Sunday, February 23, 2025
HomeCyber Security NewsWhatsApp Adds Proxy Support For Users to Help Bypass Internet Restrictions

WhatsApp Adds Proxy Support For Users to Help Bypass Internet Restrictions

Published on

SIEM as a Service

Follow Us on Google News

WhatsApp Proxy support is now available to all WhatsApp users worldwide, giving them the ability to continue using the app even if their connection is banned or otherwise disrupted.

“We’re launching proxy support for WhatsApp users all over the world. We’re putting the power into people’s hands to maintain access to WhatsApp if their connection is blocked or disrupted”, says WhatsApp

All users of the latest releases of the WhatsApp iOS and Android applications can use the new proxy support feature.

Proxy Maintains a High Level of Privacy and Security

By choosing a proxy, users can connect to WhatsApp through servers set up by volunteers and organizations dedicated to promoting free communication throughout the world.

According to WhatsApp, using a proxy connection maintains the app’s privacy and security settings, and end-to-end encryption will continue to secure private conversations.

Also, the messages will not be visible to anyone in between, not the proxy servers, WhatsApp or Meta.

“Connecting via proxy maintains the high level of privacy and security that WhatsApp provides. Your personal messages and calls will still be protected by end-to-end encryption”, WhatsApp.

“Only use a proxy if you’re unable to connect to WhatsApp. Your IP address may be visible to the proxy provider, which is not WhatsApp,” a warning given while setting up the proxy.

WhatsApp proxy settings
WhatsApp proxy settings

For users of the most recent version of the app, the new option is available in the settings menu. You must input a proxy address after turning on the “Use Proxy” option under “Storage and Data” in the WhatsApp settings in order to connect using a proxy on Android and iOS.

Anyone can set up their own proxies by following the instructions provided here to assist relatives and friends in remaining connected even when their connection is interrupted or blocked.

“Our wish for 2023 is that these internet shutdowns never occur,” WhatsApp wrote in a blog post.

“Disruptions, like we’ve seen in Iran for months on end, deny people’s human rights and cut people off from receiving urgent help. Though in case these shutdowns continue, we hope this solution helps people wherever there is a need for secure and reliable communication.”

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...