Friday, June 14, 2024

WhatsApp Adds Proxy Support For Users to Help Bypass Internet Restrictions

WhatsApp Proxy support is now available to all WhatsApp users worldwide, giving them the ability to continue using the app even if their connection is banned or otherwise disrupted.

“We’re launching proxy support for WhatsApp users all over the world. We’re putting the power into people’s hands to maintain access to WhatsApp if their connection is blocked or disrupted”, says WhatsApp

All users of the latest releases of the WhatsApp iOS and Android applications can use the new proxy support feature.

Proxy Maintains a High Level of Privacy and Security

By choosing a proxy, users can connect to WhatsApp through servers set up by volunteers and organizations dedicated to promoting free communication throughout the world.

According to WhatsApp, using a proxy connection maintains the app’s privacy and security settings, and end-to-end encryption will continue to secure private conversations.

Also, the messages will not be visible to anyone in between, not the proxy servers, WhatsApp or Meta.

“Connecting via proxy maintains the high level of privacy and security that WhatsApp provides. Your personal messages and calls will still be protected by end-to-end encryption”, WhatsApp.

“Only use a proxy if you’re unable to connect to WhatsApp. Your IP address may be visible to the proxy provider, which is not WhatsApp,” a warning given while setting up the proxy.

WhatsApp proxy settings
WhatsApp proxy settings

For users of the most recent version of the app, the new option is available in the settings menu. You must input a proxy address after turning on the “Use Proxy” option under “Storage and Data” in the WhatsApp settings in order to connect using a proxy on Android and iOS.

Anyone can set up their own proxies by following the instructions provided here to assist relatives and friends in remaining connected even when their connection is interrupted or blocked.

“Our wish for 2023 is that these internet shutdowns never occur,” WhatsApp wrote in a blog post.

“Disruptions, like we’ve seen in Iran for months on end, deny people’s human rights and cut people off from receiving urgent help. Though in case these shutdowns continue, we hope this solution helps people wherever there is a need for secure and reliable communication.”

Secure Web Gateway – Web Filter Rules, Activity Tracking & Malware Protection – Download Free E-Book


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles