Skip to main content
Blog
Blog

Utah SB 73: You Are Now Liable for Your Users' VPNs

Utah is the first US state to hold operators responsible when users use VPNs to bypass age verification. An IP blocklist cannot solve this. Here is what actually works.

May 05, 2026 7 min read
Mike Kutlu
Mike Kutlu Author
Utah SB 73: You Are Now Liable for Your Users' VPNs

Utah's Senate Bill 73 went into effect in May 2026, making it the first US state to hold website operators responsible when users use a VPN or proxy to bypass age verification checks. The law does not target VPN providers. It targets you, the operator, and it does not accept "they used a VPN" as a defence.

NordVPN described the law as "an unresolvable compliance paradox." The Electronic Frontier Foundation called it "a technical whack-a-mole that likely no company can win." Both are describing the same problem: traditional VPN detection does not work well enough to satisfy a per-violation liability standard.

This is what cside's VPN detection was built for.

What Utah SB 73 actually requires

Quick Answer: Utah SB 73 requires operators of sites with content harmful to minors to treat physically located Utah users as Utah-based, regardless of whether those users route traffic through a VPN, proxy, or any other location-masking tool. Operators remain liable for access that occurs through a masked connection. The law also prohibits operators from publishing instructions on how to use VPNs to bypass their own age gates.

The law amends Utah's existing age-verification requirements for sites with a "substantial portion of material harmful to minors." The core addition is a deemed-location rule: a user physically inside Utah is legally a Utah user even if their device presents a non-Utah IP address.

That single rule shifts the compliance problem entirely. Previously, the question was whether you had an age gate. Now the question is whether your age gate works against users who are actively trying to defeat it. A static blocklist of known VPN exit nodes answers neither question reliably.

The law also prohibits operators from sharing instructions that would help users bypass the age gate. Publishing a help article that mentions VPNs in the context of access control is now a separate liability risk.

Why an IP blocklist cannot solve this

Quick Answer: Static VPN blocklists fail because commercial VPN providers rotate IP ranges faster than any list can be updated, residential proxy services route traffic through real consumer IPs that never appear on blocklists, and new VPN services are launched daily. A blocklist approach is reactive by definition. Utah SB 73 requires detection that works on unknown VPN services, not just catalogued ones.

The VPN industry operates on scale. Major providers rotate millions of IP addresses across thousands of exit nodes. Residential proxy networks are harder still: they route traffic through IP addresses assigned to real household broadband connections, which are indistinguishable from legitimate users by IP address alone.

Static blocklists were barely adequate when VPN use was a niche behaviour. They are not adequate now. After Florida's HB3 took effect in November 2025, VPN usage spiked sharply among the exact population the law was designed to gate, as users sought workarounds. Utah operators should expect the same pattern.

The technical critique from both the EFF and NordVPN is correct in one sense: you cannot win a blocklist war. The answer is to stop fighting it on IP addresses.

The growing wave of state age-verification laws

Quick Answer: Utah SB 73 is the third major US state age-verification law to create operator liability, following Texas HB1181 (upheld by the Supreme Court in June 2025) and Florida HB3 (enforcement began November 2025). More than 25 US states have enacted or are advancing age-verification requirements. The trend is consistent: legislators are moving from "build a gate" to "the gate must actually work."

Texas HB1181 requires commercial sites where more than one-third of content is "sexual material harmful to minors" to verify users are 18 or older. The US Supreme Court upheld the law on June 27, 2025 in Free Speech Coalition, Inc. v. Paxton, confirming that age-verification mandates for adult content are constitutionally permissible.

Florida HB3 restricts minors under 14 from creating accounts on covered platforms, requires parental consent for 14- and 15-year-olds, and mandates age verification for access to harmful material. The Eleventh Circuit Court of Appeals lifted an injunction on November 25, 2025, allowing full enforcement to proceed.

Utah SB 73 goes further than either of its predecessors. Texas and Florida create liability for sites that fail to age-gate. Utah creates liability for sites whose age gates are bypassed, including through tools the user controls. That is a materially different compliance standard.

The direction of travel is clear. Legislators are not satisfied with gates that sophisticated users can route around. Operators who relied on a simple IP check or a blocklist will need to revisit their approach.

What behavioural VPN detection looks like

Quick Answer: Behavioural VPN detection analyses how a user accesses a site rather than simply checking their IP address against a known-VPN list. It examines network-level signals, behavioural patterns, and device consistency across requests to identify VPN and proxy usage even from services not yet catalogued in any blocklist. cside processes more than 100 million requests per day, building the pattern recognition that makes this approach work at scale.

The core insight is that VPN and proxy traffic has consistent behavioural signatures that persist even when IP addresses change. Traffic routed through a VPN behaves differently from organic user traffic at the network level: routing path characteristics, latency patterns, and the relationship between stated and actual device attributes all carry signal.

Residential proxy traffic is harder to detect on IP alone, but not on behaviour. A residential proxy session still exhibits the asymmetries that come from being relayed: timing behaviour, device fingerprint consistency, and session pattern characteristics that differ from a user on their own broadband connection.

cside's VPN detection identifies this traffic across both commercial VPN services and residential proxies, including services not yet in any published blocklist. When a detection fires, operators choose the response: block the session outright, require additional verification such as a CAPTCHA or 2FA step before granting access, or log the detection for compliance audit purposes without interrupting the user.

That last option matters for liability documentation. Utah SB 73, like Texas HB1181, creates per-violation risk. Operators who can demonstrate a good-faith detection-and-response programme are in a materially different position than operators who cannot.

What operators should do now

Quick Answer: Operators running age-gated content in any US state should audit their current VPN detection approach against a simple test: does it work against residential proxies and new VPN services, or only against catalogued exit nodes? If the answer is the latter, it will not satisfy a state law that holds you liable for bypassed access. Replace or supplement static blocklists with behavioural detection before the next enforcement cycle begins.

Start with an audit of your current setup:

  • Does your age-verification flow check IP against a blocklist, or does it analyse session behaviour?
  • Are you logging VPN detections in a format that creates a compliance audit trail?
  • If a user bypasses your gate through a residential proxy, does your system detect it?
  • Are you running any content on your site that explains VPN access workarounds?

If the answer to the last question is yes, remove it. Utah SB 73 explicitly prohibits operators from publishing guidance that facilitates bypass.

For the others, the honest answer for most blocklist-based setups is that residential proxies and newly launched VPN services will not be caught. That is the gap behavioural detection closes.

Bottom line

Utah SB 73 changes the compliance question from "do you have an age gate" to "does your age gate actually work against users who try to bypass it." An IP blocklist answers the first question. It does not answer the second.

Behavioural VPN detection is the approach that does. If you are running age-gated content in any US state, now is the time to audit whether your current detection will satisfy a per-violation liability standard.

See how cside's VPN detection works or book a demo to see it against your traffic.

Mike Kutlu
Author Mike Kutlu

Client-side security consultant at cside. 10+ years of experience implementing technology solutions for enterprises (previously at Oracle, Cloudflare, and Splunk). Now helping teams use client-side intelligence to catch & reduce fraud.

FAQ

Frequently Asked Questions

Utah Senate Bill 73 is a 2026 law that amends the state's online age-verification requirements. It holds website operators liable when users physically located in Utah access age-gated content through a VPN or proxy. The user's IP address does not matter; physical location in Utah makes the operator responsible regardless of how the user routes their traffic.

VPN providers and critics use that phrase because VPN tools are specifically designed to make users undetectable by IP address. A static blocklist of known VPN exit nodes cannot keep pace with providers who rotate millions of IPs. The law is not paradoxical if you detect VPNs through behaviour rather than IP catalogues, but it cannot be solved with a list alone.

Texas and Florida create liability for operators who fail to implement age verification. Utah creates an additional liability layer: if a user bypasses your age gate using a VPN, you are still responsible. It is the difference between requiring a lock on a door and requiring that the lock actually keep people out.

Options depend on your risk posture. You can block access entirely for detected VPN sessions, require step-up verification before granting access, or log the detection for a compliance audit trail without interrupting the user. cside supports all three response modes and allows operators to configure them per content type or jurisdiction.

Yes. Residential proxy traffic routes through real consumer IP addresses that never appear on VPN blocklists. cside's behavioural approach detects the session-level characteristics of proxied traffic regardless of the IP address assigned to it, covering both commercial VPN exit nodes and residential proxy services.

Monitor and Secure Your Third-Party Scripts

Gain full visibility and control over every script delivered to your users to enhance site security and performance.

Start free, or try Business with a 14-day trial.

cside dashboard interface showing script monitoring and security analytics
Related Articles
Book a demo