CDN and an application firewall, either of which can be configured to slow down, gatekeep or outright block traffic coming from an IP that is suspected to be a VPN. And there are many reasons why they could be doing this:
- websites that rely on advertising to operate get less value from VPN users. A lot of users using the same IP address means advertisers have a more difficult time showing them relevant ads, thus paying the website less for them. So there is a financial incentive for a website to convince its users to stop using their VPN voluntarily.
- a security-minded site could be concerned with malicious actors using VPNs to shield their identities and locations during attack/breech attempts.
- a site seeking to protect its content from automated scraping by various bots (search crawlers, LLM data harvesting or competitors) may believe that those actors are using VPNs to hide their identities.
The only solution I can see is to reach out to the site operators themselves and explain your valid use case. I’ve done this a few times myself. I’ve never received a response, but some of the websites that I visit which used to block my VPN traffic eventually stopped blocking it.
If you don’t like something, make some noise.
Alternatively, you could use a cloud provider to spin up a micro instance running your own OpenVPN server that you re-roll IPs on occasionally, but this takes more effort and doesn’t really address the root cause.
Is Mullvad any better?
Unfortunately many Mullvad endpoints are blocked and slowed down too.
Its getting frustrating to use. The first times this happened they encouraged to report the blocks but now they just tell you to switch servers until it works.