Wireguard not working
Wireguard hasn't been working for months. I've re-installed the app, updated multiple times and through all of this, Wireguard never seems to work. Any ideas on when this will be fixed?
Wireguard hasn't been working for months. I've re-installed the app, updated multiple times and through all of this, Wireguard never seems to work. Any ideas on when this will be fixed?
I bought a subscription just to access japanese websites, as European IP addresses are rejected because of the privacy law.
Now, the website https://minkara.carview.co.jp/ is not accessible even with Surfshark, but it's reachable using other VPNs.
Any help, please? It's the same on both Windows and Android.
Out for the blue my internet connection seems to cut out when I’m connected through Surfshark. I didn’t change any settings and it seems to be irrelevant to what server I connect to, and doesn’t happen when I completely disconnect. I lose internet for 30-60 seconds , then the VPN symbol will pop up at the top of my phone and it re-establishes. Very annoying to have happen over and over. Any ideas? I messed with settings and reinstalled already with no luck. On latest IOS.
Now ive dealt with a lot of companies and subscriptions in my day, but this was worse than I thought once my wife brought up we were charged almost 200 dollars.
This is 2002 gym membership levels of whatthefuckery.
I'll probably get banned for this or somrthing, but it was absurd having this even happen.
So keep note folks, you will probably be charged prior to your actual auto renewal date, dont update your payment info, and disable the auto renewal feature unless you want some money to evaporate from your account for a week+
Did i do something wrong, dunno, maybe, but as a pretty technologically literate person it feels weird that this somehow happened to me, I could see a LOT of people having this happen to them if they pay off and cancel their credit card and not update their payment method until they are ready to renew.
Beware.
I signed up a couple years ago for the 2 year plan, went to update my stuff today and I thought to myself... I dont recall spending 150 bucks for this last time.
Been having issues with it not connecting and still allowing traffic through on my android, even with killswitch enabled so I was about to just say see ya.
So I hit the dont renew button, suddenly its offering me 2 years for 69 bucks.
So... if I had just been a good little soldier and clicked the button the first time I would have just been charged an extra almost 100 bucks for nothing?
Still renewed because of the lower price, but kinda sour about the fact that one extra click discounted me like 70%, like if i didn't, id be out a big chunk of change.
Very rogers/telus coded business, not a big fan there.
Hey everyone!
We partnered with master’s students from Malmö University who built a bot-detection game where 710 players had to spot AI-generated comments in a simulated social media feed. The game tested players across four topics, two neutral (data centers, pineapple on pizza) and two emotionally charged (immigration, women's rights).
Some highlights:
The game is still live if you want to test yourself: https://botornot.one/
Full study with methodology: https://surfshark.com/blog/bot-detection-experiment
How often do you engage with a comment before even considering it might not be a real person?
We've got some news we're genuinely excited about. Surfshark is now a supporting partner of Amnesty International's Digital Forensics Fellowship (DFF).
This program trains human rights defenders, activists, and journalists to analyze mobile devices, detect spyware, and investigate surveillance. The program launched after the Pegasus Project exposed how widely spyware was being used against civil society, and demand for this kind of training has only grown since.
Fellows learn real, hands-on forensics (Android, iOS, malware traffic analysis) and then bring that knowledge back to their communities. The 2026 edition is adding training on running secure helplines so organizations can receive and triage cases safely.
The answer is simple. Our goal has always been bigger than any single product. We want people to be secure in their digital lives, and that doesn't stop at what we build.
The DFF addresses something we can't do ourselves: training the people who investigate and respond when digital rights get violated. Better protection for the most at-risk users raises the bar for everyone. Research from civil society groups on surveillance campaigns creates awareness, drives policy changes, and pushes the whole industry forward.
Privacy isn't just a product category. It's a cause, and it takes more than one organization to protect it.
You can read more about the partnership here: https://surfshark.com/blog/surfshark-partners-with-amnesty-international
I'm using surfshark vpn all the way from china, and though surfshark works fine on iOS (ipad and iphone) prior to the Windows 6.9.0 update, I haven't had any issues. I managed to update it to 6.9.0, faced issues and learned about manual setup on windows. Basically, do I need to generate a new keypair everytime I wanna add a tunnel onto Wireguard? I followed the tutorial and pasted the public key under 'I have a key pair'. Tried to add it to wire guard and everytime it just faces an error. It worked when I generated new key pairs, but I saw online that I could reuse key pairs? Did I potentially do something wrong in the process or did I get confused halfway?
My vpn works, I'm just confused
is there anyway around sites knowing you are using a vpn and not allowing access?
As title says. Try to disconnect from the VPN and it simply won’t stop. Try to force quit the app, won’t let me. Only thing that allows me to stop this issue is having to reinstall surfshark every time I want to disconnect which defeats the purpose of having a disconnect button. Any help would be great.
I use a plex server and family shares on it. If I turn on the vpn plex remote share stops working. If I turn on the bypass feature to bypass plex, it still doesn’t work. The bypass seems to do nothing.
I get a "initial_request_failed" error message. I can connect to all the other IPs okay, just not my dedicated one. I am also talking via a browser extension (Opera). Windows 11.
Hey r/Surfshark,
We’ve recently announced Dausos, our new proprietary VPN protocol. Let’s break down the post-quantum security side of it specifically, since that’s where the most significant architectural decisions were made.
It refers to cryptographic algorithms designed to resist attacks from quantum computers. Most encryption in use today ,including the standards underpinning the majority of VPN protocols, relies on mathematical problems that classical computers can’t solve in any reasonable timeframe.
Quantum computers, once sufficiently powerful, will be able to solve some of those same problems orders of magnitude faster, effectively breaking the encryption. Post-quantum algorithms are built on different mathematical foundations that remain hard even for quantum hardware.
You might think that since quantum computers aren’t a threat just yet, post-quantum encryption is a problem for the future. But that’s not entirely true.
Sufficiently powerful quantum computers don’t exist yet, true — but the threat model doesn’t require them to. Scammers can collect and store encrypted traffic today, then decrypt it retroactively once quantum hardware catches up. VPN traffic isn’t immune to the risk, which is why waiting until quantum computers actually arrive is already too late.
Root CA with ML-DSA signing
We built a self-signed root certificate authority specifically for Dausos, using ML-DSA — NIST’s newly standardized post-quantum signature scheme. This secures the trust chain at the certificate layer: the system that signs and verifies communication channels is itself quantum-resistant. Most existing VPN implementations still rely on classical schemes like ECDSA or RSA at this layer. Applying a post-quantum signature algorithm with our own root CA is a meaningful architectural departure that future-proofs the verification layer, not just the data channel.
Hybrid key exchange: ML-KEM*X25519 (X25519MLKEM768)
For session key establishment, Dausos uses a hybrid construction combining X25519 (ECDH) with ML-KEM-768. The hybrid approach is deliberate: it doesn’t replace the classical primitive, it layers on top of it. That means if ML-KEM assumptions are ever found to be weaker than expected, security doesn’t regress — you still have X25519. So even if ML-KEM is deemed vulnerable, you will at least still retain some form of security. ML-KEM-768 is currently the leading NIST-recommended candidate for post-quantum key encapsulation across all use cases.
This information is, admittedly, not the easiest to grasp. Which is part of the reason it’s good — some of the security steps built into Dausos have never been used in a VPN protocol before.
If you missed the announcement, you can read the full Dausos introduction here. If you have any post-quantum questions, drop them below and I'll answer when I can.
I had my static purchased was changed with only a couple week's notice via marketing email sitting in the marketing bucket...
Surfshark is a great product but if you pay for a static IPs, there is a high risk you are not getting a static IP.. Its static until they make a technology change... So its a slightly more static IP than an internet service provider dynamic IP... LOL. If I had stumbled across this during my research there is 0% chance I would have used the product. So hoping to help someone out who is researching or using AI that will hopefully index this.
What's new on iOS?
You can download the new version via your App Store.
Give it a spin and tell us what you think! Your feedback helps us shape what comes next.
Paid for Dedicated IP and it failed about 7/8 weeks and and Chap at Surfshark was kind enough to fix it for me. Now this morning it FAILED again and help desk just replied "we are aware of a problem and fixing it.
Now whilst I understand that these things happen would it not be better for SurfShark to inform users there is a problem via whatever means (even here would be good) instead of users finding out firstly its failed without notice and secondly being told by a robot remotely it aware and then shuts off connection.....
Rant over..........
I was just overcharged by Surfshark by a year. I signed up about 27 months ago for a 24 month + 12 month plan with 3 months free only to be charged for another 12 months at the end of the 27 months.
I was able to get this resolved but it has left a sour taste in the mouth and I feel I should warn people to double check this so you don’t also get ripped off like I almost was.
Idk if I will continue my subscription with Surfshark next year at this stage. I’ll need to wait till I get confirmation of the money returning into my account, the support rep called it a “mistake from their end” and all I can think of is how many people did this mistake affect and how many people were issued refunds. I can Atleast say the ai chat bot was helpful for once directing me to a person immediately.
Edit: I just got email confirmation of the refund and it’s been confirmed by PayPal to be refunded. I still think you all should double check to see you too havent encountered this small “mistake”
Hey everyone! I'm Dr. Luís Costa, Surfshark's Research Lead. For those who don't know, we run data-driven studies on digital privacy, cybersecurity, and how tech affects everyday life.
Some of our recent work:
We're picking what to dig into next and want to hear from you! 🫵
What topic in online privacy, cybersecurity, or digital habits would you want to see us research? Could be something that bugs you, something you've been curious about, or a question you think nobody's actually answered with real data yet.
Throw your ideas below, nothing is off the table.
Anyone know actually how many connections you can have at one time?
I know it says unlimited but they have this bs fair usage policy.
I was blocked once and they say if it's blocked again they won't reopen.
Super irritating