<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton VPN Blog</title><description>Free VPN News</description><link>https://protonvpn.com/</link><language>en</language><feed_url>https://protonvpn.com/feed</feed_url><item><title>Proton VPN 2025-2026 fall and winter recap</title><link>https://protonvpn.com/blog/fall-winter-recap-2025-2026</link><guid isPermaLink="true">https://protonvpn.com/blog/fall-winter-recap-2025-2026</guid><description>As promised, over the last few months we&apos;ve been focusing on delivering features to greatly improve your VPN experience.</description><pubDate>Wed, 08 Apr 2026 16:18:24 GMT</pubDate><content:encoded>
&lt;p&gt;As &lt;a href=&quot;https://protonvpn.com/blog/product-roadmap-winter-2025-2026&quot;&gt;promised&lt;/a&gt; in our fall and winter roadmap, over the last few months we&amp;#8217;ve been focusing on delivering features to greatly improve your VPN experience, such as building a &lt;strong&gt;new VPN architecture&lt;/strong&gt; and delivering a &lt;strong&gt;Linux CLI&lt;/strong&gt;. We&amp;#8217;ve also made improvements that weren&amp;#8217;t originally on our roadmap, such as making &lt;strong&gt;NetShield Ad-blocker even more effective&lt;/strong&gt;.&lt;/p&gt;



&lt;p&gt;We&amp;#8217;d like to share with you, the Proton community, how this work is going, and to fill you in on any updates you may have missed. We’ll also post our roadmap for spring and summer soon, so be sure to check back in and see what’s coming next.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A new VPN protocol codebase for faster, more reliable apps&lt;/h2&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;484&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_484,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA&quot; alt=&quot;New VPN architecture&quot; class=&quot;wp-post-22401 wp-image-12766&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;1 MB&quot; data-optsize=&quot;71 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.1&quot; data-version=&quot;1761652149&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_484,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_142,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_363,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_726,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_968,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_741,c_scale/f_auto,q_auto/v1761652149/wp-vpn/new-vpn-architecture/new-vpn-architecture.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;We&amp;#8217;ve been busy working on an exciting new client‑side &lt;a href=&quot;https://protonvpn.com/blog/what-is-wireguard&quot;&gt;WireGuard®&lt;/a&gt; codebase that unlocks the next generation of Proton VPN performance, reliability, and censorship resistance. Soon to be available for beta testing on Android and Windows, we&amp;#8217;ve already ensured this new codebase means:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Faster and more reliable apps&lt;/li&gt;



&lt;li&gt;Greatly improved anti-censorship capabilities&lt;/li&gt;



&lt;li&gt;Fewer disconnects and dropouts&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Power, precision, and privacy from the Linux terminal&lt;/h2&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;512&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA&quot; alt=&quot;The Proton VPN Linux CLI&quot; class=&quot;wp-post-22401 wp-image-22422&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;2 MB&quot; data-optsize=&quot;135 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;91.5&quot; data-version=&quot;1775144387&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1775144387/wp-vpn/proton-vpn-cli_blog_cover1/proton-vpn-cli_blog_cover1.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;We&amp;#8217;ve heard from &lt;a href=&quot;https://protonmail.uservoice.com/forums/932836-proton-vpn/suggestions/47439905-updated-command-line-interface-cli&quot;&gt;our community&lt;/a&gt; that command-line support matters for Linux users. You can now enjoy Proton VPN’s trusted encryption and Swiss privacy from the Linux terminal, allowing you to skip the graphical interface and launch secure connections in seconds. Our &lt;a href=&quot;https://protonvpn.com/support/linux-cli&quot;&gt;Linux CLI&lt;/a&gt; (command-line utility) is built for speed and reliability, providing the fastest way to protect your privacy and manage your VPN without leaving the keyboard.&lt;/p&gt;



&lt;p&gt;Available for Ubuntu, Debian, Fedora, and Arch, our new Linux CLI now supports a host of advanced features, such as &lt;a href=&quot;https://protonvpn.com/support/prevent-ipv6-vpn-leaks#linux-cli&quot;&gt;IPv6&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/support/moderate-nat#linux-cli&quot;&gt;moderate NAT&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/support/custom-dns#linux-cli&quot;&gt;custom DNS&lt;/a&gt;, a &lt;a href=&quot;https://protonvpn.com/support/what-is-kill-switch#linux-cli&quot;&gt;kill switch&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/support/how-to-use-vpn-accelerator#linux-cli&quot;&gt;VPN Accelerator&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/support/netshield#linux-cli&quot;&gt;NetShield Ad-blocker&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/support/port-forwarding#linux-cli&quot;&gt;port forwarding&lt;/a&gt;, and more.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;NetShield Ad-blocker is now six times more powerful&lt;/h2&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;512&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA&quot; alt=&quot;VPN domains blocked by NetShield&quot; class=&quot;wp-post-22401 wp-image-14686&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;1 MB&quot; data-optsize=&quot;91 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;92.1&quot; data-version=&quot;1771583088&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_512,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_150,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_384,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_768,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1024,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_784,c_scale/f_auto,q_auto/v1771583088/wp-vpn/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8/20260219-1200x600-blog-size-vpn-domains-blocked-by-netshield-graphic-1_14686c34c8.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Although it wasn&amp;#8217;t part of our original roadmap, we&amp;#8217;ve made major improvements to &lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker&quot;&gt;NetShield Ad-blocker&lt;/a&gt;, our DNS filtering feature. NetShield has always been highly effective at blocking ads, malware, and tracker domains, and now it &lt;strong&gt;blocks six times more ads and trackers&lt;/strong&gt; than before.&lt;/p&gt;



&lt;p&gt;This is because NetShield now blocks subdomains in addition to root domains. For example, instead of just blocking connections to &lt;a href=&quot;http://tracker.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;tracker.com&lt;/a&gt;, NetShield now also blocks connections to &lt;a href=&quot;http://api.tracker.com&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;api.tracker.com&lt;/a&gt; &lt;a href=&quot;http://cdn.tracker.com&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;cdn.tracker.com&lt;/a&gt;, &lt;a href=&quot;http://pixel.tracker.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;pixel.tracker.com&lt;/a&gt;, and similar subdomains. As a result, it provides stronger protection for private, secure browsing.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Faster, simpler, more reliable&lt;/h2&gt;



&lt;p&gt;We&amp;#8217;ve also introduced many under-the-hood improvements that make Proton VPN apps more intuitive and easy to use:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Added support for &lt;strong&gt;6 new languages&lt;/strong&gt;, bringing the &lt;a href=&quot;https://protonvpn.com/support/change-language&quot;&gt;total number of languages supported&lt;/a&gt; in all our apps (except Linux) to 35.&lt;/li&gt;



&lt;li&gt;Added &lt;strong&gt;City view&lt;/strong&gt; on Linux, iOS, iPadOS, and macOS (beta), so you can browse and connect to specific cities and states directly from the country list.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Improved &lt;a href=&quot;https://protonvpn.com/support/protonvpn-split-tunneling&quot;&gt;split tunneling&lt;/a&gt; and the &lt;a href=&quot;https://protonvpn.com/support/what-is-kill-switch&quot;&gt;kill switch&lt;/a&gt; on Windows&lt;/strong&gt; so you can use them together.&lt;/li&gt;



&lt;li&gt;Improved &lt;strong&gt;Connection preferences&lt;/strong&gt; on Android so you can exclude locations when you connect to &lt;strong&gt;Fastest&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Greatly improved startup reliability on the Android app.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Even better for business&lt;/h2&gt;



&lt;p&gt;Proton VPN for Business continues to expand its feature portfolio for teams and organizations. Over the last few months, we&amp;#8217;ve introduced:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;A new &lt;a href=&quot;https://protonvpn.com/support/proton-vpn-business&quot;&gt;VPN + Pass&lt;/a&gt; plan aimed at professional users&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/support/business-groups&quot;&gt;Groups&lt;/a&gt;: Administrators can create user groups and customize each group’s access to Gateways and shared servers, providing granular control access to sensitive resources based on user identity.&lt;/li&gt;



&lt;li&gt;Support for more MDM providers: Iru, FletDM, SimpleDM, and Workspace ONE.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;So what’s next?&lt;/h2&gt;



&lt;p&gt;To find out more, watch out for our upcoming Proton VPN spring and summer roadmap.&lt;/p&gt;



&lt;p&gt;Thank you for supporting our work to make privacy and freedom available to everyone. To tell us what you think about our recent improvements or to suggest new features, &lt;a href=&quot;https://protonmail.uservoice.com/forums/932836-proton-vpn&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;join our community&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Proton stories</category><author>Antonio Cesarano</author></item><item><title>IKEv2 support is ending on macOS</title><link>https://protonvpn.com/blog/ikev2-ending</link><guid isPermaLink="true">https://protonvpn.com/blog/ikev2-ending</guid><description>To improve security and app performance, we&apos;re removing support for the IKEv2 VPN protocol from our macOS app.</description><pubDate>Thu, 26 Mar 2026 11:34:05 GMT</pubDate><content:encoded>
&lt;p&gt;To improve security and performance, we&amp;#8217;re removing support for the &lt;a href=&quot;https://protonvpn.com/blog/ikev2&quot;&gt;IKEv2 VPN protocol&lt;/a&gt; from our macOS app. If you currently use IKEv2, you&amp;#8217;ll need to switch to a &lt;a href=&quot;https://protonvpn.com/blog/whats-the-best-vpn-protocol&quot;&gt;modern VPN protocol&lt;/a&gt; before the change takes effect.&lt;/p&gt;



&lt;p&gt;Apple’s native IKEv2 implementation on macOS has been a source of &lt;a href=&quot;https://protonvpn.com/blog/apple-ios-vulnerability-disclosure&quot;&gt;ongoing security concerns&lt;/a&gt;, including traffic leaks that can expose your real &lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/&quot;&gt;IP address&lt;/a&gt;. Powerful, sleek, and secure modern VPN protocols — such as &lt;a href=&quot;https://xn--19g/&quot;&gt;WireGuard®&lt;/a&gt; and our own &lt;a href=&quot;https://protonvpn.com/blog/stealth-vpn-protocol&quot;&gt;Stealth&lt;/a&gt; protocol — offer better performance and stronger privacy guarantees.&lt;/p&gt;



&lt;p&gt;There is no longer a reason for us to continue supporting IKEv2, and we have long since stopped doing so on all our other apps.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What to use instead of IKEv2&lt;/h2&gt;



&lt;p&gt;Instead of IKEv2, you can use:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Smart Protocol (default)&lt;/strong&gt;: Let the app automatically select the best protocol for your network. This is the easiest option, and is enabled by default. Smart Protocol will intelligently switch between protocols and ports as needed.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;WireGuard&lt;/strong&gt;: A fast, lightweight, and secure protocol that is now the default on our macOS app. WireGuard offers significantly better performance than IKEv2, with the added benefit of excellent security.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Stealth&lt;/strong&gt;: Our custom obfuscation protocol is based on WireGuard and tunneled over TLS. Stealth is designed to defeat censorship and deep packet inspection in restrictive network environments.&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1524&quot; height=&quot;1330&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1524,h_1330,c_scale/f_auto,q_auto/v1759393853/wp-vpn/change-protocols-macos/change-protocols-macos.png?_i=AA&quot; alt=&quot;Change VPN protocol on macOS&quot; class=&quot;wp-post-21695 wp-image-12579&quot; style=&quot;width:600px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;438 KB&quot; data-optsize=&quot;58 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;86.7&quot; data-version=&quot;1759393853&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1759393853/wp-vpn/change-protocols-macos/change-protocols-macos.png?_i=AA 1524w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_262,c_scale/f_auto,q_auto/v1759393853/wp-vpn/change-protocols-macos/change-protocols-macos.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_894,c_scale/f_auto,q_auto/v1759393853/wp-vpn/change-protocols-macos/change-protocols-macos.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_670,c_scale/f_auto,q_auto/v1759393853/wp-vpn/change-protocols-macos/change-protocols-macos.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1524px) 100vw, 1524px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/support/how-to-change-vpn-protocols&quot;&gt;&lt;strong&gt;Learn how to change VPN protocols or select Smart Protocol&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Don&amp;#8217;t see WireGuard or Stealth as an option?&lt;/h2&gt;



&lt;p&gt;WireGuard and Stealth require the use of a macOS network extension (called system extensions on older macOS versions). If you don&amp;#8217;t see these protocols listed in your Proton VPN app, it likely means the system isn&amp;#8217;t enabled. This is a common issue, as macOS blocks third-party system extensions by default as a security measure, and you need to manually allow them.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/support/macos-network-extensions&quot;&gt;&lt;strong&gt;Learn how to install macOS network extensions&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;914&quot; height=&quot;550&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_914,h_550,c_scale/f_auto,q_auto/v1774521969/wp-vpn/image-5_21696fd067/image-5_21696fd067.png?_i=AA&quot; alt=&quot;macOS network extensions&quot; class=&quot;wp-post-21695 wp-image-21696&quot; style=&quot;width:600px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;13 KB&quot; data-optsize=&quot;13 KB&quot; data-optformat=&quot;image/png&quot; data-percent=&quot;0&quot; data-version=&quot;1774521969&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774521969/wp-vpn/image-5_21696fd067/image-5_21696fd067.png?_i=AA 914w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_181,c_scale/f_auto,q_auto/v1774521969/wp-vpn/image-5_21696fd067/image-5_21696fd067.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_462,c_scale/f_auto,q_auto/v1774521969/wp-vpn/image-5_21696fd067/image-5_21696fd067.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 914px) 100vw, 914px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Who is affected?&lt;/h2&gt;



&lt;p&gt;This update affects everyone using the IKEv2 protocol in the Proton VPN macOS app. If you haven&amp;#8217;t manually changed VPN protocol, you are most likely already using WireGuard or Smart Protocol and don&amp;#8217;t need to do anything.To check your current protocol, open the Proton VPN app and go to &lt;strong&gt;Settings&lt;/strong&gt; → &lt;strong&gt;Connection&lt;/strong&gt; tab → &lt;strong&gt;Protocol&lt;/strong&gt;. If it shows &lt;strong&gt;Smart&lt;/strong&gt;, &lt;strong&gt;WireGuard&lt;/strong&gt;, &lt;strong&gt;WireGuard (TCP)&lt;/strong&gt;, or &lt;strong&gt;Stealth&lt;/strong&gt;, you&amp;#8217;re all set.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What do you need to do?&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;If your protocol is set to Smart, WireGuard, or Stealth&lt;/strong&gt;: Nothing. You&amp;#8217;re already using a modern protocol.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;If your protocol is set to IKEv2&lt;/strong&gt;: Switch to Smart Protocol or WireGuard in Settings → Connection → Protocol.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Check your connection profiles&lt;/strong&gt;: If you have created &lt;a href=&quot;https://protonvpn.com/support/connection-profiles&quot;&gt;custom VPN connection profiles&lt;/a&gt;, these may still use IKEv2 (even after you&amp;#8217;ve updated your default protocol). Go to the &lt;strong&gt;Profiles&lt;/strong&gt; tab, review each profile, and switch any that still use IKEv2 to Smart Protocol or WireGuard.&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;648&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_648,c_scale/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA&quot; alt=&quot;An IKEv2 VPN profile&quot; class=&quot;wp-post-21695 wp-image-21756&quot; style=&quot;width:600px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;353 KB&quot; data-optsize=&quot;51 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.4&quot; data-version=&quot;1774521989&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_648,c_scale/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_190,c_scale/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_486,c_scale/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_971,c_scale/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_992,c_scale/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774521989/wp-vpn/ikev2-profile/ikev2-profile.png?_i=AA 2024w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;When do you need to do it?&lt;/h2&gt;



&lt;p&gt;We&amp;#8217;ll be removing IKEv2 support from our servers starting &lt;strong&gt;April 2026&lt;/strong&gt;. The entire process won&amp;#8217;t happen overnight (final support will end in February 2027), but it will become increasing likely that your IKEv2 connection will fail&amp;nbsp; April 2026 onward.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why are we making this change?&lt;/h2&gt;



&lt;p&gt;In addition to the security concerns about Apple&amp;#8217;s IKEv2 implementation, and the fact that modern WireGuard-based protocols offer much better performance than IKEv2, maintaining support for IKEv2 has negative consequences for all our users.&lt;/p&gt;



&lt;p&gt;IKEv2 operates on well-known, fixed ports (UDP 500 and 4500) that are trivially easy to scan for. Countries that censor the internet (such as &lt;a href=&quot;https://protonvpn.com/blog/great-firewall-china&quot;&gt;China&lt;/a&gt;, Russia, and &lt;a href=&quot;https://protonvpn.com/blog/great-firewall&quot;&gt;Myanmar&lt;/a&gt;) actively probe these ports to detect and flag the &lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/&quot;&gt;IP addresses&lt;/a&gt; of our VPN servers.&lt;/p&gt;



&lt;p&gt;Once flagged, these IP addresses are added to commercial databases (&amp;#8220;blacklists&amp;#8221;) used by websites, streaming services, and other online platforms to block access or serve CAPTCHAs to anyone connecting from those addresses.&lt;/p&gt;



&lt;p&gt;This affects everyone in Proton VPN community who uses these servers, not just those using IKEv2. By closing these ports, we make our servers significantly harder to fingerprint and reduce the likelihood of our IP addresses being flagged. The result is a better browsing experience for everyone.&lt;/p&gt;



&lt;p&gt;Removing IKEv2 from our macOS app allows us to:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Improve your security&lt;/strong&gt;: Apple&amp;#8217;s IKEv2 implementation has known vulnerabilities that are outside our control to fix. By moving to protocols fully managed by us, we can protect your privacy better.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Reduce complexity&lt;/strong&gt;: Supporting fewer protocols means a leaner, more reliable app with fewer potential points of failure.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Accelerate developmen&lt;/strong&gt;t: A simpler codebase lets us ship new features and improvements faster.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Deliver better performance&lt;/strong&gt;: WireGuard and Stealth are modern protocols built from the ground up to be fast and efficient, offering noticeably better speeds and lower battery drain than IKEv2.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A better, faster VPN experience&lt;/h2&gt;



&lt;p&gt;WireGuard is faster, more battery-efficient, and reconnects more quickly than IKEv2 — especially when switching between Wi-Fi and mobile networks. Combined with Smart Protocol&amp;#8217;s automatic network probing, you&amp;#8217;ll get the best possible connection without having to think about protocol selection at all.&lt;/p&gt;



&lt;p&gt;If you connect to Proton VPN from a censored environment, Stealth provides robust obfuscation capabilities that IKEv2 simply does not. This change will result in a better VPN experience for all our macOS community members.&lt;/p&gt;
</content:encoded><author>Douglas Crawford</author></item><item><title>Censorship and repression: Proton VPN’s end of year report 2025</title><link>https://protonvpn.com/blog/eoy-report-2025</link><guid isPermaLink="true">https://protonvpn.com/blog/eoy-report-2025</guid><description>2025 marked another challenging year for democracy and internet freedom. We use Proton VPN&apos;s unique insights to analyze censorship trends.</description><pubDate>Tue, 17 Mar 2026 17:18:30 GMT</pubDate><content:encoded>
&lt;p&gt;The past year marked another challenging one for democracy and internet freedom. A notable trend was the increasing willingness of authoritarian governments to damage their own economies and the livelihoods of citizens by implementing total internet shutdowns.&lt;/p&gt;



&lt;p&gt;Most notable, however, was the increasing threat to internet freedom in Western democracies by-and-large considered &amp;#8220;free.&amp;#8221; From age verification laws introduced without considering the full ramifications to social media restrictions, to DNS server blocks, access to a free and open internet is imperilled now more than ever.&lt;/p&gt;



&lt;p&gt;As always, Proton VPN is at the forefront of this battle to protect privacy and free speech. More and more the world is relying on our services to defend themselves in this dramatic escalation the global war on internet freedom.&lt;/p&gt;



&lt;blockquote class=&quot;wp-block-quote is-layout-flow wp-block-quote-is-layout-flow&quot;&gt;
&lt;p&gt;We&amp;#8217;ve observed unprecedented surges in Proton VPN connections worldwide as people refuse to be silenced. As pressure mounted, citizens everywhere fought back, turning to privacy tools in record numbers to defeat censorship and reclaim their right to an open, uncensored internet. — David Peterson, Proton VPN&amp;#8217;s General Manager.&lt;/p&gt;
&lt;/blockquote&gt;



&lt;p&gt;In 2025, we &lt;a href=&quot;https://protonvpn.com/internet-censorship-observatory/2025#reports&quot;&gt;observed&lt;/a&gt; spikes in Proton VPN signups in 62 countries. We define a spike as any sudden increase that surpasses 100% over the previous baseline. These upsurges included:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;10 countries with at least one spike in signups of over 1,000%&lt;/li&gt;



&lt;li&gt;Six countries with at least one spike in signups of over 5,000%&lt;/li&gt;



&lt;li&gt;Four countries with at least one spike in signups of over 10,000%&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In this report, we&amp;#8217;ll analyze what made 2025 so remarkable. We&amp;#8217;ll explore where pressures on free speech intensified and how regular people around the world pushed back. Using data from our observatory and global usage patterns, we&amp;#8217;ll outline the forces now shaping online freedom — and what they might signal for the year ahead.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Most notable spikes and shutdowns &lt;strong&gt;in 2025&lt;/strong&gt;&lt;/h2&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;Spikes and shutdowns due to censorship and civil unrest&lt;/h4&gt;



&lt;p&gt;When political pressure rises, the internet is often the first casualty. Across multiple countries, governments responded to conflict and elections not with transparency, but with blackouts, throttling, and isolation from the global web. These incidents show how fragile digital access can be, and why tools that preserve connectivity matter now more than ever.&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;1. Iran&lt;/h4&gt;



&lt;p&gt;On June 18, as the Iran–Israel War escalated, Iran imposed a near-total internet blackout that lasted three days. The government &lt;strong&gt;severed international connections&lt;/strong&gt; and blocked access to websites, social media, messaging services, and foreign VPN servers. Only Iran&amp;#8217;s domestic intranet and government-approved services remained accessible.&lt;/p&gt;



&lt;p&gt;Limited bandwidth returned on June 21, but networks remained heavily throttled for essential services only. Following a US-brokered ceasefire on June 24, normal (censored) internet access was restored. By June 26, Proton VPN signups surged 5,500% as Iranians looked for ways to access international news.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA&quot; alt=&quot;Iran&quot; class=&quot;wp-post-21108 wp-image-21228&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;424 KB&quot; data-optsize=&quot;52 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.7&quot; data-version=&quot;1774416339&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1774416339/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-iran-1_21228cf91a.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h4 class=&quot;wp-block-heading&quot;&gt;2. Tanzania&lt;/h4&gt;



&lt;p&gt;Tanzania’s October general election saw the two main opposition candidates barred from the ballot, sparking protests in several cities. Security forces responded with &lt;a href=&quot;https://www.amnesty.org/en/latest/news/2025/12/tanzania-security-forces-used-unlawful-lethal-force-in-election-protest-crackdown-and-took-away-dead-bodies/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;lethal force&lt;/a&gt;, causing many deaths and injuries, and the government &lt;strong&gt;shut down the internet for five days&lt;/strong&gt;. When service resumed, VPN signups increased by 2,000%.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA&quot; alt=&quot;Tanzania&quot; class=&quot;wp-post-21108 wp-image-21328&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;425 KB&quot; data-optsize=&quot;50 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;88.3&quot; data-version=&quot;1773762807&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1773762807/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-tanzania-2_213289c4b4.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h4 class=&quot;wp-block-heading&quot;&gt;3. Afghanistan&lt;/h4&gt;



&lt;p&gt;On September 29, citing “immorality&amp;#8221;, the Taliban imposed a &lt;strong&gt;24‑hour total internet blackout&lt;/strong&gt; affecting roughly 30% of the population. The shutdown came after the regime began &lt;a href=&quot;https://www.bbc.com/news/articles/c0kn7yyzrjgo&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;removing&lt;/a&gt; women‑authored books from universities and restricting girls’ education past age 12, prompting some women to turn to online learning.&lt;/p&gt;



&lt;p&gt;Even after the blackout ended, access to Facebook, Instagram and X remained limited. &lt;strong&gt;Proton VPN signups jumped a staggering 35,000%&lt;/strong&gt; as Afghans sought ways to connect abroad. Subsequent disruptions, including a separate blackout on October 14, have kept VPN demand high.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA&quot; alt=&quot;Afghanistan&quot; class=&quot;wp-post-21108 wp-image-21348&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;457 KB&quot; data-optsize=&quot;60 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87&quot; data-version=&quot;1774332278&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1774332278/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-afghanistan-3_21348a4b71.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h4 class=&quot;wp-block-heading&quot;&gt;4. Papua New Guinea&lt;/h4&gt;



&lt;p&gt;On March 25, 2025, Papua New Guinea abruptly &lt;a href=&quot;https://www.abc.net.au/pacific/facebook-png-disrupted-by-tests-to-regulate-hate-speech/105092262&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;blocked Facebook&lt;/a&gt; access, claiming a “test” to curb misinformation, hate speech, pornography and other harmful content during in the event of a national emergency. Critics noted the timing coincided with Prime Minister James Marape’s testimony in a corruption trial, suggesting the move aimed to suppress real‑time news coverage and commentary.&lt;/p&gt;



&lt;p&gt;Because Facebook is a key gateway to the wider internet for many PNG residents, &lt;strong&gt;Proton VPN signups spiked by over 14,000 %&lt;/strong&gt; the same day.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA&quot; alt=&quot;Papua New Guinea&quot; class=&quot;wp-post-21108 wp-image-21208&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;443 KB&quot; data-optsize=&quot;48 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;89.2&quot; data-version=&quot;1774416350&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1774416350/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-papua-new-guinea-4_21208edf56.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/blog/censorship-2025&quot;&gt;&lt;strong&gt;See more top censorship moments for 2025&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;Spikes due to legal and regulatory changes&lt;/h4&gt;



&lt;p&gt;Internet control doesn’t always look like a shutdown. Increasingly, it comes wrapped in regulation. New laws that expand age verification and identity requirements can create pressure to hand over sensitive personal data just to access legal content. When trust in data handling erodes, users look for alternatives.&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;1. United Kingdom&lt;/h4&gt;



&lt;p&gt;The UK&amp;#8217;s controversial Online Safety Act, which introduced new age-verification requiring all user generated content sites to verify the age of their users, came into force on July 25. In practice, this meant adults were increasingly asked to prove their identity, often by uploading government-issued ID or submitting biometric data, to access legal content.&lt;/p&gt;



&lt;p&gt;Many people were reluctant to comply, especially in light of a number of high-profile data breaches that hit the headlines at around the same time. The &lt;a href=&quot;https://www.nbcnews.com/tech/social-media/tea-app-hacked-13000-photos-leaked-4chan-call-action-rcna221139&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Tea app data breach&lt;/a&gt; exposed particularly sensitive user information: 72,000 images, including 13,000 verification photos and images of government IDs, and was followed by further such incidents, including data leaks involving &lt;a href=&quot;https://redact.dev/blog/discord-messages-scraped-2025&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Discord&lt;/a&gt; and &lt;a href=&quot;https://openai.com/index/mixpanel-incident/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Mixpanel&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Together, these events reinforced fears about how personal data is collected, stored, and protected by online services, and resulted in a notable &lt;strong&gt;1200% increase in Proton VPN signups&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA&quot; alt=&quot;United Kingdom&quot; class=&quot;wp-post-21108 wp-image-21268&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;425 KB&quot; data-optsize=&quot;54 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.3&quot; data-version=&quot;1774332301&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1774332301/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-united-kingdom-5_2126868ffa.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h4 class=&quot;wp-block-heading&quot;&gt;2. Spain&lt;/h4&gt;



&lt;p&gt;La Liga (Spain&amp;#8217;s top soccer league) wanted to crack down on illegal streaming of matches. To do this, it obtained a court order allowing them to &lt;a href=&quot;https://protonvpn.com/blog/spain-laliga&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;block IP addresses&lt;/a&gt; associated with piracy, which it promptly required multiple ISPs to do.&lt;/p&gt;



&lt;p&gt;However, many of the blocked IP addresses belonged to Cloudflare, a global infrastructure provider. And because Cloudflare uses shared IP addresses, millions of legitimate websites share the same IP addresses as pirate sites. The result? Widespread over-blocking of millions of legitimate websites.&lt;/p&gt;



&lt;p&gt;This remains an ongoing situation, resulting in &lt;strong&gt;consistent Proton VPN signup spikes throughout the year&lt;/strong&gt;, notably in February (+110%) and October (+200%). Of particular note is that VPN usage surges occurred whenever the blocks were put in place, not just during matches. This strongly suggests that Spaniards are turning to VPNs simply to access the legitimate websites they usually frequent.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA&quot; alt=&quot;Spain&quot; class=&quot;wp-post-21108 wp-image-21308&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;410 KB&quot; data-optsize=&quot;48 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;88.4&quot; data-version=&quot;1774332288&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1774332288/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6_213085f0bd.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h4 class=&quot;wp-block-heading&quot;&gt;3. USA&lt;/h4&gt;



&lt;p&gt;In 2024, framing the measure as protection against “foreign adversary–controlled applications&amp;#8221;, Congress passed legislation requiring TikTok to divest its US operations or face removal from app stores and US internet infrastructure.&lt;/p&gt;



&lt;p&gt;On January 19, 2025, the TikTok app &lt;a href=&quot;https://www.bbc.com/news/articles/cz6p1g54q85o&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;briefly stopped working&lt;/a&gt; for US users, and the app was removed from the Apple and Google app stores. The video editing tool, CapCut (developed by TikTok&amp;#8217;s owners), also went down. During this time, we recorded a 520% increase in Proton VPN signups.&lt;/p&gt;



&lt;p&gt;Within hours, however, the incoming Trump administration signed an executive order delaying enforcement, giving TikTok extra time to find a buyer and effectively pausing the ban multiple times through 2025.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;656&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA&quot; alt=&quot;United States&quot; class=&quot;wp-post-21108 wp-image-21388&quot; style=&quot;width:700px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;369 KB&quot; data-optsize=&quot;47 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.2&quot; data-version=&quot;1773764503&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_656,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_192,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_492,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_984,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1312,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1005,c_scale/f_auto,q_auto/v1773764503/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-spain-6-1_21388c4b2c.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Timeline of spikes&lt;/h2&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;741&quot; height=&quot;1024&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_741,h_1024,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA&quot; alt=&quot;Infographic showing a timeline of VPN signup spikes&quot; class=&quot;wp-post-21108 wp-image-21288&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;340 KB&quot; data-optsize=&quot;283 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;16.7&quot; data-version=&quot;1773764445&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_741,h_1024,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 741w, https://res.cloudinary.com/dbulfrlrz/images/w_217,h_300,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 217w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1062,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1111,h_1536,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 1111w, https://res.cloudinary.com/dbulfrlrz/images/w_1481,h_2048,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 1481w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_2168,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/w_1852,h_2560,c_scale/f_auto,q_auto/v1773764445/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-timeline-of-spikes-7_21288a4b2b.jpg?_i=AA 1852w&quot; sizes=&quot;auto, (max-width: 741px) 100vw, 741px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Signup spikes by region&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Political instability in many sub-Saharan African countries, including Tanzania, Togo, the Democratic Republic of Congo, and South Sudan resulted in a notable increase in total internet shutdowns and Proton VPN signup spikes across the region.&lt;/p&gt;



&lt;p&gt;Last year also saw a sizable increase in signups from Southeast Asian and Middle Eastern countries such as Türkiye, Myanmar, Cambodia, Iran, and Papua New Guinea, in response to social media restrictions (often implemented in response to civil unrest or with the aim of preventing it).&lt;/p&gt;



&lt;p&gt;Perhaps the most interesting new development, though, was the number of spikes we witnessed in Western democracies such as the UK, US, Spain and France.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;819&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_819,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA&quot; alt=&quot;World map heat‑map showing the number of spikes per region per country&quot; class=&quot;wp-post-21108 wp-image-21248&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;802 KB&quot; data-optsize=&quot;110 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;86.3&quot; data-version=&quot;1774416327&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_819,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_240,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_614,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_1229,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1638,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1254,c_scale/f_auto,q_auto/v1774416327/wp-vpn/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539/20260316-2025-end-of-year-report-blog-spikes-shutdowns-graph-signup-spikes-by-region-7_212488c539.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Proton VPN is at the forefront of the battle against censorship&lt;/h2&gt;



&lt;p&gt;Proton VPN provides key tools and services that allow people to access the free and open internet, no matter where they are. These include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;100% free VPN service with no data limits&lt;/strong&gt;: Ensuring our service is available to those who need it the most is central to Proton&amp;#8217;s mission.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Alternative routing&lt;/strong&gt;: If our software cannot connect directly to our servers, it routes your connection through third-party services (such as AWS) that are unlikely to be blocked.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Stealth&lt;/strong&gt;: Our WireGuard®-based obfuscated and DPI resistant VPN protocol is effective at defeating many forms of online censorship.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Smart protocol&lt;/strong&gt;: When the default VPN protocol is blocked, our apps automatically switch to different VPN protocols and ports to evade the block.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Available from multiple sources&lt;/strong&gt;: When access to our website is blocked, Proton VPN can be downloaded from third party sources such as &lt;a href=&quot;https://apps.apple.com/us/app/protonvpn-fast-secure-vpn/id1437005085&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Apple App Store&lt;/a&gt;, &lt;a href=&quot;https://play.google.com/store/apps/details?id=ch.protonvpn.android&amp;amp;hl=en&amp;amp;gl=US&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google Play&lt;/a&gt;, &lt;a href=&quot;https://www.amazon.com/dp/B09RFFWTFM&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Amazon app store&lt;/a&gt; and &lt;a href=&quot;https://f-droid.org/en/packages/ch.protonvpn.android&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;F-Droid&lt;/a&gt;. It&amp;#8217;s available as an APK, and all our open source apps are available to compile and download from &lt;a href=&quot;https://github.com/ProtonVPN&quot;&gt;GitHub&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Of course, Proton VPN is always working on new ways to improve our anti-censorship capabilities. In 2025 we added:&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;Guest mode on iOS&lt;/h4&gt;



&lt;p&gt;This popular feature for Android is now available for iPhones. Just install the app and tap the &lt;strong&gt;Continue as guest&lt;/strong&gt; button to defeat censorship and protect your privacy online.&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;More free server locations&lt;/h4&gt;



&lt;p&gt;We&amp;#8217;ve expanded our selection of free server locations to 10 countries. You can now connect to free servers for the Netherlands, Japan, Romania, Poland, Norway, Switzerland, Singapore, Mexico, Canada, and the United States.&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;More server locations&lt;/h4&gt;



&lt;p&gt;We&amp;#8217;ve also expanded the total number of server locations you can connect to with a paid Proton VPN plan. You can now defeat government efforts to censor international connections and access local content by connecting to 17,000+ VPN servers for 127 countries. Locations added in 2025 include Panama, Armenia, Mongolia, Laos, Brunei, Cuba, Dominican Republic, Cameroon, Guatemala, and Honduras.&lt;/p&gt;



&lt;h4 class=&quot;wp-block-heading&quot;&gt;More ways to buy Proton VPN&lt;/h4&gt;



&lt;p&gt;In addition to our long-standing support for direct payments via cash and Bitcoin, it is now possible to purchase paid Proton VPN plans using Monero, Litecoin, Ethereum, and more via partners.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Whatever 2026 brings, Proton VPN is ready&lt;/h2&gt;



&lt;p&gt;The trends that emerged in 2025 show no sign of slowing in 2026. Governments around the world are increasingly willing to restrict internet access as a first response to political pressure, civil unrest, or regulatory ambition. In authoritarian states, this has meant more frequent and more severe shutdowns, even at significant economic cost.&lt;/p&gt;



&lt;p&gt;In democracies, the threat is subtler but no less real. Poorly designed laws, blunt enforcement tools, and private-sector compliance mechanisms are fragmenting access to the open internet in ways that were once considered unthinkable.&lt;/p&gt;



&lt;p&gt;At the same time, 2025 made one thing clear: people adapt quickly. Whether facing total blackouts, social media bans, mandatory ID checks, or indiscriminate blocking of infrastructure providers, millions turned to Proton VPN not to break the law, but to stay informed, communicate freely, and access the services they rely on.&lt;/p&gt;



&lt;p&gt;The growing number of large signup spikes in democratic countries suggests that circumvention tools are no longer used only at the margins of society. They are becoming a mainstream response to overreach, censorship, and loss of trust in how online access is governed.&lt;/p&gt;



&lt;p&gt;As we move into 2026, the struggle over internet freedom is likely to intensify. More governments will test the limits of control, and more people will look for ways around it. Proton VPN will continue to invest in free access, stronger anti-censorship technology, and wider global availability, so that wherever restrictions appear, people have a reliable way to stay connected to the open internet. For example, we&amp;#8217;re currently working on:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;A new VPN codebase: Will deliver best-in-class anti-censorship capabilities, enable Stealth support on Linux, power the next generation of Stealth, and lay the groundwork for post-quantum encryption.&lt;/li&gt;



&lt;li&gt;An improved Linux CLI: Our Linux command-line tool allows anyone to access the open internet using only the most basic hardware. We recently added a host of &lt;a href=&quot;https://protonvpn.com/support/linux-cli#config&quot;&gt;advanced configuration options&lt;/a&gt;, and will expand on these through 2026.&lt;/li&gt;
&lt;/ul&gt;



&lt;blockquote class=&quot;wp-block-quote is-layout-flow wp-block-quote-is-layout-flow&quot;&gt;
&lt;p&gt;As we head into 2026, the 2025 data underscores a powerful truth: whenever censorship tightens its grip, from internet shutdowns to app blocks, people fight back by turning to VPNs in unprecedented numbers to protect their voices and access uncensored information. We remain deeply committed to this battle; our team will keep working tirelessly to innovate, roll out new anti-censorship features, and strengthen our tools so that users worldwide can defeat restrictions and reclaim their online freedom. Thanks to Proton VPN community, we will ensure privacy and an open internet prevail. — David Peterson.&lt;/p&gt;
&lt;/blockquote&gt;



&lt;p&gt;Whatever challenges 2026 brings, the message from 2025 is clear: when internet access is threatened, people push back. And Proton VPN will be there to support them.&lt;/p&gt;
</content:encoded><category>Privacy deep dives</category><author>Douglas Crawford</author></item><item><title>Is your iPhone tracking you? How to check iPhone location history</title><link>https://protonvpn.com/blog/how-to-check-iphone-location-history</link><guid isPermaLink="true">https://protonvpn.com/blog/how-to-check-iphone-location-history</guid><description>iPhone tracking and how to stop it. But the biggest danger is from third-party apps that use your location data to target you with ads.</description><pubDate>Tue, 10 Mar 2026 11:28:48 GMT</pubDate><content:encoded>
&lt;p&gt;Your iPhone has a feature called &lt;strong&gt;Significant Locations&lt;/strong&gt;, which is designed to help Siri and Maps learn your routines so they can provide better, more personalized suggestions. For example, to remind you to leave for work when traffic is bad, or to suggest a restaurant near your gym.&lt;/p&gt;



&lt;p&gt;Although Significant Locations does keep a surprisingly detailed log of where you&amp;#8217;ve been, when, and how often, Apple has gone to admirable lengths to minimize its threat to your privacy.&lt;/p&gt;



&lt;p&gt;Arguably, a bigger threat comes from third-party apps like the almost ubiquitous &lt;strong&gt;Google Maps&lt;/strong&gt;,&lt;strong&gt; &lt;/strong&gt;which have detailed access to your&lt;strong&gt; &lt;/strong&gt;location history and are much less picky about who they share it with.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is Significant Locations and how does it work?&lt;/h2&gt;



&lt;p&gt;Significant Locations is an iPhone feature that keeps a record of places you visit often to personalize services like maps, photos, and suggestions. Unlike Google Maps, Significant Locations is not a full GPS history log. Instead, it collects periodic location signals using geolocation indicators such as GPS, WiFi, cell tower, and Bluetooth connections. Over time, it detects patterns such as:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;How often you visit a location&lt;/li&gt;



&lt;li&gt;How long you stay of there&lt;/li&gt;



&lt;li&gt;How recently you last visited&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Once it identifies these patterns, it stores the locations locally on your device. So a coffee shop you visit daily will be stored, but not a one-time road trip.&lt;/p&gt;



&lt;p&gt;This information is used by Maps to predict routing due to traffic, make location-based suggestions in Calendar, group Memories in Photos, create location-based alerts and Siri suggestions, and more.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How secure is Significant Locations?&lt;/h2&gt;



&lt;p&gt;Significant Locations data is stored locally on your device. The feature is enabled by default but only works if Location Services are turned on and your phone is secured using a passcode or biometric lock.&lt;/p&gt;



&lt;p&gt;If &lt;strong&gt;Sync to iCloud&lt;/strong&gt; is enabled, your data will also be stored on Apple servers. However, Apple says that Significant Locations data is &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/what-is-end-to-end&quot;&gt;end-to-end encrypted (E2EE)&lt;/a&gt;, with the encryption keys derived from your device passcode.&lt;/p&gt;



&lt;p&gt;This means your Significant Locations data is not accessible to Apple, even if it&amp;#8217;s synced to iCloud and &lt;a href=&quot;https://proton.me/blog/protect-data-apple-adp-uk&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Advanced Data Protection&lt;/a&gt; (optional E2EE for iCloud) is not enabled. Metadata may still exist, however, and since iOS is closed-source, we just have to take Apple&amp;#8217;s word on this.&lt;/p&gt;



&lt;p&gt;Anyone with physical access to your unlocked phone can view your Significant Locations. Depending on your recovery methods, anyone with full control of your Apple ID and one of your &lt;a href=&quot;https://support.apple.com/en-us/122621&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;trusted devices&lt;/a&gt; can access that data too.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to check your iPhone location history (Significant Locations data)&lt;/h2&gt;



&lt;p&gt;On your iPhone or iPad, open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt; → &lt;strong&gt;Location Services &lt;/strong&gt;→&lt;strong&gt; System services &lt;/strong&gt;→&lt;strong&gt; Significant Locations &amp;amp; Routes&lt;/strong&gt;. From here, you can view your Significant Locations records.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;693&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_693,c_scale/f_auto,q_auto/v1774421322/wp-vpn/significant-locations-1_20795278b3/significant-locations-1_20795278b3.png?_i=AA&quot; alt=&quot;Significant Locations 1&quot; class=&quot;wp-post-20674 wp-image-20795&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;393 KB&quot; data-optsize=&quot;25 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.7&quot; data-version=&quot;1774421322&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774421322/wp-vpn/significant-locations-1_20795278b3/significant-locations-1_20795278b3.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_173,h_300,c_scale/f_auto,q_auto/v1774421322/wp-vpn/significant-locations-1_20795278b3/significant-locations-1_20795278b3.png?_i=AA 173w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to delete your iPhone location history (Significant Locations)&lt;/h2&gt;



&lt;p&gt;1. On your iPhone or iPad, open the &lt;strong&gt;Settings&lt;/strong&gt; app.&lt;/p&gt;



&lt;ol start=&quot;2&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Go to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt; → &lt;strong&gt;Location Services &lt;/strong&gt;→&lt;strong&gt; System services &lt;/strong&gt;→&lt;strong&gt; Significant Locations &amp;amp; Routes&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Toggle the &lt;strong&gt;Significant Locations &amp;amp; Routes&lt;/strong&gt; switch &lt;strong&gt;off&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;693&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_693,c_scale/f_auto,q_auto/v1773138624/wp-vpn/significant-locations-2_2081513270/significant-locations-2_2081513270.png?_i=AA&quot; alt=&quot;Significant Locations 2&quot; class=&quot;wp-post-20674 wp-image-20815&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;388 KB&quot; data-optsize=&quot;24 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.8&quot; data-version=&quot;1773138624&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1773138624/wp-vpn/significant-locations-2_2081513270/significant-locations-2_2081513270.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_173,h_300,c_scale/f_auto,q_auto/v1773138624/wp-vpn/significant-locations-2_2081513270/significant-locations-2_2081513270.png?_i=AA 173w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Beware location tracking by apps&lt;/h2&gt;



&lt;p&gt;Many of the apps you install on iOS can track your location, but they must go through a permission system and the system location APIs controlled by Apple. These limit the amount of direct geolocation data that an app can access, but apps can use a number of indirect methods.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How iOS handles location permissions&lt;/h2&gt;



&lt;p&gt;Apple’s iOS uses a permission-based model that requires your explicit consent before any app can access your location data. When an app requests location access, you are presented with several options:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Allow Once&lt;/strong&gt;: Grants access for a single session.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Allow While Using App&lt;/strong&gt;: The app can access location only when it is actively open or in the foreground.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Allow Always&lt;/strong&gt;: The app can access location even in the background (requires justification).&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Don&amp;#8217;t Allow&lt;/strong&gt;: Denies access entirely.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;696&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_696,c_scale/f_auto,q_auto/v1774416372/wp-vpn/ios-location-1b_2083513a45/ios-location-1b_2083513a45.png?_i=AA&quot; alt=&quot;App location permissions&quot; class=&quot;wp-post-20674 wp-image-20835&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;267 KB&quot; data-optsize=&quot;24 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;91.2&quot; data-version=&quot;1774416372&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774416372/wp-vpn/ios-location-1b_2083513a45/ios-location-1b_2083513a45.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_172,h_300,c_scale/f_auto,q_auto/v1774416372/wp-vpn/ios-location-1b_2083513a45/ios-location-1b_2083513a45.png?_i=AA 172w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Crucially, for &lt;strong&gt;Allow Always&lt;/strong&gt; permissions, iOS requires the app developer to provide a reason for background access. You&amp;#8217;ll also occasionally be reminded of this permission by a system prompt asking if you want to keep it enabled.&lt;/p&gt;



&lt;p&gt;When the app is actively accessing your location data, you&amp;#8217;ll see a &lt;strong&gt;blue&lt;/strong&gt; &lt;strong&gt;location indicator icon&lt;/strong&gt; in your notification bar (a gray icon indicates that your location was recently accessed by an app).&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;254&quot; height=&quot;55&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_254,h_55,c_scale/f_auto,q_auto/v1773138618/wp-vpn/location-icon_208556100b/location-icon_208556100b.png?_i=AA&quot; alt=&quot;The blue location indicator icon&quot; class=&quot;wp-post-20674 wp-image-20855&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;11 KB&quot; data-optsize=&quot;2 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.1&quot; data-version=&quot;1773138618&quot; data-seo=&quot;1&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;To see how often an app has accessed your location data, you can view its App Privacy Report if you&amp;#8217;ve turned this feature on. To do this:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open the &lt;strong&gt;Settings&lt;/strong&gt; app.&lt;/li&gt;



&lt;li&gt;Go to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt; → &lt;strong&gt;App Privacy Report&lt;/strong&gt; (under Transparency Logs).&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Turn On App Privacy Report&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;Once enabled, go to &lt;strong&gt;App Privacy Report&lt;/strong&gt; whenever you want to check how often apps access your location and other sensitive data.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;693&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_693,c_scale/f_auto,q_auto/v1774421293/wp-vpn/report_2089586032/report_2089586032.png?_i=AA&quot; alt=&quot;App privacy report&quot; class=&quot;wp-post-20674 wp-image-20895&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;387 KB&quot; data-optsize=&quot;25 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.6&quot; data-version=&quot;1774421293&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774421293/wp-vpn/report_2089586032/report_2089586032.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_173,h_300,c_scale/f_auto,q_auto/v1774421293/wp-vpn/report_2089586032/report_2089586032.png?_i=AA 173w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Approximate vs precise location on iPhone&lt;/h2&gt;



&lt;p&gt;By default, apps that request location permissions use your Precise Location. This uses various sensors on your iPhone to accurately locate you within a few meters. However, since iOS 14, you can disable Precise Location for each app that requests it, forcing them to use your approximate location instead (to roughly within a few kilometers).&lt;/p&gt;



&lt;p&gt;To disable Precise Location, tap &lt;strong&gt;Precise: On&lt;/strong&gt; when an app first asks for location permissions (see screenshot above). Or open the &lt;strong&gt;Settings&lt;/strong&gt; app, go to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt; → &lt;strong&gt;Location Services&lt;/strong&gt;, select the app, and toggle the &lt;strong&gt;Precise&lt;/strong&gt; &lt;strong&gt;Location&lt;/strong&gt; switch &lt;strong&gt;off&lt;/strong&gt;. You can also change when an app can request location data from this screen.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;589&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_589,c_scale/f_auto,q_auto/v1774421344/wp-vpn/image-2_20679b2820/image-2_20679b2820.png?_i=AA&quot; alt=&quot;Precise Location&quot; class=&quot;wp-post-20674 wp-image-20679&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;290 KB&quot; data-optsize=&quot;18 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.8&quot; data-version=&quot;1774421344&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774421344/wp-vpn/image-2_20679b2820/image-2_20679b2820.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_204,h_300,c_scale/f_auto,q_auto/v1774421344/wp-vpn/image-2_20679b2820/image-2_20679b2820.png?_i=AA 204w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Geofencing&lt;/h2&gt;



&lt;p&gt;Apps register geofences using Apple’s location APIs. When a user enters or leaves these areas, the app can trigger actions. This is often used for reminders or location-based services such as retail apps triggering store notifications, and smart-home apps triggering automations.&lt;/p&gt;



&lt;p&gt;Geofencing lets apps collect some background location data, even when restricted to &lt;strong&gt;Allow While Using App&lt;/strong&gt; permissions. The only way to prevent it is to &lt;strong&gt;Never&lt;/strong&gt; allow location access for the app.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Passive location inference&lt;/h2&gt;



&lt;p&gt;Even without explicit GPS access, apps may infer your location using things like your &lt;a href=&quot;https://protonvpn.com/what-is-my-ip-address&quot;&gt;IP address&lt;/a&gt;, nearby WiFi networks, Bluetooth beacons, and &lt;a href=&quot;https://proton.me/blog/exif-data&quot;&gt;metadata from photos&lt;/a&gt;. Although these techniques typically provide less precise location data than full GPS access, they can still reveal your location to around the city or even neighborhood level.&lt;/p&gt;



&lt;p&gt;And once apps have this information, they can use it themselves to target you with personalized ads and/or sell it to &lt;a href=&quot;https://proton.me/blog/data-brokers&quot;&gt;data brokers&lt;/a&gt; and analytics platforms.&lt;/p&gt;



&lt;p&gt;Your best defense against such techniques is to &lt;a href=&quot;https://protonvpn.com/&quot;&gt;use a VPN&lt;/a&gt; to hide your real IP address, and DNS filtering (such as Proton VPN&amp;#8217;s &lt;a href=&quot;https://protonvpn.com/features/adblocker&quot;&gt;NetShield Ad-blocker&lt;/a&gt; feature) to block tracker scripts.&lt;/p&gt;



&lt;p&gt;Individual apps and services may also offer their own ways to view and delete location history they&amp;#8217;ve collected about you. For example, you can &lt;a href=&quot;https://protonvpn.com/blog/delete-search-history#How-to-delete-Google-Maps-search-history&quot;&gt;delete Google Maps search history&lt;/a&gt; or &lt;a href=&quot;https://proton.me/blog/instagram-maps-privacy-concern&quot;&gt;turn off Instagram location sharing&lt;/a&gt; using in-app settings.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Final thoughts on iPhone location tracking&lt;/h2&gt;



&lt;p&gt;Apple’s Significant Locations feature shows how location history can be used in a relatively privacy-conscious way. Its data is stored locally (or end-to-end encrypted if synced with iCloud), and it is designed primarily to improve useful built-in services like Siri and Maps, rather than to build a detailed profile of your movements for advertising purposes. However, Significant Locations can still provide a surprisingly detailed record of places you visit regularly, so checking and clearing its data from time to time may be a sensible precaution.&lt;/p&gt;



&lt;p&gt;In practice, the bigger privacy risk often comes from the apps you install. Many third-party apps request location access and may collect, store, and share that information with advertisers, analytics companies, or data brokers. Even when iOS limits direct GPS access, apps can sometimes infer your location through other signals.&lt;/p&gt;



&lt;p&gt;The best way to stay in control of your location data is to regularly review your location permissions, disable Precise Location for apps that don’t truly need it, and remove access entirely where possible. Combined with tools like &lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPNs&lt;/a&gt; and tracker blocking, these steps can help reduce how much of your movement history ends up in the hands of companies you didn’t intend to share it with.&lt;/p&gt;
</content:encoded><category>Privacy basics</category><author>Douglas Crawford</author></item><item><title>Less than half of SMBs use a VPN. Here’s what our research found.</title><link>https://protonvpn.com/blog/vpn-smb-cybersecurity</link><guid isPermaLink="true">https://protonvpn.com/blog/vpn-smb-cybersecurity</guid><description>Less than half of SMBs use a VPN to secure remote access. Proton’s latest research explains why that’s a growing risk in hybrid work.</description><pubDate>Tue, 10 Mar 2026 10:54:54 GMT</pubDate><content:encoded>
&lt;p&gt;For most small- and medium-sized businesses (SMBs), the “office” is now a collection of home WiFi networks, coffee shop hotspots, shared workspaces, and cloud-based SaaS tools.&lt;/p&gt;



&lt;p&gt;Yet even as work continues to become more distributed, many businesses have failed to put network controls in place. &lt;strong&gt;Fewer than half of SMBs use a VPN&lt;/strong&gt; to protect access to their network, according to new research by Proton.&lt;/p&gt;



&lt;p&gt;At the same time, security incidents are rising. &lt;strong&gt;One in four SMBs have experienced a cyberattack or breach&lt;/strong&gt; in the past year.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;So why, despite a seemingly permanent shift to hybrid work, is VPN adoption so inconsistent? And is that the cause of so many recent security incidents?&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Our SMB Cybersecurity Report 2026 sheds light on this question. For our exclusive research, we surveyed thousands of business leaders around the world dozens of questions about their security practices. You can download the free cybersecurity report to gain four key insights and five recommendations for your business.&amp;nbsp;&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Download the free report&lt;/a&gt;&lt;/div&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why attackers are targeting SMBs&lt;/h2&gt;



&lt;p&gt;For years, cybercriminals focused primarily on large corporations. But as enterprise defenses have improved, attackers have &lt;a href=&quot;https://proton.me/blog/ransomware-threats-smbs&quot;&gt;increasingly targeted SMBs&lt;/a&gt; due to:&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Limited resources:&lt;/strong&gt; Small teams often lack dedicated security staff and formal security policies.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Distributed networks:&lt;/strong&gt; Employees connect from home WiFi, shared workspaces, and public hotspots, creating more entry points for attackers.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;High-value data:&lt;/strong&gt; SMBs might store the &lt;a href=&quot;https://proton.me/business/2025-tech-breaches&quot;&gt;same sensitive data as large enterprises&lt;/a&gt; — including customer information, financial records, and intellectual property — but with fewer protections in place.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The adoption gap: SMBs are neglecting VPNs&lt;/h2&gt;



&lt;p&gt;The Proton SMB Cybersecurity Report 2026 exposed two gaps among small and medium businesses:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Adoption gap: &lt;/strong&gt;Less than half of SMBs use a VPN to &lt;a href=&quot;https://proton.me/l/business/vpn/foundingjourney&quot;&gt;secure their endpoints&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Execution gap: &lt;/strong&gt;Even among VPN adopters, security practices are inconsistent.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Let’s start with the adoption gap.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The rise of software-as-a-service has created a false sense of security among small businesses. While most SaaS platforms use strong encryption (i.e., &lt;a href=&quot;https://proton.me/blog/tls-ssl-certificate&quot;&gt;TLS&lt;/a&gt;) to protect traffic in transit, and some like Proton Mail or Proton Drive also use &lt;a href=&quot;https://proton.me/security/end-to-end-encryption&quot;&gt;end-to-end encryption&lt;/a&gt; at rest, they don&amp;#8217;t secure the path your employees take to log in.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;For example, your organization might use an &lt;a href=&quot;https://proton.me/business/mail&quot;&gt;encrypted email service&lt;/a&gt; to protect the content of your messages, but without a VPN you can’t enforce IP-based restrictions to control who can log in to the platform. So an attacker with a set of leaked credentials could log in and breach your network.&lt;/p&gt;



&lt;p&gt;While the shift to hybrid work is global, the accompanying security adaptations have been uneven. The United States is the only country in our study where a majority of SMBs use a VPN. In every other market, &lt;strong&gt;adoption sits below 50%&lt;/strong&gt;. This gap is even more pronounced outside the tech sector, where security hasn’t kept pace with the shift to hybrid work.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The execution gap: True security goes beyond a VPN&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Fifty-two percent of VPN-using SMBs say they are very or completely confident in their ability to withstand attacks. But our data shows that even among this group, 26% experienced a breach in the past 12 months. If a business is already securing its network, how is this still happening?&lt;/p&gt;



&lt;p&gt;The issue is not the VPN itself, but the surrounding controls and the prevalence of human error. Only 56% of VPN adopters in our study enforce &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;two-factor authentication&lt;/a&gt; (2FA). When nearly half of businesses rely on passwords alone, the risk is compounded by poor credential discipline. Instead of consistently using a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;31.5% still share credentials via email&lt;/li&gt;



&lt;li&gt;33.4% via shared documents&lt;/li&gt;



&lt;li&gt;28% rely on messaging apps to share logins&lt;/li&gt;



&lt;li&gt;24.6% still write passwords down&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Our data suggests that many businesses are treating security as a piecemeal investment in isolated products rather than a cohesive system, without consistently executed security policies in place.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Security as infrastructure, not afterthought&lt;/h2&gt;



&lt;p&gt;The study revealed another valuable insight: Security is a revenue driver.&lt;/p&gt;



&lt;p&gt;In our report, 66% of businesses say demonstrating secure data handling is “very” or “critically” important to winning new business. A VPN for endpoint security gives you the infrastructure and visibility to make that case to prospective clients.&lt;/p&gt;



&lt;p&gt;Without a defined network perimeter, entry points multiply, visibility diminishes, and access control is scattered across third-party platforms. All this expands the attack surface and makes it harder to detect suspicious behavior, contain incidents, or demonstrate control to customers and partners. A VPN restores the boundary, and establishes a controllable perimeter around employees wherever they work.&lt;/p&gt;



&lt;p&gt;Here’s how you can apply the lesson in your business:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Restrict access by IP or location:&lt;/strong&gt; Only allow access to internal tools from approved devices or networks.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Have full network visibility:&lt;/strong&gt; When logins are only allowed from your VPN, you can monitor traffic to your resources and spot potential attacks.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Enforce consistent policies:&lt;/strong&gt; Apply security rules on your network, rather than relying on third-party promises.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Without a VPN, remote traffic moves across public networks without centralized control, increasing exposure. True security requires the network layer and the identity layer to operate as a single, reinforced system.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Download the full 2026 SMB Cybersecurity Report&lt;/h2&gt;



&lt;p&gt;Proton’s SMB Cybersecurity Report 2026 examines where security confidence breaks down, why foundational controls are missing, and how hybrid work has reshaped the attack surface for growing businesses.&lt;/p&gt;



&lt;p&gt;Inside the report, you’ll find:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Global breach patterns and human-error trends&lt;/li&gt;



&lt;li&gt;The financial impact of modern data breaches&lt;/li&gt;



&lt;li&gt;Cloud and AI trust gaps among business leaders&lt;/li&gt;



&lt;li&gt;Practical steps for building layered security systems&lt;/li&gt;
&lt;/ul&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Download the free report&lt;/a&gt;&lt;/div&gt;
</content:encoded><author>Ben Wolford</author></item><item><title>What is a CDN and how does it work?</title><link>https://protonvpn.com/blog/cdn</link><guid isPermaLink="true">https://protonvpn.com/blog/cdn</guid><description>A CDN is a geographically distributed network of servers that work together to deliver internet content faster and more reliably.</description><pubDate>Fri, 06 Mar 2026 12:23:20 GMT</pubDate><content:encoded>
&lt;p&gt;A &lt;strong&gt;content delivery network&lt;/strong&gt; (CDN) is a geographically distributed network of servers that work together to deliver internet content faster and more reliably. Instead of all users accessing content from a single origin server, CDNs cache copies of static assets like images, videos, stylesheets, and JavaScript files on servers located closer to users around the globe.&lt;/p&gt;



&lt;p&gt;Think of it like a retail chain. Instead of everyone traveling to one massive warehouse headquarters to buy products, there are local stores in every city stocked with popular items. You get what you need faster, and the central warehouse handles less traffic.&lt;/p&gt;



&lt;p&gt;Some &lt;a href=&quot;https://trends.builtwith.com/CDN/Content-Delivery-Network?utm_source=chatgpt.com&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;46 million websites use CDNs&lt;/a&gt; worldwide, including &lt;a href=&quot;https://zipdo.co/cdn-industry-statistics&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;around 81% of the top 1 million websites&lt;/a&gt;. Major CDN providers include Akamai Technologies and the almost ubiquitous Cloudflare (over &lt;a href=&quot;https://backlinko.com/cloudflare-users&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;24 million websites use Cloudflare&lt;/a&gt; alone).&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#why&quot;&gt;Why do CDNs exist?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#benefits&quot;&gt;What are the benefits of CDNs?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#how&quot;&gt;How do CDNs work?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#overblocking&quot;&gt;CDNs and the dangers of overblocking&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;why&quot;&gt;Why do CDNs exist?&lt;/h2&gt;



&lt;p&gt;Traditionally, websites were hosted on a single server in one physical location. Which works fine if all your visitors live near that server. But once users are spread across countries (or continents), problems appear:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Latency (slow loading times due to physical distance)&lt;/li&gt;



&lt;li&gt;Bandwidth bottlenecks&lt;/li&gt;



&lt;li&gt;Server overload during traffic spikes&lt;/li&gt;



&lt;li&gt;Higher vulnerability to &lt;a href=&quot;https://proton.me/blog/ddos-protection-guide&quot;&gt;DDoS attacks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;CDNs solve this by distributing content across many servers worldwide. This means if you&amp;#8217;re in New York, you&amp;#8217;ll get content from a US-based sever, while visitors from London to the same website will get be served content from a European sever.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;benefits&quot;&gt;What are the benefits of CDNs?&lt;/h2&gt;



&lt;p&gt;CDNs improve:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Speed: Content travels a shorter physical distance&lt;/li&gt;



&lt;li&gt;Scalability: Traffic spikes (e.g., during sales or viral events) don’t crash the site&lt;/li&gt;



&lt;li&gt;Uptime: If one server fails, another takes over&lt;/li&gt;



&lt;li&gt;Security: Most CDNs help protect against DDoS attacks&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;how&quot;&gt;How do CDNs work?&lt;/h2&gt;



&lt;p&gt;A CDN consists of:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;An &lt;strong&gt;origin server&lt;/strong&gt;. This is the “main” server where the website actually lives.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Edge servers&lt;/strong&gt; that store (&amp;#8220;cache&amp;#8221;) static content like images, CSS files, JavaScript, and videos from the origin server. Large CDNs (like Cloudflare) may run hundreds of these distributed edge servers all over the world.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;565&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_565,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA&quot; alt=&quot;Diagram showing how a CDN works&quot; class=&quot;wp-post-17594 wp-image-20937&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;567 KB&quot; data-optsize=&quot;85 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;84.9&quot; data-version=&quot;1774416362&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_565,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_166,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_424,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_847,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1130,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_865,c_scale/f_auto,q_auto/v1774416362/wp-vpn/20260309-cdn-content-delivery-network_diagram_20937da880/20260309-cdn-content-delivery-network_diagram_20937da880.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;When you visit a website that uses a CDN, the process works as follows:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;User request: When you visit a website, your browser sends a request for content.&lt;/li&gt;



&lt;li&gt;DNS resolution: The CDN&amp;#8217;s DNS system determines which server is best positioned to serve you. Typically, this will be the one closest to you.&lt;/li&gt;



&lt;li&gt;Cache check: The edge server checks if it has the requested content cached.&lt;/li&gt;



&lt;li&gt;Delivery: If cached, the content is delivered immediately. If not, the edge server fetches it from the origin server, caches a copy for future requests, and delivers it to you.&lt;/li&gt;



&lt;li&gt;Dynamic content: For dynamic content (like personalized pages), CDNs can route requests to the origin server while still optimizing the connection path.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;Crucially, all websites that use the same CDN will route their content though the CDN&amp;#8217;s shared edge servers. This means hundreds of otherwise unrelated websites serving a similar geographic area may &lt;strong&gt;share the &lt;/strong&gt;&lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/&quot;&gt;&lt;strong&gt;IP address&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; of a CDN edge server for that area&lt;/strong&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;overblocking&quot;&gt;CDNs and the dangers of overblocking&lt;/h2&gt;



&lt;p&gt;To combat illegal streaming of its football matches, top Spanish football association LaLiga has &lt;a href=&quot;https://protonvpn.com/blog/spain-laliga&quot;&gt;obtained court orders&lt;/a&gt; requiring Spanish &lt;a href=&quot;https://protonvpn.com/blog/isp/&quot;&gt;internet service providers&lt;/a&gt; to block thousands of IP addresses belonging to CDN provider Cloudflare. This is because it has connected these IP addresses to illegal streaming services.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;600&quot; height=&quot;637&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_600,h_637,c_scale/f_auto,q_auto/v1774421357/wp-vpn/cloudflare-1_176771a9ba/cloudflare-1_176771a9ba.jpg?_i=AA&quot; alt=&quot;Services affected by Cloudflare blocks in Spain&quot; class=&quot;wp-post-17594 wp-image-17677&quot; style=&quot;width:600px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;104 KB&quot; data-optsize=&quot;42 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;60&quot; data-version=&quot;1774421357&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774421357/wp-vpn/cloudflare-1_176771a9ba/cloudflare-1_176771a9ba.jpg?_i=AA 600w, https://res.cloudinary.com/dbulfrlrz/images/w_283,h_300,c_scale/f_auto,q_auto/v1774421357/wp-vpn/cloudflare-1_176771a9ba/cloudflare-1_176771a9ba.jpg?_i=AA 283w&quot; sizes=&quot;auto, (max-width: 600px) 100vw, 600px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;The problem is these IP addresses belong to Cloudflare&amp;#8217;s edge servers, which are also used by thousands (potentially millions) of legitimate websites. This has left millions of people in Spain unable to reliably access some popular sites, &lt;a href=&quot;https://www.xatakamovil.com/streaming/todas-estas-webs-perfectamente-legales-no-podemos-acceder-culpa-conflicto-laliga-cloudflare&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;including&lt;/a&gt; GitHub, ChatGPT, government websites, and banking services.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Final thoughts on CDNs&lt;/h2&gt;



&lt;p&gt;Content delivery networks are now essential infrastructure for today&amp;#8217;s web, quietly powering the fast, reliable online experience that you&amp;#8217;ve come to expect. By distributing content across geographically dispersed edge servers, CDNs reduce latency, absorb traffic spikes, improve uptime, and add critical layers of security.&lt;/p&gt;



&lt;p&gt;Much of their utility lies in their invisibility. Although used by over three-quarters of all websites on the internet, most of us never even think about them. But they&amp;#8217;re there, working behind the scenes on roughly three-quarters of today&amp;#8217;s websites, ensuring that content arrives quickly and reliably regardless of geography.&lt;/p&gt;



&lt;p&gt;Recent situations where governments, courts and corporate interests have blocked internet services inevitably do significant collateral damage to the wider internet.&lt;/p&gt;
</content:encoded><category>Privacy basics</category><author>Douglas Crawford</author></item><item><title>Surveillance pricing: How your data determines what you pay</title><link>https://protonvpn.com/blog/surveillance-pricing</link><guid isPermaLink="true">https://protonvpn.com/blog/surveillance-pricing</guid><description>Surveillance or personalized pricing means the price you see is not the same others see. It&apos;s based on how much algorithms think you&apos;re able (or willing) to pay.</description><pubDate>Wed, 04 Mar 2026 15:34:51 GMT</pubDate><content:encoded>
&lt;p&gt;Surveillance pricing, also known as personalized or algorithmic pricing, is a practice where companies use your personal data, such as your location, the device you&amp;#8217;re using, your browsing history, and even your income, to determine what price to show &lt;em&gt;you&lt;/em&gt;. It&amp;#8217;s not just about supply and demand — it&amp;#8217;s about &lt;strong&gt;you&lt;/strong&gt; as a consumer and how much the system thinks you&amp;#8217;re able (or willing) to pay.&lt;/p&gt;



&lt;p&gt;Have you ever &lt;a href=&quot;https://www.theguardian.com/lifeandstyle/2025/may/21/booking-flights-online-dynamic-pricing-ticket-is-it-legal-australia&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;shopped online for a flight&lt;/a&gt;, only to find that the price mysteriously increased the second time you checked? Or have you and a friend searched for the same hotel room on your phones, only to find your friend sees a lower price? This isn’t a glitch — it’s surveillance pricing at work.&lt;/p&gt;



&lt;p&gt;In the United States, surveillance pricing is becoming increasingly prevalent across various industries, including airlines, hotels, and e-commerce platforms. It exists elsewhere, but in other parts of the world, such as the European Union, there is a growing recognition of the danger this pricing model presents to citizens&amp;#8217; privacy, resulting in stricter data protection laws aimed at curbing it. The US appears to be moving in the opposite direction.&lt;/p&gt;



&lt;p&gt;In this article we&amp;#8217;ll look at:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is surveillance pricing?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#how&quot;&gt;How does surveillance pricing work?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#which-companies&quot;&gt;Which companies use surveillance pricing?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#legality&quot;&gt;Is surveillance pricing legal in the US?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#global&quot;&gt;Surveillance pricing around the world&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#avoid&quot;&gt;How to avoid surveillance pricing&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#final-thoughts&quot;&gt;A deeply unfair practice&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is surveillance pricing?&lt;/h2&gt;



&lt;p&gt;At its core, surveillance pricing is the practice of adjusting prices based on the personal data collected from an individual. Unlike traditional &lt;a href=&quot;https://en.wikipedia.org/wiki/Dynamic_pricing&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;dynamic pricing&lt;/a&gt;, which changes prices based on time, demand, or supply, surveillance pricing uses&lt;strong&gt; who you are&lt;/strong&gt; and &lt;strong&gt;how you behave online&lt;/strong&gt; to determine the price you see.&lt;/p&gt;



&lt;p&gt;Companies gather data from a wide range of sources to build a profile of each customer. This data can include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Your location: &lt;/strong&gt;Are you shopping from a wealthy ZIP/postal code (which can also lead to &lt;a href=&quot;https://www.propublica.org/article/asians-nearly-twice-as-likely-to-get-higher-price-from-princeton-review&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;racial discrimination&lt;/a&gt;)?&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Device type: &lt;/strong&gt;Are you using an iPhone or an older Android?&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Browsing history&lt;/strong&gt;: Have you looked at this item multiple times?&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Purchase behavior&lt;/strong&gt;: Are you a repeat buyer? Do you often choose premium options?&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Login status:&lt;/strong&gt; Have you signed in to a loyalty program or rewards account?&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These details feed into algorithms that can predict your price sensitivity — essentially, how much they think you&amp;#8217;re willing to pay. If the system believes you’re less likely to comparison shop or more likely to pay full price, it might show you a higher price than someone else sees for the same product or service.&lt;/p&gt;



&lt;p&gt;What makes surveillance pricing controversial isn&amp;#8217;t just the price difference — it’s that you usually don’t know it’s happening. There&amp;#8217;s rarely any disclosure or obvious way to compare your price with what others see. This lack of transparency makes surveillance pricing fundamentally different from things like coupons, sales, or even &amp;#8220;traditional&amp;#8221; dynamic pricing.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;how&quot;&gt;How does surveillance pricing work?&lt;/h2&gt;



&lt;p&gt;The goal of surveillance pricing is to find the maximum price you&amp;#8217;ll tolerate before walking away. This is a concept known in economics as &lt;a href=&quot;https://www.investopedia.com/ask/answers/042415/what-are-different-types-price-discrimination-and-how-are-they-used.asp&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;first-degree price discrimination&lt;/a&gt;. It uses advanced data analytics and algorithms to dynamically adjust prices based on your individual data. It uses your data to profile you and adjusts the prices you see in real time based on this profile.&lt;/p&gt;



&lt;p&gt;Surveillance pricing is only possible if the merchant has your data. This is gathered via multiple channels, including:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/blog/how-to-block-third-party-cookies-on-all-browsers/&quot;&gt;Cookies&lt;/a&gt; and &lt;a href=&quot;https://proton.me/blog/browser-device-fingerprinting&quot;&gt;device and browser fingerprinting&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;Mobile apps that access &lt;a href=&quot;https://protonvpn.com/blog/location-services&quot;&gt;location&lt;/a&gt; or device data&lt;/li&gt;



&lt;li&gt;Loyalty cards and programs that log your past purchases&lt;/li&gt;



&lt;li&gt;Social media activity&lt;/li&gt;



&lt;li&gt;Search behavior (especially when you&amp;#8217;re logged into accounts). For example, if you sign in to Amazon and browse a particular product multiple times without buying, Amazon might infer high interest and raise the price slightly the next time you look for it.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;which-companies&quot;&gt;Which companies use surveillance pricing?&lt;/h2&gt;



&lt;p&gt;The following examples show how companies leverage your personal data to adjust pricing dynamically:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Target agreed to pay &lt;a href=&quot;https://www.kare11.com/article/news/local/kare11-extras/target-settles-ca-lawsuit-alleging-false-advertising-overpricing-fined-5m/89-ba4a5441-c38e-4c9f-b524-b0d13414042f&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;$5 million in civil penalties&lt;/a&gt; after its app was found to increase prices for people based on their location. For example, it charged &lt;a href=&quot;https://consumerwatchdog.org/privacy/new-report-details-how-companies-use-surveillance-to-charge-different-prices-for-the-same-item/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;$100 more&lt;/a&gt; for TVs if someone was in the Target parking lot because the closer they were to the store, the more likely they were to pay.&lt;/li&gt;



&lt;li&gt;Amazon&amp;#8217;s pricing algorithms change its prices &lt;a href=&quot;https://www.consumeraffairs.com/news/surveillance-pricing-gouges-customers-without-their-knowing-020425.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;over 2.5 million times a day&lt;/a&gt; based on various factors, including demand and user behavior.&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://books.google.ch/books?id=RGZ3DQAAQBAJ&amp;amp;pg=PA83&amp;amp;source=gbs_toc_r&amp;amp;redir_esc=y#v=onepage&amp;amp;q&amp;amp;f=false&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Staples&lt;/a&gt; charged customers different prices on its website based on estimations about their location — charging people more when they were in areas with fewer competitors&lt;/li&gt;



&lt;li&gt;Uber has &lt;a href=&quot;https://consumerwatchdog.org/wp-content/uploads/2024/12/Surveillance-Price-Gouging.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;admitted&lt;/a&gt; other effects that “land-use/neighborhood patterns, trip purposes, time of day, and other effects” go into pricing, while Lyft said, “there are many factors that go into pricing time of day, trip purposes, and more&amp;#8221;. Uber has been &lt;a href=&quot;https://www.forbes.com/sites/amitchowdhry/2016/05/25/uber-low-battery/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;accused&lt;/a&gt; of increasing fares for users with low battery on their phones on the assumption they will pay more.&lt;/li&gt;



&lt;li&gt;The travel booking site &lt;a href=&quot;https://venturebeat.com/business/what-companies-can-learn-from-the-orbitz-mac-pricing-scandal/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Orbitz&lt;/a&gt; directed Mac users toward more expensive hotel options based on data indicating that Mac users tend to spend more on accommodation.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;legality&quot;&gt;Is surveillance pricing legal in the US?&lt;/h2&gt;



&lt;p&gt;In the United States, surveillance pricing is widespread and largely unregulated. Unlike in the European Union, where privacy laws such as the &lt;a href=&quot;https://proton.me/blog/gdpr-email-compliance&quot;&gt;GDPR&lt;/a&gt; limit how companies can use personal data, the US lacks any federal legislation that directly addresses personalized pricing practices.&lt;/p&gt;



&lt;p&gt;This regulatory gap allows businesses to collect and exploit consumer data with minimal oversight as long as they avoid overtly deceptive or discriminatory practices that violate existing consumer protection or civil rights laws. In 2022, the Federal Trade Commission (FTC) &lt;a href=&quot;https://www.congress.gov/crs_external_products/LSB/PDF/LSB10839/LSB10839.1.pdf&quot;&gt;announced&lt;/a&gt; interest in enacting new regulations to tackle the issue, and in the last days of the Biden administration, it released a &lt;a href=&quot;https://www.ftc.gov/system/files/ftc_gov/pdf/p246202_surveillancepricing6bstudy_researchsummaries_redacted.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;report&lt;/a&gt; and published a &lt;a href=&quot;https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2025/01/surveillance-pricing-update-work-ahead&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;blog post&lt;/a&gt; advocating for concrete regulatory action over surveillance pricing.&lt;/p&gt;



&lt;p&gt;However, the Trump administration has made it clear that it has little interest in this digital protection for consumers. In response, California, Georgia, Illinois, Colorado, and New York have introduced &lt;a href=&quot;https://www.msn.com/en-us/money/companies/the-trump-administration-stopped-investigating-a-new-pricing-scheme-states-are-stepping-in/ar-AA1FDQ8X&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;state-level legislation&lt;/a&gt; to curb surveillance pricing.&lt;/p&gt;



&lt;p&gt;Although facing stiff opposition from tech industry groups such as &lt;a href=&quot;https://www.technet.org/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;TechNet&lt;/a&gt;, these bills, particularly the California bill, may have a wide-ranging impact. &lt;a href=&quot;https://californiainsider.com/california-news/politics/legislature-policy/california-assembly-passes-bill-to-ban-surveillance-pricing-5857343&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Passed by the California Assembly&lt;/a&gt; on May 12, 2025, &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202520260AB446&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Assembly Bill 446&lt;/a&gt; could become a national standard, similar to the &lt;a href=&quot;https://www.oag.ca.gov/privacy/ccpa&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;California Consumer Privacy Act (CCPA21`)&lt;/a&gt;. As the bill&amp;#8217;s author, San Diego Assemblyman Christopher Ward, noted:&lt;/p&gt;



&lt;p&gt;“&lt;em&gt;I believe that [surveillance pricing] is predatory, it’s discriminatory, and it violates a public trust when consumers are already stretched thin and don’t deserve to be unwittingly exploited&lt;/em&gt;”.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;global&quot;&gt;Surveillance pricing around the world&lt;/h2&gt;



&lt;p&gt;Although largely unregulated in the US, other countries have taken a more muscular approach to protecting consumer data and limiting how it can be used for algorithmic pricing. `&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;European Union&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;The EU’s General Data Protection Regulation (GDPR) is among the strictest privacy laws in the world. It doesn’t directly ban personalized pricing, but it places serious limits on how companies can collect and use personal data, especially for automated decision-making. Key GDPR protections relevant to surveillance pricing include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Right to be informed&lt;/strong&gt;: Companies must be transparent about what data they collect and how it’s used.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Right to object&lt;/strong&gt;: Consumers can object to profiling and automated decision-making.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Explicit consent&lt;/strong&gt;: Companies must often obtain clear consent before using personal data for pricing decisions.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In practice, European companies are more cautious about using surveillance pricing — especially when tied to sensitive characteristics like race, income, or location. Following &lt;a href=&quot;https://europa.eu/youreurope/citizens/consumers/unfair-treatment/unfair-pricing/index_en.htm&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;official guidance&lt;/a&gt;, they must include clear disclaimers when offering dynamic or algorithmic pricing or use standardized pricing.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;United Kingdom&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;While no longer part of the EU, the &lt;a href=&quot;https://www.gov.uk/data-protection&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;UK GDPR&lt;/a&gt; remains broadly aligned with the GDPR. The Competition and Markets Authority (CMA) has also expressed &lt;a href=&quot;https://competitionandmarkets.blog.gov.uk/2021/01/21/algorithms-wheres-the-harm/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;concern&lt;/a&gt; about algorithmic harms, including discriminatory pricing, and has promised to work with the &lt;a href=&quot;https://ico.org.uk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ICO&lt;/a&gt; and &lt;a href=&quot;https://www.ofcom.org.uk/home&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Ofcom&lt;/a&gt; to help address these concerns.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Canada&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Canada’s &lt;a href=&quot;https://ised-isde.canada.ca/site/innovation-better-canada/en/consumer-privacy-protection-act&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Consumer Privacy Protection Act (CPPA)&lt;/a&gt;, part of its proposed &lt;a href=&quot;https://ised-isde.canada.ca/site/innovation-better-canada/en/canadas-digital-charter-trust-digital-world&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Digital Charter&lt;/a&gt;, aims to improve transparency and give consumers more control over their data. While it&amp;#8217;s still in development, this reflects a growing awareness of how behavioral targeting (including pricing) is bad for consumers.&lt;/p&gt;



&lt;p&gt;More generally, across the globe, there&amp;#8217;s a &lt;a href=&quot;https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-consumer-data-opportunity-and-the-privacy-imperative&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;growing trend&lt;/a&gt; toward algorithmic accountability, consumer education on digital pricing, and creating legal frameworks that limit abusive use of data. However, enforcement remains inconsistent, and the citizens of many countries remain vulnerable to opaque and exploitative surveillance pricing practices.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;avoid&quot;&gt;How to avoid surveillance pricing&lt;/h2&gt;



&lt;p&gt;It’s difficult to detect or avoid surveillance pricing entirely, especially if you use mobile apps that can access a huge amount of your personal data. However, there are some things you can do to reduce how much companies know about you.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. Use a browser, not an app&lt;/h3&gt;



&lt;p&gt;Mobile apps typically collect a huge amount of personal data about you, which they send directly to their developers. Browsers (including mobile browsers) &lt;a href=&quot;https://www.washingtonpost.com/technology/2024/06/04/better-privacy-security-app-website/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;do not send anywhere near as much data&lt;/a&gt; to the websites you visit and may include privacy features such as tracking protection and &lt;a href=&quot;https://proton.me/blog/browser-device-fingerprinting&quot;&gt;fingerprinting&lt;/a&gt; resistance.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/best-browser-for-privacy&quot;&gt;&lt;strong&gt;Learn about the best browsers for your privacy&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. Block third-party cookies&lt;/h3&gt;



&lt;p&gt;Third-party cookies are small text files stored on your browser that exist almost entirely to track your behavior across different websites. Blocking them in your browser deprives companies of some of the data they use for surveillance pricing.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/blog/how-to-block-third-party-cookies-on-all-browsers&quot;&gt;&lt;strong&gt;Learn how to block third-party cookies on all browsers&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;3. Use a VPN&lt;/h3&gt;



&lt;p&gt;A VPN hides the single most revealing thing about you to app developers and websites — your&lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/&quot;&gt; IP address&lt;/a&gt;. It also stops your ISP from knowing what you do online and &lt;a href=&quot;https://www.ftc.gov/news-events/news/press-releases/2021/10/ftc-staff-report-finds-many-internet-service-providers-collect-troves-personal-data-users-have-few&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;selling that data&lt;/a&gt; to companies that use surveillance pricing. With a paid Proton VPN account, our &lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker/&quot;&gt;NetShield Ad-blocker&lt;/a&gt; DNS filtering feature will protect you against a range of tracker scripts.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white&quot; href=&quot;/pricing/&quot;&gt;Get Proton VPN Plus&lt;/a&gt;&lt;/div&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;4. Compare prices across devices and browsers&lt;/h3&gt;



&lt;p&gt;When researching goods and services, try to perform multiple searches on different devices and browsers to see if there is any change in price.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;final-thoughts&quot;&gt;Final thoughts: A deeply unfair practice&lt;/h2&gt;



&lt;p&gt;Surveillance pricing is not science fiction. It’s here and embedded in the everyday experiences of online shopping, ride-hailing, and even &lt;a href=&quot;https://www.michigandaily.com/opinion/columns/same-product-different-prices-how-surveillance-pricing-is-emptying-out-consumers-pockets/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;education services&lt;/a&gt;. By quietly collecting and analyzing vast amounts of consumer data, companies can invisibly adjust prices based on who you are, where you are, what device you use, and how likely you are to pay.&lt;/p&gt;



&lt;p&gt;Companies often claim this practice is nothing more than harmless personalization. But it furthers discrimination, exploitation, and inequity, especially when pricing is influenced by sensitive traits like race, income level, or where you live.&lt;/p&gt;



&lt;p&gt;Ultimately, only legislators have the power necessary to reign in the rampant abuses of surveillance pricing. That&amp;#8217;s why it&amp;#8217;s unfortunate the FTC has abandoned its work on surveillance pricing, leaving it to individual states to pick up the pieces. Consumers elsewhere may be luckier.&lt;/p&gt;



&lt;p&gt;That said, by avoiding apps and using a VPN, you can help limit the data companies collect to profile you for surveillance pricing.&lt;/p&gt;
</content:encoded><category>Privacy deep dives</category><author>Douglas Crawford</author></item><item><title>Top 10: The biggest internet censorship moments in 2025</title><link>https://protonvpn.com/blog/censorship-2025</link><guid isPermaLink="true">https://protonvpn.com/blog/censorship-2025</guid><description>We look back at how citizens around the world turned to Proton VPN in 2025 to defeat internet and social media censorship.</description><pubDate>Wed, 21 Jan 2026 16:50:19 GMT</pubDate><content:encoded>
&lt;p&gt;As huge news stories break across the world this year, the need for VPNs has become even clearer.&lt;/p&gt;



&lt;p&gt;When people feel threatened, they want to know what is going on, and they turn to the internet. When governments prevent them from doing this — as is sadly far too common — they turn to VPNs to bypass censorship.&lt;/p&gt;



&lt;p&gt;As one of the world&amp;#8217;s most popular VPN services, Proton has unique insight into world events as they are happening. Here&amp;#8217;s what we&amp;#8217;ve already seen this year in 2026:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;In Iran, the government has imposed a complete internet shutdown as mass protests convulse the country. Personal accounts trickling out suggest that Tehran is waging a brutal crackdown. Before the blackout, Proton recorded a &lt;a href=&quot;https://protonvpn.com/internet-censorship-observatory#reports&quot;&gt;1,000% increase in VPN sign-ups&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;In Venezuela, after the &lt;a href=&quot;https://www.bbc.com/news/articles/cdred61epg4o&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;US military launched strikes&lt;/a&gt; and captured President Nicolás Maduro on January 3, Proton recorded a &lt;a href=&quot;https://protonvpn.com/internet-censorship-observatory#reports&quot;&gt;770% jump in VPN sign-ups&lt;/a&gt; from people inside that country.&lt;/li&gt;



&lt;li&gt;In Uganda, days before a national election in which the president is seeking a seventh term, &lt;a href=&quot;https://www.nytimes.com/2026/01/13/world/africa/uganda-election-internet.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;the government blocked all internet access&lt;/a&gt; to prevent opposition. Proton VPN recorded a &lt;a href=&quot;https://protonvpn.com/internet-censorship-observatory#reports&quot;&gt;3,000% increase in VPN sign-ups&lt;/a&gt; after access was restored following election day (although social media platforms remain blocked).&lt;/li&gt;



&lt;li&gt;In Egypt, social media users have reported that &lt;a href=&quot;https://protonvpn.com/blog/discord-banned-egypt&quot;&gt;Discord, a popular communication platform, has been blocked&lt;/a&gt; by several internet service providers. Discord users said they have encountered connection failures and “stuck on loading” screens, which are signs of a government-level block, but there has been no government confirmation of a shutdown. Proton recorded a &lt;a href=&quot;https://protonvpn.com/internet-censorship-observatory#reports&quot;&gt;320% increase in VPN sign-ups&lt;/a&gt; above normal levels.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;At Proton, we publicly document the most striking VPN trends around the world in our &lt;a href=&quot;https://protonvpn.com/internet-censorship-observatory&quot;&gt;Proton VPN Observatory&lt;/a&gt;. As we continue to chart this year&amp;#8217;s news events, we wanted to use this article to unpack the top 10 internet censorship moments of 2025.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;1. Iran&lt;/h2&gt;



&lt;p&gt;June 13 marked escalating hostilities between Iran and Israel, as exchanges of strikes and counter-strikes intensified across the region in what is now known as the &lt;a href=&quot;https://en.wikipedia.org/wiki/Iran%E2%80%93Israel_war&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Iran–Israel (or Twelve Days) War&lt;/a&gt;. Defending the action as necessary for national security during wartime conditions, the Iranian government implemented a &lt;a href=&quot;https://x.com/davidgpeterson/status/1985486191693635840?s=20&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;near-total internet blackout&lt;/strong&gt;&lt;/a&gt; starting June 18.&lt;/p&gt;



&lt;p&gt;For most people, access to international websites, social media, messaging services, and VPN servers (including ours) vanished. This wasn’t simply a throttling or slowdown; the government’s actions effectively severed all international connections. Only limited access to Iran’s National Information Network (a domestic intranet) and government-approved local services continued.&lt;/p&gt;



&lt;p&gt;Starting on the morning of the 21st, limited bandwidth returned, but the network remained heavily throttled so that only essential services like banking and government portals were reachable.&lt;/p&gt;



&lt;p&gt;VPN traffic stayed at a fraction of pre‑blackout levels until normal (that is, heavily censored) internet access was restored to the country after, under US pressure, Israel and Iran agreed to a ceasefire on June 24. By June 26, Proton VPN sign-ups had &lt;strong&gt;jumped 5,500%&lt;/strong&gt; as Iranians desperate for international news downloaded our apps.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;2. Tanzania&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/vpn-servers/tanzania&quot;&gt;Tanzania&lt;/a&gt; held a general election on October 29, where the two main opposition candidates (effectively the only credible challengers to the incumbent ruling Chama Cha Mapinduzi party) were barred from the ballot.&lt;/p&gt;



&lt;p&gt;Protests erupted in several cities (during which &lt;a href=&quot;https://www.amnesty.org/en/latest/news/2025/12/tanzania-security-forces-used-unlawful-lethal-force-in-election-protest-crackdown-and-took-away-dead-bodies/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;security forces used lethal force&lt;/a&gt; that resulted in numerous deaths and injuries), prompting a surge in VPN use as Tanzanian citizens bypassed government attempts to censor internet and social media access.&lt;/p&gt;



&lt;p&gt;In a dramatic display of what increasingly seems to be the new normal, the government responded by completely &lt;a href=&quot;https://x.com/davidgpeterson/status/1985480285937623086?s=20&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;shutting down the internet for five days&lt;/strong&gt;&lt;/a&gt;. As internet access was restored, VPN sign-ups &lt;strong&gt;spiked at 2,000%&lt;/strong&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;3. Afghanistan&lt;/h2&gt;



&lt;p&gt;Citing concerns about “immorality,” the Taliban, &lt;a href=&quot;https://protonvpn.com/vpn-servers/afghanistan&quot;&gt;Afghanistan&amp;#8217;s&lt;/a&gt; de facto government, on September 29 implemented a &lt;a href=&quot;https://x.com/davidgpeterson/status/1985480285937623086?s=20&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;24-hour total internet blackout&lt;/strong&gt;&lt;/a&gt; that affected around 30% of the population.&lt;/p&gt;



&lt;p&gt;This move followed a Taliban campaign to &lt;a href=&quot;https://www.bbc.com/news/articles/c0kn7yyzrjgo&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;remove books written by women&lt;/a&gt; from the country&amp;#8217;s university teaching system and to restrict women and girls from getting an education beyond the age of 12. In response to this, some women had turned to online learning.&lt;/p&gt;



&lt;p&gt;After the blackout was lifted, access to platforms like Facebook, Instagram, and X continued to be restricted across various parts of the country. During this period, Proton VPN saw sign-ups soar by a &lt;strong&gt;staggering 35,000%&lt;/strong&gt; as Afghan citizens sought to contact the outside world.&lt;/p&gt;



&lt;p&gt;Disruptions continued throughout October and beyond (including another total internet blackout on October 14), and Proton VPN continues to see high levels of sign-ups from the country.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;4. Papua New Guinea&lt;/h2&gt;



&lt;p&gt;On March 25, 2025, the Papua New Guinea government &lt;a href=&quot;https://www.abc.net.au/pacific/facebook-png-disrupted-by-tests-to-regulate-hate-speech/105092262&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;abruptly shut down access to Facebook&lt;/a&gt; as part of a “test” of its capacity to curb misinformation, hate speech, pornography, and other harmful content during a national emergency.&lt;/p&gt;



&lt;p&gt;However, the shutdown also coincided with a corruption trial for which Prime Minister James Marape was giving evidence in court. Critics and opposition members pointed to this timing as evidence that the shutdown was intended to suppress real-time commentary on the Prime Minister&amp;#8217;s testimony.&lt;/p&gt;



&lt;p&gt;Facebook is a primary way many PNG residents stay connected to the broader internet, so the abrupt loss of the service prompted a surge in Proton VPN sign-ups (&lt;strong&gt;over 14,000%&lt;/strong&gt;) on March 25.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;5. Togo&lt;/h2&gt;



&lt;p&gt;In the wake of extensive constitutional changes in 2024, reforms that removed presidential term limits were introduced in June 2025, effectively allowing President Faure Gnassingbé to stay in power indefinitely. This move was widely seen as entrenching the power of &lt;a href=&quot;https://protonvpn.com/vpn-servers/togo&quot;&gt;Togo&amp;#8217;&lt;/a&gt;s political elites. Spring and early summer were marked by the death of at least seven anti-government protesters, numerous political arrests, and a &lt;a href=&quot;https://cpj.org/2025/06/france-24-and-rfi-broadcasters-suspended-in-togo-for-3-months/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;three-month suspension&lt;/a&gt; of French broadcasters RFI and France 24.&lt;/p&gt;



&lt;p&gt;Grassroots opposition coalesced in the youth-led &lt;a href=&quot;https://en.wikipedia.org/wiki/June_6_Movement&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;June 6 Movement&lt;/a&gt;, and amid increased calls for civic disobedience, violent clashes broke out between protesters and security forces in several parts of Togo’s capital, Lomé, on June 26. This date coincides with a &lt;strong&gt;12,000% jump&lt;/strong&gt; in Proton VPN sign-ups from Togolese citizens desperate for objective reports about the situation.&lt;/p&gt;



&lt;p&gt;These protests were met with &lt;a href=&quot;https://www.reuters.com/world/africa/seven-killed-during-togo-protests-civil-society-groups-say-2025-06-30/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;strong repression&lt;/a&gt; by security forces, leading to deaths, injuries, and numerous arrests. The government also issued arrest warrants for movement leaders, including artists and activists, accusing them of attempting to destabilize the country.&lt;/p&gt;



&lt;p&gt;Activists have continued to agitate against the government. The response has been heavy-handed, and VPN sign-ups from Togo remain high.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;6. Nepal&lt;/h2&gt;



&lt;p&gt;On September 4, &lt;a href=&quot;https://protonvpn.com/vpn-servers/nepal&quot;&gt;Nepal’s&lt;/a&gt; government blocked access to 26 major social media platforms, including Facebook, Instagram, WhatsApp, X, YouTube, LinkedIn, Reddit, Discord, Signal, and Pinterest. The move followed a Supreme Court and Cabinet directive requiring all platforms operating in Nepal to register locally, appoint local compliance and grievance officers, and meet regulatory conditions.&lt;/p&gt;



&lt;p&gt;The restrictions triggered &lt;a href=&quot;https://www.theguardian.com/world/2025/sep/08/nepal-bans-26-social-media-sites-including-x-whatsapp-and-youtube&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;widespread outrage&lt;/a&gt;, especially among young people and digital natives who rely on these platforms for communication, work, business, education, and community events. Demonstrations (quickly dubbed the “Gen Z protests”) drew tens of thousands of participants.&lt;/p&gt;



&lt;p&gt;These protests culminated in Kathmandu on September 8, when security forces used lethal force to disperse the crowds, resulting in at least 19 dead and hundreds injured. With violence spreading across the capital and other cities, Prime Minister KP Sharma Oli announced his resignation on September 9, and the social media ban was lifted on September 10.&lt;/p&gt;



&lt;p&gt;Starting on September 4 and remaining high throughout the period of unrest, the Proton VPN Observatory recorded an &lt;strong&gt;8,000% increase&lt;/strong&gt; in sign-ups from the country.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;7. Democratic Republic of Congo&lt;/h2&gt;



&lt;p&gt;The Democratic Republic of Congo is suffering from a severe humanitarian crisis, and by February 2025 an estimated 7.8 million people were internally displaced, with widespread disruption to housing, food security, water and health services. This crisis is driven by an ongoing civil war between the Congolese government and the Rwandan-backed rebel paramilitary group, M23.&lt;/p&gt;



&lt;p&gt;In February, not long after protests and riots in Kinshasa over the government’s handling of the security situation and perceived international inaction on rebel advances, M23 conducted large-scale operations in the eastern provinces of North Kivu and South Kivu, and were targeted by a rally bombing in Bukavu that resulted in multiple fatalities and dozens of injuries.&lt;/p&gt;



&lt;p&gt;Amid this febrile and unstable situation, users across several Congolese cities started to report difficulties accessing popular social media services like TikTok and X. There was no clear official explanation for these disruptions, and government regulators at the time could not definitively say whether the block was accidental or intentional.&lt;/p&gt;



&lt;p&gt;However, the fact that &lt;a href=&quot;https://actualite.cd/2025/02/07/rdc-lonu-qualifie-de-grave-atteinte-au-droit-linformation-la-restriction-dacces-certains&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google Play Store access was blocked&lt;/a&gt; (in a country where almost all internet access is via mobile phones and few can afford Apple products), strongly suggests the move was deliberate.&lt;/p&gt;



&lt;p&gt;We saw a &lt;strong&gt;7,000% rise&lt;/strong&gt; in Proton VPN sign-ups from DR Congo in February, as many Congolese citizens turned to VPNs to access blocked services. This shows that many people found alternative ways to access our service outside of the Play Store (such as by &lt;a href=&quot;https://protonvpn.com/blog/download-android-app-on-github/&quot;&gt;downloading our app as an APK&lt;/a&gt;). Over February, services slowly returned to normal.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;8. South Sudan&lt;/h2&gt;



&lt;p&gt;Since 2020, South Sudan has been ruled by a &amp;#8220;unity government&amp;#8221;, with President Salva Kiir sharing power with former rebel leader Riek Machar as First Vice‑President. This arrangement remains very fragile, and in early 2025, repeated delays of core reforms resulted in a resurgence of armed clashes between government forces and ex-rebel militias.&lt;/p&gt;



&lt;p&gt;This dangerous situation was exacerbated by a large influx of refugees fleeing war in neighboring Sudan, during which graphic images of killings of South Sudanese citizens in Sudan were widely distributed on social media.&lt;/p&gt;



&lt;p&gt;Starting at midnight on 22 January  amid a humanitarian crisis that affected some 7.5 million facing acute food insecurity, an economy still reeling from the loss of oil‑export revenues after the Sudan conflict disrupted the main pipeline, and increased pressure from both humanitarian and opposition groups, the government ordered a 30-90-day block on major social media platforms such as Facebook and TikTok.&lt;/p&gt;



&lt;p&gt;It claimed this was in response to graphic content linked to violence, but many suspect the motive was to control the narrative ahead of the upcoming electoral cycle, which culminates in a presidential and parliamentary election to be held in December 2026.&lt;/p&gt;



&lt;p&gt;In practice, the ban was lifted after only a few days (on January 28). But during this period, Proton VPN recorded a &lt;strong&gt;5200% increase in sign-ups&lt;/strong&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;9. Venezuela&lt;/h2&gt;



&lt;p&gt;Political turmoil in &lt;a href=&quot;https://protonvpn.com/vpn-servers/venezuela&quot;&gt;Venezuela&lt;/a&gt; didn&amp;#8217;t start with recent (January 2026) events. On January 10, 2025, then President Nicolás Maduro was sworn in for a third term. And with civil society groups documenting at least 83 new political detainees in the first 12 days of the month, domestic political tensions were running high.&lt;/p&gt;



&lt;p&gt;The Venezuelan government responded by blocking multiple social media platforms, VPN websites, and international DNS services such as Cloudflare (1.1.1.1) and Google (8.8.8.8), that are commonly used to bypass local internet censorship.&lt;/p&gt;



&lt;p&gt;In response, Proton VPN sign-ups &lt;strong&gt;shot up by 5,000% &lt;/strong&gt;ahead of the inauguration.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;10. Cameroon&lt;/h2&gt;



&lt;p&gt;On November 7, police in &lt;a href=&quot;https://protonvpn.com/vpn-servers/cameroon&quot;&gt;Cameroon&amp;#8217;s&lt;/a&gt; capital, Yaoundé, &lt;a href=&quot;https://www.hrw.org/news/2025/10/28/cameroon-biya-declared-the-winner-amid-post-election-violence&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;opened fire on a crowd of demonstrators&lt;/a&gt; who were protesting over alleged fraud in the presidential election held a month earlier. One person was killed and several injured.&lt;/p&gt;



&lt;p&gt;The next day, the government declared a partial internet lockdown that mainly affected Yaoundé and Douala, citing &amp;#8220;public‑order concerns&amp;#8221;. ISPs were also ordered to block access to VPNs, and on November 11, security forces raided several internet cafés in Yaoundé, arresting at least 12 people for “unauthorized use of VPNs&amp;#8221;.&lt;/p&gt;



&lt;p&gt;Proton VPN sign-ups from Cameroon started &lt;strong&gt;spiking up to 3,000%&lt;/strong&gt; as tensions mounted in the days leading up to the fatal demonstration, as Cameroonians preemptively prepared for the trouble to come. Widely condemned internationally, most internet restrictions have now been removed.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Final thoughts: VPNs defeat government censorship&lt;/h2&gt;



&lt;p&gt;Total internet blackouts are becoming more common. What these figures clearly show is that whenever repressive governments try to prevent their citizens from accessing the free and open internet, their citizens turn to &lt;a href=&quot;https://protonvpn.com/download&quot;&gt;VPNs&lt;/a&gt; to bypass these restrictions.&lt;/p&gt;



&lt;p&gt;Unable to prevent this, authoritarian governments have been simply turning the internet off, rather than allowing their citizens to access international news sources and use social media to organize opposition.&lt;/p&gt;



&lt;p&gt;The cost of doing this, to both their country&amp;#8217;s economy and the livelihoods of their citizens, however, is huge. And in a world where even limited restrictions on social media inflame public opinion, imposing internet blackouts can only be seen as a tactic of desperation.&lt;/p&gt;
</content:encoded><category>Privacy deep dives</category><author>Douglas Crawford</author></item><item><title>Update your old OpenVPN config files or switch to modern protocols</title><link>https://protonvpn.com/blog/old-ovpn-configs</link><guid isPermaLink="true">https://protonvpn.com/blog/old-ovpn-configs</guid><description>If you use OpenVPN configs downloaded before September 2023, you need to switch to WireGuard or download new OpenVPN configs.</description><pubDate>Wed, 14 Jan 2026 12:05:59 GMT</pubDate><content:encoded>
&lt;p&gt;To improve your security, Proton VPN no longer supports manual OpenVPN config files &lt;strong&gt;downloaded before September 2023&lt;/strong&gt;. If you currently use older config files and wish to continue using manual OpenVPN configurations, you &lt;strong&gt;need to download new configuration files &lt;/strong&gt;before the end of February 2026.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/blog/what-is-openvpn/&quot;&gt;OpenVPN&lt;/a&gt; is an old VPN protocol that, although still robustly secure, is bloated and slow compared to powerful, sleek, and secure modern VPN protocols, such as &lt;a href=&quot;https://protonvpn.com/blog/what-is-wireguard/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;WireGuard&lt;/a&gt;® and our own &lt;a href=&quot;https://protonvpn.com/blog/stealth-vpn-protocol/&quot;&gt;Stealth&lt;/a&gt; protocol. This is why we are working toward discontinuing support for OpenVPN on our official apps.&lt;/p&gt;



&lt;p&gt;Instead of manual OpenVPN configs, we recommend using:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Our official apps&lt;/strong&gt; (on supported platforms): These offer a wide selection of advanced features that are simply not possible using manual configuration. This includes support for our Stealth protocol, WireGuard TCP, and intuitive server selection using a graphic user interface.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;WireGuard&lt;/strong&gt; (on everything else): WireGuard offers better performance than OpenVPN, while being equally secure. So where possible, we recommend using WireGuard on devices that only support manual VPN configuration (such as routers).&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;We only recommend using manual OpenVPN configuration on devices (typically older ones) that don&amp;#8217;t support WireGuard.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Who is affected?&lt;/h2&gt;



&lt;p&gt;This update is required for everyone who currently uses OpenVPN configuration files downloaded before September 2023 to manually configure a device for Proton VPN.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What do you need to do?&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If your device(s) support our official apps or manual WireGuard configuration, we recommend switching to those.&lt;/li&gt;



&lt;li&gt;If you need to continue using a manual OpenVPN configuration, please &lt;strong&gt;download new OpenVPN configuration files&lt;/strong&gt; and use them to re-configure your device.&lt;/li&gt;
&lt;/ul&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/support/vpn-config-download&quot;&gt;&lt;strong&gt;Learn how to download Proton VPN OpenVPN configuration files&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/support/wireguard-configurations&quot;&gt;&lt;strong&gt;Learn how to download WireGuard configuration files&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;When do you need to do it?&lt;/h2&gt;



&lt;p&gt;You need to update your OpenVPN configs &lt;strong&gt;before the end of February 2026&lt;/strong&gt;. After February 28, your old configurations will no longer work.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What&amp;#8217;s changing?&lt;/h2&gt;



&lt;p&gt;At Proton VPN, we always maintain the highest possible security standards. To ensure this and other improvements, our newer OpenVPN configuration files use:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/blog/what-is-aes-encryption/&quot;&gt;&lt;strong&gt;AES-256-GCM&lt;/strong&gt;&lt;/a&gt; (instead of AES-256-CBC): With built-in integrity, support for parallel processing, and other efficiency improvements, AES-GCM is faster, stronger, and causes less battery drain than AES-CBC.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Newer server certificates&lt;/strong&gt;: The newer X.509 certificates use stronger signature algorithms and longer validity periods to improve the chain of trust and resistance to certain attacks.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;tls-crypt + tls-auth&lt;/strong&gt; (instead of just tls-auth): tls-auth verifies that a packet really comes from a client that knows the shared secret. Adding tls-crypt means the entire packet (including its length and payload) is encrypted, so an attacker can’t read or guess its shape. This makes passive sniffing and crafted‑packet attacks much harder.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A faster and more secure OpenVPN&lt;/h2&gt;



&lt;p&gt;Although still secure, OpenVPN is an old and inefficient VPN protocol. Where possible, you should upgrade to a better, more modern alternative (our official apps, or manual WireGuard configuration on routers and the like).&lt;/p&gt;



&lt;p&gt;However, OpenVPN &lt;em&gt;is&lt;/em&gt; still very secure, and so remains fine for use on devices that don&amp;#8217;t support the newer protocol. In this case, updating your manual configuration to use to our newer OpenVPN certificates will result in a faster and even more secure VPN setup.&lt;/p&gt;
</content:encoded><category>Service updates</category><author>Douglas Crawford</author></item><item><title>Uganda shut down the internet ahead of elections; Proton VPN signups surge 8000%</title><link>https://protonvpn.com/blog/uganda-internet-shutdown-elections</link><guid isPermaLink="true">https://protonvpn.com/blog/uganda-internet-shutdown-elections</guid><description>Uganda denied plans to block the internet before elections and then did it. Data shows people prepared in advance.</description><pubDate>Tue, 13 Jan 2026 21:01:06 GMT</pubDate><content:encoded>
&lt;p&gt;Days ahead of Uganda’s January 15 general elections, government officials publicly denied plans to restrict internet access. In early January, authorities told local media there would be &lt;a href=&quot;https://www.myjoyonline.com/uganda-denies-plans-to-block-internet-during-election-2&quot;&gt;no internet shutdown during the vote&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;On Tuesday, just days before polls opened, Uganda ordered a nationwide suspension of public internet access, citing the need to curb “misinformation” and “&lt;a href=&quot;https://nation.africa/kenya/news/africa/uganda-suspends-internet-access-roaming-calls-and-new-sim-cards-days-before-poll-5325388&quot;&gt;electoral fraud&lt;/a&gt;.&amp;#8221;&lt;/p&gt;



&lt;p&gt;For people on the ground, this wasn’t a shock.&lt;/p&gt;



&lt;p&gt;In the weeks leading up to the election, Proton VPN saw two major signup surges from Uganda, each exceeding 250%, as people anticipated a blackout. When the shutdown actually began, Proton VPN signups from Uganda &lt;a href=&quot;https://x.com/davidgpeterson/status/2011140554244100501?s=20&quot;&gt;spiked by more than 8,000%&lt;/a&gt;, as people tried to reconnect to the outside world. The spike happened in the span of one hour.&lt;/p&gt;



&lt;p&gt;Independent internet monitoring group NetBlocks &lt;a href=&quot;https://mastodon.social/@netblocks/115888574953145927&quot;&gt;confirmed&lt;/a&gt; a nation-scale disruption, matching official notices from the Uganda Communications Commission ordering restrictions to “mitigate the rapid spread of misinformation.&amp;#8221;&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;1007&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_1007,c_scale/f_auto,q_auto/v1774421709/wp-vpn/screenshot-2026-01-13-at-11-35-57-am_13199bb65d/screenshot-2026-01-13-at-11-35-57-am_13199bb65d.png?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-13194 wp-image-13199&quot; style=&quot;aspect-ratio:1.016905003776927;width:496px;height:auto&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;255 KB&quot; data-optsize=&quot;48 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;81&quot; data-version=&quot;1774421709&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_1007,c_scale/f_auto,q_auto/v1774421709/wp-vpn/screenshot-2026-01-13-at-11-35-57-am_13199bb65d/screenshot-2026-01-13-at-11-35-57-am_13199bb65d.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_295,c_scale/f_auto,q_auto/v1774421709/wp-vpn/screenshot-2026-01-13-at-11-35-57-am_13199bb65d/screenshot-2026-01-13-at-11-35-57-am_13199bb65d.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_755,c_scale/f_auto,q_auto/v1774421709/wp-vpn/screenshot-2026-01-13-at-11-35-57-am_13199bb65d/screenshot-2026-01-13-at-11-35-57-am_13199bb65d.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1774421709/wp-vpn/screenshot-2026-01-13-at-11-35-57-am_13199bb65d/screenshot-2026-01-13-at-11-35-57-am_13199bb65d.png?_i=AA 1176w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Although authorities indicated a broad shutdown of internet services, monitoring data shows that some connections remain active. The initial drop was immediate, followed by a gradual decline, which may indicate a phased implementation across networks.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large is-resized&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;413&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_413,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-13194 wp-image-13203&quot; style=&quot;aspect-ratio:2.479517307081613;width:522px;height:auto&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;93 KB&quot; data-optsize=&quot;15 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;83.6&quot; data-version=&quot;1774421699&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_413,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_121,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_310,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_619,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_826,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_632,c_scale/f_auto,q_auto/v1774421699/wp-vpn/monitoring-data_13203e028e/monitoring-data_13203e028e.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;This pattern is becoming increasingly familiar. &lt;/p&gt;



&lt;p&gt;Around the world, election periods now &lt;a href=&quot;https://www.accessnow.org/campaign/keepiton/&quot;&gt;often coincide with internet shutdowns&lt;/a&gt;, throttling, or platform bans. Governments often frame these actions as &amp;#8216;temporary safeguards&amp;#8217;. In reality, they cut off journalists, civil society groups, opposition voices, and everyday people at the moment access to information matters most.&lt;/p&gt;



&lt;p&gt;Uganda’s shutdown highlights a broader shift: people no longer take official reassurances at face value. They plan for digital blackouts the same way some might prepare for storms. The data shows Ugandans expected to be disconnected and acted ahead of time.&lt;/p&gt;



&lt;p&gt;At Proton, we believe secure internet access is a cornerstone of democratic societies. When governments shut down connectivity during elections, protecting access to information becomes a necessity.&lt;/p&gt;
</content:encoded><category>Proton VPN news</category><author>Edward Komenda</author></item></channel></rss>