Blog
-
Now There's a Way to Measure QUIC Targeting By Middleboxes
National-scale censors have been observed engaging in traffic filtering targeted at new and secure transport protocols such as QUIC.
Categories: -
VPN or Vpwn: How Afraid Should You Be of VPN Traffic Identification?
A recent study finds that popular VPN protocols can be easily identified and blocked by ISPs.
Categories: -
Who Owns, Operates, and Develops Your VPN Matters
New research shows that eight popular, commercial VPN apps operate deceptively, exposing more than 700 million users to authoritarian surveillance.
Categories: -
Understanding Your Rights Starts With Measuring What's Wrong
Measurements are only as powerful as the reforms they bring.
Categories: -
Why DNS Resolvers Are the Next Internet Frontline
Governments increasingly turn to DNS-level blocking interventions because they're easy to implement.
Categories: -
Myanmar Earthquake: A Crisis Within a Crisis
Internet access should not be weaponized or restricted during emergencies—it should be a relief, coordination, and rebuilding tool.
Categories: -
Will Election-related Internet Shutdowns Continue in 2025?
Pulse tracked seven election-related Internet shutdowns in 2024, the most we've ever tracked.
Categories: -
Developing a Holistic approach to measuring Internet Outages
A Pulse Research Fellow has developed a new Internet shutdown tracking system that retrieves open-source, API data from several sources to provide higher resolution of Internet traffic measurements, including during anomalies.
Categories: -
Pakistan's Open, Globally-Connected Internet is Under Threat
Pakistan authorities have blocked free VPN services, requiring Internet users to register to use select paid services.
Categories: -
DNS Hijacking in Malaysia: A Step Back for Internet Freedom
The recent use of DNS hijacking by Malaysian authorities to block certain content reveals a dangerous precedent for Internet regulation in Malaysia.
Categories: -
Half of Top 10 Most Popular VPNs are Vulnerable to Port Shadow Interception Attack
A new study shows that half of the top 10 most popular VPNs used today are vulnerable to having their routes intercepted by an attacker.
Categories: -
Exploring DNS Resolver Diversity: Singapore Case Study
DNS usage patterns are sometimes influenced by external factors like censorship or surveillance. Understanding these patterns can give important insights into the local Internet landscape.
Categories:












