by mentioning “steam downloading” and “if the company vpn client can run side by side with proton” i can assume you are using your personal computer, not a work pc, thus being at home, not at work, while having installed the company’s vpn client in your computer. correct?
Can I connect the browser to ProtonVPN using split tunneling if I am already connected to another VPN? That is one of my issues
only one active vpn client at a time. i said you are covered with split tunneling to browse the web thought proton’s network while steam downloads through the normal route, being ’ your modem - isp - steam servers ’ and back. so far split tunneling is used to allow or exclude apps and addresses from using the vpn, unfortunately not in conjunction with another vpn client and network at the same time. i searched endlessly for this without result with clear common sense in mind: “if a client featuring split tunneling can separate apps and links between vpn and unencrypted isp route then two clients both with split tunneling can be set and allow easy route management and selection of apps and links per client per network. logical so viable” NOPE they cannot it’s an ip conflict/issue/something, someone was explaining in a site but i stopped reading after seeing it cannot be done currently.
Not sure about other, but Nord and Express (can’t 100% confirm the second, haven’t used it) allow client-less VPN using the extension. Based on the descriptions of the Firefox extensions page, seems many others allow it too
- coincidentally i have an expressvpn annual subscription but i don’t know if the extension acts as a standalone client, i installed the .exe in win10 which installed the extension on its own in chrome automatically
you last paragraph confused me in the most part of it
- i said torrents through vpn due to the nature of the protocol, with the multiple simultaneous connections the torrents launch and use, which is a formidable stress test, bordering network abuse if it’s massive data flow is not supported by the vpn. encrypting torrent data packets that could never reach their destination but you do it which means resources usage. you need a really good physical infrastructure and briliant QoS to support encrypting torrent connections.
secondly I talked about the user connecting to the general internet through his vpn doing intentional harm to the company, not about malicious code due to user carelessness. without further clarification i can only say basic things based on logical steps of common sense: vpn = initial level of company’s security concerns = limitations to employees. viewing it primarily from a security standpoint, in order to prohibit the user (you) and avoid letting you managing harming the company by allowing an unknown non transparent connection connecting to the web
another angle is that they can also say: “oh okay you are harmless but you want to browse the web during work? let’s get you fired to browse the web fully carefree at home without costing us 12 paychecks annually”
see where i am going so far? to a main legitimate multifaceted pack of genuine reasons with viable created countermeasures prohibiting you
if you company doesn’t have a strict security-centric culture, you can download a portable version of chrome, install an extension standalone client of any free vpn (that actually encrypts not just rerouting and lying to collect and sell data) and test it through the company’s vpn to see what’s what