r/vpnet

VPN laws across US states as of May 6, 2026 (Utah becomes the first restricted state)
▲ 898 r/vpnet

VPN laws across US states as of May 6, 2026 (Utah becomes the first restricted state)

Utah Senate Bill 73 takes effect tomorrow, May 6, 2026. It is the first US state law that specifically restricts VPN use, and it does so in two ways:

  1. Anyone physically in Utah is treated as a Utah user for age-verification purposes, regardless of what their IP address says. The website carries the legal risk if it guesses wrong.
  2. Covered websites are barred from telling visitors how to use a VPN to bypass age checks. The EFF has flagged this as a First Amendment concern.

The EFF has called it a "liability trap" because there is no reliable way for a website to detect VPN traffic and pinpoint a user's actual physical location. The only systems that come close are China's Great Firewall and Russia's TSPU. The likely outcomes: sites either block every known VPN IP, or force every visitor on Earth into an ID check.

Wisconsin tried something similar earlier in 2026 and walked it back. The UK and France have signaled they want to move in the same direction.

We put together a map of where every US state currently stands and a full breakdown of what SB 73 actually does: https://s.vp.net/ot4Is

EDIT 5/7: Great news! The law in Utah has been blocked temporarily!
https://www.sltrib.com/news/politics/2026/05/06/why-utah-now-requires-porn/

u/V3R1F13D0NLY — 9 days ago
▲ 36 r/vpnet+2 crossposts

Three reasons why everyone should actually care about using a VPN

u/FriendHot7938 — 5 hours ago
▲ 8 r/vpnet+2 crossposts

Chris from bmail.ag here, the only verifiably private email service. I have been in the privacy industry for over a decade and have seen a ton of misinformation about email providers, so I'm helping set the record straight.

Drop your email provider below and I will tell you exactly how private it is, what their architecture actually does and doesn't protect against.

Proton, Tuta, Gmail, Yahoo, AOL, Outlook, Fastmail. No one's safe.

u/V3R1F13D0NLY — 11 days ago
▲ 73 r/vpnet+1 crossposts

Congress continues to gamble with our privacy...

The perpetual can-kickers in Congress have issued a 45-day extension to their 10-day extension of their 20-day extension (seriously).

Does anyone in D.C. actually work when it doesn't benefit them directly? 🤦‍♂️

u/V3R1F13D0NLY — 7 days ago
▲ 30 r/vpnet

Utah's SB 73, the first state law restricting VPN use, was frozen pending a lawsuit on the same day it took effect

Utah's SB 73 took effect Wednesday, May 6th. By the end of that same day, the Salt Lake Tribune was reporting that enforcement was already on hold pending a lawsuit. The bill makes websites liable for users who access age-gated content through a VPN, and it also bans those same sites from publishing how a VPN works. Civil liberties groups spent months warning Utah lawmakers that the First Amendment was going to eat the publishing-ban half before it ever got enforced.

Key points:

  • SB 73 took effect May 6, 2026, frozen the same day pending suit
  • Makes websites liable when users reach age-gated content via VPN
  • Bans those sites from publishing explainers on how a VPN works
  • Fight for the Future called the statute language "AI slop" and pre-endorsed any lawsuit filed
  • Passed 22-2 in the Senate, 66-1 in the House, three Republican dissents total

The publishing-ban portion is the obviously dead piece on First Amendment grounds. The liability-for-user-VPN-use portion is the more interesting question because it pushes legal exposure onto websites for what's happening on the network layer.

Additional reading with the full statute walkthrough and what comes next: https://s.vp.net/zbckd

youtube.com
u/V3R1F13D0NLY — 3 days ago
▲ 10 r/vpnet+1 crossposts

'Swiss Privacy" has more hole than Swiss cheese

A Swiss flag is not a firewall.

If a provider can log your IP address to 'monitor for abuse,' they can log it for a court order. If they can monitor a mailbox for 'safety,' they can monitor it for a government. They are not villains. They are administrators operating under whichever set of laws applies this week.

In 2021, Swiss authorities ordered ProtonMail to log a user's IP. ProtonMail complied. The architecture permitted it. Switzerland, it turned out, was a jurisdiction, not a guarantee.

bmail's API gateway runs inside an Intel SGX enclave. Client IP addresses are processed in hardware-isolated memory and never written to any storage. There is nothing to log because the architecture never permitted it.

Physically protected by hardware, not imaginary lines.

u/V3R1F13D0NLY — 5 days ago
▲ 27 r/vpnet+1 crossposts

Lavabit, an email provider, once printed 410,000 encryption keys in 4-point font on 11 pages, handed them to the FBI, then deleted the entire company

A clip from this week's Hide & Speak where we discussed the insane Lavabit story.

A court order arrived demanding the encryption keys that protected 410,000 user accounts. The founder complied... technically...

He printed every key in 4-point font across 11 pages and handed the physical stack to the FBI. 🤣 What a legend.

They were not amused. They demanded an electronic copy and gave him almost no time to produce it.

He chose option three. He deleted the company. 410,000 accounts and inboxes wiped overnight.

A few things worth pulling out:

  • The legal mechanism that forced the keys is still on the books
  • Most email providers would have complied without the printout stunt or the deletion
  • Users had no warning and no way to verify what was happening on the backend
  • This was not a hypothetical. It was a real court order, in 2013, against a real provider that thousands of people trusted with their email

The part that sticks with me is that the choice even existed. If the keys are accessible to the provider, they are accessible to anyone with a court order or anyone who compromises the provider.

For anyone who has read about this case before, what other providers do you think would have made the same call he did?

Full episode here: https://www.youtube.com/watch?v=X0TAd-4eIb8

Written breakdown here: https://s.vp.net/iQi47

youtube.com
u/V3R1F13D0NLY — 6 days ago
▲ 0 r/vpnet

Think about what a "no-logs policy" actually is. It's a company telling you "we could watch everything you do, but we promise we won't." That's it. That's the whole security model.

You're not buying privacy. You're buying a promise.

A handful of VPNs have done third-party audits, which is better than nothing, but an audit is a snapshot. It tells you what the logging looked like the week the auditors were in the building. It doesn't tell you what's happening on the server right now. And it means taking the word of a company paid by the VPN who knows they probably aren't getting that audit job next year if they make the VPN look bad.

The actual fix is architectural: build the system so the provider literally cannot see user activity, even if they wanted to. Hardware enclaves, remote attestation, cryptography that doesn't require trusting the operator. The math does the work the promise is currently doing.

So I'm curious where this community lands:

Is a no-logs policy + audit good enough for you?

Or do you think "trust us" should be obsolete at this point?

And if you've moved to something more verifiable, what convinced you?

u/V3R1F13D0NLY — 11 days ago