Venezuela Blocks Access To X

The Venezuelan President Nicolas Maduro has issued an order to block X in an attempt to control the flow of information available to users in Venezuela.

This follows a public row with the social media owner Elon Musk. The argument between Maduro and Musk has grown after contested election results that saw the Venezuelan President confirming his mandate for six more years.

From his X account, Musk dismissed the victory as a "major election fraud" with Maduro accusing the billionaire of "inciting hate." 

Venezuela’s government has also blocked access to crypto exchange Binance and other online services amid unrest over disputed presidential election results. This move has sparked concern both nationally and internationally, with many condemning it as a violation of freedom of speech and an attack on democracy. 

In response to the X blockage, many Venezuelans have turned to Virtual Private Networks (VPNs) to bypass the restrictions and access social media platforms. Indeed, the research team at  VpnMentor has detected a remarkable near 500% increase in VPN demand in Venezuela after the blocking of X .

The surge in started on Thursday 8th August  after Conatel, Venezuela’s National Telecommunications Commission, effectively blocked access to the social media platform. VPN demand kept on growing until it reached its peak on Friday August 9. 

Before the elections of July 28, ProtonVPN started to offer its services for free to Venezuelan residents. Following the implementation of the blockade on Friday, August 9, TunnelBear VPN announced on X that they would offer temporary free access to people living in Venezuela in a show of support. This gesture led to a significant increase in demand for both VPNs across the country but only skyrocketed after the ban of X.

The restriction on X marks a concerning development that adds to the constraints on freedom of expression and information access within Venezuela. With Venezuelans persisting in their quest for political transformation and economic equilibrium, global attention remains fixed on the unfolding events.

The vpnMentor research team has recorded other similar VPN demand spikes related to protests, social media suspensions, and restricted access to certain apps or websites. For example, an Internet blockade in Bangladesh amid protests resulted in a VPN surge of over 5k%. 

This is one example of how people use VPNs as a work-around to government censorship, since  open access to information and unrestricted communications  are crucial instruments for advancing democracy and human rights.

From Iran and Pakistan to Belarus and Russia, measures to restrict  their citizens access to social media and other uncontrolled media is a hallmark of authoritarian regimes.  

vpnMentor   |     Coin Telegraph   |      Cryptoslate   |    Techradar   |    FT   |   Abijita   |     Nova News Agency

Image: @NicolasMaduro

You Might Also Read: 

Elections 2024 - Fake News & Misinformation [extract]:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hackers Stealing Data Using Cisco Smart Install
Coming Soon - An AI Cyber Security Code »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Delta Risk

Delta Risk

Delta Risk is a global provider of managed security services and cyber security risk management solutions to government and private sector clients.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

PrivateVPN

PrivateVPN

PrivateVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.