February 26, 2026

Security Protocol Update: Phasing Out TLS 1.0 and 1.1

To ensure we provide the most robust protection against evolving threats, we are upgrading our network security configuration.

Starting April 2026, we will be deprecating support for legacy TLS 1.0 and 1.1 protocols and adopting CNSA 2.0 cryptographic algorithms across our APIs and web app.

After this date, all API requests must use at least TLS 1.2. Using at least TLS 1.2 is a recommended security best practice to improve data integrity and maintain compliance with industry standards.

Updated TLS Protocols Support

TLS Protocol VersionSupport StatusNotes
TLS 1.0❌ DisabledNo longer supported
TLS 1.1❌ DisabledNo longer supported
TLS 1.2✅ EnabledMinimum supported version
TLS 1.3✅ EnabledPreferred where available

Updated Mixpanel Cipher Suite Support by TLS version

Mixpanel will also mirror the commonly accepted standards for TLS 1.2 and TLS 1.3 Cipher Suite compatibility, as listed in this external resource.

TLS Version✅ Supported Cipher Suite
v1.2TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
v1.3TLS_AES128_GCM_SHA256
TLS_AES256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256

What’s the impact of this change?

Any data sent to Mixpanel’s Ingestion API endpoints after April 1, 2026 via TLS 1.0 and 1.1 will not be accepted, meaning you will not receive analytics information from users who engage with your applications using the 1.0 and 1.1 versions of TLS.

While the vast majority of modern traffic uses TLS 1.2 or 1.3, data can be sent to Mixpanel via TLS 1.0 and 1.1 when end-users access your application from older browsers or devices with operating systems that don’t support or enforce modern TLS versions.

Commonly Affected Examples

The following browsers and OS may still use TLS 1.0 or 1.1:

CategoryImpacted Versions / EnvironmentsExamples & Notes
MobileAndroid < 5.0 (pre-Lollipop)2012 Samsung Galaxy S4
iOS < 92010 iPhone 4
Desktop OSWindows XP, Vista, early Windows 7Without critical security updates
macOS < 10.9Legacy Apple systems
Browsers / RuntimesInternet Explorer ≤ 10
Firefox < 78
Chrome < 84
Java 6 / early Java 7
Python < 2.7.9OpenSSL without TLS 1.2 support
Old OpenSSL versions (< 1.0.1)
Embedded / IoTLegacy firmwareHardcoded TLS stacks / Non-upgradable
Protocol SpecificDevices supporting only SSLv3 / TLS 1.0

Please Note: While we’ve listed some common versions above, compatibility can vary. For example, Chrome 30-32 started supporting TLS 1.2.

For a comprehensive list of environments that may still use TLS 1.0/1.1, we recommend visiting the Browser/OS Official Documentation or referring to the TLS Support Version History (External Resource).

How to identify affected users

More than 99% of Mixpanel Web and API Traffic use TLS 1.2+; however, to assess how many users are potentially affected by this change in your projects:

  1. In an Insights report, select All Events as the primary metric
  2. Break down by the following properties, depending on your tracking SDK(s)
    • JavaScript (Web): Browser ($browser) and Browser Version ($browser_version)
    • Mobile: Operating System ($os), OS Version ($os_version)

Tip: You can create a Custom Property to quickly bucket users. For example, the following Custom Property can help check against Chrome and Firefox.

Custom Prop Example

  • Client-Side Tracking: Where possible, we recommend encouraging users to update their browsers or OS to a version that communicates using TLS 1.2+.
  • Server-Side Tracking: Verify your server environments are configured to use TLS 1.2+.
  • Protocol Migration: If your application currently utilizes legacy TLS versions, we recommend deprecating them in favor of TLS 1.2+ to ensure long-term security and compatibility.
  • Proxying: We understand that some devices have hardware/software limitations that may not be able to use TLS 1.2+. In these cases, if you would like to maintain tracking for these devices, you could consider implementing a proxy server that accepts TLS 1.0/1.1 from end users and forwards the tracking data to Mixpanel Ingestion APIs via TLS 1.2+.

Support & Inquiries

We have notified users whose projects were detected receiving legacy TLS 1.0/1.1 Ingestion traffic. If you have questions about your project’s compatibility or need general assistance, please reach out to Mixpanel Support.

For technical questions about TLS protocols or broader security questions, please contact our GRC Team at grc@mixpanel.com.

Was this page useful?