Over 4.2 million VPN servers, private home routers and other network hosts are vulnerable to being hijacked due to using tunneling protocols without security.
VPN, Internet Rights & Security Research
VPN Software
Our VPN research aims to better understand this rapidly-changing industry through investigations into VPN demand, the motivations behind global VPN usage, and the safety of popular free VPN applications.
- VPN | StatisticsVPN Demand Surges Around the World
This live tracker documents VPN demand spikes around the world and provides context for these increases.
- VPN | Free VPNsFree Android VPN Security Flaws: 100 Apps Tested
We tested the 100 most popular free VPN Android apps and found significant security and privacy flaws in the majority of these apps, which have 2.5 billion total installs
- VPN | Free VPNsThe Dangers of Free VPNs
Find all our investigations into the dangers of free VPN apps in one place. We look at ownership issues, security risks and how operators ignore Apple's privacy rules.
Internet Censorship
- Censorship | Internet ShutdownsGovernment Internet Shutdowns Cost $7.69 Billion in 2024
Our annual report analyzes every major intentional internet shutdown in 2024 and reveals that they cost the world economy $7.69 billion.
- Censorship | Blocked WebsitesWebsites Blocked in Russia Since February 2022
We are tracking the websites officially blocked in Russia by the authorities since the invasion of Ukraine in February 2022 that relate to the conflict.
- Censorship | Digital RightsChina’s Surveillance State: A Global Project
Researchers Valentin Weber and Vasilis Ververis reveal the global reach of Huawei's tech and the U.S. companies that facilitate China's surveillance state.
Internet Security
- Security | VulnerabilitiesNew Tunneling Protocol Vulnerabilities
Over 4.2 million VPN servers, private home routers and other network hosts are vulnerable to being hijacked due to using tunneling protocols without security.
- Security | VulnerabilitiesCVE-2023-52424 WiFi Vulnerability: The SSID Confusion Attack
This vulnerability exploits a design flaw in the WiFi standard, allowing attackers to trick WiFi clients on any operating system into connecting to a untrusted network.
- Security | VulnerabilitiesNew WiFi Authentication Vulnerabilities Discovered
New vulnerabilities in WiFi software allow attackers to trick victims into connecting to malicious networks and join secure networks without needing the password.
Surveillance
In these investigations, we explore the rise of surveillance technologies worldwide, along with the companies that power them.
- Surveillance | Digital RightsEmployee Monitoring Software Demand up 60% since 2019
As millions of people shifted to home working, employers around the world have turned to employee surveillance software to track their employees' productivity.
- Surveillance | Digital RightsPrivacy Tracker: Contact Tracing & Digital Health Certificate Apps
This live tracker documents new initiatives introduced in response to the pandemic that pose a risk to digital rights around the world.
- Surveillance | Digital RightsHikvision and Dahua Surveillance Cameras: Global Locations
We identified and mapped 6.3 million surveillance camera networks globally that use hardware from controversial Chinese firms Hikvision and Dahua.