It’s a somewhat convoluted story. Here are some links
- https://proton.me/blog/climate-activist-arrest
- https://old.reddit.com/r/ProtonMail/comments/ydcek3/what_became_of_the_french_climate_activist/
- https://www.wired.com/story/protonmail-amends-policy-after-giving-up-activists-data/
The takeaway is when he logged into his Protonmail they logged his IP address which helped track this individual down. But note that Reddit thread I linked. I also cannot find that much information about “what happened next,” or the details of who was arrested and why.
There may be other examples, but this particular case kinda hit the rounds back when it happened.
So to be perfectly clear, setting up Wireguard is about bridging two LANs (or devices) to make them virtually appear as if they belong on the same network. For every client that connects they would need to be issued a key and every device would have to be set up. But all the traffic between the two “LANs” would be encrypted and secure.
But I don’t think WireGuard is what you’re looking for, because this would require setting up all these other people with WireGuard as well. Or doing a more complex setup where you use a VPS and WireGuard and have that serve an exit point instead of your home connection. Or any other number of more complex setups that would work but require a lot more effort… and it sounds like you were just looking for basic port forwarding.
Mullvad took that feature away a couple of years ago (presumably to combat CSAM dissemination). So if you were hoping to just have a secure path for someone to connect to your media server routed through Mullvad, I don’t believe that’s possible anymore.