Internet censorship index reveals Russia’s lead and widespread content blocking


Internet censorship index reveals Russia’s lead and widespread content blocking

Pierluigi Paganini
April 29, 2026

Global study shows targeted internet censorship worldwide, with Russia leading; VPNs, news, and adult content are most frequently blocked categories.

The Global Internet Censorship Index 2026 offers a clear view of how governments around the world control online access. Researchers tested 74 popular websites across 53 countries using residential proxies to simulate real users. After removing false positives caused by anti-bot protections, they analyzed 58 sites to identify genuine censorship patterns.

One of the key findings is that countries don’t block the entire internet. Instead, they selectively restrict specific categories of content based on political, cultural, or security priorities. This targeted approach reveals a lot about each government’s concerns and objectives.

At the top of the censorship ranking is Russia, which blocks a wide range of content, including independent media, messaging apps, LGBTQ+ resources, and tools used to bypass censorship.

“Russia leads our censorship index, blocking independent news (Meduza, Bellingcat), messaging apps (Telegram, WhatsApp), LGBTQ+ resources, and anti-censorship tools.” reads the report. “Countries don’t simply block “the internet”. Instead, they make targeted choices on which website categories to restrict, revealing their political priorities.”

Other countries with notable restrictions include the UAE, Bahrain, Belarus, and Pakistan, each with its own focus. For example, Belarus mainly targets human rights organizations and independent journalism, while Pakistan focuses heavily on encrypted communication tools.

The study also shows that democratic countries generally score very high in terms of openness, with most allowing access to nearly all tested websites. Differences between countries become more noticeable lower in the ranking, where restrictions increase.

Looking at what gets blocked most often, adult content leads the list, restricted in 16 countries across regions like the Middle East and South Asia. VPNs and anti-censorship tools are another major target, especially in Gulf countries. This creates a layered censorship model: first block content, then block the tools that could bypass those restrictions.

Independent news outlets and investigative journalism platforms are also frequent targets. For instance, Russia blocks sites like Meduza and Bellingcat, while Vietnam and Belarus restrict access to international media and watchdog organizations. LGBTQ+ resources face restrictions in countries such as Russia and the UAE, reflecting local legal and cultural positions.

Messaging platforms are another area of concern. Russia blocks Telegram and WhatsApp web versions, Pakistan blocks Signal, and countries like Turkey and Bangladesh restrict Discord. These actions show a clear effort to control communication channels.

From a technical perspective, many countries rely on advanced methods like SSL interception, which allows them to inspect and block encrypted traffic. This indicates significant investment in surveillance infrastructure. Other techniques include DNS blocking, connection resets, and redirects to warning pages.

The report also highlights limitations in measuring censorship. For example, China appeared less restrictive in the data, but this is due to how its Great Firewall works, using DNS poisoning and IP blocking methods that residential proxies can sometimes bypass. This means real censorship levels may be higher than observed.

“China showed minimal blocks in our scan (LinkedIn only), likely because the Great Firewall (GFW) operates at the DNS level, which residential proxies can bypass.” continues the report. “Censorship isn’t binary. Countries don’t simply block “the internet”. Instead, they make targeted choices on which website categories to restrict, revealing their political priorities.”

Overall, the study shows that internet censorship is complex and strategic. Governments choose what to block carefully, often focusing on information control and preventing users from bypassing restrictions. VPN blocking, in particular, stands out as a strong signal of broader censorship efforts.

“Residential proxies partially bypass some censorship methods (notably China’s GFW), so our scores may underestimate the actual restriction levels in countries that use DNS-based blocking.” concludes the report.”The Middle East (UAE, Bahrain, Qatar, Oman, Saudi Arabia) shows a consistent pattern of VPN and adult content blocking, with the UAE adding political content restrictions.”

About the author: Mantas Sasnauskas

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, internet censorship)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Apple’s Hide My Email feature has always been a pretty good quality-of-life privacy tool. iCloud+ subscribers can access randomly generated email addresses that forward messages to their real inbox. This helps users avoid any apps or websites from seeing their actual address. Apple also states that it doesn’t read the forwarded messages either.

All of this makes it quite a handy tool that genuinely cuts down on spam, creating a distance between you and whatever sketchy service wants your email.

But what it apparently does not do is hide your identity from law enforcement.

What’s going on?

According to court documents seen by TechCrunch, Apple provided federal agents with the real identities of at least two customers who had used Hide My Email addresses. One case in particular had the FBI seek records in an investigation that involved an email allegedly threatening Alexis Wilkins, who has been publicly reported as the girlfriend of FBI director Kash Patel.

The affidavit cited in the report states that Apple identified the anonymized address as being associated with the target Apple account. The company even provided the account holder’s full name and email address, along with records of another 134 anonymized email accounts created through this privacy feature.

TechCrunch also says it reviewed a second search warrant tied to an investigation by Homeland Security, where Apple again provided information linking Hide My Email accounts back to a user.

Why does this concern you

Before anyone starts calling out Apple for breaching privacy, they should know the distinction between companies and official warrants. Hide My Email is designed to protect users from apps, websites, and marketers, not from legal requests.

Apple still stores customer data like names, addresses, billing details, and other unencrypted info, which can be handed over when authorities come knocking with the right paperwork. So an email is a weak point here. Most emails are still not end-to-end encrypted, which means it is fundamentally different from services like Signal, whose popularity has grown precisely because of their robust privacy model.



Source link