Friday, January 24, 2025
HomeCyber Security NewsWhatsApp Adds Proxy Support For Users to Help Bypass Internet Restrictions

WhatsApp Adds Proxy Support For Users to Help Bypass Internet Restrictions

Published on

SIEM as a Service

Follow Us on Google News

WhatsApp Proxy support is now available to all WhatsApp users worldwide, giving them the ability to continue using the app even if their connection is banned or otherwise disrupted.

“We’re launching proxy support for WhatsApp users all over the world. We’re putting the power into people’s hands to maintain access to WhatsApp if their connection is blocked or disrupted”, says WhatsApp

All users of the latest releases of the WhatsApp iOS and Android applications can use the new proxy support feature.

Proxy Maintains a High Level of Privacy and Security

By choosing a proxy, users can connect to WhatsApp through servers set up by volunteers and organizations dedicated to promoting free communication throughout the world.

According to WhatsApp, using a proxy connection maintains the app’s privacy and security settings, and end-to-end encryption will continue to secure private conversations.

Also, the messages will not be visible to anyone in between, not the proxy servers, WhatsApp or Meta.

“Connecting via proxy maintains the high level of privacy and security that WhatsApp provides. Your personal messages and calls will still be protected by end-to-end encryption”, WhatsApp.

“Only use a proxy if you’re unable to connect to WhatsApp. Your IP address may be visible to the proxy provider, which is not WhatsApp,” a warning given while setting up the proxy.

WhatsApp proxy settings
WhatsApp proxy settings

For users of the most recent version of the app, the new option is available in the settings menu. You must input a proxy address after turning on the “Use Proxy” option under “Storage and Data” in the WhatsApp settings in order to connect using a proxy on Android and iOS.

Anyone can set up their own proxies by following the instructions provided here to assist relatives and friends in remaining connected even when their connection is interrupted or blocked.

“Our wish for 2023 is that these internet shutdowns never occur,” WhatsApp wrote in a blog post.

“Disruptions, like we’ve seen in Iran for months on end, deny people’s human rights and cut people off from receiving urgent help. Though in case these shutdowns continue, we hope this solution helps people wherever there is a need for secure and reliable communication.”

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

Microsoft Unveils New Identity Secure Score Recommendations in General Availability

Microsoft has announced the general availability of 11 new Identity Secure Score recommendations in...