The Volunteers Who Keep Myanmar's Internet Visible: OONI Data, Probe Deployment, and Why It Matters
Myanmar’s 13.4% internet anomaly rate is not a number that exists in nature. It exists because people chose to measure it — and kept measuring, year after year, at personal cost.
Since February 2021, the Myanmar military’s censorship apparatus has operated continuously: blocking independent media, filtering social platforms, applying deep packet inspection to VPN traffic, cutting entire regions off the network entirely. What allows that apparatus to be documented — precisely, reproducibly, with timestamps — is a global network of volunteers running free software on their devices. That software is OONI Probe. This is a guide to what it produces, what Myanmar’s data looks like today, and why the measurement infrastructure around it deserves more support than it currently receives.
What OONI Is, and Why the Architecture Matters
The Open Observatory of Network Interference is a nonprofit project under the Tor Project, founded in 2012 and currently maintaining what is probably the world’s largest open dataset of internet censorship measurements. As of 2026, the OONI database contains over one billion individual test results from more than 240 countries and territories, all published in near-real-time under a CC BY 4.0 open licence.
The measurement model is deliberately distributed. OONI runs no monitoring infrastructure inside the countries it studies. Instead, volunteers install OONI Probe and run tests from their own devices on their own networks. When Probe executes, it fetches a curated URL list — drawn from the Citizen Lab test lists, maintained collaboratively by researchers with country expertise — and compares what it observes against control measurements taken outside the country. DNS query results, TCP connection success or failure, HTTP response bodies and headers: every discrepancy is logged as an anomaly.
This architecture produces evidence with a specific evidentiary property: the measurement originates inside the network under scrutiny. An anomaly flagged by a probe in Mandalay reflects what a user in Mandalay actually experiences — not a simulation from outside the country, not a model. That is the standard that makes OONI data credible to UN Human Rights Council rapporteurs, referenced in Citizen Lab investigations, and cited by Access Now’s STOP Dataset researchers when cross-validating documented shutdowns.
It also means that the data has a hard constraint: it only covers networks where someone is running a probe.
Myanmar’s Current Data: What We See and What We Don’t
Bars = OONI anomaly rate · Teal line = Cloudflare Radar traffic index · updated daily
OONI CC BY 4.0 · CF Radar CC BY-NC 4.0 · updated 2026-04-29
Show data table
| Date | Anomaly rate | CF traffic | Measurements |
|---|---|---|---|
| 2026-03-31 | 17.1% | 55.2% | 1,582 |
| 2026-04-01 | 10.6% | 66.8% | 1,514 |
| 2026-04-02 | 11.5% | 70% | 1,968 |
| 2026-04-03 | 20.5% | 85.3% | 2,151 |
| 2026-04-04 | 15% | 90.4% | 466 |
| 2026-04-05 | 17.8% | 91.1% | 1,000 |
| 2026-04-06 | 8.9% | 91.3% | 800 |
| 2026-04-07 | 9.9% | 84.9% | 1,428 |
| 2026-04-08 | 8.8% | 86.2% | 1,147 |
| 2026-04-09 | 13.4% | 84.4% | 1,073 |
| 2026-04-10 | 7.3% | 86.1% | 1,857 |
| 2026-04-11 | 6.9% | 88% | 1,696 |
| 2026-04-12 | 10.1% | 87.3% | 1,646 |
| 2026-04-13 | 12.7% | 91.9% | 1,585 |
| 2026-04-14 | 18.2% | 89.2% | 2,845 |
| 2026-04-15 | 14.3% | 84.8% | 3,878 |
| 2026-04-16 | 15.5% | 90.2% | 2,567 |
| 2026-04-17 | 22% | 100% | 3,084 |
| 2026-04-18 | 12.1% | 97.7% | 3,909 |
| 2026-04-19 | 15.7% | 94.4% | 1,662 |
| 2026-04-20 | 9.8% | 89.7% | 1,219 |
| 2026-04-21 | 11.9% | 86.9% | 1,828 |
| 2026-04-22 | 16.7% | 89.1% | 1,308 |
| 2026-04-23 | 13% | 86.9% | 2,895 |
| 2026-04-24 | 14.4% | 85.9% | 3,851 |
| 2026-04-25 | 12.8% | 85.8% | 4,588 |
| 2026-04-26 | 13.7% | 93.1% | 4,473 |
| 2026-04-27 | 14.5% | 88.9% | 5,276 |
| 2026-04-28 | 14.8% | — | 7,522 |
| 2026-04-29 | 14.3% | — | 7 |
The 30-day signal chart above shows Myanmar’s current OONI anomaly rate alongside Cloudflare Radar traffic. The picture is consistent: anomaly rates have held between 12% and 17% throughout April 2026, with no sharp departures in either direction. On April 27 alone, probes logged 5,276 measurements across Myanmar networks — 14.5% returned anomalies, 61 were confirmed blocks.
This stability is not a sign of improvement. It is the signature of censorship that has become structural. Myanmar’s junta no longer issues emergency block orders against specific news events; those blocks are already in place, applied at the network layer, and maintained continuously by ISPs operating under military directive. The 2025–26 election period produced no measurable anomaly spike precisely because the information environment was already comprehensively controlled before the first ballot was cast.
Share of measurements per outcome · last 26 weeks · distinguishes confirmed blocks from unverified anomalies
Show data table
| Week | Confirmed % | Anomaly % | Failure % | OK % | Total |
|---|---|---|---|---|---|
| 2025-11-02 | 1% | 23.9% | 3.5% | 71.5% | 7,483 |
| 2025-11-09 | 0.8% | 22.4% | 3.6% | 73.2% | 8,521 |
| 2025-11-16 | 0.5% | 24.1% | 3.3% | 72.1% | 7,275 |
| 2025-11-23 | 1.2% | 19.3% | 6.7% | 72.8% | 3,765 |
| 2025-11-30 | 1.1% | 26% | 3.1% | 69.8% | 3,532 |
| 2025-12-07 | 0.8% | 20% | 5.8% | 73.4% | 6,378 |
| 2025-12-14 | 0.7% | 19.5% | 3.2% | 76.6% | 6,116 |
| 2025-12-21 | 0.8% | 16.7% | 3.5% | 79% | 5,124 |
| 2025-12-28 | 0.7% | 14.7% | 6.1% | 78.6% | 6,192 |
| 2026-01-04 | 0.1% | 18.9% | 3.4% | 77.6% | 12,415 |
| 2026-01-11 | 1.1% | 21.1% | 3.3% | 74.5% | 8,045 |
| 2026-01-18 | 0.1% | 20.7% | 4.7% | 74.5% | 31,674 |
| 2026-01-25 | 0.5% | 22% | 3.4% | 74.2% | 13,370 |
| 2026-02-01 | 0.8% | 17.6% | 4% | 77.6% | 11,052 |
| 2026-02-08 | 2.8% | 17% | 6.1% | 74.1% | 7,687 |
| 2026-02-15 | 1.5% | 17.4% | 3.6% | 77.5% | 13,137 |
| 2026-02-22 | 1% | 12.1% | 16.3% | 70.6% | 11,845 |
| 2026-03-01 | 2.1% | 9.4% | 11.1% | 77.5% | 8,921 |
| 2026-03-08 | 3% | 13.2% | 3.6% | 80.1% | 2,084 |
| 2026-03-15 | 0.9% | 13.5% | 4% | 81.6% | 7,293 |
| 2026-03-22 | 1.4% | 11.9% | 3.6% | 83.1% | 8,645 |
| 2026-03-29 | 0.9% | 15.5% | 3.5% | 80.1% | 10,186 |
| 2026-04-05 | 0.4% | 9.9% | 3.2% | 86.5% | 9,001 |
| 2026-04-12 | 0.3% | 15.3% | 4.8% | 79.6% | 19,514 |
| 2026-04-19 | 0% | 13.4% | 3.5% | 83% | 17,351 |
| 2026-04-26 | 0.6% | 14.4% | 3.5% | 81.5% | 17,272 |
The weekly breakdown extends the picture over the past six months. Three patterns are visible. First, measurement volume has grown — a positive signal reflecting increased probe deployment or more active existing probes. Second, the anomaly rate has been remarkably stable in the 12–16% band since mid-2025, after a period of elevated readings (up to 32.3% in August 2024) that correlated with the military’s intensified offensives in Shan and Rakhine States. Third, confirmed blocks — measurements where the block itself can be technically verified, not just flagged as anomalous — represent a consistent but small share of anomalies, reflecting the difficulty of definitively attributing interference at scale.
OONI anomaly rate by domain · Jan 2024 – Apr 2026 · top 12 most-blocked sites
The blocked sites chart shows where the blocks fall. Facebook, which functions as Myanmar’s de facto public square and primary news distribution channel, returns an 89% OONI anomaly rate — effectively inaccessible on Myanmar’s major ISPs without circumvention tools. Independent news outlets including The Irrawaddy, Myanmar Now, Mizzima, and DVB each return 66–78% anomaly rates. VPN and circumvention services — the standard route around content blocks — are themselves blocked at 69–87% rates under the 2025 Cybersecurity Law.
These numbers represent what probes can see. They do not represent the full censorship picture. Of Myanmar’s 330 townships, over 130 were under communications blackout as of late 2025, with mobile and internet services cut at the physical infrastructure level by military order. Those populations produce no OONI measurements. The anomaly rate for Myanmar as a whole therefore understates the actual information environment experienced by the country’s population, particularly in conflict-affected regions in Shan, Kayah, Kachin, and Rakhine States.
The Global Picture and Where Myanmar Fits
OONI’s measurement coverage varies enormously by country — not because some countries have more censorship, but because some countries have more probe operators. Russia, Iran, Venezuela, and Cuba have dense, long-running OONI coverage built up over years of civil society investment. That coverage has made it possible to document the precise timing of election-day blackouts (Russia 2024, Venezuela 2024), correlate network-layer shutdowns with military operations (Iran 2019, 2022), and provide the evidentiary basis for UN-level accountability processes.
Myanmar has meaningful coverage in Yangon and several major urban centres. Its rural townships — where the military’s most severe network disruptions have occurred — are chronically under-measured. The OONI record of Myanmar’s post-coup internet environment is already one of the most detailed such records in existence for a country in active armed conflict. Making it more complete is a tractable problem: it requires more probe operators on more diverse networks across more regions.
Globally, OONI data has been used in legally significant ways that extend well beyond monitoring dashboards. The dataset has been cited in UN Human Rights Council reports on digital rights in conflict zones. It underpins Access Now’s KeepItOn campaign’s verification methodology for shutdown events. It has contributed to Citizen Lab investigations into ISP-level blocking of civil society platforms in over a dozen countries. As international mechanisms for accountability mature, digital evidence — including internet measurement data — is increasingly being treated as admissible documentation of state behavior. The OONI archive is a record. What it contains in five years is partly determined by what volunteers contribute today.
How to Contribute — With an Explicit Note on Risk
If you are outside Myanmar — in the diaspora, in a neighboring country, or anywhere with a stable internet connection — installing OONI Probe is low-risk and takes under five minutes. The mobile app runs on Android and iOS. The desktop app runs on Windows, macOS, and Linux. Probes running from outside Myanmar do not measure Myanmar’s censorship directly, but they contribute to the global dataset that provides the comparison baseline making Myanmar’s anomalies detectable. They also contribute measurement coverage in your own country, which has independent value.
If you are a researcher with access to Myanmar networks — whether physically present or using a VPN in a direction that passes through Myanmar-based infrastructure — even limited measurements add precision to the record. OONI Probe can be configured for single-run operation, minimising on-network exposure time.
If you are currently inside Myanmar: Running OONI Probe carries real risk. Network operators and intelligence agencies can observe connections to OONI’s collector infrastructure. The test lists include politically sensitive URLs, and the 2025 Cybersecurity Law creates broad criminalization risk for actions that could be characterized as “opposing” state communications control. We do not recommend running OONI Probe from inside Myanmar without reading the full OONI risk documentation and making an informed personal decision about that risk.
For Myanmar readers who want to contribute to internet freedom documentation without running active probes: sharing verified information about blocked services through secure channels, supporting Access Now’s Digital Security Helpline, and contributing to the Citizen Lab test lists via GitHub are all meaningful forms of participation that carry lower risk profiles.
Why This Infrastructure Will Matter More, Not Less
Two structural trends make OONI’s measurement network more important in the years ahead.
The first is the evolution of censorship technology. Myanmar’s February 2026 Cloudflare Radar spike — a sustained jump from 37% to 93–100% of historical traffic peak that has held for over two months — is consistent with the activation of centralized routing infrastructure modelled on China’s Great Firewall, following the September 2025 exposure of the junta’s collaboration with Geedge Networks, a Chinese firm with links to the Chinese government. Infrastructure of this kind implements deep packet inspection and machine-learning traffic classifiers that can identify and block circumvention tools without relying on static URL blocklists. These systems are harder to fingerprint with standard URL-based testing, and OONI’s research team is actively developing new test types to detect them — but those tests require dense probe networks to produce statistically valid results. Sparser coverage means slower detection of new censorship methods.
The second is the evidentiary standard for accountability. Formal international processes — UN inquiry panels, tribunal proceedings, sanctions designations — increasingly require systematic, technically documented evidence of state behavior, not just eyewitness testimony. Internet measurement data that is timestamped, independently replicable, and publicly archived under an open licence meets that standard in ways that informal reports do not. The OONI record of Myanmar’s post-coup internet environment is already being treated as that kind of evidence. What is in the archive when accountability processes eventually mature is in part what volunteers choose to document now.
Myanmar’s anomaly rate in five years will reflect two things: what the junta chooses to do, and whether anyone was measuring. The second is the variable that is within reach.
Key Findings
-
Myanmar’s ambient censorship has stabilized, not improved. A 12–16% anomaly rate held throughout the first quarter of 2026 reflects institutionalised filtering, not episodic disruption. The blocks are structural infrastructure, not emergency orders.
-
Facebook — Myanmar’s primary political communication platform — is effectively inaccessible on major ISPs, returning an 89% OONI anomaly rate. Independent news outlets face 66–78% block rates at the network layer.
-
Circumvention is also blocked. VPN and circumvention services return 69–87% anomaly rates under the 2025 Cybersecurity Law, closing the standard escape route used by internet users who want to reach blocked content.
-
Measurement coverage understates reality. Over 130 townships under active communications blackout produce zero OONI measurements. The aggregate anomaly rate covers only the parts of the country where probes operate.
-
OONI data has a policy and legal footprint. It has been cited in UN Human Rights Council reports, used to verify KeepItOn shutdown records, and treated as primary evidence in Citizen Lab investigations. Its value as documentation grows as accountability mechanisms develop.
-
The February 2026 routing shift signals qualitative change. A sustained 93–100% Cloudflare Radar traffic level over two months is consistent with centralised routing infrastructure — a structural shift from targeted URL blocking to network-layer control.
Methodology & Limitations
OONI Web Connectivity measurements are collected by volunteers running OONI Probe. The probe compares DNS, TCP, and HTTP results against control measurements taken outside Myanmar; discrepancies are classified as anomalies. We aggregate at daily and monthly granularity. Limitations: probe density in Myanmar has declined since the 2021 coup as digital security risks have increased; townships under communications blackout produce no measurements; anomaly rates therefore underrepresent censorship in conflict zones. A measurement flagged as an anomaly is not necessarily a confirmed block — confirmed blocks require corroborating evidence.
Full methodology is documented on the Shutdown Tracker and the Observatory data page.
Researcher Data Downloads
The datasets underlying this article are available for download and reuse under open licences.
| Dataset | Format | Description |
|---|---|---|
| OONI Timeseries | CSV | Monthly anomaly rates, February 2021 – present |
| Blocked Sites Database | CSV | Confirmed blocked domains with OONI anomaly rates |
| Verified Shutdowns | CSV | KeepItOn-verified shutdown events, normalized |
| Unified Events | JSON | All sources merged and cross-validated |
Please cite as: Internet in Myanmar Observatory, internetinmyanmar.com. OONI data published under CC BY 4.0.
Data & Sources
Download the full underlying datasets from the Observatory data page. For real-time network status — BGP routing visibility across 130+ Myanmar autonomous systems — see the BGP Observatory. For the full five-year censorship timeline, see the Shutdown Tracker.
Sources
Sacha Nakeo is a journalist specializing in Myanmar's media landscape, digital rights, and internet freedom. She has closely followed the military junta's systematic censorship of online information since the 2021 coup.