<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton VPN Blog</title><description>Free VPN News</description><link>https://protonvpn.com/blog/</link><language>en</language><feed_url>https://protonvpn.com/blog/feed</feed_url><item><title>Plex: What to know about this media streamer</title><link>https://protonvpn.com/blog/plex-streaming-app</link><guid isPermaLink="true">https://protonvpn.com/blog/plex-streaming-app</guid><description>Media server, commercial streaming service, closed-source software. Plex is a lot of things, but is it legal? Is it safe? And is it free?</description><pubDate>Fri, 08 Aug 2025 13:13:02 GMT</pubDate><content:encoded>
&lt;p&gt;Plex began as media server software that allows you to organize, manage, and &lt;a href=&quot;https://protonvpn.com/streaming&quot;&gt;stream&lt;/a&gt; your personal media collections, such as movies, TV shows, music, and photos, to various devices. However, thanks to its ongoing quest to monetize its undeniable popularity (around &lt;a href=&quot;https://www.globenewswire.com/news-release/2025/01/13/3008658/34264/en/Global-Streaming-Media-Company-Plex-Appoints-Matt-DiPietro-as-CMO.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;25 million active monthly users&lt;/a&gt;), Plex now aims to be a centralized one-stop hub for all your media needs.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is Plex?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#free&quot;&gt;Is Plex free?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#safe&quot;&gt;Is Plex safe?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#legal&quot;&gt;Is Plex legal?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#how&quot;&gt;How does Plex work for streaming?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#alternatives&quot;&gt;Open-source Plex alternatives&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#final-thoughts&quot;&gt;Final thoughts&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is Plex?&lt;/h2&gt;



&lt;p&gt;Plex is essentially two separate things wrapped into a single service:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;1. A (mainly free) media server&lt;/h3&gt;



&lt;p&gt;Plex is best known as a media server. Install the Plex server software on a computer, network-attached storage (NAS) device, or dedicated media servers, and you can stream your video, audio, and &lt;a href=&quot;https://proton.me/support/drive-create-album-add-photos&quot;&gt;photo library&lt;/a&gt; for free on other devices on your local network, complete with cover art, trailers, descriptions, subtitles, and more.&lt;/p&gt;



&lt;p&gt;You can do this using the Plex player apps, which are available for most platforms. You can also access your Plex library in a browser via the Plex web app player.&lt;/p&gt;



&lt;p&gt;Plex also supports remote streaming over the internet, but as of May 2025, this feature is &lt;a href=&quot;https://support.plex.tv/articles/requirements-for-remote-playback-of-personal-media/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;no longer free&lt;/a&gt; for video files. We discuss this further below.&lt;/p&gt;



&lt;p&gt;The Plex media server software is available for Windows, macOS, Linux, Docker, and a wide selection of NAS devices.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;2. A commercial streaming service&lt;/h3&gt;



&lt;p&gt;Plex also offers a free, ad-supported streaming service with a wide selection of TV channels and on-demand movies. It should be noted, though, that most of this content is either old and/or very much in the B-movie category.&lt;/p&gt;



&lt;p&gt;In addition to these core functionalities, Plex allows you to:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Add any movie or TV show to a unified watchlist. Plex will list all the legal places this content is available and link to it if you subscribe to a platform where it&amp;#8217;s available&lt;/li&gt;



&lt;li&gt;Share watchlists, comments, and recommendations with friends&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Although largely free to use, Plex is a proprietary closed-source platform.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;free&quot;&gt;Is Plex free?&lt;/h2&gt;



&lt;p&gt;Plex has tried various pricing models over the years. The following pricing is correct at the time of writing this article:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Local streaming&lt;/h3&gt;



&lt;p&gt;You can stream your personal content from a Plex server to devices on your local network for free. This now includes your mobile devices, in addition to your smart TVs, media streaming devices, and computers.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Remote streaming&lt;/h3&gt;



&lt;p&gt;You can still stream your personal music and photo collections over the internet for free. However, streaming video content remotely is now a premium feature that can be accessed in one of two ways:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Plex Pass&lt;/strong&gt; — Anyone can connect to your Plex server and stream your content remotely for no additional charge. You also have access to a range of premium features, such as hardware transcoding, downloading files locally to your device, the ability to skip titles&amp;#8217; intro and credits, and more. A Plex Pass makes sense if you share your video collection with friends and family.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Remote Watch Pass&lt;/strong&gt; — Allows you to stream videos remotely from the Plex servers of friends and family who don’t have a Plex Pass. It&amp;#8217;s also useful for remotely accessing your own server&amp;#8217;s content if you don&amp;#8217;t share it with enough people to justify purchasing a Plex Pass.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Ad-supported conten&lt;/strong&gt;t — You can watch ad-supported TV shows and movies for free. In fact, this is the only way to watch them. Upgrading to a paid Plex Pass or Remote Watch Pass plan doesn&amp;#8217;t remove the ads.&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;621&quot; data-public-id=&quot;wp-vpn/plex-1/plex-1.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_621,c_scale/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA&quot; alt=&quot;Plex will collect lots of metadata and display in an attractive way&quot; class=&quot;wp-post-12333 wp-image-12341&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;1 MB&quot; data-optsize=&quot;115 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;92.5&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12341&quot; data-version=&quot;1754651741&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_621,c_scale/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_182,c_scale/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_466,c_scale/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_932,c_scale/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_951,c_scale/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA 1568w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1754651741/wp-vpn/plex-1/plex-1.png?_i=AA 1586w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;safe&quot;&gt;Is Plex safe?&lt;/h2&gt;



&lt;p&gt;As long as you download the Plex server software and viewer apps from a reputable source (such as the official Plex website, Apple App Store, or Google Play Store), you can be confident they are free from malware. Connections to Plex servers and self-hosted remote streaming servers are secured using &lt;a href=&quot;https://proton.me/blog/https&quot;&gt;HTTPS&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;When it comes to streaming content from a self-hosted media player, Plex is quite &lt;a href=&quot;https://www.plex.tv/about/privacy-legal/#device-information-i-e-the-device-that-runs-the-application-you-use-to-access-plex&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;privacy-friendly&lt;/a&gt;. It doesn&amp;#8217;t collect, share, or sell information about content or titles in your personal media library. It does however, collect some metadata about your media library, such as your device information, the types of files you have, and how often you access them. This data is used for analytics and to improve the service, but it also means that Plex has some insight into your media consumption habits.&lt;/p&gt;



&lt;p&gt;If you watch Plex&amp;#8217;s ad-supported free streaming service, you&amp;#8217;re handing over much more information, which Plex sells to third parties and uses for targeted ads. This includes location data, detailed viewing history, search history, your friends list, interactions, and more. It&amp;#8217;s worth noting that most other commercial streaming services also collect and monetize similar amounts of your personal data.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;legal&quot;&gt;Is Plex legal?&lt;/h2&gt;



&lt;p&gt;Yes. Plex is just software. Its free streamlining service only offers content that&amp;#8217;s been licensed from the copyright holders (which includes Warner Bros, &lt;a href=&quot;https://protonvpn.com/support/watch-mgm-with-vpn&quot;&gt;MGM&lt;/a&gt;, Lionsgate, Legendary, Crackle, and more).&lt;/p&gt;



&lt;p&gt;It is, of course, also fully legal to stream legal content from your personal Plex media server. For example, you can legally stream DVDs that you&amp;#8217;ve purchased and &lt;a href=&quot;https://en.wikipedia.org/wiki/Ripping&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ripped&lt;/a&gt; into a digital format suitable for streaming.&lt;/p&gt;



&lt;p&gt;What &lt;em&gt;isn&amp;#8217;t&lt;/em&gt; legal is using Plex to stream libraries of content you obtained by less legitimate means. But the issue here isn&amp;#8217;t really about Plex (which takes no legal responsibility for such behavior) — it&amp;#8217;s about your libraries.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;how&quot;&gt;How does Plex work for streaming?&lt;/h2&gt;



&lt;p&gt;To watch ad-supported content, simply download the Plex app for your device and start watching. You don&amp;#8217;t need to register for an account, but doing so gives you access to advanced features.&lt;/p&gt;



&lt;p&gt;Setting up a Plex media server to stream your own content is also easy. You will need to sign up for an account for this.&lt;/p&gt;



&lt;p&gt;1. Choose one of your computers or NAS servers to be the Plex server. It&amp;#8217;s best to choose one that&amp;#8217;s always on, so low-power devices like Raspberry Pis make excellent Plex servers.&lt;/p&gt;



&lt;p&gt;2. Install the Plex media server software.&lt;/p&gt;



&lt;p&gt;3. Name your Plex server.&lt;/p&gt;



&lt;p&gt;4. Configure your media sources. Plex works best if each folder contains the same type of media (movies, TV shows, music files, etc.).&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;724&quot; height=&quot;521&quot; data-public-id=&quot;wp-vpn/plex-2/plex-2.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_724,h_521,c_scale/f_auto,q_auto/v1754651735/wp-vpn/plex-2/plex-2.png?_i=AA&quot; alt=&quot;You can easily add your own media libraries&quot; class=&quot;wp-post-12333 wp-image-12342&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;28 KB&quot; data-optsize=&quot;6 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;77&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12342&quot; data-version=&quot;1754651735&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1754651735/wp-vpn/plex-2/plex-2.png?_i=AA 724w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_216,c_scale/f_auto,q_auto/v1754651735/wp-vpn/plex-2/plex-2.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 724px) 100vw, 724px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;Plex will automatically scan your libraries and add metadata such as cover images, a synopsis, cast details, ratings, reviews, and more.&lt;/p&gt;



&lt;p&gt;5. Install the Plex app on your devices and sign in. With a free account, you can watch your content over your local network. With a premium account, you can watch your content anywhere. Note that if you have a complex setup (such as you&amp;#8217;re using a VPN on your media server), &lt;a href=&quot;https://support.plex.tv/articles/200289506-remote-access/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;additional configuration&lt;/a&gt; may be required for remote streaming.&lt;/p&gt;



&lt;ol start=&quot;5&quot; class=&quot;wp-block-list&quot;&gt;&lt;/ol&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;alternatives&quot;&gt;Open-source Plex alternatives&lt;/h2&gt;



&lt;p&gt;For many, one of Plex&amp;#8217;s biggest drawbacks is that it&amp;#8217;s proprietary closed-source software. Another is that remote streaming now requires a paid plan. Fortunately, there are some excellent free and open-source alternatives. The most notable of these (and closest drop-in alternatives) are:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;a href=&quot;https://jellyfin.org/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Jellyfin&lt;/a&gt;&lt;/h3&gt;



&lt;p&gt;Jellyfin basically aims to be an open-source version of Plex with the commercial bits stripped out. As such, it closely follows Plex&amp;#8217;s server-client model and behaves just like Plex in most ways.&lt;/p&gt;



&lt;p&gt;You should be aware, however, that Jellyfin is less mature than Plex, so it doesn&amp;#8217;t have as many advanced features and extensible plugins as its commercial rival (although all its features are free). And because no one is getting paid to run them, there are no proxy servers to connect for easy one-click remote streaming.&lt;/p&gt;



&lt;p&gt;This means you&amp;#8217;ll need to &lt;a href=&quot;https://www.wundertech.net/how-to-access-jellyfin-remotely/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;manually configure&lt;/a&gt; a remote streaming solution, such as setting up &lt;a href=&quot;https://protonvpn.com/blog/port-forwarding/&quot;&gt;port forwarding&lt;/a&gt;, a reverse proxy, or a direct VPN connection (a feature not supported by Proton VPN). On the plus side, remote streaming is free.&lt;/p&gt;



&lt;p&gt;It&amp;#8217;s worth noting that Jellyfin is a fork of &lt;a href=&quot;https://emby.media/&quot;&gt;Emby&lt;/a&gt;, which despite having many open source components, now operates on a freemium model (like Plex). As with Plex, remote streaming is much easier on Emby than Jellyfin, but it&amp;#8217;s a paid feature (as are mobile app playback and downloading files locally from your media server).&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;a href=&quot;https://kodi.tv/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Kodi&lt;/a&gt;&lt;/h3&gt;



&lt;p&gt;Kodi is a highly versatile open-source media player known for its massive plugin ecosystem, which can greatly extend its functionality (this includes a range of dubious third-party IPTV add-ons). It doesn&amp;#8217;t have a built-in server component like Plex or Jellyfin, but one can be added via a Jellyfin or Emby plugin.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;vpn&quot;&gt;Plex and Proton VPN&lt;/h2&gt;



&lt;p&gt;Using Proton VPN on your client device will prevent Plex from easily identifying you via your IP address when streaming ad-supported content, while having no effect on streaming from a self-hosted Plex media server.&lt;/p&gt;



&lt;p&gt;You can also use Proton VPN to secure your Plex media server, but may need to upgrade to a paid plan for this:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;To stream over your local network, simply &lt;a href=&quot;https://protonvpn.com/support/lan-connections&quot;&gt;allow LAN connections&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;To configure remote streaming, you may need to &lt;a href=&quot;https://protonvpn.com/support/port-forwarding/&quot;&gt;port forward&lt;/a&gt; through the VPN server&amp;#8217;s firewall.&lt;/li&gt;
&lt;/ul&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white&quot; href=&quot;/pricing/&quot;&gt;Get Proton VPN Plus&lt;/a&gt;&lt;/div&gt; 



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;final-thoughts&quot;&gt;Final thoughts&lt;/h2&gt;



&lt;p&gt;If you want a mature self-hosted streaming solution, Plex remains the go-to solution. This is especially true if you want hassle-free remote streaming while out and about, but this is something you&amp;#8217;ll need to pay for.&lt;/p&gt;



&lt;p&gt;If your streaming needs are not too complex and you prefer a solution that is open source and doesn&amp;#8217;t try to push its money-making options on you (currently these are not too intrusive with Plex, but they have been much more so in the past), Jellyfin is an easy recommendation. Just be aware that you&amp;#8217;ll need some technical know-how to access your media libraries while away from your home network.&lt;/p&gt;



&lt;p&gt;Plex&amp;#8217;s ad-supported content is best summed up as old. But it&amp;#8217;s hard to criticize such a large catalog of free shows and movies, and there is some good (if old) content in there.&lt;/p&gt;
</content:encoded><category>Privacy basics</category><author>Douglas Crawford</author></item><item><title>Omegle is gone, but Omegle alternatives are just as unsafe for kids</title><link>https://protonvpn.com/blog/is-omegle-safe</link><guid isPermaLink="true">https://protonvpn.com/blog/is-omegle-safe</guid><description>Omegle may be gone, but similar sites are just as risky to kids. Learn how to protect your child from dangerous chat apps and online predators.</description><pubDate>Tue, 05 Aug 2025 11:22:50 GMT</pubDate><content:encoded>
&lt;p&gt;Imagine you&amp;#8217;re a child signing on to a random chat generator and you get paired with a celebrity like &lt;a href=&quot;https://vm.tiktok.com/ZNduxguJN&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener nofollow&quot;&gt;Millie Bobby Brown&lt;/a&gt;. If the situation sounds too good to be true, that&amp;#8217;s because it is: there&amp;#8217;s a growing trend to use AI filters to fool kids into thinking they&amp;#8217;re talking to their favorite celebrities.&lt;/p&gt;



&lt;p&gt;Welcome to Omegle and its many alternatives. Omegle was a popular chat platform that randomly and anonymously paired strangers around the world through text or video. For over 14 years, it attracted millions of young people with a tagline that flew in the face of every childhood safety rule: &amp;#8220;Talk to strangers.&amp;#8221; The problem was that anyone could join, including kids pretending to be older — or adults pretending to be teens.&lt;/p&gt;



&lt;p&gt;In November 2023, Omegle &lt;a href=&quot;https://www.bbc.com/news/business-67364634&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;officially shut down&lt;/a&gt; after mounting public backlash and its connection to over 500 criminal investigations involving child predators. However, countless Omegle copycat platforms still exist, often with the same lack of moderation, weak privacy protections, and high risk of abuse.&lt;/p&gt;



&lt;p&gt;If your child is curious, bored, or seeking connection online, they may already know about these Omegle alternatives. Here are the risks involved with such platforms and what you can do to &lt;a href=&quot;https://proton.me/blog/how-to-protect-your-childrens-privacy-online&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;keep your child safe online&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is Omegle and how does it work?&lt;/h2&gt;



&lt;p&gt;Omegle was a free, anonymous chat website that connected users with random strangers for real-time conversations via text or video. No account or age verification was required — anyone could access the site, click a button, and instantly be matched with someone else.&lt;/p&gt;



&lt;p&gt;Omegle and its clones generally use a peer-to-peer (P2P) connection for video chats, meaning they share your data (including video and audio streams and potentially your &lt;a href=&quot;https://protonvpn.com/what-is-my-ip-address&quot;&gt;IP address&lt;/a&gt;) directly with the person you&amp;#8217;re talking to.&lt;/p&gt;



&lt;p&gt;Omegle offered several chat options:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Text mode for standard one-on-one conversations&lt;/li&gt;



&lt;li&gt;Spy (question) text mode, where one person asked a question and two strangers debated or answered it&lt;/li&gt;



&lt;li&gt;Video mode for one-on-one video chats, where participants could see and hear each other&lt;/li&gt;



&lt;li&gt;Unmoderated video mode for adults over 18, which carried a warning but had no real safeguards&lt;/li&gt;



&lt;li&gt;College student mode for users with college email addresses&lt;/li&gt;



&lt;li&gt;Interest-based mode for pairing two strangers with similar interests&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;At its peak in January 2023, Omegle attracted &lt;a href=&quot;https://www.statista.com/statistics/1368245/global-monthly-visits-to-omegle/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;70 million monthly visitors&lt;/a&gt;, with &lt;a href=&quot;https://www.statista.com/statistics/1368238/omegle-users-by-age-group/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;38% of users&lt;/a&gt; aged 18–24. Its simplicity and anonymity made it especially appealing to teens — and predators.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What risks does your child face on apps like Omegle?&lt;/h2&gt;



&lt;p&gt;Omegle might be gone, but many similar platforms still exist, often exposing their users to the same dangers.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Lack of meaningful moderation and safety controls&lt;/h3&gt;



&lt;p&gt;Omegle had &lt;a href=&quot;https://www.omegle.com/static/guidelines.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;community guidelines&lt;/a&gt; meant to discourage harmful behavior, including harassment, sexually explicit content, threats, impersonation, and the unauthorized sharing of personal information. But enforcement was practically nonexistent.&lt;/p&gt;



&lt;p&gt;While you could report abuse to Omegle, it banned offenders based on their IP address, making it easy to bypass them. Unfortunately, many Omegle alternatives still operate using the same ineffective procedures. For example, TinyChat and CamSurf don&amp;#8217;t require registration, so anyone can join.&lt;/p&gt;



&lt;p&gt;While some of these websites claim to use AI or human moderation, there’s often little transparency around what that actually means or whether it’s effective — especially on platforms that prioritize fast, anonymous access over user safety.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Exposure to inappropriate content and online predators&lt;/h3&gt;



&lt;p&gt;Due to poor moderation and nonexistent age verification, Omegle became a hotspot for nudity, sexually explicit behavior, and graphic conversations, often within seconds of joining a chat. Many kids were exposed to adult content and &lt;a href=&quot;https://www.theguardian.com/media/2023/nov/15/omegle-closing-random-video-chat&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;pressured&lt;/a&gt; to perform inappropriate acts before they even knew what was happening.&lt;/p&gt;



&lt;p&gt;Many disturbing cases involving Omegle have surfaced, including &lt;a href=&quot;https://www.mdx.ac.uk/news/2024/2/omegle-chatroom-children-abuse-study-/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;users sharing confessions&lt;/a&gt; after sexting with underage teens, &lt;a href=&quot;https://www.essex.police.uk/news/essex/news/news/2024/july/couple-jailed-for-facilitating-the-sexual-abuse-of-a-child-on-omegle/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;sexual abuse&lt;/a&gt;, and a man convicted of &lt;a href=&quot;https://www.theverge.com/2024/7/22/24203577/sex-offender-convicted-sextortion-omegle-snapchat-tiktok-csam&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;sextorting&lt;/a&gt; over 100 children across platforms like Omegle, &lt;a href=&quot;https://proton.me/blog/tiktok-parental-controls&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;TikTok&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/blog/snapchat-parental-controls&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Snapchat&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Involuntary sharing and recordings&lt;/h3&gt;



&lt;p&gt;Everything kids share on platforms like Omegle — whether its&amp;#8217;s text, photos, or videos — can be secretly recorded or screenshotted without their knowledge. These recordings may later become tools for threats, humiliation, extortion, or &lt;a href=&quot;https://www.savethechildren.net/news/one-5-young-people-spain-report-being-victims-ai-deepfakes-almost-all-reporting-sexual&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;AI-generated deepfakes&lt;/a&gt; — realistic photos or videos that are manipulated to make it appear the child said or did something they never did. The emotional damage can be &lt;a href=&quot;https://www.msn.com/en-us/news/crime/teen-was-blackmailed-with-ai-generated-nude-photo-of-himself-then-he-died-by-suicide/ar-AA1GnPk2&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;irreversible&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Manipulation and scams&lt;/h3&gt;



&lt;p&gt;On anonymous chat platforms with little to no supervision, like Omegle, it’s easy for bad actors to pose as someone they’re not. Some may take their time, building trust through casual conversation before asking for access to private photos, files, or personal information — a classic form of &lt;a href=&quot;https://proton.me/blog/what-is-social-engineering&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;social engineering&lt;/a&gt; that can quickly lead to &lt;a href=&quot;https://protonvpn.com/blog/doxing&quot;&gt;doxing&lt;/a&gt; or blackmail.&lt;/p&gt;



&lt;p&gt;Scammers may also share links that lead to malware or &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;phishing websites&lt;/a&gt; designed to steal credentials or install spyware. It only takes a simple, casual message like &amp;#8220;Can you vote for me in this contest?&amp;#8221; to trick someone into clicking.&lt;/p&gt;



&lt;p&gt;As we mentioned in the intro, people have recently started using AI-generated deepfakes to impersonate celebrities — &lt;a href=&quot;https://www.tiktok.com/@youneslife_&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener nofollow&quot;&gt;often to gain views&lt;/a&gt;. In the wrong hands, this &lt;a href=&quot;https://github.com/iperov/DeepFaceLive&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;technology&lt;/a&gt; can exploit a child’s trust by mimicking a public figure they admire, making it easier to pressure them into doing or sharing things they normally wouldn’t.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Data collection and privacy risks&lt;/h3&gt;



&lt;p&gt;Even if your child doesn&amp;#8217;t share anything personal in a chat, just using an app like Omegle can expose them to privacy risks. These platforms often collect IP addresses, device details, and chat logs — and with so many different copycats out there, it&amp;#8217;s difficult to tell how trustworthy any platform&amp;#8217;s privacy policies really are.&lt;/p&gt;



&lt;p&gt;For example, OmeTV&amp;#8217;s &lt;a href=&quot;https://ome.tv/privacy/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;privacy policy&lt;/a&gt; says that the platform collects various data, including:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;IP addresses, shared with service providers and other users in video chats. Although an IP address reveals only a general location, it can be correlated with parts of a conversation to help pinpoint where your child lives or build a profile of who they are&lt;/li&gt;



&lt;li&gt;Profile data, including your child&amp;#8217;s name, age, and information from their connected social profiles&lt;/li&gt;



&lt;li&gt;Video frame snapshots from cameras during bans or complaints&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In the case of Omegle, it allowed users to save chats, generating a unique link for each one. Anything your child typed in what felt like a private conversation could be permanently stored and shared online by the other person. However, a &lt;a href=&quot;https://thehackernews.com/2016/08/omegle-hack.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;security flaw&lt;/a&gt; allowed anyone to access the chat links of other Omegle users.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What can parents do to protect their kids online?&lt;/h2&gt;



&lt;p&gt;Here’s what you can do to &lt;a href=&quot;https://proton.me/blog/proton-parents-privacy-guide&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;help your child stay safer on the internet&lt;/a&gt;:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Talk about online risks and keep the conversation open&lt;/h3&gt;



&lt;p&gt;If your child is old enough to go online, they’re old enough to understand the risks. That’s why it’s important to have regular, honest conversations, ideally before any issues arise. Help them understand:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;The risks of talking to strangers, such as grooming and exposure to explicit content.&lt;/li&gt;



&lt;li&gt;Why they should never share personal information, like their real name, school, where they live, or photos.&lt;/li&gt;



&lt;li&gt;How photos or videos of them can be misused, including for &lt;a href=&quot;https://proton.me/blog/family-photos-ai-risks&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;AI training&lt;/a&gt;, deepfakes, and extortion.&lt;/li&gt;



&lt;li&gt;That people online can easily lie about who they are, impersonate celebrities, and may try to build trust through flattery or fake identities to manipulate them.&lt;/li&gt;



&lt;li&gt;That nothing online is ever truly private — even disappearing messages or private chats can be made public.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Most importantly, let your child know that if a stranger asks for something personal or makes them uncomfortable, it’s always okay to leave the conversation — no explanation needed — and come talk to you.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Set clear rules and stay involved&lt;/h3&gt;



&lt;p&gt;To help your child form healthy boundaries around video chat platforms like Omegle, set expectations together about what’s okay to do online, what’s off-limits, and when to ask for help. Go through the app or website with them and explore how to report, block, or mute users when something feels off.&lt;/p&gt;



&lt;p&gt;Set ground rules about which apps they&amp;#8217;re allowed to use, when, and for how long. You might also consider using parental control tools that can send alerts about suspicious or unsafe activity, explaining they are there to keep them safe, not invade their privacy.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Teach kids how to spot red flags&lt;/h3&gt;



&lt;p&gt;Here are some common warning signs that could signal grooming, scams, or social engineering attempts:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Strangers asking to move the conversation to another app&lt;/li&gt;



&lt;li&gt;Requests for photos, especially &amp;#8220;just for fun&amp;#8221; or &amp;#8220;just between us&amp;#8221;&lt;/li&gt;



&lt;li&gt;Messages that suddenly turn flirtatious or overly personal&lt;/li&gt;



&lt;li&gt;Users who hide their face on video or use fake-looking profiles&lt;/li&gt;



&lt;li&gt;Pressure to keep the conversation secret&lt;/li&gt;



&lt;li&gt;Being asked to click on links or download files&lt;/li&gt;



&lt;li&gt;Sudden threats or guilt-tripping if the child doesn&amp;#8217;t respond&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Set up a VPN for your family&lt;/h3&gt;



&lt;p&gt;Even if your child doesn’t share personal details, platforms like Omegle may expose the IP addresses of users, which can reveal their approximate location and other device information.&lt;/p&gt;



&lt;p&gt;A &lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPN (virtual private network)&lt;/a&gt; helps hide your IP address and encrypt your internet traffic. With a VPN enabled, strangers, websites, and apps will have a harder time tracking your child’s location and gathering data about them.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/pricing&quot;&gt;Proton VPN&lt;/a&gt; allows you to protect up to 10 devices under one account and works on all &lt;a href=&quot;https://protonvpn.com/download&quot;&gt;major platforms&lt;/a&gt;, including Windows, macOS, Android, iOS, and Linux. You can also &lt;a href=&quot;https://protonvpn.com/support/installing-protonvpn-on-a-router/&quot;&gt;set it up on your home router&lt;/a&gt;, so every device connected to your WiFi is automatically protected.&lt;/p&gt;



&lt;blockquote class=&quot;wp-block-quote is-layout-flow wp-block-quote-is-layout-flow&quot;&gt;
&lt;p&gt;Want more tips for raising privacy-smart kids? &lt;a href=&quot;https://proton.me/blog/family-internet&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Explore our guide for families.&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;



&lt;p&gt;Shady platforms like Omegle aren&amp;#8217;t going away anytime soon. But with the right tools, honest conversations, and clear boundaries, you can help your child stay safe, confident, and in control of their digital life. At Proton, we believe privacy should be the default — especially for kids. That&amp;#8217;s why we build tools that protect your data without asking you to trade it away.&lt;/p&gt;
</content:encoded><category>Privacy deep dives</category><author>Elena Constantinescu</author></item><item><title>Pluto TV: What&amp;#8217;s the catch?</title><link>https://protonvpn.com/blog/pluto-tv-streaming-app</link><guid isPermaLink="true">https://protonvpn.com/blog/pluto-tv-streaming-app</guid><description>Is Pluto TV safe — and is it really a totally free streaming service? Here&apos;s what you need to know before you start streaming.</description><pubDate>Fri, 01 Aug 2025 16:08:59 GMT</pubDate><content:encoded>
&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/support/watch-pluto-tv-with-vpn-outside-us/&quot;&gt;Pluto TV&lt;/a&gt; is a US-based &lt;a href=&quot;https://protonvpn.com/support/streaming-guide&quot;&gt;streaming app&lt;/a&gt; that offers a mix of live TV channels and on-demand content. It stands out in today&amp;#8217;s crowded &lt;a href=&quot;https://protonvpn.com/streaming&quot;&gt;streaming&lt;/a&gt; marketplace as one of the few options that&amp;#8217;s completely free to access. You don&amp;#8217;t even need to sign up or sign in to watch over 250 live TV channels and thousands of on-demand movies and shows without paying a penny.&lt;/p&gt;



&lt;p&gt;So what&amp;#8217;s the catch? In this article, we&amp;#8217;ll take a comprehensive look at Pluto TV, delving into its features, security measures, and potential risks, so you can make an informed decision about whether this service is for you.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is Pluto TV?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#safe&quot;&gt;Is Pluto TV safe?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#downsides&quot;&gt;Other Pluto TV downsides&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#vpn&quot;&gt;Can you stream Pluto TV with Proton VPN?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#alternatives&quot;&gt;Pluto TV alternatives&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#catch&quot;&gt;There isn&amp;#8217;t really a catch&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#faq&quot;&gt;Frequently asked questions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is Pluto TV?&lt;/h2&gt;



&lt;p&gt;Pluto TV is a free, ad-supported streaming service owned by the &lt;a href=&quot;https://protonvpn.com/support/watch-paramount-with-vpn/&quot;&gt;Paramount&lt;/a&gt; Global mass media entertainment conglomerate.&lt;/p&gt;



&lt;p&gt;Although it does offer on-demand content, its primary focus is on offering a traditional linear broadcast TV experience with a fixed schedule and regular ad breaks. Launched in 2013 to target the emerging &lt;a href=&quot;https://en.wikipedia.org/wiki/Cord-cutting&quot;&gt;cord-cutting&lt;/a&gt; trend among US consumers, its simple cable-like experience (complete with a grid guide that allows you to easily browse and select live channels) is a major part of its appeal.&lt;/p&gt;



&lt;p&gt;In addition to the US, Pluto TV is now available in many European and most Latin American countries and can be accessed through your web browser or via apps for smartphones and a wide selection of smart TVs and &lt;a href=&quot;https://protonvpn.com/streaming/devices&quot;&gt;streaming devices&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;The catalog of titles available in your country will vary due to licensing restrictions and the availability of regional channels and shows.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;safe&quot;&gt;Is Pluto TV safe?&lt;/h2&gt;



&lt;p&gt;Yes, Pluto TV is a safe and legitimate service insofar as you don&amp;#8217;t need to worry about hidden charges, credit card requests, or sneaky subscriptions. When your device connects to Pluto TV, the connection is automatically secured using &lt;a href=&quot;https://proton.me/blog/https&quot;&gt;HTTPS&lt;/a&gt; so only you and Pluto TV (and its parent company, Paramount) can see what you watch.&lt;/p&gt;



&lt;p&gt;You can download its apps from the Apple App Store, Google Play, Amazon, and Roku, confident that they don&amp;#8217;t contain malware (still, you should never download its apps from unofficial sources).&lt;/p&gt;



&lt;p&gt;However, there are a couple of things you should be aware of:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Tracking&lt;/h3&gt;



&lt;p&gt;Like most ad-supported platforms, Pluto TV collects personal data that it uses to target you with personalized ads. According to its &lt;a href=&quot;https://privacy.paramount.com/en/policy?r=pluto.tv&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;privacy policy&lt;/a&gt;, Pluto TV tracks your &lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/&quot;&gt;IP address&lt;/a&gt;, location data, device identifiers, browsing activity, and viewing habits.&lt;/p&gt;



&lt;p&gt;However, this is quite strongly mitigated by the fact that Pluto TV doesn&amp;#8217;t require an account or personal information to use the service, limiting how much data it can tie directly to you. And if you use a &lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPN&lt;/a&gt; to hide your real IP address (see below for guidance on how to do just that), you can further reduce the data it has access to.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Content moderation&lt;/h3&gt;



&lt;p&gt;Pluto TV doesn&amp;#8217;t host &amp;#8220;adult&amp;#8221; content, but R-rated movies are shown throughout the day. In the UK (for example), shows like South Park are only available after the 9 PM &lt;a href=&quot;https://en.wikipedia.org/wiki/Watershed_(broadcasting)&quot;&gt;watershed&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;If you do opt to register for the service and sign in, Pluto TV provides parental control options to restrict access to certain channels or content to ensure that younger viewers are only exposed to age-appropriate material. However, with no requirement to register or sign in with an account, such restrictions are easy to bypass.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;downsides&quot;&gt;Other Pluto TV downsides&lt;/h2&gt;



&lt;p&gt;Other factors that may negatively affect your viewing pleasure include:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Ads&lt;/h3&gt;



&lt;p&gt;Pluto TV is an almost completely ad-supported service, so you&amp;#8217;re going to see quite a lot of ads.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Catalog quality&lt;/h3&gt;



&lt;p&gt;There are no &amp;#8220;Pluto TV originals&amp;#8221;, and you can expect most content to be older and/or of a lower standard than is available on most premium channels.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Video and audio quality&lt;/h3&gt;



&lt;p&gt;Most content is shown at lower resolutions —&amp;nbsp;typically 720p or 1080p, depending on the channel and region. Don&amp;#8217;t expect the kind of &amp;#8220;4K with Dolby Atmos&amp;#8221; quality available on paid services like &lt;a href=&quot;https://protonvpn.com/support/watch-netflix-with-vpn/&quot;&gt;Netflix&lt;/a&gt; or &lt;a href=&quot;https://protonvpn.com/support/watch-disneyplus-with-vpn/&quot;&gt;Disney+&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;vpn&quot;&gt;Can you stream Pluto TV with Proton VPN?&lt;/h2&gt;



&lt;p&gt;With a paid Proton VPN plan, you can easily watch Pluto TV from anywhere in the world. Simply connect to one of our &lt;a href=&quot;https://protonvpn.com/vpn-servers&quot;&gt;11&lt;/a&gt;,&lt;a href=&quot;https://protonvpn.com/vpn-servers&quot;&gt;000+ Plus servers&lt;/a&gt; in countries where Pluto TV is available.&lt;/p&gt;



&lt;p&gt;Using Proton VPN to stream Pluto TV offers other benefits:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Privacy&lt;/strong&gt; — With no sign-in requirement, your IP address is the main datapoint that Paramount Global uses to tie the other personal data it collects to your real-world identity. When you use Proton VPN, all Paramount can see is the IP address of our VPN server, not your real IP address.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Fewer ads&lt;/strong&gt; — Our &lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker/&quot;&gt;NetShield Ad-blocker&lt;/a&gt; DNS filtering feature won&amp;#8217;t currently block in-stream ad breaks on Pluto TV (although it can on other services). However, it is effective at blocking static ads in the Pluto TV apps and on its website and preventing annoying pop-ups and other distractions.&lt;/li&gt;
&lt;/ul&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white&quot; href=&quot;/pricing/&quot;&gt;Get Proton VPN Plus&lt;/a&gt;&lt;/div&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;alternatives&quot;&gt;Pluto TV alternatives&lt;/h2&gt;



&lt;p&gt;Although unusual, Pluto TV is not the only US-based free ad-supported streaming service. Other options include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/support/watch-tubi-with-vpn&quot;&gt;Tubi&lt;/a&gt; (like Pluto TV, Tubi is 100% ad-supported free)&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/support/watch-philo-with-vpn&quot;&gt;Philo&lt;/a&gt; (this service is primarily ad-supported free, although a premium option is available)&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;You can &lt;a href=&quot;https://protonvpn.com/support/streaming-guide&quot;&gt;stream&lt;/a&gt; &lt;a href=&quot;https://protonvpn.com/support/streaming-guide&quot;&gt;both these services&lt;/a&gt; while connected to Proton VPN. We also support numerous free streaming services around the world. Visit our &lt;a href=&quot;https://protonvpn.com/streaming/services&quot;&gt;streaming services guide&lt;/a&gt; to find one in your area.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;catch&quot;&gt;Pluto TV: There isn&amp;#8217;t really a catch&lt;/h2&gt;



&lt;p&gt;If you&amp;#8217;re not looking for the latest premium streaming content and don&amp;#8217;t mind ads, Pluto TV is a great free service. And with Proton VPN, you can watch it even more privately, wherever you are.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;faq&quot;&gt;Frequently asked questions&lt;/h2&gt;



&lt;div class=&quot;schema-faq wp-block-yoast-faq-block&quot;&gt;&lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1754052944267&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;Is Pluto TV free?&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;Yes. Pluto TV is a 100% free service that derives most of its income from ads.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1754052951963&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;Where can I download the Pluto TV app for my device?&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;Pluto TV has apps for almost every major platform. These include:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=tv.pluto.android&amp;amp;hl=en-IN&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Android&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;https://apps.apple.com/us/app/pluto-tv-stream-movies-shows/id751712884&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;iOS and iPadOS&lt;/a&gt;&lt;br /&gt;Roku&lt;br /&gt;Apple TV&lt;br /&gt;Android TV&lt;br /&gt;Amazon Fire TV&lt;br /&gt;&lt;a href=&quot;https://apps.microsoft.com/detail/9p9lv240kq9r?hl=en-us&amp;amp;gl=US&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Windows&lt;/a&gt; (via the Microsoft Store)&lt;br /&gt;&lt;br /&gt;You can also watch Pluto TV on almost any internet-capable device by visiting its &lt;a href=&quot;https://pluto.tv/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;website&lt;/a&gt;.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1754053017805&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;How many Pluto TV channels are there?&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;In the US, Pluto now offers over 250 live streaming channels (plus on-demand content). This may vary in other regions.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1754053030513&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;Who owns Pluto TV?&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;Pluto TV is owned by Paramount Global. It was acquired by Viacom (now part of Paramount Global) in January 2019. One of Pluto TV’s co-founders, Tom Ryan, is now the CEO of Paramount Streaming and remains heavily involved with the service.&lt;/p&gt; &lt;/div&gt; &lt;/div&gt;



&lt;p&gt;&lt;/p&gt;
</content:encoded><category>Privacy basics</category><author>Douglas Crawford</author></item><item><title>Kanopy: A free streaming app for library members</title><link>https://protonvpn.com/blog/kanopy</link><guid isPermaLink="true">https://protonvpn.com/blog/kanopy</guid><description>Free streaming platform Kanopy offers hundreds of films, documentaries, or more to public library members. But is it really free, and is it safe to use?</description><pubDate>Fri, 18 Jul 2025 18:04:43 GMT</pubDate><content:encoded>
&lt;p&gt;Kanopy is a free &lt;a href=&quot;https://protonvpn.com/streaming/services&quot;&gt;streaming platform&lt;/a&gt; that offers hundreds of critically acclaimed movies, documentaries, foreign films, and more. The catch? You need to be a member of a participating public library or university to access its content. This article will dive into everything you need to know about this excellent free service.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is Kanopy streaming?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#free&quot;&gt;Is Kanopy free?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#watch&quot;&gt;How to watch content on Kanopy&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#money&quot;&gt;How does Kanopy make money?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#vpn&quot;&gt;Can I use a VPN to access Kanopy?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#safe&quot;&gt;Is Kanopy safe?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#final-thoughts&quot;&gt;A great free service if you can get it&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is Kanopy streaming?&lt;/h2&gt;



&lt;p&gt;Kanopy is a streaming service that partners with public libraries and universities to bring free and ad-free movies, documentaries, foreign films, classic cinema, independent films, and educational videos to their members. Each participating library or university has its own portal where it can curate the content available, and otherwise customize the experience.&lt;/p&gt;



&lt;p&gt;Kanopy started as an Australian company, but is now headquartered in San Francisco. It currently partners with institutions in Australia, United States, United Kingdom, New Zealand, Hong Kong, and Singapore.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;free&quot;&gt;Is Kanopy free?&lt;/h2&gt;



&lt;p&gt;If you are a member of a participating library or university, Kanopy is 100% free to use.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;money&quot;&gt;How does Kanopy make money?&lt;/h2&gt;



&lt;p&gt;Modern libraries don&amp;#8217;t just purchase books that you can borrow. They offer digital resources (such as films) that you can access for free as a library member. The library or university covers the costs for this. If the library uses Kanopy as its digital services provider, it pays Kanopy a fee on a pay-per-view basis.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;watch&quot;&gt;How to watch content on Kanopy&lt;/h2&gt;



&lt;p&gt;The Kanopy streaming service has apps for all major platforms and can be accessed via its website. Crucially, it&amp;#8217;s only available to members of participating libraries and academic institutions.&lt;/p&gt;



&lt;p&gt;Online and in-app search tools make it easy to find out if your library or university is a Kanopy partner.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;985&quot; data-public-id=&quot;wp-vpn/image-13_12174a9c8a/image-13_12174a9c8a.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_985,c_scale/f_auto,q_auto/v1752836350/wp-vpn/image-13_12174a9c8a/image-13_12174a9c8a.png?_i=AA&quot; alt=&quot;Search to see if your library or university has partnered with Kanopy&quot; class=&quot;wp-post-12172 wp-image-12174&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;131 KB&quot; data-optsize=&quot;37 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;71.6&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12174&quot; data-version=&quot;1752836350&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1752836350/wp-vpn/image-13_12174a9c8a/image-13_12174a9c8a.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_122,h_300,c_scale/f_auto,q_auto/v1752836350/wp-vpn/image-13_12174a9c8a/image-13_12174a9c8a.png?_i=AA 122w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;If it is, you can sign in with your library card number and PIN or password, or using your student or faculty ID.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;808&quot; data-public-id=&quot;wp-vpn/image-12_1217318105/image-12_1217318105.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_808,c_scale/f_auto,q_auto/v1752836356/wp-vpn/image-12_1217318105/image-12_1217318105.png?_i=AA&quot; alt=&quot;Sign in with your library card number and PIN or password, or using your student or faculty ID&quot; class=&quot;wp-post-12172 wp-image-12173&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;85 KB&quot; data-optsize=&quot;22 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;74.3&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12173&quot; data-version=&quot;1752836356&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1752836356/wp-vpn/image-12_1217318105/image-12_1217318105.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_149,h_300,c_scale/f_auto,q_auto/v1752836356/wp-vpn/image-12_1217318105/image-12_1217318105.png?_i=AA 149w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;vpn&quot;&gt;Can I use a VPN to access Kanopy?&lt;/h2&gt;



&lt;p&gt;If you search &amp;#8220;Kanopy,&amp;#8221; you will see a number of &amp;#8220;best VPN for Kanopy&amp;#8221; results. However, Kanopy does not block users based on their geographic location — if you&amp;#8217;re a member of a participating institution and enter your correct membership details, you can access Kanopy from anywhere, with no need for a VPN.&lt;br&gt;&lt;br&gt;If you aren&amp;#8217;t a member of a participating library or university, using a VPN won&amp;#8217;t help you to access the service.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;safe&quot;&gt;Is Kanopy safe?&lt;/h2&gt;



&lt;p&gt;Yes. Kanopy is a reputable service that partners with public libraries and education institutions worldwide. With most services that are billed as being &amp;#8220;free&amp;#8221;, its right to be cautious. Nobody offers this kind of service without a viable business model, so what you don&amp;#8217;t pay for in money, you pay for with your privacy and by watching ads.&lt;/p&gt;



&lt;p&gt;However, while Kanopy is a commercial company in the business of making a profit, it&amp;#8217;s business model if different. It gets paid by your library or university, which will have its own funding model (and it which also uses to purchase and lend out books, free of charge to you as a member).&lt;/p&gt;



&lt;p&gt;In 2019, three of the largest public libraries in the United States (New York Public Library, Brooklyn Public Library, and Queens Public Library) stopped using Kanopy because they found it too expensive. A purely financial decision by the libraries, this was never about concern over their users&amp;#8217; safety.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;final-thoughts&quot;&gt;Final thoughts: A great free service if you can get it&lt;/h2&gt;



&lt;p&gt;Because its catalog is curated for public libraries and universities, hundreds of excellent titles are available through this free streaming service. And if you&amp;#8217;re lucky enough to belong to a library or university that has partnered with Kanopy, you can watch them for free.&lt;/p&gt;



&lt;p&gt;However, Kanopy is not the only platform used by libraries and universities to provide digital content to their members, and many purchase their own resources for this purpose. So if you want to access free high-quality films and documentaries, it is well worth contacting your local library to find out what it offers.&lt;/p&gt;



&lt;p&gt;At Proton, we&amp;#8217;re committed to providing you with unbiased information about staying safe online. This includes providing letting you about any security and privacy concerns with streaming apps. It&amp;#8217;s always sensible to cautious about &amp;#8220;free&amp;#8221; apps, but in the case on Kanopy, it offers a solid service with a reputable business that lets you &amp;#8220;borrow&amp;#8221; films from your library in a similar to to how you borrow a book.&lt;/p&gt;
</content:encoded><category>Privacy basics</category><author>Douglas Crawford</author></item><item><title>Brazil innovates on digital self-determination</title><link>https://protonvpn.com/blog/digital-self-determination</link><guid isPermaLink="true">https://protonvpn.com/blog/digital-self-determination</guid><description>Brazil is piloting a bold initiate that allows citizens to control and sell their personal data. Is this a good thing?</description><pubDate>Wed, 16 Jul 2025 13:32:52 GMT</pubDate><content:encoded>
&lt;p&gt;Data is power. This is why Big Tech companies such as Google and Facebook can offer &amp;#8220;free&amp;#8221; products and still generate more revenue than all the combined economic output of entire countries. Google’s parent company Alphabet&amp;#8217;s annual revenue in 2024, for example, was &lt;a href=&quot;https://www.macrotrends.net/stocks/charts/GOOGL/alphabet/revenue&quot;&gt;$350 billion&lt;/a&gt;, while Greece&amp;#8217;s 2025 GDP is projected to be &lt;a href=&quot;https://www.imf.org/external/datamapper/profile/GRC&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;$267 billion&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;There is an emerging concept, however, that can give control of personal data back to the users. It&amp;#8217;s known as &lt;a href=&quot;https://en.wikipedia.org/wiki/Digital_self-determination&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;digital self-determination&lt;/a&gt;, and the concept emphasizes your right as an individual to control your personal data and gives you the autonomy to decide how your information is collected, used, and shared.&lt;/p&gt;



&lt;p&gt;Brazil has long been at the forefront of creating legal frameworks and digital public infrastructure that prioritize transparency, inclusion, and user control (such as its &lt;a href=&quot;https://en.wikipedia.org/wiki/Open_banking&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;open banking&lt;/a&gt; initiative and the &lt;a href=&quot;https://en.wikipedia.org/wiki/Pix_(payment_system)&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Pix instant payment system&lt;/a&gt;). It has now taken a step toward giving individuals direct control over their personal data, not just to protect it, but to monetize it.&lt;/p&gt;



&lt;p&gt;A new initiative from a &lt;a href=&quot;https://en.wikipedia.org/wiki/Dataprev&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;state-owned data firm&lt;/a&gt; allows Brazilians to manage and even sell their personal data, turning what was once a resource hoarded by tech companies into an asset owned by the people themselves.&lt;/p&gt;



&lt;p&gt;While this is not the first such initiative (as we’ll discuss below), the fact that it combines state support with strong industry backing has led many observers to think it may be the first of its kind to be widely adopted. This traction demonstrates that there are different ways to think about digital privacy — ways that empower the individual while also providing companies with the data they feel necessary for their commercial success.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is digital self-determination?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#why&quot;&gt;Why digital self-determination matters&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#brazil&quot;&gt;How Brazil is working towards digital self-determination&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#others&quot;&gt;Other digital self-determination projects&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#diy&quot;&gt;How to exercise digital self-determination&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#final-thoughts&quot;&gt;A provocation, a prototype, and perhaps the future&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is digital self-determination?&lt;/h2&gt;



&lt;p&gt;Digital self-determination is the right and ability of individuals (and communities) to control how their personal data and digital identity are used, shared, and represented in the digital world.&lt;/p&gt;



&lt;p&gt;It’s a concept rooted in the broader philosophical idea of &lt;a href=&quot;https://thelegalquotient.com/legal-concepts/human-rights/the-right-of-self-determination-a-third-generation-human-right/5519/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;self-determination&lt;/a&gt;, which emphasizes the autonomy and agency of individuals in making choices that affect their lives (and which is itself rooted in the notion of &lt;a href=&quot;https://en.wikipedia.org/wiki/Human_rights&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;human rights&lt;/a&gt;). The key aspects of digital self-determination are:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Control over your personal data&lt;/h3&gt;



&lt;p&gt;You should be able to decide what personal data you share, with whom, and for what purpose. This includes the right to consent to data collection and withdraw consent at any time.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Transparency and informed consent&lt;/h3&gt;



&lt;p&gt;Organizations must provide clear and transparent information about how they collect, store, and process your personal data to ensure you understand how it’s being used and the potential consequences of sharing it.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Data ownership and portability&lt;/h3&gt;



&lt;p&gt;You should be able to access your personal data and transfer it between different services or platforms easily. This ensures you aren’t locked into specific services and retain control over your data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Right to be forgotten&lt;/h3&gt;



&lt;p&gt;You should have the right to request that organizations delete your data from their systems. This is particularly important when your data is no longer necessary or after you’ve withdrawn your consent.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Privacy by design&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Digital services and products should be designed with protecting users’ privacy and data in mind from the outset. This means incorporating privacy features and safeguards into the development process to minimize data collection and maximize users’ control over any data that is collected.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;why&quot;&gt;Why digital self-determination matters&lt;/h2&gt;



&lt;p&gt;Currently, monopolistic tech giants are making money hand over fist by harvesting and exploiting our most intimate data. Once these companies collect our data, we have almost no control over it. It can be used to target us with ads, &lt;a href=&quot;https://cybernews.com/privacy/6-examples-of-online-privacy-violation/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;violate our privacy&lt;/a&gt;, and even &lt;a href=&quot;https://www.wired.com/story/lgbtq-phone-data-police/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;discriminate&lt;/a&gt; against us. But there’s an even better argument in favor of digital self-determination.&lt;/p&gt;



&lt;p&gt;Digital self-determination allows people to remain autonomous in a world where digital systems often act on our behalf without any transparency or accountability. Ensuring that we have the autonomy to make informed choices about our digital lives is essential if we are to live in a world where technology serves the interests and values of all individuals. It is therefore an essential safeguard to privacy, democracy, and human rights.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;brazil&quot;&gt;How Brazil is working towards digital self-determination&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Dataprev&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Dataprev&lt;/a&gt; (Empresa de Tecnologia e Informações da Previdência Social) is a Brazilian state-owned company that (mainly) provides technology and information services for the country’s social security system. In May 2025, it &lt;a href=&quot;https://rio.websummit.com/wp-media/2025/04/Dataprev-Press-Release-EN.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;announced&lt;/a&gt; a &amp;#8220;pioneering data property management initiative&amp;#8221; in partnership with DrumWave, a Silicon Valley–based technology company that specializes in valuing and monetizing data.&lt;/p&gt;



&lt;p&gt;Named dWallet, the project aims to give Brazilian citizens a high degree of digital self-determination, including the right and means to sell their data. Starting as a pilot scheme, dWallet is a digital “data savings account” that allows Brazilians to deposit, manage, and monetize their personal data (starting with information tied to payroll loans).&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;How dWallet works&lt;/h3&gt;



&lt;p&gt;When dWallet users interact with the internet, the personal data they generate is placed in a secure digital wallet. Companies can then submit paid offers to access this data, which users can accept on an opt-in and per-offer basis.&lt;/p&gt;



&lt;p&gt;The higher the quality of the data — as assessed by DrumWave’s proprietary DIM (Data Information Meaning) index — the more companies are likely to offer. In a country where the &lt;a href=&quot;https://wagecentre.com/work/work-in-america/salary-in-brazil&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;average monthly salary is $530&lt;/a&gt;, early adopters are already &lt;a href=&quot;https://www.drivingeco.com/en/tus-datos-valen-dinero-asi-funciona-dwallet-revolucion-brasilena-economia-digital/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;earning about $50 a month&lt;/a&gt; for granting access to data that they previously didn&amp;#8217;t even know they were generating.&lt;/p&gt;



&lt;p&gt;DrumWave does not have any direct access to users’ data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Reception&lt;/h3&gt;



&lt;p&gt;It remains to be seen whether the pilot will succeed. Critics point to the &lt;a href=&quot;https://blogs.worldbank.org/en/digital-development/bridging-brazil-s-digital-divide--how-internet-inequality-mirror&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;sharp digital divide&lt;/a&gt; in Brazil, where some &lt;a href=&quot;https://agenciadenoticias.ibge.gov.br/en/agencia-news/2184-news-agency/news/41910-2022-census-87-of-the-brazilian-population-lives-in-urban-areas&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;25.6 million people live in rural areas&lt;/a&gt; with little or no internet infrastructure and very low basic literacy rates (&lt;a href=&quot;https://agenciabrasil.ebc.com.br/educacao/noticia/2025-05/tres-cada-10-brasileiros-sao-analfabetos-funcionais-0]&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;let alone the kind of digital literacy&lt;/a&gt; required to properly benefit from such a scheme). dWallet could exacerbate this divide, benefiting the relatively wealthy and tech-literate urban populations while leaving the poorest and most vulnerable sections of society behind.&lt;/p&gt;



&lt;p&gt;There is also concern that large, successful companies will be able to outbid smaller businesses, start-ups, and government departments with small budgets, effectively excluding them from access to the kind of data necessary for organizations to succeed in today&amp;#8217;s digital world.&lt;/p&gt;



&lt;p&gt;On a more philosophical level, even though it gives individuals autonomy and choice over their data, this data is still being exploited for profit by Big Tech (which is why companies are willing to pay handsomely for it). And when people from often the most vulnerable sections of society can substantially boost their monthly incomes by selling their data, real choice is a luxury that only the already well off will be able to afford.&lt;/p&gt;



&lt;p&gt;But for good or ill, the fact that dWallet is the first scheme to institutionalize digital self-determination at a national level gives it the best odds of being widely adopted.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;others&quot;&gt;Other digital self-determination projects&lt;/h2&gt;



&lt;p&gt;Brazil is not working in a vacuum. Government-backed initiatives such as the EU&amp;#8217;s &lt;a href=&quot;https://proton.me/business/gdpr&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;GDPR&lt;/a&gt; (and Brazil&amp;#8217;s own implementation of it, the &lt;a href=&quot;https://lgpd-brazil.info/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;LGPO&lt;/a&gt;) have made substantial progress in terms of protecting people’s personal data. But many want to go further, shifting the conversation away from protecting people to &lt;em&gt;&lt;em&gt;empowering&lt;/em&gt;&lt;/em&gt; them. Notable other initiatives in this area include:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;a href=&quot;https://digitale-selbstbestimmung.swiss/home/en/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Digital Self-Determination Network&lt;/a&gt;&lt;/h3&gt;



&lt;p&gt;Launched by the Swiss Federal Department of Foreign Affairs (FDFA) and Federal Office of Communications (OFCOM), this government-backed initiative is founded on the notion that citizens should retain control over their data — especially in cross-border contexts. In pursuit of this, the network promotes trustworthy digital ecosystems that respect personal autonomy, data sovereignty, and democratic values.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;a href=&quot;https://decodeproject.eu/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;DECODE&lt;/a&gt;&lt;/h3&gt;



&lt;p&gt;Funded under the EU’s Horizon 2020 program, the DECODE (DEcentralised Citizen-Owned Data Ecosystem) project is a pioneering experiment in digital self-sovereignty, offering a privacy-first, citizen-controlled architecture for data ownership, use, and identity.&lt;/p&gt;



&lt;p&gt;Using a &lt;a href=&quot;https://www.geeksforgeeks.org/software-engineering/blockchain-and-distributed-ledger-technology-dlt/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;blockchain and distributed ledger technology&lt;/a&gt; (DLT) to create a tamper-proof, transparent system for data sharing, real-life pilots in Amsterdam and Barcelona have already demonstrated its technical viability and value in protecting people&amp;#8217;s privacy.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;a href=&quot;https://solidproject.org/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Solid&lt;/a&gt;&lt;/h3&gt;



&lt;p&gt;Led by Tim Berners-Lee (inventor of the &lt;a href=&quot;https://en.wikipedia.org/wiki/World_Wide_Web&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;World Wide Web&lt;/a&gt; and &lt;a href=&quot;https://proton.me/blog/sir-tim-berners-lee-advisory-board&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Proton advisory board member&lt;/a&gt;), Solid (Social Linked Data) is an open-source, &lt;a href=&quot;https://www.w3.org/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;W3C-standardized&lt;/a&gt; framework that aims to give individuals full control over their personal data online by allowing them to store it in decentralized &amp;#8220;pods&amp;#8221;, which they host themselves (on personal servers, cloud services, or via providers). When apps or services request access, users can explicitly grant or revoke it at any time.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;diy&quot;&gt;How to exercise digital self-determination&lt;/h2&gt;



&lt;p&gt;Most digital self-determination projects are still at the planning and limited-pilot stage, and focus on protecting your personal data from abuse. dWallet is currently quite unique in that it gives you the ability to monetize your personal data, but it&amp;#8217;s restricted to people in Brazil.&lt;/p&gt;



&lt;p&gt;However, there are many steps you can personally take to restrict third-party access to your data and achieve at least a measure of digital self-determination:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;The Solid project is available to everyone, and you can get a pod now.&lt;/li&gt;



&lt;li&gt;Use &lt;a href=&quot;https://proton.me/blog/what-is-end-to-end-encryption&quot;&gt;end-to-end encryption&lt;/a&gt; whenever possible so that only you can access your data.&lt;/li&gt;



&lt;li&gt;Use a &lt;a href=&quot;https://proton.me/security/zero-access-encryption&quot;&gt;zero&lt;/a&gt;&amp;#8211;&lt;a href=&quot;https://proton.me/security/zero-access-encryption&quot;&gt;access encryption email service&lt;/a&gt; and a &lt;a href=&quot;https://proton.me/blog/whatsapp-alternatives&quot;&gt;secure messaging app&lt;/a&gt; (such as Signal) to communicate with others.&lt;/li&gt;



&lt;li&gt;Use a &lt;a href=&quot;https://proton.me/blog/best-browser-for-privacy&quot;&gt;browser that respects your privacy&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Use a &lt;a href=&quot;https://protonvpn.com/&quot;&gt;VPN&lt;/a&gt; to hide your IP address from websites you visit and your browsing history from your &lt;a href=&quot;https://protonvpn.com/blog/isp/&quot;&gt;ISP&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Use a DNS blocker such as Proton VPN&amp;#8217;s &lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker/&quot;&gt;NetShield Ad-blocker&lt;/a&gt; or uBlock Origin to stop websites tracking you across the web.&lt;/li&gt;



&lt;li&gt;Access online services via their websites, not their apps.&lt;/li&gt;



&lt;li&gt;For the apps you can&amp;#8217;t live without, regularly check their permissions.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;final-thoughts&quot;&gt;Final thoughts: A provocation, a prototype, and perhaps the future&lt;/h2&gt;



&lt;p&gt;As the world grapples with the ethical implications of data ownership, Brazil’s dWallet initiative may signal a new way for governments to approach data, identity, and individual empowerment. By enabling citizens to own and monetize their personal data, Brazil isn’t just experimenting with a new technology — it’s potentially redefining how we think about the ownership and control of our digital assets.&lt;/p&gt;



&lt;p&gt;Unlike traditional systems, where data is extracted and monetized by platforms behind closed doors, dWallet shifts power to the people — placing consent, transparency, and economic value in their hands. For its advocates, this model doesn’t just benefit individual users; it sets a blueprint for ethical data economies globally. For its critics, it still encourages Big Tech to exploit people&amp;#8217;s data.&lt;/p&gt;



&lt;p&gt;To succeed on a global scale, this model faces many challenges, such as fostering widespread adoption in the face of what&amp;#8217;s likely to be extremely robust opposition from some of the wealthiest and most powerful organizations this planet has ever seen. There is also an urgent need to bridge the digital divide, so that everyone can benefit from it.&lt;/p&gt;



&lt;p&gt;Brazil&amp;#8217;s dWallet nevertheless sets an interesting precedent for other nations seeking to balance technological advancement with individual rights.&lt;/p&gt;



&lt;p&gt;&lt;/p&gt;



&lt;p&gt;&lt;/p&gt;
</content:encoded><category>Privacy deep dives</category><author>Douglas Crawford</author></item><item><title>How to find spyware and other hidden apps on your iPhone</title><link>https://protonvpn.com/blog/iphone-hidden-apps</link><guid isPermaLink="true">https://protonvpn.com/blog/iphone-hidden-apps</guid><description>Here&apos;s what to know about the spyware apps targeting journalists, how hackers hide apps on reporters&apos; iPhones, and how to check your iPhone for spyware.</description><pubDate>Tue, 15 Jul 2025 17:06:06 GMT</pubDate><content:encoded>
&lt;p&gt;In recent years, &lt;a href=&quot;https://proton.me/business/media&quot;&gt;journalists&lt;/a&gt; have emerged as one of the top targets of surveillance by governments around the world. If you&amp;#8217;re a &lt;a href=&quot;https://proton.me/blog/world-press-freedom-day&quot;&gt;reporter&lt;/a&gt; working on sensitive topics, no country is safe for privacy in the context of an international market for &lt;a href=&quot;https://proton.me/blog/world-press-freedom-day-rsf&quot;&gt;spyware&lt;/a&gt; apps that can secretly monitor all the data transmitted and stored on your iPhone.&lt;/p&gt;



&lt;p&gt;As these apps proliferate, it has become critical to understand how to find hidden apps on iPhone and remove them.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#journalists&quot;&gt;The spyware targeting journalists&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#hackers&quot;&gt;How hackers hide apps on iPhone&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#pegasus&quot;&gt;How to check your iPhone for Pegasus spyware&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#graphite&quot;&gt;How to check your iPhone for Graphite spyware&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#find&quot;&gt;How to find hidden apps on an iPhone&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#do&quot;&gt;What to do with spyware on your device&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;journalists&quot;&gt;The spyware targeting journalists&lt;/h2&gt;



&lt;p&gt;In June 2025, researchers at &lt;a href=&quot;https://en.wikipedia.org/wiki/Citizen_Lab&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Citizen Lab&lt;/a&gt; reported &lt;a href=&quot;https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;new evidence&lt;/a&gt; that the Italian government is targeting journalists and activists with Graphite spyware developed by the Israeli firm &lt;a href=&quot;https://en.wikipedia.org/wiki/Paragon_Solutions&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Paragon Solutions&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Citizen Lab has previously found &lt;a href=&quot;https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;evidence of Graphite use&lt;/a&gt; in Australia, Canada, Denmark, Singapore, Israel, and Cyprus, with potential links to police in Canada. Graphite is responsible for a hacking attack in January 2025 that targeted almost 100 journalists and other members of civil society using&amp;nbsp;&lt;a href=&quot;https://proton.me/blog/whatsapp-alternatives&quot;&gt;WhatsApp&lt;/a&gt; on their iPhones. Notably, given current events in the United States, the US Immigration and Customs Enforcement (ICE) &lt;a href=&quot;https://www.wired.com/story/ice-paragon-solutions-contract/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;signed a $2 million contract&lt;/a&gt; with Paragon in 2024.&lt;/p&gt;



&lt;p&gt;Graphite works in a very similar way to the infamous &lt;a href=&quot;https://en.wikipedia.org/wiki/Pegasus_(spyware)&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Pegasus spyware&lt;/a&gt; from &lt;a href=&quot;https://en.wikipedia.org/wiki/NSO_Group&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;NSO Group&lt;/a&gt;. Paragon Solutions&amp;#8217; competitor in the world of mercenary spyware, this company is known for its close relationship with the Israeli state, and its spyware is &lt;a href=&quot;https://www.washingtonpost.com/investigations/spyware-technology-found-on-phone-of-moroccan-journalist-report-says/2020/06/21/ca409294-b220-11ea-8758-bfd1d045525a_story.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;classified as a military export&lt;/a&gt; by Israel. NSO Group sells its software to &lt;a href=&quot;https://www.theguardian.com/technology/2024/nov/14/nso-pegasus-spyware-whatsapp&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;governments around the world&lt;/a&gt;, including Saudi Arabia, Dubai, India, Mexico, Morocco, Rwanda, and Hungary, and its Pegasus software is linked to the &lt;a href=&quot;https://www.theverge.com/2021/12/21/22848485/pegasus-spyware-jamal-khashoggi-murder-nso-hanan-elatr-new-analysis&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;brutal assassination&lt;/a&gt; of Saudi human rights activist &lt;a href=&quot;https://en.wikipedia.org/wiki/Jamal_Khashoggi&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Jamal Khashoggi&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;hackers&quot;&gt;How hackers hide apps on iPhone&lt;/h2&gt;



&lt;p&gt;Both Graphite and Pegasus are suites of exploits that target iPhones. Graphite is newer and much less documented than Pegasus, and it&amp;#8217;s telling that the Israeli government sought to &lt;a href=&quot;https://archive.ph/20230917000514/https://www.ft.com/content/11cb394d-a13e-4826-b580-823b9367fedb#selection-2135.151-2135.204&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;replace Pegasus with Graphite&lt;/a&gt; in the Saudi armory.&lt;/p&gt;



&lt;p&gt;Apple released a &lt;a href=&quot;https://www.engadget.com/update-your-iphone-now-to-patch-a-major-pegasus-vulnerability-114009683.html&quot;&gt;patch&lt;/a&gt; to mitigate against Pegasus back in 2023, and following the WhatsApp attack it released a patch for iOS 18.3.1 to address the vulnerability exploited by Graphite. But there are no guarantees these patches will be effective against updated versions of the spywares.&lt;/p&gt;



&lt;p&gt;Both apps exploit zero-day vulnerabilities in iOS using a variety of attack vectors. The most worrying of these are &lt;a href=&quot;https://en.wikipedia.org/wiki/Exploit_(computer_security)#Zero-click&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;zero-click attacks&lt;/a&gt;&amp;nbsp;that exploit vulnerabilities in apps like iMessage, WhatsApp, or FaceTime to silently infect a device without any need for the victim to click links or otherwise interact with their phone.&lt;/p&gt;



&lt;p&gt;Once an iPhone has been infected, the spyware uses a &lt;strong&gt;modular architecture&lt;/strong&gt; to enable or disable components remotely based on the client&amp;#8217;s surveillance goals. Capabilities include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Keylogging&lt;/li&gt;



&lt;li&gt;Microphone and camera access (for live audio and video eavesdropping)&lt;/li&gt;



&lt;li&gt;Call log, SMS, contact, and email access&lt;/li&gt;



&lt;li&gt;Encrypted messaging app data (Signal, WhatsApp, Telegram) access using accessibility services or by capturing data before encryption&lt;/li&gt;



&lt;li&gt;GPS tracking&lt;/li&gt;



&lt;li&gt;Screenshot capture&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;The spyware is very hard to detect on an iPhone, and can self-destruct to erase evidence if it doesn&amp;#8217;t phone home for a set period of time, or on command. NSO Group has created a version of Pegasus that &lt;a href=&quot;https://www.kaspersky.com/blog/pegasus-spyware/14604/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;also targets Android devices&lt;/a&gt;. This has similar functionality to the iOS version, but uses a different mode of attack.&lt;/p&gt;



&lt;p&gt;It is very difficult to estimate how many devices are affected by either spywares, but back in 2021 NSO Group leaked &lt;a href=&quot;https://www.amnesty.org/en/latest/news/2021/07/pegasus-project-apple-iphones-compromised-by-nso-spyware/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;50,000 phone numbers&lt;/a&gt; of potential Pegasus targets.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;pegasus&quot;&gt;How to check your iPhone for Pegasus spyware&lt;/h2&gt;



&lt;p&gt;Apple does not permit true anti-malware apps on the App Store (strictly speaking, &amp;#8220;anti-malware&amp;#8221; apps are available on the App Store, but limits on their access to system resources severely restrict their usefulness). And in any case, traditional anti-malware software is ineffective against Pegasus on other platforms.&lt;/p&gt;



&lt;p&gt;Mobile device security firm iVerify offers a &lt;a href=&quot;https://iverify.io/solutions/threat-hunting&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Threat Hunting&lt;/a&gt; tool that it clams has already &lt;a href=&quot;https://www.wired.com/story/iverify-spyware-detection-tool-nso-group-pegasus/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;discovered seven Pegasus infections&lt;/a&gt; (as of December 2024). Available for less than a dollar on the App Store (somehow skirting Apple&amp;#8217;s malware scanning restrictions), &lt;a href=&quot;https://iverify.io/solutions/threat-hunting&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;iVerify Basic&lt;/a&gt; is very easy to use. But as closed-source proprietary software, there&amp;#8217;s no way to independently asses how effective it is.&lt;/p&gt;



&lt;p&gt;Another option is to use Mobile Verification Toolkit (&lt;a href=&quot;https://docs.mvt.re/en/stable/&quot;&gt;MVT&lt;/a&gt;), a free, open-source tool from the human rights group &lt;a href=&quot;https://securitylab.amnesty.org/case-study-the-pegasus-project/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Amnesty International’s Security Lab&lt;/a&gt;. This extracts various types of data from an iPhone backup to find evidence of a Pegasus attack, including&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;SMS messages&lt;/li&gt;



&lt;li&gt;Call logs&lt;/li&gt;



&lt;li&gt;Data from installed apps&lt;/li&gt;



&lt;li&gt;System logs&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;It then analyzes this data to detect “Indicators of Compromise” (IOCs), such as specific processes and file names that are known to be associated with Pegasus. It should be noted, though, that to use the tool you&amp;#8217;ll need a Linux PC or Mac and familiarity with the command line. Some deeper understanding of malware forensics is also required to get the most from the results.&lt;/p&gt;



&lt;p&gt;A more user-friendly option (with a GUI) is the &lt;a href=&quot;https://imazing.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;iMazing&lt;/a&gt; tool, which uses methodology that &amp;#8220;closely mirrors&amp;#8221; that of open source MVT. It&amp;#8217;s paid software, but a free trial includes the Pegasus detection tool. You&amp;#8217;ll still need access to a Linux PC or Mac, though.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;graphite&quot;&gt;How to check your iPhone for Graphite spyware&lt;/h2&gt;



&lt;p&gt;There are no tools available yet that can specifically detect a Graphite infection.&lt;/p&gt;



&lt;p&gt;The tools for detecting Pegasus discussed above &lt;em&gt;might&lt;/em&gt; have some chance of detecting the newer spyware, but they cannot be relied on for this. The general tips discussed below may also be useful for detecting suspicious behavior.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;find&quot;&gt;How to find hidden apps on an iPhone&lt;/h2&gt;



&lt;p&gt;In general (outside of the kind of state-sponsored spyware discussed above), iPhones don&amp;#8217;t allow third-party apps to truly &amp;#8220;hide&amp;#8221; in the background like they can on Android. However, some can be deliberately hard to find.&lt;/p&gt;



&lt;p&gt;Despite Apple&amp;#8217;s fairly robust sandboxing, code-signing, and App Store review process, iPhones are &lt;a href=&quot;https://www.theiphonewiki.com/wiki/Malware_for_iOS&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;not immune to viruses or malware&lt;/a&gt;. People with direct access to your phone (such as domestic abusers) may also install less sophisticated forms of spyware when your back is turned.&lt;/p&gt;



&lt;p&gt;This means everyone can benefit from periodically checking that nothing is running on your iPhone that shouldn&amp;#8217;t be. Here are some tips for finding hidden apps:&lt;/p&gt;



&lt;p&gt;1. &lt;strong&gt;Check your App Library&lt;/strong&gt;: Swipe all the way to the rightmost home screen. Here you&amp;#8217;ll see all apps installed on your iPhone, even if you don&amp;#8217;t see them on your regular home screens. Look for any apps that are unfamiliar to you, especially those with foreign names. Research online whether these represent legitimate software or are common malware disguises. If you have any doubt, uninstall the apps.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;691&quot; data-public-id=&quot;wp-vpn/app-library/app-library.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_691,c_scale/f_auto,q_auto/v1752592393/wp-vpn/app-library/app-library.png?_i=AA&quot; alt=&quot;Check your App Library for hidden apps&quot; class=&quot;wp-post-12127 wp-image-12136&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;237 KB&quot; data-optsize=&quot;72 KB&quot; data-optformat=&quot;image/jpeg&quot; data-percent=&quot;69.7&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12136&quot; data-version=&quot;1752592393&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1752592393/wp-vpn/app-library/app-library.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_174,h_300,c_scale/f_auto,q_auto/v1752592393/wp-vpn/app-library/app-library.png?_i=AA 174w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;2. &lt;strong&gt;Check for malicious configuration profiles&lt;/strong&gt;: These are designed for businesses and schools to remote-manage your iPhone, but can be an &lt;a href=&quot;https://www.howtogeek.com/176195/why-configuration-profiles-can-be-as-dangerous-as-malware-on-iphones-and-ipads/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;important vector for malware attacks&lt;/a&gt;. Open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;General&lt;/strong&gt; → &lt;strong&gt;VPN &amp;amp; Device Management&lt;/strong&gt;. &lt;a href=&quot;https://support.apple.com/guide/iphone/install-or-remove-configuration-profiles-iph6c493b19/ios&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Delete any profiles&lt;/a&gt; you don&amp;#8217;t recognize.&lt;/p&gt;



&lt;p&gt;3. &lt;strong&gt;Check your storage&lt;/strong&gt;: Open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;General&lt;/strong&gt; → &lt;strong&gt;iPhone Storage&lt;/strong&gt;. Review the list of installed applications displayed here. Any discrepancies between visible apps on your home versus those shown here warrant further investigation.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;690&quot; data-public-id=&quot;wp-vpn/iphone-storage/iphone-storage.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_690,c_scale/f_auto,q_auto/v1752592388/wp-vpn/iphone-storage/iphone-storage.png?_i=AA&quot; alt=&quot;Check your iPhone storage for malware&quot; class=&quot;wp-post-12127 wp-image-12137&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;83 KB&quot; data-optsize=&quot;24 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;70.5&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12137&quot; data-version=&quot;1752592388&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1752592388/wp-vpn/iphone-storage/iphone-storage.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_174,h_300,c_scale/f_auto,q_auto/v1752592388/wp-vpn/iphone-storage/iphone-storage.png?_i=AA 174w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;4. &lt;strong&gt;Be aware of suspicious behavior&lt;/strong&gt;: Unusual battery drain or data usage, or a hot phone when not in use, may indicate malware. If you have the technical skills, you can &lt;a href=&quot;https://www.thequantizer.com/tutorials/wireshark-iphone-traffic-capture/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;use package capture tools such as Wireshark&lt;/a&gt; to analyze where your iPhone&amp;#8217;s data is going.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;do&quot;&gt;What to do about spyware on your device&lt;/h2&gt;



&lt;p&gt;One piece of encouraging news from Citizen Lab&amp;#8217;s research is that spyware such Graphite and Pegasus is highly targeted — mainly at journalists, but activists, dissidents, political figures, and those work in sensitive sectors may also be targets.&lt;/p&gt;



&lt;p&gt;If you&amp;#8217;re concerned that you might be a target for this kind of surveillance, you should activate Lockdown Mode. This is a special feature designed by Apple to harden iPhones against just the kind of targeted cyberattacks used by Pegasus and Graphite. To turn Lockdown Mode on, open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;Privacy &amp;amp; Security&lt;/strong&gt; → &lt;strong&gt;Security&lt;/strong&gt; → &lt;strong&gt;Lockdown Mode&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;690&quot; data-public-id=&quot;wp-vpn/lockdown-mode/lockdown-mode.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_690,c_scale/f_auto,q_auto/v1752592383/wp-vpn/lockdown-mode/lockdown-mode.png?_i=AA&quot; alt=&quot;Use Lockdown mode to protect yourself from hidden apps&quot; class=&quot;wp-post-12127 wp-image-12138&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;100 KB&quot; data-optsize=&quot;25 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;75.5&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12138&quot; data-version=&quot;1752592383&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1752592383/wp-vpn/lockdown-mode/lockdown-mode.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_174,h_300,c_scale/f_auto,q_auto/v1752592383/wp-vpn/lockdown-mode/lockdown-mode.png?_i=AA 174w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;It&amp;#8217;s worth noting that using Lockdown Mode comes some downsides, such limited functionality, reduced convenience, potential compatibility issues, and fewer customization options. It&amp;#8217;s therefore not a great option for most people. But if you&amp;#8217;re a journalist, or otherwise think you may be a target for spyware, its security benefits are likely to outweigh any relatively minor inconveniences.&lt;/p&gt;



&lt;p&gt;Other things you can do include:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Update iOS&lt;/strong&gt;: The best defense against malware is to keep iOS up-to-date, as Apple routinely patches its mobile operating system to address new vulnerabilities as it becomes aware of them.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Don&amp;#8217;t &lt;/strong&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/IOS_jailbreaking&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;jailbreak&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; your phone&lt;/strong&gt;: This removes many of the security features that are normally built in to iOS, and potentially allows third parties to bypass the App Store and &lt;a href=&quot;https://en.wikipedia.org/wiki/Sideloading&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;sideload&lt;/a&gt; apps onto your phone without your knowledge.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Factory reset your phone&lt;/strong&gt;: If you&amp;#8217;re suspicious about an app on your phone, you should &lt;a href=&quot;https://support.apple.com/en-us/108931&quot;&gt;factory reset your phone&lt;/a&gt;. This will get rid of almost all &amp;#8220;consumer-level&amp;#8221; malware. But it may not be sufficient to dislodge state-sponsored spyware such as Graphite and Pegasus. If you suspect this level of surveillance, its probably best to either call in a professional malware expert or simply replace your iPhone.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Use &lt;/strong&gt;&lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker/&quot;&gt;&lt;strong&gt;NetShield&lt;/strong&gt; &lt;strong&gt;Ad-blocker&lt;/strong&gt;&lt;/a&gt;: Proton VPN&amp;#8217;s DNS filtering solution can block DNS calls to known malware and phishing domains. The means even if your iPhone becomes infected with malware, it may not be able to &amp;#8220;phone home&amp;#8221;.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;If you are at all concerned about being targeted with state-sponsored malware, Lockdown Mode is specially designed to counter such threats. For everyone else, Apple largely does a good job at keeping iPhones secure, but be sure to keep yours up-to-date with the latest iOS version and to stay vigilant.&lt;/p&gt;
</content:encoded><category>How-to</category><author>Douglas Crawford</author></item><item><title>Proton VPN spring recap and summer check-in</title><link>https://protonvpn.com/blog/vpn-roadmap-summer-2025</link><guid isPermaLink="true">https://protonvpn.com/blog/vpn-roadmap-summer-2025</guid><description>So summer now upon us, we&apos;d like to check in and let you know how we&apos;re progressing on our spring and summer roadmap.</description><pubDate>Tue, 08 Jul 2025 15:28:22 GMT</pubDate><content:encoded>
&lt;p&gt;People all over the world use Proton VPN to reach the content they want without anyone following them — it&amp;#8217;s their front door to the internet. And we rely on your feedback to make sure Proton VPN has the features and performance you need.&lt;/p&gt;



&lt;p&gt;Now that warm weather and longer days are upon (most of) us, we want to revisit our &lt;a href=&quot;https://protonvpn.com/blog/vpn-roadmap-spring-summer-2025&quot;&gt;spring and summer roadmap&lt;/a&gt; and highlight the improvements and features you might have missed and what we&amp;#8217;ll be working on over summer.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What we launched in spring&lt;/h2&gt;



&lt;p&gt;You&amp;#8217;ve told us what matters most — so this spring, that&amp;#8217;s &lt;a href=&quot;https://protonvpn.com/blog/may-2025-update&quot;&gt;where our focus went&lt;/a&gt;. The features you rely on got smarter, faster, and easier to use, with updates inspired by your feedback.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Greater protection from phishing with NetShield Ad-blocker&lt;/h3&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;518&quot; data-public-id=&quot;wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_518,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-12013 wp-image-12087&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;1 MB&quot; data-optsize=&quot;140 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;90.4&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=12087&quot; data-version=&quot;1752061421&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_518,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_152,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_388,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_777,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1036,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_793,c_scale/f_auto,q_auto/v1752061421/wp-vpn/01vpn_inline_blog2x-1/01vpn_inline_blog2x-1.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;Have you ever clicked on a link that takes you to a suspicious website or downloads files you never asked for? Our &lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker/&quot;&gt;NetShield Ad-blocker&lt;/a&gt; DNS filtering feature has always protected you from a wide range of malware and unwanted trackers, but now you can rely on it for even more protection from malicious actors.&lt;/p&gt;



&lt;p&gt;Recent improvements to NetShield ensure that it now blocks almost all known &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;phishing&lt;/a&gt; domains (while minimizing &amp;#8220;false positives&amp;#8221;), making the internet safer and more enjoyable for you to explore.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Longer lasting batteries&lt;/h3&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter&quot;&gt;&lt;img width=&quot;2400&quot; height=&quot;1194&quot; data-public-id=&quot;wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_2400,h_1194,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA&quot; alt=&quot;Our battery tests&quot; class=&quot;wp-post-12013 wp-image-11751&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;294 KB&quot; data-optsize=&quot;76 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;74.3&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11751&quot; data-version=&quot;1747913072&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_509,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_149,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_382,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_764,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1019,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_780,c_scale/f_auto,q_auto/v1747913072/wp-vpn/image-7_11751c54b5/image-7_11751c54b5.png?_i=AA 1568w&quot; sizes=&quot;(max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;figcaption class=&quot;wp-element-caption&quot;&gt;Lab tested on a Xiaomi 13T with 5000mAh battery; no apps running&lt;/figcaption&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;Now you can browse the internet safely, wherever you have reception, without worrying about your smartphone dying. Recent improvements to our &lt;a href=&quot;https://protonvpn.com/download-android&quot;&gt;Android&lt;/a&gt; and &lt;a href=&quot;https://protonvpn.com/download-ios&quot;&gt;iOS&lt;/a&gt; apps minimize their background usage when the phone is asleep, conserving battery life when you’re out in the world and using a mobile (cellular) connection.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;High-speed browsing for everyone&lt;/h3&gt;



&lt;p&gt;No one enjoys buffering. Unfortunately, a combination of network conditions and configurations used to prevent some of our community members from gaining the full benefit of Proton VPN&amp;#8217;s high-speed&lt;a href=&quot;https://protonvpn.com/blog/11000-servers&quot;&gt; VPN network&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;With a major improvement to our unique &lt;a href=&quot;https://protonvpn.com/features/vpn-accelerator&quot;&gt;VPN Accelerator&lt;/a&gt; technology that can &lt;a href=&quot;https://protonvpn.com/blog/vpn-accelerator/&quot;&gt;improve speeds by up to 400%&lt;/a&gt; compared to other VPN services, Proton VPN now detects these conditions and configurations occurring. It will then automatically reconfigure the connection to ensure you can stream your favorite HD content without buffering issues, enjoy blazing fast page load times, and fully benefit from the bandwidth you pay for.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;And lots more&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Choose from 3,000+ additional servers, five new countries (Panama, Armenia, Mongolia, Laos, and Brunei), and two new US cities (Memphis, Tennessee, and McAllen, Texas) for your VPN connection. This means our network now has over 13,000 servers in more than 120 countries, making us not just one of the largest and most popular VPN services in the world, but also one of the fastest growing.&lt;/li&gt;



&lt;li&gt;Stream more of your favorite content no matter where you are. You can now watch Netflix, Amazon Prime Video, and Disney+ in most countries worldwide.&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;https://protonvpn.com/support/lan-connections&quot;&gt;A&lt;/a&gt;&lt;a href=&quot;https://protonvpn.com/support/lan-connections&quot;&gt;ccess other devices on your local network&lt;/a&gt;, like smart devices, printers, washing machines, without disconnecting Proton VPN in our Windows and Android apps.&lt;/li&gt;



&lt;li&gt;Following the recent redesign of our Windows app, you can now effortlessly connect to your favorite location at any time without opening the main Proton VPN app. Simply use our new system tray widget to connect without interrupting your flow.&lt;/li&gt;



&lt;li&gt;Customize our app&amp;#8217;s appearance with our new light theme for Android.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What&amp;#8217;s coming this summer&lt;/h2&gt;



&lt;p&gt;Behind-the-scenes upgrades are critical to providing a great VPN experience, but we know you want all our great features on all the devices you love to use every day. So coming soon:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Custom DNS for macOS, iOS, and iPadOS&lt;/h3&gt;



&lt;p&gt;Normally, when you connect to Proton VPN, we encrypt and resolve your DNS queries. &lt;a href=&quot;https://protonvpn.com/support/custom-dns&quot;&gt;Custom DNS&lt;/a&gt; lets you choose one or more &lt;a href=&quot;https://protonvpn.com/blog/what-is-dns/#dns-services&quot;&gt;third-party DNS resolvers&lt;/a&gt; instead, allowing you to access their advanced DNS filtering features, such as parental controls and customized blocklists.&lt;/p&gt;



&lt;p&gt;Custom DNS is coming to your Apple devices very soon, so be sure to look out for more updates.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Split Tunneling for Linux and macOS&lt;/h3&gt;



&lt;p&gt;Split tunneling lets you route some connections through the VPN tunnel while excluding others. For example, you can bypass censorship using a VPN connection for your browser while allowing your banking, streaming, and government services apps to access the local internet. Or use a VPN only for specific purposes, like protecting your torrenting sessions or changing your location when gaming.&lt;/p&gt;



&lt;p&gt;Soon, you&amp;#8217;ll be able to use &lt;a href=&quot;https://protonvpn.com/support/protonvpn-split-tunneling/&quot;&gt;split tunneling&lt;/a&gt; on Linux and macOS.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Port Forwarding for macOS&lt;/h3&gt;



&lt;p&gt;You&amp;#8217;ll soon see faster transfer speeds when you download and share files using P2P protocols such as BitTorrent on your Mac. You may also see speed improvements as an online gamer. This is thanks to &lt;a href=&quot;https://protonvpn.com/support/port-forwarding/&quot;&gt;port forwarding&lt;/a&gt;, which routes connections through the Proton VPN firewall. Already available on our Windows and Linux apps, this is a feature many of you Mac users have been asking for.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;And lots more&lt;/h3&gt;



&lt;p&gt;Also coming over the summer are:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;More improvements to our anti-censorship capabilities&lt;/strong&gt;: Censorship is becoming more and more prevalent online, which is why we’re expanding methods to help you connect securely and access our service in countries with robust censorship capabilities.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Even better VPN connection profiles on Windows&lt;/strong&gt;&lt;strong&gt; and Android: &lt;/strong&gt;You&amp;#8217;ll be able to make even more customized profiles, as we build upon recent improvements to &lt;a href=&quot;https://protonvpn.com/support/connection-profiles/&quot;&gt;VPN connection profiles&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Guest mode for iOS and iPadOS&lt;/strong&gt;: Get instantly connected without a Proton account.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;IPv6 support for more platforms&lt;/strong&gt;: This will ensure full compatibility with the growing number of internet providers using &lt;a href=&quot;https://protonvpn.com/support/prevent-ipv6-vpn-leaks/&quot;&gt;IPv6&lt;/a&gt;-only connections.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;More ways to pay&lt;/strong&gt;: Due to popular demand and to make Proton VPN accessible to more people, we&amp;#8217;re adding new ways to buy our service. This includes additional cryptocurrency payment options.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;More features for Android TV&lt;/strong&gt;: Some of the community’s most popular requests, these features will give you more control over how you watch your favorite content on your big-screen TV.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Improved support for &lt;/strong&gt;&lt;a href=&quot;https://protonvpn.com/support/watch-f1-tv-with-vpn/&quot;&gt;&lt;strong&gt;F1 TV&lt;/strong&gt;&lt;/a&gt;. You&amp;#8217;ll soon be able to watch your favorite Formula 1 racing channel safely and securely in more countries worldwide.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;An end-of-year sneak peek&lt;/h2&gt;



&lt;p&gt;We&amp;#8217;re also actively working on the following improvements and hope (but can&amp;#8217;t promise) to release them later this year:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;A command-line interface (CLI) on Linux. We’ll also be exploring GUI improvements.&lt;/li&gt;



&lt;li&gt;Optimizations and customizations for gamers for a faster and more responsive gaming experience.&lt;/li&gt;



&lt;li&gt;More new features to combat emerging privacy threats online.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;We exist because of you&lt;/h2&gt;



&lt;p&gt;As always, we are deeply indebted to the passionate and highly engaged Proton community for your ideas and your enthusiasm. We couldn&amp;#8217;t do this without you, and we&amp;#8217;re always looking for ways to improve our products.&lt;/p&gt;



&lt;p&gt;So please share your thoughts with us on &lt;a href=&quot;https://www.reddit.com/r/ProtonMail/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Reddit&lt;/a&gt; or &lt;a href=&quot;https://twitter.com/intent/user?screen_name=ProtonPrivacy&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;X&lt;/a&gt;, or join our community at &lt;a href=&quot;https://protonmail.uservoice.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;protonmail.uservoice.com&lt;/a&gt;. Together, we&amp;#8217;ll build a privacy-first internet that works for everyone&lt;/p&gt;
</content:encoded><category>Proton VPN news</category><author>Antonio Cesarano</author></item><item><title>How to set up a Pi-hole</title><link>https://protonvpn.com/blog/pi-hole</link><guid isPermaLink="true">https://protonvpn.com/blog/pi-hole</guid><description>A Pi-hole is a free and open-source ad-blocker system for home networks. We explain how you can set one up.</description><pubDate>Thu, 26 Jun 2025 17:33:58 GMT</pubDate><content:encoded>
&lt;p&gt;Pi-hole is a free, open-source ad blocker designed for home networks. Originally designed for Raspberry Pi, it now runs on most Debian-based Linux systems. Like Proton VPN’s &lt;a href=&quot;https://protonvpn.com/blog/netshield-ad-blocker/&quot;&gt;NetShield Ad-blocker&lt;/a&gt; feature, Pi-hole blocks ads by preventing &lt;a href=&quot;https://protonvpn.com/blog/what-is-dns/&quot;&gt;DNS requests&lt;/a&gt; to domains known for serving ads.&lt;/p&gt;



&lt;p&gt;When people talk about&lt;em&gt; a&lt;/em&gt; &amp;#8220;Pi-hole&amp;#8221;, they&amp;#8217;re usually referring to a device dedicated to running the &lt;a href=&quot;https://pi-hole.net/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Pi-hole software &lt;/a&gt;and filtering the DNS traffic for the other devices on your network. Raspberry Pis are ideal for this job thanks to their low price and low power consumption, making them cost-effective to leave running at all times.&lt;/p&gt;



&lt;p&gt;Please note that using a Pi-hole is not compatible with Proton VPN. However, you can install Proton VPN on your router and block ads, trackers, and malware by &lt;a href=&quot;https://protonvpn.com/support/netshield/&quot;&gt;turning &lt;/a&gt;on &lt;a href=&quot;https://protonvpn.com/support/netshield/&quot;&gt;NetShield Ad-blocker&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to create your own Pi-hole&lt;/h2&gt;



&lt;p&gt;This guide assumes you are running a Debian-based system on a suitable device (such as &lt;a href=&quot;https://www.raspberrypi.com/software/&quot;&gt;Raspberry Pi OS&lt;/a&gt; on a Raspberry Pi). The Pi-hole software is very lightweight and will run happily on very low-end hardware (including Raspberry Pi Zeros).&lt;/p&gt;



&lt;p&gt;There are two ways to set up a Pi-hole:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Install the Pi-hole software directly on your device&lt;/li&gt;



&lt;li&gt;Run Pi-hole inside a &lt;a href=&quot;https://www.docker.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Docker&lt;/a&gt; container&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;For this simple guide, we’ll show you how to install Pi-hole directly onto your device. This is easy, thanks to a simple script.&lt;/p&gt;



&lt;p&gt;Before you start, it’s a good idea to ensure your system and packages are up-to-date with the following command:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;sudo apt-get update &amp;amp;&amp;amp; sudo apt-get upgrade -y&lt;/pre&gt;



&lt;p&gt;You’ll also need &lt;a href=&quot;https://www.geeksforgeeks.org/linux-unix/curl-command-in-linux-with-examples/&quot;&gt;curl&lt;/a&gt; installed on your system (it’s pre-installed on many Linux distros, including Raspberry OS). If you don’t have it on your system, you can install it with the following command:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;sudo apt install curl -y&lt;/pre&gt;



&lt;p&gt;Now:&lt;/p&gt;



&lt;p&gt;1. In your terminal (in the example below, the Terminal app on Raspberry OS), run:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;curl -sSL https://install.pi-hole.net | sudo bash&lt;/pre&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;653&quot; height=&quot;542&quot; data-public-id=&quot;wp-vpn/image-33_1198397318/image-33_1198397318.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_653,h_542,c_scale/f_auto,q_auto/v1750952197/wp-vpn/image-33_1198397318/image-33_1198397318.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 1&quot; class=&quot;wp-post-11982 wp-image-11983&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;28 KB&quot; data-optsize=&quot;7 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;74.8&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11983&quot; data-version=&quot;1750952197&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952197/wp-vpn/image-33_1198397318/image-33_1198397318.png?_i=AA 653w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_249,c_scale/f_auto,q_auto/v1750952197/wp-vpn/image-33_1198397318/image-33_1198397318.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 653px) 100vw, 653px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;2. Click &lt;strong&gt;OK&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;650&quot; height=&quot;477&quot; data-public-id=&quot;wp-vpn/image-34_119844baab/image-34_119844baab.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_650,h_477,c_scale/f_auto,q_auto/v1750951968/wp-vpn/image-34_119844baab/image-34_119844baab.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 2&quot; class=&quot;wp-post-11982 wp-image-11984&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;17 KB&quot; data-optsize=&quot;4 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;77.6&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11984&quot; data-version=&quot;1750951968&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750951968/wp-vpn/image-34_119844baab/image-34_119844baab.png?_i=AA 650w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_220,c_scale/f_auto,q_auto/v1750951968/wp-vpn/image-34_119844baab/image-34_119844baab.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 650px) 100vw, 650px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;3. Your Pi-hole device will need a static IP address to function properly. Here are instructions for &lt;a href=&quot;https://www.tomshardware.com/how-to/static-ip-raspberry-pi&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;configuring a static IP on Raspberry OS&lt;/a&gt;. Click &lt;strong&gt;Continue&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;650&quot; height=&quot;493&quot; data-public-id=&quot;wp-vpn/image-36_119876ff45/image-36_119876ff45.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_650,h_493,c_scale/f_auto,q_auto/v1750952172/wp-vpn/image-36_119876ff45/image-36_119876ff45.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 3&quot; class=&quot;wp-post-11982 wp-image-11987&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;34 KB&quot; data-optsize=&quot;9 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;74&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11987&quot; data-version=&quot;1750952172&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952172/wp-vpn/image-36_119876ff45/image-36_119876ff45.png?_i=AA 650w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_228,c_scale/f_auto,q_auto/v1750952172/wp-vpn/image-36_119876ff45/image-36_119876ff45.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 650px) 100vw, 650px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;4. Select a DNS provider to resolve your DNS queries after Pi-hole has filtered out the ad domains. Click &lt;strong&gt;OK&lt;/strong&gt; to continue.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;649&quot; height=&quot;533&quot; data-public-id=&quot;wp-vpn/image-38_11988d5801/image-38_11988d5801.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_649,h_533,c_scale/f_auto,q_auto/v1750952183/wp-vpn/image-38_11988d5801/image-38_11988d5801.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 4&quot; class=&quot;wp-post-11982 wp-image-11988&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;32 KB&quot; data-optsize=&quot;7 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.9&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11988&quot; data-version=&quot;1750952183&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952183/wp-vpn/image-38_11988d5801/image-38_11988d5801.png?_i=AA 649w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_246,c_scale/f_auto,q_auto/v1750952183/wp-vpn/image-38_11988d5801/image-38_11988d5801.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 649px) 100vw, 649px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;5. Unless you strongly prefer to use another third-party blocklist, we recommend using Pi-hole’s suggested list. Click &lt;strong&gt;Yes&lt;/strong&gt; to continue. You can always edit it or add more blocklists later.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;649&quot; height=&quot;533&quot; data-public-id=&quot;wp-vpn/image-35_11985b23d4/image-35_11985b23d4.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_649,h_533,c_scale/f_auto,q_auto/v1750952158/wp-vpn/image-35_11985b23d4/image-35_11985b23d4.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 5&quot; class=&quot;wp-post-11982 wp-image-11985&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;24 KB&quot; data-optsize=&quot;6 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;76.8&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11985&quot; data-version=&quot;1750952158&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952158/wp-vpn/image-35_11985b23d4/image-35_11985b23d4.png?_i=AA 649w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_246,c_scale/f_auto,q_auto/v1750952158/wp-vpn/image-35_11985b23d4/image-35_11985b23d4.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 649px) 100vw, 649px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;6. Decide whether you’d like to log DNS queries made through your Pi-hole.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;649&quot; height=&quot;533&quot; data-public-id=&quot;wp-vpn/image-37_119869cbd0/image-37_119869cbd0.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_649,h_533,c_scale/f_auto,q_auto/v1750952190/wp-vpn/image-37_119869cbd0/image-37_119869cbd0.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 6&quot; class=&quot;wp-post-11982 wp-image-11986&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;15 KB&quot; data-optsize=&quot;3 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;77.6&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11986&quot; data-version=&quot;1750952190&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952190/wp-vpn/image-37_119869cbd0/image-37_119869cbd0.png?_i=AA 649w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_246,c_scale/f_auto,q_auto/v1750952190/wp-vpn/image-37_119869cbd0/image-37_119869cbd0.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 649px) 100vw, 649px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;7. If you clicked &lt;strong&gt;Yes&lt;/strong&gt; in the previous step, select a &lt;a href=&quot;https://docs.pi-hole.net/ftldns/privacylevels/&quot;&gt;privacy level&lt;/a&gt; for your logs. These details will only be available to people with access to your Pi-hole admin console. Click &lt;strong&gt;Continue&lt;/strong&gt; when you&amp;#8217;re ready.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;648&quot; height=&quot;535&quot; data-public-id=&quot;wp-vpn/image-39-1/image-39-1.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_648,h_535,c_scale/f_auto,q_auto/v1750952177/wp-vpn/image-39-1/image-39-1.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 6&quot; class=&quot;wp-post-11982 wp-image-11989&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;24 KB&quot; data-optsize=&quot;5 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.6&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11989&quot; data-version=&quot;1750952177&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952177/wp-vpn/image-39-1/image-39-1.png?_i=AA 648w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_248,c_scale/f_auto,q_auto/v1750952177/wp-vpn/image-39-1/image-39-1.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 648px) 100vw, 648px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;8. Your Pi-hole is now set up and running! Make a note of the IP addresses. You’ll need them to configure the DNS settings of any devices you wish to use the Pi-hole with. Also make sure you save the URL and password needed to access the admin webpage.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;648&quot; height=&quot;535&quot; data-public-id=&quot;wp-vpn/image-39_119902fae4/image-39_119902fae4.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_648,h_535,c_scale/f_auto,q_auto/v1750952165/wp-vpn/image-39_119902fae4/image-39_119902fae4.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 7&quot; class=&quot;wp-post-11982 wp-image-11990&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;32 KB&quot; data-optsize=&quot;7 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11990&quot; data-version=&quot;1750952165&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750952165/wp-vpn/image-39_119902fae4/image-39_119902fae4.png?_i=AA 648w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_248,c_scale/f_auto,q_auto/v1750952165/wp-vpn/image-39_119902fae4/image-39_119902fae4.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 648px) 100vw, 648px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to manage your Pi-hole&lt;/h2&gt;



&lt;p&gt;1. On any device connected to the same local network as the Pi-hole, open a browser window and enter &lt;a href=&quot;http://pi.hole/admin:80&quot;&gt;pi.hole/admin:80&lt;/a&gt; or the IP address listed above into the URL bar. Enter your Pi-hole password (also see above).&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;745&quot; data-public-id=&quot;wp-vpn/image-40_119914e982/image-40_119914e982.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_745,c_scale/f_auto,q_auto/v1750951958/wp-vpn/image-40_119914e982/image-40_119914e982.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 8&quot; class=&quot;wp-post-11982 wp-image-11991&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;81 KB&quot; data-optsize=&quot;26 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;67.3&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11991&quot; data-version=&quot;1750951958&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_745,c_scale/f_auto,q_auto/v1750951958/wp-vpn/image-40_119914e982/image-40_119914e982.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_218,c_scale/f_auto,q_auto/v1750951958/wp-vpn/image-40_119914e982/image-40_119914e982.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_559,c_scale/f_auto,q_auto/v1750951958/wp-vpn/image-40_119914e982/image-40_119914e982.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750951958/wp-vpn/image-40_119914e982/image-40_119914e982.png?_i=AA 1047w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;2. You can now explore Pi-hole’s features, monitor which DNS queries it blocks, and configure advanced settings using the web interface.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;715&quot; data-public-id=&quot;wp-vpn/image-41_119928279a/image-41_119928279a.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_715,c_scale/f_auto,q_auto/v1750951975/wp-vpn/image-41_119928279a/image-41_119928279a.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 9&quot; class=&quot;wp-post-11982 wp-image-11992&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;96 KB&quot; data-optsize=&quot;25 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;73.8&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11992&quot; data-version=&quot;1750951975&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_715,c_scale/f_auto,q_auto/v1750951975/wp-vpn/image-41_119928279a/image-41_119928279a.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_209,c_scale/f_auto,q_auto/v1750951975/wp-vpn/image-41_119928279a/image-41_119928279a.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_536,c_scale/f_auto,q_auto/v1750951975/wp-vpn/image-41_119928279a/image-41_119928279a.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750951975/wp-vpn/image-41_119928279a/image-41_119928279a.png?_i=AA 1050w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;How to use your Pi-hole&lt;/h2&gt;



&lt;p&gt;You can configure the DNS settings of each device on your local network to filter their DNS queries through your Pi-hole. However, a simpler solution is to change the DNS settings of your router so that all devices that connect to the router use the Pi-hole.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;1000&quot; height=&quot;574&quot; data-public-id=&quot;wp-vpn/image-42_11993c04aa/image-42_11993c04aa.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1000,h_574,c_scale/f_auto,q_auto/v1750951986/wp-vpn/image-42_11993c04aa/image-42_11993c04aa.png?_i=AA&quot; alt=&quot;How to set up a Pi-hole 10&quot; class=&quot;wp-post-11982 wp-image-11993&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;108 KB&quot; data-optsize=&quot;26 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;76.4&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11993&quot; data-version=&quot;1750951986&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750951986/wp-vpn/image-42_11993c04aa/image-42_11993c04aa.png?_i=AA 1000w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_172,c_scale/f_auto,q_auto/v1750951986/wp-vpn/image-42_11993c04aa/image-42_11993c04aa.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_441,c_scale/f_auto,q_auto/v1750951986/wp-vpn/image-42_11993c04aa/image-42_11993c04aa.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1000px) 100vw, 1000px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Final thoughts&lt;/h2&gt;



&lt;p&gt;A Pi-hole is more than just an ad blocker — it’s a powerful, network-wide tool that gives you greater control over what enters your digital space. It filters traffic at the DNS level, stopping unwanted content before it reaches your devices.&lt;/p&gt;



&lt;p&gt;However, a Pi-hole doesn’t provide privacy. It doesn&amp;#8217;t hide your real IP address from the websites you visit, and third-party DNS providers can track your browsing history like your ISP can (it is possible to run your own DNS server, but that’s taking things to the next level).&lt;/p&gt;



&lt;p&gt;If you want to block ads and protect your privacy, a trustworthy, no-logs VPN service like &lt;a href=&quot;https://protonvpn.com/&quot;&gt;Proton VPN&lt;/a&gt; is a much better solution. And as noted earlier, our NetShield feature (which also works on routers) affords similar protections&lt;/p&gt;
</content:encoded><category>How-to</category><author>Douglas Crawford</author></item><item><title>Find your default gateway on any device</title><link>https://protonvpn.com/blog/default-gateway</link><guid isPermaLink="true">https://protonvpn.com/blog/default-gateway</guid><description>A default gateway connects devices on your local network to the internet. Here&apos;s an in-depth look at how to find yours on any device.</description><pubDate>Mon, 23 Jun 2025 11:53:17 GMT</pubDate><content:encoded>
&lt;p&gt;A default gateway is a device in a computer network that acts as an access point to other networks. By far the most common type of default gateway is a home or office &lt;a href=&quot;https://protonvpn.com/blog/setup-a-vpn-router/&quot;&gt;router&lt;/a&gt; that connects devices on the local network such as laptops, smartphones using WiFi, printers, smart TVs, and Internet of Things (IoT) devices to the internet. These devices typically connect to the access point via WiFi or wired Ethernet cable.&lt;/p&gt;



&lt;p&gt;In this article, we&amp;#8217;ll look at:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is a default gateway?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#address&quot;&gt;What is a default gateway address?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#windows&quot;&gt;How to find your default gateway on Windows&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#macos&quot;&gt;How to find your default gateway on macOS&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#linux&quot;&gt;How to find your default gateway on Linux&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#android&quot;&gt;How to find your default gateway on Android&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#ios&quot;&gt;How to find your default gateway on iOS and iPadOS&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#chromeos&quot;&gt;How to find your default gateway on a Chromebook&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#why&quot;&gt;Why find your default gateway?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#final-thoughts&quot;&gt;Why the default gateway matters&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is a default gateway?&lt;/h2&gt;



&lt;p&gt;Default gateways usually mediate data transfer between devices connected to a local area network (LAN) and the internet. If your computer wants to send data to a device outside your local network, it sends it to the default gateway, which then routes it appropriately.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-full&quot;&gt;&lt;img width=&quot;2400&quot; height=&quot;1802&quot; data-public-id=&quot;wp-vpn/diagram012x/diagram012x.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_2400,h_1802,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA&quot; alt=&quot;Default gateway on a typical home network&quot; class=&quot;wp-post-11941 wp-image-11961&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;209 KB&quot; data-optsize=&quot;46 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.1&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11961&quot; data-version=&quot;1750671493&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 2400w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_225,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_769,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_577,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_1153,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1538,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1177,c_scale/f_auto,q_auto/v1750671493/wp-vpn/diagram012x/diagram012x.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 2400px) 100vw, 2400px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;Corporate networks may use multiple layers of &lt;a href=&quot;https://protonvpn.com/blog/firewall&quot;&gt;firewalls&lt;/a&gt; and routers to create subnets. In this case, there will be a default gateway for each local subnet, without which devices are unable to communicate beyond their subnet. In all likelihood, the subnet routers themselves connect to a default gateway that provides access to the internet.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-full&quot;&gt;&lt;img width=&quot;2400&quot; height=&quot;1428&quot; data-public-id=&quot;wp-vpn/diagram022x/diagram022x.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_2400,h_1428,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA&quot; alt=&quot;Default gateway on a cooperate LAN network with multiple subnets&quot; class=&quot;wp-post-11941 wp-image-11962&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;207 KB&quot; data-optsize=&quot;47 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;77.2&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11962&quot; data-version=&quot;1750671483&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 2400w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_179,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_609,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_457,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_914,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1219,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_933,c_scale/f_auto,q_auto/v1750671483/wp-vpn/diagram022x/diagram022x.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 2400px) 100vw, 2400px&quot; /&gt;&lt;/figure&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;address&quot;&gt;What is a default gateway address?&lt;/h2&gt;



&lt;p&gt;A default gateway is identified by its IP address. This is a purely &lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/#lans&quot;&gt;local IP address&lt;/a&gt; used by devices on your local network that connect to it. If the default gateway connects to the internet, it is &lt;em&gt;not&lt;/em&gt; the external IP address that is visible from the internet.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/&quot;&gt;&lt;strong&gt;Learn more about how IP addresses work&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;Most routers have the default IP address &lt;strong&gt;196.168.0.1&lt;/strong&gt; or &lt;strong&gt;196.168.1.1,&lt;/strong&gt; so these are also the most common default gateway addresses. Default gateways may also use &lt;a href=&quot;https://protonvpn.com/blog/what-is-an-ip-address/#ipv6&quot;&gt;IPv6 addresses&lt;/a&gt; on systems that are configured for the new system.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;windows&quot;&gt;How to find your default gateway on Windows&lt;/h2&gt;



&lt;p&gt;On Windows 11, go to &lt;strong&gt;Settings&lt;/strong&gt; → &lt;strong&gt;Network &amp;amp; internet&lt;/strong&gt; →&lt;strong&gt; Advanced network settings&lt;/strong&gt;&amp;nbsp;→ &lt;strong&gt;More settings&lt;/strong&gt; → &lt;strong&gt;Hardware and connection properties&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;629&quot; data-public-id=&quot;wp-vpn/image-23_1194303c27/image-23_1194303c27.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_629,c_scale/f_auto,q_auto/v1750424181/wp-vpn/image-23_1194303c27/image-23_1194303c27.png?_i=AA&quot; alt=&quot;How to find default gateway on Windows 11&quot; class=&quot;wp-post-11941 wp-image-11943&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;151 KB&quot; data-optsize=&quot;37 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;75.5&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11943&quot; data-version=&quot;1750424181&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_629,c_scale/f_auto,q_auto/v1750424181/wp-vpn/image-23_1194303c27/image-23_1194303c27.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_184,c_scale/f_auto,q_auto/v1750424181/wp-vpn/image-23_1194303c27/image-23_1194303c27.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_472,c_scale/f_auto,q_auto/v1750424181/wp-vpn/image-23_1194303c27/image-23_1194303c27.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424181/wp-vpn/image-23_1194303c27/image-23_1194303c27.png?_i=AA 1046w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;An alternative method that works on all versions of Windows is to use the &lt;a href=&quot;https://www.lifewire.com/how-to-open-command-prompt-2618089&quot;&gt;Command Prompt&lt;/a&gt; (cmd). Open cmd and run:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;ipconfig&lt;/pre&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;943&quot; height=&quot;297&quot; data-public-id=&quot;wp-vpn/image-24_11945d2e16/image-24_11945d2e16.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_943,h_297,c_scale/f_auto,q_auto/v1750424214/wp-vpn/image-24_11945d2e16/image-24_11945d2e16.png?_i=AA&quot; alt=&quot;How to find default gateway on Windows using cmd&quot; class=&quot;wp-post-11941 wp-image-11945&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;28 KB&quot; data-optsize=&quot;5 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.6&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11945&quot; data-version=&quot;1750424214&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424214/wp-vpn/image-24_11945d2e16/image-24_11945d2e16.png?_i=AA 943w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_94,c_scale/f_auto,q_auto/v1750424214/wp-vpn/image-24_11945d2e16/image-24_11945d2e16.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_242,c_scale/f_auto,q_auto/v1750424214/wp-vpn/image-24_11945d2e16/image-24_11945d2e16.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 943px) 100vw, 943px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;macos&quot;&gt;How to find your default gateway on macOS&lt;/h2&gt;



&lt;p&gt;Open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;Network&lt;/strong&gt; tab → [Your network] → &lt;strong&gt;Details&lt;/strong&gt; → &lt;strong&gt;TCP/IP&lt;/strong&gt; tab → &lt;strong&gt;Router&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;1000&quot; height=&quot;797&quot; data-public-id=&quot;wp-vpn/image-25_11946d6c22/image-25_11946d6c22.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1000,h_797,c_scale/f_auto,q_auto/v1750424202/wp-vpn/image-25_11946d6c22/image-25_11946d6c22.png?_i=AA&quot; alt=&quot;How to find default gateway on Mac&quot; class=&quot;wp-post-11941 wp-image-11946&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;304 KB&quot; data-optsize=&quot;69 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;77.3&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11946&quot; data-version=&quot;1750424202&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424202/wp-vpn/image-25_11946d6c22/image-25_11946d6c22.png?_i=AA 1000w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_239,c_scale/f_auto,q_auto/v1750424202/wp-vpn/image-25_11946d6c22/image-25_11946d6c22.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_612,c_scale/f_auto,q_auto/v1750424202/wp-vpn/image-25_11946d6c22/image-25_11946d6c22.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1000px) 100vw, 1000px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;linux&quot;&gt;How to find your default gateway on Linux&lt;/h2&gt;



&lt;p&gt;Open a terminal window and enter:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;ip route | grep default&lt;/pre&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;640&quot; height=&quot;160&quot; data-public-id=&quot;wp-vpn/image-26-1/image-26-1.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_640,h_160,c_scale/f_auto,q_auto/v1750424174/wp-vpn/image-26-1/image-26-1.png?_i=AA&quot; alt=&quot;How to find default gateway on Linux&quot; class=&quot;wp-post-11941 wp-image-11948&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;51 KB&quot; data-optsize=&quot;21 KB&quot; data-optformat=&quot;image/jpeg&quot; data-percent=&quot;59.4&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11948&quot; data-version=&quot;1750424174&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424174/wp-vpn/image-26-1/image-26-1.png?_i=AA 640w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_75,c_scale/f_auto,q_auto/v1750424174/wp-vpn/image-26-1/image-26-1.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 640px) 100vw, 640px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;android&quot;&gt;How to find your default gateway on Android&lt;/h2&gt;



&lt;p&gt;This guide was created using a Samsung OneUI phone, but the instructions should be similar for most Android devices.&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;Connections&lt;/strong&gt; → &lt;strong&gt;Wi-Fi&lt;/strong&gt; → [Your network] → &lt;strong&gt;⚙&lt;/strong&gt; → &lt;strong&gt;View more&lt;/strong&gt; → &lt;strong&gt;IP settings&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;983&quot; data-public-id=&quot;wp-vpn/image-26_11947f9f1c/image-26_11947f9f1c.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_983,c_scale/f_auto,q_auto/v1750424177/wp-vpn/image-26_11947f9f1c/image-26_11947f9f1c.png?_i=AA&quot; alt=&quot;How to find default gateway on Android 1&quot; class=&quot;wp-post-11941 wp-image-11947&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;95 KB&quot; data-optsize=&quot;21 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;78.3&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11947&quot; data-version=&quot;1750424177&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424177/wp-vpn/image-26_11947f9f1c/image-26_11947f9f1c.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_122,h_300,c_scale/f_auto,q_auto/v1750424177/wp-vpn/image-26_11947f9f1c/image-26_11947f9f1c.png?_i=AA 122w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;ol start=&quot;2&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Select &lt;strong&gt;Static&lt;/strong&gt;. You can now see a new &lt;strong&gt;Gateway&lt;/strong&gt; field showing your default gateway address. Tap &lt;strong&gt;Cancel&lt;/strong&gt; to revert to your device&amp;#8217;s default settings.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;986&quot; data-public-id=&quot;wp-vpn/image-27_11949f32ea/image-27_11949f32ea.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_986,c_scale/f_auto,q_auto/v1750426047/wp-vpn/image-27_11949f32ea/image-27_11949f32ea.png?_i=AA&quot; alt=&quot;How to find default gateway on Android 2&quot; class=&quot;wp-post-11941 wp-image-11949&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;89 KB&quot; data-optsize=&quot;16 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;81.8&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11949&quot; data-version=&quot;1750426047&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750426047/wp-vpn/image-27_11949f32ea/image-27_11949f32ea.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_122,h_300,c_scale/f_auto,q_auto/v1750426047/wp-vpn/image-27_11949f32ea/image-27_11949f32ea.png?_i=AA 122w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;ios&quot;&gt;How to find your default gateway on iOS and iPadOS&lt;/h2&gt;



&lt;p&gt;Open the &lt;strong&gt;Settings&lt;/strong&gt; app and go to &lt;strong&gt;Wi-Fi&lt;/strong&gt; → [Your network] → &lt;strong&gt;Router&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;692&quot; data-public-id=&quot;wp-vpn/image-28_11950313fd/image-28_11950313fd.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_692,c_scale/f_auto,q_auto/v1750424194/wp-vpn/image-28_11950313fd/image-28_11950313fd.png?_i=AA&quot; alt=&quot;How to find default gateway on iPhone and iPad&quot; class=&quot;wp-post-11941 wp-image-11950&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;103 KB&quot; data-optsize=&quot;27 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;73.9&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11950&quot; data-version=&quot;1750424194&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424194/wp-vpn/image-28_11950313fd/image-28_11950313fd.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_173,h_300,c_scale/f_auto,q_auto/v1750424194/wp-vpn/image-28_11950313fd/image-28_11950313fd.png?_i=AA 173w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;chromeos&quot;&gt;How to find your default gateway on a Chromebook&lt;/h2&gt;



&lt;p&gt;Click or tap on the &lt;strong&gt;Status&lt;/strong&gt; area (where the clock is) and go to &lt;strong&gt;⚙&lt;/strong&gt; (Settings) → &lt;strong&gt;Network&lt;/strong&gt; → &lt;strong&gt;Wi-Fi &lt;/strong&gt;or &lt;strong&gt;Ethernet&lt;/strong&gt; → &lt;strong&gt;Known networks&lt;/strong&gt; → [Your network] → &lt;strong&gt;Network&lt;/strong&gt; → &lt;strong&gt;Gateway&lt;/strong&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;1000&quot; height=&quot;625&quot; data-public-id=&quot;wp-vpn/image-29_119516113d/image-29_119516113d.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1000,h_625,c_scale/f_auto,q_auto/v1750424223/wp-vpn/image-29_119516113d/image-29_119516113d.png?_i=AA&quot; alt=&quot;How to find default gateway on ChromeOS&quot; class=&quot;wp-post-11941 wp-image-11951&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;256 KB&quot; data-optsize=&quot;25 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;90.3&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11951&quot; data-version=&quot;1750424223&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424223/wp-vpn/image-29_119516113d/image-29_119516113d.png?_i=AA 1000w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_188,c_scale/f_auto,q_auto/v1750424223/wp-vpn/image-29_119516113d/image-29_119516113d.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_480,c_scale/f_auto,q_auto/v1750424223/wp-vpn/image-29_119516113d/image-29_119516113d.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1000px) 100vw, 1000px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;why&quot;&gt;Why find your default gateway?&lt;/h2&gt;



&lt;p&gt;Knowing your &lt;strong&gt;default gateway address&lt;/strong&gt; is useful for several reasons:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Network troubleshooting&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;If you&amp;#8217;re having issues connecting to the internet, you can ping the default gateway to see if your device is reaching your router. If the ping fails, the issue is likely within your local network. To ping your default gateway, open a terminal (for example, &lt;a href=&quot;https://www.lifewire.com/how-to-open-command-prompt-2618089&quot;&gt;cmd on Windows&lt;/a&gt; or the Terminal app on macOS) and enter:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;ping [your default gateway address]&lt;/pre&gt;



&lt;p&gt;For example:&lt;/p&gt;



&lt;pre class=&quot;wp-block-preformatted&quot;&gt;ping 192.168.1.1&lt;/pre&gt;



&lt;p&gt;If you see a reply and response time, your device can reach its default gateway.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;583&quot; data-public-id=&quot;wp-vpn/image-32_1195574021/image-32_1195574021.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_583,c_scale/f_auto,q_auto/v1750427177/wp-vpn/image-32_1195574021/image-32_1195574021.png?_i=AA&quot; alt=&quot;Ping your default gateway&quot; class=&quot;wp-post-11941 wp-image-11955&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;339 KB&quot; data-optsize=&quot;81 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;76.2&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11955&quot; data-version=&quot;1750427177&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_583,c_scale/f_auto,q_auto/v1750427177/wp-vpn/image-32_1195574021/image-32_1195574021.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1750427177/wp-vpn/image-32_1195574021/image-32_1195574021.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750427177/wp-vpn/image-32_1195574021/image-32_1195574021.png?_i=AA 1254w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Router configuration&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Typing the default gateway address into a web browser allows you to sign in to your router’s web interface, allowing you to change your WiFi settings, update your router&amp;#8217;s firmware, configure port forwarding, view connected devices, and more.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-full&quot;&gt;&lt;img width=&quot;1000&quot; height=&quot;650&quot; data-public-id=&quot;wp-vpn/image-31_11953df047/image-31_11953df047.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1000,h_650,c_scale/f_auto,q_auto/v1750424213/wp-vpn/image-31_11953df047/image-31_11953df047.png?_i=AA&quot; alt=&quot;Access your router&amp;#039;s admin page&quot; class=&quot;wp-post-11941 wp-image-11953&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;133 KB&quot; data-optsize=&quot;38 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;71.5&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11953&quot; data-version=&quot;1750424213&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1750424213/wp-vpn/image-31_11953df047/image-31_11953df047.png?_i=AA 1000w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_195,c_scale/f_auto,q_auto/v1750424213/wp-vpn/image-31_11953df047/image-31_11953df047.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_499,c_scale/f_auto,q_auto/v1750424213/wp-vpn/image-31_11953df047/image-31_11953df047.png?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1000px) 100vw, 1000px&quot; /&gt;&lt;/figure&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Monitoring network security&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Knowing the default gateway address helps you check if you&amp;#8217;re connected to the correct network, especially on public or shared networks.&lt;/p&gt;



&lt;p&gt;You can also use it to verify whether an unauthorized device is impersonating your network’s router (known as an &lt;a href=&quot;https://protonvpn.com/blog/evil-twin/&quot;&gt;evil twin attack&lt;/a&gt;) by comparing your device&amp;#8217;s current default gateway address with the address you know it should be connecting to.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Advanced network management&lt;/h3&gt;



&lt;p&gt;Knowing your default gateway address is vital for advanced network management, which includes configuring static IPs, subnets, or access control rules (all of which are beyond the scope of this article).&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;final-thoughts&quot;&gt;Final thoughts: Why the default gateway matters&lt;/h2&gt;



&lt;p&gt;Your default gateway is the bridge between your device and the wider internet, quietly handling traffic every time you send an email, browse a website, or stream a video.&lt;/p&gt;



&lt;p&gt;At Proton VPN, we want to empower our community take charge of your connectivity. Whether you’re troubleshooting a connection issue, setting up a secure network, or just learning how your devices talk to the web, understanding what a default gateway is and how to find it gives you more control over your network.&lt;/p&gt;
</content:encoded><category>How-to</category><author>Douglas Crawford</author></item><item><title>Does Instagram&amp;#8217;s vanish mode protect your private conversations?</title><link>https://protonvpn.com/blog/vanish-mode-instagram</link><guid isPermaLink="true">https://protonvpn.com/blog/vanish-mode-instagram</guid><description>Instagram &apos;s vanish mode allows you to send messages that disappear once they are read. It can be fun, but it is not secure.</description><pubDate>Fri, 13 Jun 2025 16:41:26 GMT</pubDate><content:encoded>
&lt;p&gt;Vanish mode on &lt;a href=&quot;https://protonvpn.com/blog/unblock-instagram/&quot;&gt;Instagram&lt;/a&gt; is a feature that allows you to have ephemeral conversations. When you turn vanish mode on, your chat messages will disappear as soon as your recipient sees them. Because no permanent record is kept, vanish mode aims to provide an extra layer of privacy and security for your private conversations.&lt;/p&gt;



&lt;p&gt;This feature is designed to provide an extra layer of privacy and security for anyone who wants to ensure their messages don&amp;#8217;t leave a permanent record. However, as we&amp;#8217;ll discuss, you shouldn&amp;#8217;t rely on vanish mode to protect sensitive or important conversations. In this article we&amp;#8217;ll look at:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#what&quot;&gt;What is vanish mode on Instagram?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#how&quot;&gt;How to use vanish mode&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#benefits&quot;&gt;Benefits of vanish mode&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#limitations&quot;&gt;Limitations of vanish mode&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#worth-using&quot;&gt;Is vanish mode worth using?&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#final-thoughts&quot;&gt;For fun only&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#faq&quot;&gt;FAQ&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;what&quot;&gt;What is vanish mode on Instagram?&lt;/h2&gt;



&lt;p&gt;Vanish mode is a messaging feature on Instagram designed for fleeting, private conversations. Messages sent in vanish mode automatically disappear after they’ve been seen and the chat is closed, which is great for when sharing something temporarily without leaving a digital footprint. Vanish mode is like Snapchat&amp;#8217;s signature feature and similar to &lt;a href=&quot;https://proton.me/support/expiration&quot;&gt;Proton Mail&amp;#8217;s expiring emails&lt;/a&gt; option.&lt;/p&gt;



&lt;p&gt;Vanish mode is built into &lt;a href=&quot;https://about.instagram.com/features/direct&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Instagram Direct Messages&lt;/a&gt; (DMs) and is available only for &lt;strong&gt;one-on-one conversations&lt;/strong&gt;. This means you can’t use vanish mode in group chats or with people you haven’t messaged before.&lt;/p&gt;



&lt;p&gt;As with &lt;a href=&quot;https://proton.me/blog/what-is-end-to-end-encryption&quot;&gt;end-to-end encryption&lt;/a&gt;, vanish mode is not available on Instagram in all regions (notably, it isn&amp;#8217;t available in the European Union or the United Kingdom).&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;how&quot;&gt;How to use vanish mode&lt;/h2&gt;



&lt;p&gt;To use Instagram vanish mode:&lt;/p&gt;



&lt;p&gt;1. Start or open a DM with an existing contact&lt;/p&gt;



&lt;p&gt;2. &lt;strong&gt;Swipe up&lt;/strong&gt; from the bottom of the screen&lt;/p&gt;



&lt;p&gt;Your screen will turn darker, and you&amp;#8217;ll see a notification saying &lt;strong&gt;Disappearing message&lt;/strong&gt; that lets you and the other participant know Vanish mode is active.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full&quot;&gt;&lt;img width=&quot;400&quot; height=&quot;191&quot; data-public-id=&quot;wp-vpn/image-14_11895bb830/image-14_11895bb830.png&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_400,h_191,c_scale/f_auto,q_auto/v1749765607/wp-vpn/image-14_11895bb830/image-14_11895bb830.png?_i=AA&quot; alt=&quot;Vanish mode in action&quot; class=&quot;wp-post-11894 wp-image-11895&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;167 KB&quot; data-optsize=&quot;11 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.4&quot; data-permalink=&quot;https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;amp;section=edit-asset&amp;amp;asset=11895&quot; data-version=&quot;1749765607&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1749765607/wp-vpn/image-14_11895bb830/image-14_11895bb830.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_143,c_scale/f_auto,q_auto/v1749765607/wp-vpn/image-14_11895bb830/image-14_11895bb830.png?_i=AA 300w&quot; sizes=&quot;auto, (max-width: 400px) 100vw, 400px&quot; /&gt;&lt;/figure&gt;&lt;/div&gt;


&lt;p&gt;You can now chat as normal, except your messages vanish once they’re seen and the chat is exited. There’s no saved history, and once messages vanish, there’s no way to retrieve them.&lt;/p&gt;



&lt;p&gt;You can exit vanish mode at any time to resume a regular chat. To do this, simply &lt;strong&gt;swipe down&lt;/strong&gt; on the screen.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Screenshot Notifications&lt;/h3&gt;



&lt;p&gt;If the other person takes a screenshot while you&amp;#8217;re in vanish mode, Instagram will notify you. Please note, nothing can stop someone from using sneaker methods, such as taking a photo of the screen using another device.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;benefits&quot;&gt;Benefits of vanish mode&lt;/h2&gt;



&lt;p&gt;Vanish mode can be a fun way to introduce a little more privacy into your one-to-one chats. No chat history means fewer digital traces and screenshot alerts can provide some peace of mind that intimate conversations and photos will remain private.&lt;/p&gt;



&lt;p&gt;It can also be useful when you want things off the record, but not necessarily top-secret. It also helps you save storage space since photos and videos aren&amp;#8217;t stored.&lt;/p&gt;



&lt;p&gt;However, given the quite extensive limitations of vanish mode (discussed below), a considerable amount of trust is required to use it safely. Vanish mode&amp;#8217;s most practical use is to ensure that third parties who gain physical access to your phone aren&amp;#8217;t able to access your private conversations after the fact.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;limitations&quot;&gt;Limitations of vanish mode&lt;/h2&gt;



&lt;p&gt;Assuming it&amp;#8217;s even available in your region, you can only use vanish mode for one-to-one chats (not group chats). But the biggest issue is that it&amp;#8217;s &lt;a href=&quot;https://followeran.com/en/blog/vanish-mode-instagram-screenshot/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;quite easy&lt;/a&gt; for a bad actor to get around the screenshot warning and record conversations without your knowledge. There&amp;#8217;s also nothing to stop them from taking a screenshot if they don&amp;#8217;t care that you know about it.&lt;/p&gt;



&lt;p&gt;As with Instagram&amp;#8217;s optional end-to-end encryption for one-to-one chats, another problem is &lt;a href=&quot;https://privacycenter.instagram.com/search/?query=vanish%20mode&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;metadata&lt;/a&gt;. The content of your chats will disappear, but Instagram and its Facebook-owning parent company, Meta, will continue to know who you talked to, when, how often, and for how long. Meta can use these details to infer personal interests to target you with ads, and it could potentially hand them over to third parties.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;worth-using&quot;&gt;Is vanish mode worth using?&lt;/h2&gt;



&lt;p&gt;Given these limitations, you should be careful using vanish mode. It&amp;#8217;s great for jokes, memes, one-off messages, or for sharing quick updates that don’t need to be saved. But if you require real privacy, you should avoid Instagram entirely, even with vanish mode.&lt;/p&gt;



&lt;p&gt;If you need to send anything sensitive or important, you should use a &lt;a href=&quot;https://proton.me/blog/whatsapp-alternatives&quot;&gt;secure privacy-focused messenger&lt;/a&gt; app instead (such as Signal, which also &lt;a href=&quot;https://support.signal.org/hc/en-us/articles/360007320771-Set-and-manage-disappearing-messages&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;features disappearing messages&lt;/a&gt;). Even using a secure app, you need to trust the recipient to not take photos of their screen.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;final-thoughts&quot;&gt;Final thoughts: For fun only&lt;/h2&gt;



&lt;p&gt;Vanish mode on Instagram is a fun feature that adds a layer of casual privacy that&amp;#8217;s useful for quick, forgettable exchanges. It&amp;#8217;s not a secure communication tool.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;faq&quot;&gt;Frequently asked questions&lt;/h2&gt;



&lt;div class=&quot;schema-faq wp-block-yoast-faq-block&quot;&gt;&lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1749738907704&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;How to turn off vanish mode on Instagram?&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;Once Vanish mode is activated, simply &lt;strong&gt;swipe down&lt;/strong&gt; at any time to revert to standard messaging.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1749738915666&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;Why have my Instagram messages disappeared?&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;One plausible explanation for messages disappearing is that you or the person you chatted with enabled vanish mode. This is quite easy to do by accident (just swipe up from the bottom of the screen during a conversation), although it&amp;#8217;s also quite easy to see this has happened (the screen goes dark, and there is a clear notification).&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1749738922506&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;&lt;strong&gt;How to remove vanish mode on Instagram&lt;/strong&gt;&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;To remove vanish mode on Instagram, open the chat where it&amp;#8217;s enabled and &lt;strong&gt;swipe down&lt;/strong&gt;. The chat background will change back to normal, indicating that Vanish mode is now disabled.&lt;/p&gt; &lt;/div&gt; &lt;/div&gt;



&lt;p&gt;&lt;/p&gt;
</content:encoded><category>Privacy deep dives</category><author>Douglas Crawford</author></item></channel></rss>