|Original author(s)||Adam Fisk|
6.8.10 / 22 September 2021
|Operating system||Linux, OS X, Windows, Android|
|Type||Internet censorship circumvention|
|License||Apache License 2.0|
Lantern is a free[a] peer-to-peer internet censorship circumvention tool, used for casual web browsing. It provides a way to bypass state-sanctioned filtration through a network of trusted users, but it's not an anonymity tool like Tor. Using Lantern, users in countries having free internet access can share their bandwidth with those who are in countries where the network is partly blocked. Network connections will be dispersed between multiple computers running Lantern so it will not put undue stress on a single connection or computer.
Lantern's CEO and lead developer is Adam Fisk, a former lead engineer of LimeWire and LittleShoot.
In early December 2013, Lantern had a surge of Chinese users and could reach from 200 users to 10,000 users in just two weeks. Soon after that, the network was almost blocked by the Chinese government. Another surge occurred after the 2022 Russian invasion of Ukraine when internet freedoms in Russia were severely curtailed. 
The software is financed by US$2.2 million (HK$17.1 million) seed funding by the US State Department.
Lantern is partially hosted on DigitalOcean's infrastructure, which was briefly reported as blocked in Iran during the civil unrest on January 2, 2018.
In early versions, Lantern's framework required the use of Google Talk for users to invite other trusted users from their Google Talk contacts. It's financed through US Department of State seed funding. These have raised some concerns about privacy of users, though Fisk has said the State Department is "incredibly hands off" and never dictates how they should write Lantern, or how they should talk about it.
Users are not required to connect by invite since version 2.0 was released in 2015.
(We may share information...) With vendors, consultants, marketing partners, and other service providers who need access to such information to carry out work on our behalf
Since Lantern operates at the routing layer of the TCP/IP stack, content blockers like uBlock Origin, Pi-hole that operate at the application layer remain ineffective in preventing data collection Lantern may engage in.
Lantern may use data they collect for advertisements and possibly share them with third-parties.
Personalize and improve the Services, including to provide or recommend features, content, social connections, referrals, and advertisements.
Lantern isn't a no logs VPN service, and so, it can be critiqued that it isn't an effective anti-censorship tool.
Device Information: We may collect information about your mobile device, including, for example, the hardware model, operating system and version, software and file names and versions, preferred language, unique device identifier, advertising identifiers, serial number, device motion information, and mobile network information. Log Information: When you interact with the Services, we collect server logs, which may include information like device IP address, access dates and times, app features or pages viewed, app crashes and other system activity, type of browser, and the third-party site or service you were using before interacting with our Services.
Lantern isn't an anonymity network like Tor, in fact it does claim to collect personally identifiable information that may be subject to disclosure to the governments the countries they operate in.
We may transfer the information described in this Statement to, and process and store it in, the United States and other countries, some of which may have less protective data protection laws than the region in which you reside.
At the beginning of 2019, it was reported that the Guangdong police had imposed penalties on the basis of the "Interim Provisions on the Administration of the International Network of Computer Information Network of the People's Republic of China" for a Lantern user to "create and use illegal channels for international networking." The fine is a thousand Yuan. The document of the punishment was publicized on the “Guangdong Public Security Law Enforcement Information Disclosure Platform”.[non-primary source needed]
In March of 2022 it was reported that Russian users were employing Lantern to bypass censorship measures put in place by the Russian government.