Bangladesh: Internet Shutdown During the 2024 Uprising
On this page
Bangladesh's July–August 2024 internet shutdown was the longest and most technically complex in the country's history. A student-led uprising against a quota system for government jobs escalated into a national political crisis. The government responded with layered communication controls — full blackouts, bandwidth throttling, and targeted blocking of social media and circumvention tools — deployed across 170 million people over 22 days.
Background: Centralized Infrastructure, Centralized Control
Bangladesh's internet architecture has a structural vulnerability: all domestic traffic passes through a small number of International Internet Gateways (IIGs). This concentration, built for cost efficiency, makes nationwide shutdown straightforward. Authorities can restrict access either by instructing individual ISPs or by applying controls upstream at the IIG level, affecting all downstream users simultaneously.
The government body responsible, the Bangladesh Telecommunication Regulatory Commission (BTRC), issued most directives informally (often via WhatsApp messages to operators) with no published orders and no formal legal process. This opacity made it impossible for citizens or journalists to verify or challenge restrictions in real time.
Bangladesh had imposed internet disruptions before: brief blackouts during protests in 2015, 2018, and 2021. But the July–August 2024 shutdown was categorically different in scope, duration, and the layering of methods used.
The Shutdown: Five Phases Over 22 Days
The shutdown was documented in a joint investigation by Digitally Right and OONI (Open Observatory of Network Interference), published in 2025. Their analysis identified five distinct phases:
Jul 15–17
Targeted throttling and campus blocks
Mobile internet throttled at university areas. Facebook blocked on mobile networks via TLS interference.Jul 18–23
Full national blackout — 5 days
All mobile and fixed internet cut. OONI confirmed near-complete disconnection. At least 143 deaths reported during this period.Jul 24–30
Partial restoration with platform blocks
Broadband returned; mobile data restricted. Facebook, YouTube, WhatsApp, TikTok, and most messaging apps remained blocked.Jul 31–Aug 5
VPN blocking + second full blackout
Commercial VPNs blocked. Second total blackout on August 5 — the deadliest day of protests (223 more deaths). PM Hasina resigned and fled.After Aug 5
Progressive restoration
Connectivity progressively restored as political situation stabilized. Platform blocks gradually lifted.
What Worked and What Didn't
- Tor with Snowflake bridges remained accessible for some users throughout — Snowflake disguises traffic as WebRTC, making it harder to block than standard VPNs
- SMS on mobile networks remained partially functional even during data blackouts, as it uses the signaling channel separately from data
- Fixed broadband (fiber to home) was restored earlier than mobile data after the July 18–23 blackout
- Offline-first apps with pre-downloaded content (maps, cached news) continued working without internet
- International organizations monitoring network conditions from outside Bangladesh (OONI, IODA, NetBlocks) provided real-time evidence of the shutdown's extent
- WhatsApp, Signal, and Telegram (the primary tools for coordination and family contact) were blocked or nonfunctional during the full blackouts
- Standard commercial VPNs (ProtonVPN, NordVPN, TunnelBear) were blocked during the July 31–August 5 phase
- Mobile data was the first to be cut and last to be restored, leaving the 90%+ of Bangladeshis who access internet via smartphone without connectivity longest
- International calls to Bangladesh reached phones that were simply offline — no infrastructure could bridge a total blackout
- Evidence of abuses was difficult to document and share during the blackout, which is consistent with the shutdown's apparent purpose
The Circumvention Layer
The blocking of commercial VPNs in late July prompted a shift to more specialized circumvention tools. Tor's Snowflake pluggable transport disguises traffic as ordinary WebRTC browser calls, making it significantly harder to fingerprint and block than VPN protocols. The Tor Project reported sustained usage from Bangladesh throughout the shutdown.
The Bangladesh shutdown demonstrated a pattern now seen across multiple countries: initial platform blocks prompt a shift to VPNs; VPN blocking prompts a shift to traffic obfuscation tools; obfuscation tools require more sophisticated detection to block. Each escalation raises the technical cost for the censor but also raises the technical barrier for ordinary users.
Iran faced a similar escalation during its June 2025 wartime shutdown. Russia has been engaged in this cat-and-mouse cycle continuously since 2022.
Lessons
Centralized internet infrastructure is a shutdown risk, not just a reliability risk.
Bangladesh's IIG chokepoints were built for economic efficiency. They also made nationwide shutdown a single administrative decision. Countries where all traffic passes through a small number of government-accessible gateways face this exposure regardless of their political situation today.
Shutdowns follow escalation patterns that can be anticipated.
The sequence — throttling, platform blocks, full blackout, VPN blocking — has appeared in Bangladesh, Iran, Myanmar, and Ethiopia. Each phase signals what is coming next. Communities that pre-install Tor with Snowflake before a crisis have better options than those who try to download it after platforms are blocked.
Commercial VPNs fail under targeted blocking; traffic obfuscation survives longer.
ProtonVPN, NordVPN, and TunnelBear were blocked within days of the July 31 VPN crackdown. Tor with Snowflake continued operating. The difference is that Snowflake disguises traffic as WebRTC, while commercial VPN protocols have recognizable fingerprints that DPI (deep packet inspection) equipment can identify and block.
Full blackouts cannot be circumvented with software.
During the July 18–23 and August 5 full disconnections, no circumvention tool provided access because no internet connectivity existed to obfuscate. The only options in a full blackout are radio-based systems (HF amateur radio, Meshtastic) or satellite links that bypass terrestrial infrastructure entirely.
Opacity in shutdown orders makes accountability harder.
Bangladesh's directives were issued informally, often by WhatsApp, with no published legal basis. This pattern — documented also in India, Ethiopia, and Pakistan — means citizens cannot challenge shutdowns through legal processes during the event. Post-event documentation (as the OONI/Digitally Right report provides) becomes the primary accountability mechanism.
Mobile internet is more vulnerable than fixed broadband.
Mobile data was cut first and restored last in every phase of the Bangladesh shutdown. Fixed broadband connections to homes and businesses restored earlier. Communities and organizations with wired connections to their premises have a resilience advantage that mobile-only users do not.
Preparing for Shutdown Risk
The most effective preparation happens before a shutdown begins. Once platforms are blocked, downloading new tools becomes difficult. Once VPNs are blocked, setting up Tor requires technical knowledge many users don't have. Once the full blackout starts, no software preparation helps.
For communities in countries with shutdown history or risk: pre-install Tor Browser and configure Snowflake bridges in advance; establish out-of-band communication plans (SMS trees, pre-agreed check-in times) that don't rely on internet-dependent apps; and consider whether any members have amateur radio licenses or satellite communicators that could bridge a full blackout.
Sources & Evidence
- OONI / Digitally Right — The Longest Silence: Internet Shutdowns During Bangladesh's 2024 Uprising
- Access Now — #KeepItOn: Internet Shutdowns in Bangladesh
- Internet Society Pulse — Bangladesh Government Shuts Down Mobile Internet
- UN Human Rights Office — Human Rights Violations in Bangladesh (February 2025)
- Tor Project — Staying Ahead of Censors in 2025