Surfshark's MultiHop feature, often referred to as Double VPN, routes your internet traffic through two VPN servers in succession. This creates an additional layer of encryption and obfuscation compared to standard single-server VPN connections. For users seeking enhanced privacy, it's a targeted tool within Surfshark's suite, but it comes with trade-offs in speed and usability. This article breaks down its mechanics, benefits, real-world behavior, and limitations.
At its core, MultiHop extends the traditional VPN model by chaining two servers. Your device connects to an "entry" server, which encrypts your traffic and forwards it to an "exit" server. The exit server then decrypts the outer layer, applies its own encryption, and sends the traffic to the destination site. The destination sees only the exit server's IP, while no single server holds your full unencrypted data.
Surfshark brands this as MultiHop, distinguishing it from generic double VPN implementations. It uses pre-selected server pairs—typically combining locations for strategic coverage, like a European entry to a North American exit. This isn't manual chaining; Surfshark handles the routing automatically upon activation.
The concept draws from onion routing principles (similar to Tor) but operates within a commercial VPN's infrastructure. It's not infinite hopping—strictly two hops—to balance security gains with practicality.
Surfshark employs WireGuard or OpenVPN protocols for MultiHop, with WireGuard often preferred for its efficiency in multi-hop scenarios. The entry server encapsulates your traffic in its first encryption layer (e.g., ChaCha20 for WireGuard), tunnels it to the exit server via a dedicated backhaul connection, and the exit server unwraps it before re-encrypting with its keys.
Key technical aspects include:
Server Pairing: Fixed combinations, such as US to UK or Germany to Australia, optimized for low-latency paths. Users select from a dropdown in the app without custom configurations.
Encryption Overhead: Double AES-256 or equivalent, meaning two full encryption/decryption cycles per packet.
IP Leak Prevention: MultiHop inherits Surfshark's kill switch and leak protection, but the dual routing adds redundancy against entry-server compromises.
In practice, this behaves reliably on stable networks. The backhaul links between servers are Surfshark-owned, reducing third-party dependencies and potential bottlenecks.
MultiHop matters primarily for privacy amplification. A single VPN server, if logged or compromised, exposes your full activity. With double hopping:
The entry server sees your real IP but not the destination (only the exit server's address).
The exit server sees the destination but attributes it to the entry server's IP.
Attackers must breach both servers simultaneously for correlation attacks.
This guards against:
Jurisdiction-specific surveillance, by splitting logs across regions.
Traffic analysis, as the dual encryption obscures patterns.
Man-in-the-middle risks on public Wi-Fi, where one hop might suffice but two provide margin.
In threat models involving state actors or targeted monitoring, MultiHop elevates protection without needing Tor's full anonymity network. Independent audits of Surfshark's no-logs policy (verified by firms like Deloitte) apply here, ensuring neither server retains usable data.
Expect noticeable impacts from the dual routing. Generally, MultiHop halves throughput compared to single-hop connections due to:
Extra encryption processing on both servers.
Increased latency from inter-server travel (often 50-200ms added round-trip).
Bandwidth limits on backhaul links to prioritize reliability.
On high-speed fiber connections (500Mbps+ base), users often see 100-250Mbps through MultiHop—sufficient for streaming or browsing but not raw downloads. Mobile or congested networks amplify slowdowns, sometimes to 20-50% of single-hop speeds.
Latency rises predictably with geographic distance between pairs; closer hops (e.g., intra-EU) perform better than transcontinental ones. Surfshark mitigates this via RAM-only servers and optimized routing, but it's not instantaneous like single-hop.
MultiHop shines in specific scenarios rather than daily use:
High-risk activities like journalism in censored regions or accessing blocklists that detect single VPNs.
Obfuscating VPN usage itself, useful against DPI (deep packet inspection) in restrictive networks.
Layering privacy for torrenting or sensitive research, where extra hops deter casual snooping.
Avoid it for low-threat browsing, as the overhead rarely justifies routine activation. Toggle it via Surfshark's one-click feature for on-demand use.
While robust, MultiHop has caveats that trip up users:
Speed Degradation: Often unsuitable for gaming or 4K streaming; test pairs empirically.
Limited Pairs: Only 10-15 pre-sets, no custom routes, restricting flexibility versus manual tools like Whonix.
Battery Drain: Dual processing taxes devices, though Surfshark's lightweight apps minimize this.
Compatibility Edge Cases: Rare protocol mismatches on older firmware, resolved by sticking to WireGuard.
Overkill for Most: Adds complexity without proportional gains against browser fingerprinting or endpoint leaks.
A short list of troubleshooting tips:
Switch server pairs if latency spikes.
Disable for speed-critical tasks.
Verify via ipleak.net post-activation.
Misconfigurations, like running MultiHop with split-tunneling, can expose traffic—always full-tunnel.
Surfshark MultiHop delivers a practical double VPN without the setup hassles of DIY solutions, striking a balance for privacy-focused users. It meaningfully bolsters security in targeted scenarios through clever server chaining and strong encryption, but its performance hit demands judicious use. For general browsing, single-hop suffices; reserve MultiHop for when threats warrant the extra layer. As VPN tech evolves, features like this underscore Surfshark's commitment to configurable depth, though always weigh it against your bandwidth needs and risk profile.