Switzerland is thinking about changing its digital surveillance laws, and privacy experts are worried. The new rules could force VPN companies and secure messaging services to track their users and give up private information if requested.
At the center of the issue is a proposed change that would expand government powers over online services like email platforms, messaging apps, VPNs, and even social media sites. These services could soon be required to collect and store personal details about their users and hand over encrypted data when asked.
This move has sparked concern among privacy-focused companies that operate out of Switzerland. If the law is approved, it could prevent them from offering the same level of privacy they are known for.
What Could the New Rules Mean?
The suggested law says that if a digital service has over 5,000 users, it must collect and verify users’ identities and store that information for half a year after they stop using the service. This would affect many platforms, even small ones run by individuals or non-profits.
Another part of the law would give authorities the power to access encrypted messages, but only if the company has the key needed to unlock them. This could break the trust users have in these services, especially those who rely on privacy for safety or security.
Why VPN Providers Are Speaking Out
VPN services are designed to hide user activity and protect data from being tracked. They usually don’t keep any records that could identify a user. But if Swiss law requires them to log personal data, that goes against the very idea of privacy that VPNs are built on.
Swiss companies like Proton VPN, Threema, and NymVPN are all worried. They say the law could damage Switzerland’s reputation as a country that supports privacy and secure digital tools.
NymVPN’s Warning
NymVPN, a newer VPN service backed by privacy activist Chelsea Manning, has raised strong objections. Alexis Roussel, the company’s Chief Operating Officer, explained that the new rules would not only hurt businesses but could also put users in danger—especially people in sensitive roles, like journalists or activists.
Roussel added that this law may try to go around earlier court rulings that protected privacy rights, which could hurt Switzerland’s fast-growing privacy tech industry.
What People Can Do
Swiss citizens have time to give feedback on the proposal until May 6, 2025. NymVPN is encouraging people to spread the word, take part in the consultation process, and contact government officials to share their concerns. They’re also warning people in other countries to stay alert in case similar ideas start appearing elsewhere.
In 2025 alone, three VPN apps have had over a million downloads on Google Play and Apple’s App Store, suggesting these aren’t small-time apps, Sensor Tower reports. They are advertised as “private browsing” tools, but the VPNs provide the companies with complete user data of their online activity. This is alarming because China’s national security laws mandate that companies give user data if the government demands it.
The intricate web of ownership structures raises important questions; the apps are run by Singapore-based Innovative Connecting, owned by Lemon Seed, a Cayman Islands firm. Qihoo acquired Lemon Seed for $69.9 million in 2020. The company claimed to sell the business months late, but FT reports the China-based team making the applications were still under Qihoo’s umbrella for years. According to FT, a developer said, “You could say that we’re part of them, and you could say we’re not. It’s complicated.”
Google said it strives to follow sanctions and remove violators when found. Apple has removed two apps- Snap VPN and Thunder VPN- after FT contacted the business, claiming it follows strict rules on VPN data-sharing.
What Google and Apple face is more than public outage. Investors prioritise data privacy, and regulatory threat has increased, mainly with growing concerns around U.S tech firms’ links to China. If the U.S government gets involved, it can result in stricter rules, fines, and even more app removals. If this happens, shareholders won’t be happy.
According to FT, “Innovative Connecting said the content of the article was not accurate and declined to comment further. Guangzhou Lianchuang declined to comment. Qihoo and Chen Ningyi did not respond to requests for comment.”
Every day, the digital landscape evolves, thanks to innovations and technological advancements. Despite this growth, it suffers from a few roadblocks, cybercrime being a major one and not showing signs of ending anytime soon. Artificial Intelligence, large-scale data breaches, businesses, governments, and rising target refinement across media platforms have contributed to this problem. However, Nord VPN CTO Marijus Briedis believes, “Prevention alone is insufficient,” and we need resilience.
VPN provider Nord VPN experienced first-hand the changing cyber threat landscape after the spike in cybercrime cases attacking Lithuania, where the company is based, in the backdrop of the Ukraine conflict.
In the last few years, we have witnessed the expansion of cybercrime gangs and state-sponsored hackers and also the abuse of digital vulnerabilities. What is even worse is that “with little resources, you can have a lot of damage,” Briedis added. Data breaches reached an all-time high in 2024. The infamous “mother of all data breaches” incident resulted in a massive 26 billion record leak. Overall, more than 1 billion records were leaked throughout the year, according to NordLayer data.
Google’s Cybersecurity Forecast 2025 included Generative AI as a main threat, along with state-sponsored cybercriminals and ransomware.
Amid these increasing cyber threats, companies like NordVPN are widening the scope of their security services. A lot of countries have also implemented laws to safeguard against cyberattacks as much as possible throughout the years.
Over the years, governments, individuals, and organizations have also learned to protect their important data via vpn software, antivirus, firewall, and other security software. Despite these efforts, it’s not enough. According to Briedis, this happens because cybersecurity is not a fixed goal. "We have to be adaptive and make sure that we are learning from these attacks. We need to be [cyber] resilience."
In a RightsCon panel that Briedis attended, the discourse was aimed at NGOs, activists, and other small businesses, people take advantage of Nord’s advice to be more cyber-resilient. He gives importance to education, stressing it’s the “first thing.”
Smiths Group, a London-listed engineering firm operating in energy, security, aerospace, and defence, has reported a cybersecurity incident involving unauthorised access to its systems. The company has taken immediate steps to mitigate potential disruptions and contain the breach. In a statement issued to the London Stock Exchange, Smiths Group confirmed the detection of unauthorised activity and outlined measures to protect business continuity, including isolating affected systems and ensuring normal operations are maintained.
The company emphasized its commitment to safeguarding operations, stating that swift action was taken to minimize the impact of the breach. Smiths Group is actively restoring affected systems and assessing the impact on its business operations. However, the company has not provided specific details about the nature of the cyberattack, though indications suggest it may have been a ransomware incident, given the common practice of taking systems offline in such cases.
Following the announcement of the cybersecurity breach, Smiths Group’s share price dropped by nearly 2%. The company is collaborating with cybersecurity experts to assess the extent of the breach and facilitate the restoration of affected systems. While Smiths Group has confirmed adherence to regulatory requirements, it has not disclosed details about the cause of the incident, the exact timing of its discovery, or whether business or customer data was compromised. The company has promised to provide updates “as appropriate.”
This incident is part of a growing trend of cyberattacks targeting organizations across various sectors. Earlier this month, the International Civil Aviation Organization (ICAO), a United Nations specialized agency, confirmed a data breach affecting nearly 12,000 individuals in the aviation sector. The breach exposed approximately 42,000 recruitment records from April 2016 to July 2024, with 11,929 individuals directly impacted.
Similarly, Conduent, a business services company, recently confirmed a cyberattack that caused a system outage. Meanwhile, Hewlett Packard Enterprise (HPE) is investigating claims of a data breach after an adversary allegedly accessed documents associated with its developer environment. In the UK, the domain registry Nominet reported a network compromise in early January due to a zero-day vulnerability in Ivanti VPN, which has been linked to cyber espionage activities by the UNC5337 threat group.
Smiths Group, established in 1851, employs over 15,000 people and reported annual revenues of approximately $3.89 billion in fiscal 2024. The company’s Smiths Detection arm develops security screening systems for airports and other ports of entry, while its other divisions support industries such as mining, oil, gas, clean energy, and semiconductor testing. The engineering and manufacturing sectors are prime targets for cybercriminals and nation-state hackers due to their economic importance and the sensitive nature of their work.
For example, in August, Schlatter Group, a Swiss manufacturer of industrial welding machines, fell victim to a criminal cyberattack. Smiths Group, which reported annual revenues of £3.13 billion last year, supplies products to industries including energy, safety, security, aerospace, and defence, making it a lucrative target for cyberattacks.
The cybersecurity incident at Smiths Group highlights the increasing vulnerability of engineering and manufacturing firms to cyberattacks. As cybercriminals and nation-state actors continue to target these sectors, companies must prioritize robust cybersecurity measures to protect sensitive data and maintain business continuity. Smiths Group’s swift response to the breach underscores the importance of proactive incident management, but the incident serves as a reminder of the ongoing challenges in securing critical infrastructure and industrial systems.
Virtual Private Networks (VPNs) are widely trusted for protecting online privacy, bypassing regional restrictions, and securing sensitive data. However, new research has uncovered serious flaws in some VPN protocols, exposing millions of systems to potential cyberattacks.
A study by Top10VPN, conducted in collaboration with cybersecurity expert Mathy Vanhoef, highlights these alarming issues. The research, set to be presented at the USENIX 2025 Conference, reveals vulnerabilities in VPN tunnelling protocols affecting over 4 million systems worldwide. Impacted systems include:
Tunneling protocols are essential mechanisms that encrypt and protect data as it travels between a user and a VPN server. However, the study identified critical weaknesses in specific protocols, including:
These vulnerabilities allow attackers to bypass security measures by sending manipulated data packets through the affected protocols, enabling unauthorized access and a range of malicious activities, such as:
Advanced encryption tools like IPsec and WireGuard play a crucial role in safeguarding data. These technologies provide strong end-to-end encryption, ensuring data is decoded only by the intended server. This added security layer prevents hackers from exploiting weak points in VPN systems.
The vulnerabilities are not confined to specific regions. They predominantly affect servers and services in the following countries:
Both individual users and large organizations are impacted, emphasizing the need for vigilance and regular updates.
To enhance VPN security, consider these steps:
This research serves as a critical reminder: while VPNs are designed to protect privacy, they are not immune to flaws. Users must remain proactive, prioritize robust security features, and stay informed about emerging vulnerabilities.
By taking these precautions, both individuals and organizations can significantly reduce the risks associated with these newly discovered VPN flaws. Remember, no tool is entirely foolproof — staying informed is the key to online safety.