abusesaffiliationarrow-downarrow-leftarrow-rightarrow-upattack-typeblueskyburgerchevron-downchevron-leftchevron-rightchevron-upClock iconclosedeletedevelopment-povertydiscriminationdollardownloademailenvironmentexternal-linkfacebookfilterflaggenderglobeglobegroupshealthC4067174-3DD9-4B9E-AD64-284FDAAE6338@1xinformation-outlineinformationinstagraminvestment-trade-globalisationissueslabourlanguagesShapeCombined Shapeline, chart, up, arrow, graphLinkedInlocationmap-pinminusnewsorganisationotheroverviewpluspreviewArtboard 185profilerefreshIconnewssearchsecurityPathStock downStock steadyStock uptagticktooltiptwitteruniversalitywebwhatsappxIcons / Social / YouTube

The content is also available in the following languages: العربيّة

Article

16 Aug 2023

Author:
SMEX

Egypt: Authorities allegedly use DPI technology to block VPN use

"What is DPI Technology, and Why is Egypt Abusing It?"

An engineering student in Egypt found herself with no access to remote classes as authorities in Egypt unilaterally blocked the VPN service she had relied on to study. 

Egyptian authorities are using the Deep Packet Inspection (DPI) technique to impede access to virtual private networks (VPNs), commonly used in Egypt to access restricted content.

Between 2017 and 2020, Egypt blocked 600 websites and online services, including 400 virtual networks, proxy service providers, and 11 news websites. Regional and international organizations asserted that the Egyptian state uses DPI technology to intercept communications and impose censorship.

Undeterred by dissenting voices, authorities persisted in limiting the options available for people in Egypt to access online content freely.

In August 2022, the Egyptian government took its first measures to ban the use of VPNs...

Internet users started complaining about connectivity hitches when using OpenVPN. Eventually, communication via this protocol became impossible. The Egyptian government used DPI technology to throttle internet connection and identify data transferred via OpenVPN, PPTP, and L2TP protocols...

“Those able to connect to paid virtual networks can readily access any content, while those without the knowledge or financial resources will find themselves deprived of such access.”...

An anonymous network engineer specializing in the field contends that “this pretext of banning free virtual networks in Egypt is merely a smokescreen.” He explained that artificial intelligence products are perfectly functional in Egypt and can be accessed through payment despite attracting few users. He added that banning free virtual networks is nothing but “authorities’ way of securing a share of the fees paid to VPN service providers.

As more VPN applications get blocked and DPI technology enforced, internet users find themselves defenseless, stripped of the protective shields that once provided concealment against the authorities’ gaze.

Privacy information

This site uses cookies and other web storage technologies. You can set your privacy choices below. Changes will take effect immediately.

For more information on our use of web storage, please refer to our Data Usage and Cookies Policy

Strictly necessary storage

ON
OFF

Necessary storage enables core site functionality. This site cannot function without it, so it can only be disabled by changing settings in your browser.

Analytics cookie

ON
OFF

When you access our website we use Google Analytics to collect information on your visit. Accepting this cookie will allow us to understand more details about your journey, and improve how we surface information. All analytics information is anonymous and we do not use it to identify you. Google provides a Google Analytics opt-out add on for all popular browsers.

Promotional cookies

ON
OFF

We share news and updates on business and human rights through third party platforms, including social media and search engines. These cookies help us to understand the performance of these promotions.

Your privacy choices for this site

This site uses cookies and other web storage technologies to enhance your experience beyond necessary core functionality.