Tech
Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect data from attack
It’s a sunny June day in southeast England. I’m driving along a quiet, rural road that stretches through the Kent countryside. The sun flashes through breaks in the hedgerow, offering glimpses of verdant crop fields and old farmhouses.
Thick hawthorn and brambles make it difficult to see the 10ft-high razor-wire fence that encloses a large grassy mound. You’d never suspect that 100ft beneath the ground, a hi-tech cloud computing facility is whirring away, guarding the most valuable commodity of our age: digital data.
This subterranean data center is located in a former nuclear bunker that was constructed in the early 1950s as a command-and-control center for the Royal Air Force’s radar network. You can still see the decaying concrete plinths that the radar dish once sat upon. Personnel stationed in the bunker would have closely watched their screens for signs of nuclear missile-carrying aircraft.
After the end of the cold war, the bunker was purchased by a London-based internet security firm for use as an ultra-secure data center. Today, the site is operated by the Cyberfort Group, a cybersecurity services provider.
I’m an anthropologist visiting the Cyberfort bunker as part of my ethnographic research exploring practices of “extreme” data storage. My work focuses on anxieties of data loss and the effort we take—or often forget to take—to back-up our data.
As an object of anthropological inquiry, the bunkered data center continues the ancient human practice of storing precious relics in underground sites, like the tumuli and burial mounds of our ancestors, where tools, silver, gold and other treasures were interred.
The Cyberfort facility is one of many bunkers around the world that have now been repurposed as cloud storage spaces. Former bomb shelters in China, derelict Soviet command-and-control centers in Kyiv and abandoned Department of Defense bunkers across the United States have all been repackaged over the last two decades as “future-proof” data storage sites.
I’ve managed to secure permission to visit some of these high-security sites as part of my fieldwork, including Pionen, a former defense shelter in Stockholm, Sweden, which has attracted considerable media interest over the last two decades because it looks like the hi-tech lair of a James Bond villain.
Many abandoned mines and mountain caverns have also been re-engineered as digital data repositories, such as the Mount10 AG complex, which brands itself as the “Swiss Fort Knox” and has buried its operations within the Swiss Alps.
Cold war-era information management company Iron Mountain operates an underground data center 10 minutes from downtown Kansas City and another in a former limestone mine in Boyers, Pennsylvania.
The National Library of Norway stores its digital databanks in mountain vaults just south of the Arctic Circle, while a Svalbard coal mine was transformed into a data storage site by the data preservation company Piql. Known as the Arctic World Archive (AWA), this subterranean data preservation facility is modeled on the nearby Global Seed Vault.
Just as the seeds preserved in the Global Seed Vault promise to help re-build biodiversity in the aftermath of future collapse, the digitized records stored in the AWA promise to help re-boot organizations after their collapse.
Bunkers are architectural reflections of cultural anxieties. If nuclear bunkers once mirrored existential fears about atomic warfare, then today’s data bunkers speak to the emergence of a new existential threat endemic to digital society: the terrifying prospect of data loss.
Data, the new gold?
After parking my car, I show my ID to a large and muscular bald-headed guard squeezed into a security booth not much larger than a payphone box. He’s wearing a black fleece with “Cyberfort” embroidered on the left side of the chest. He checks my name against today’s visitor list, nods, then pushes a button to retract the electric gates.
I follow an open-air corridor constructed from steel grating to the door of the reception building and press a buzzer. The door opens on to the reception area: “Welcome to Cyberfort,” receptionist Laura Harper says cheerfully, sitting behind a desk in front of a bulletproof window which faces the car park. I hand her my passport, place my bag in one of the lockers, and take a seat in the waiting area.
Big-tech pundits have heralded data as the “new gold”—a metaphor made all the more vivid when data is stored in abandoned mines. And as the purported economic and cultural value of data continues to grow, so too does the impact of data loss.
For individuals, the loss of digital data can be a devastating experience. If a personal device should crash or be hacked or stolen with no recent back-ups having been made, it can mean the loss of valuable work or cherished memories. Most of us probably have a data-loss horror story we could tell.
For governments, corporations and businesses, a severe data loss event—whether through theft, erasure or network failure—can have a significant impact on operations or even result in their collapse. The online services of high-profile companies like Jaguar and Marks & Spencer have recently been impacted by large-scale cyber-attacks that have left them struggling to operate, with systems shutdown and supply chains disrupted.
But these companies have been comparatively lucky: a number of organizations had to permanently close down after major data loss events, such as the TravelEx ransomware attack in 2020, and the MediSecure and National Public Data breaches, both in 2024.
With the economic and societal impact of data loss growing, some businesses are turning to bunkers with the hope of avoiding a data loss doomsday scenario.
The concrete cloud
One of the first things visitors to the Cyberfort bunker encounter in the waiting area is a 3ft cylinder of concrete inside a glass display cabinet, showcasing the thickness of the data center’s walls. The brute materiality of the bunkered data center stands in stark contrast to the fluffy metaphor of the “cloud,” which is often used to discuss online data storage.
Data centers, sometimes known as “server farms,” are the buildings where cloud data is stored. When we transfer our data into the cloud, we are transferring it on to servers in a data center (hence the meme “there is no cloud, just someone else’s computer”).
Data centers typically take the form of windowless, warehouse-scale buildings containing hundreds of servers (pizza box-shaped computers) stored in cabinets that are arranged in aisles.
Data centers are responsible for running many of the services that underpin the systems we interact with every day. Transportation, logistics, energy, finance, national security, health systems and other lifeline services all rely on up-to-the-second data stored in and accessed through data centers.
Everyday activities such as debit and credit card payments, sending emails, booking tickets, receiving text messages, using social media, search engines and AI chatbots, streaming TV, making video calls and storing digital photos all rely on data centers.
These buildings now connect such an incredible range of activities and utilities across government, business and society that any downtime can have major consequences. The UK government has officially classified data centers as forming part of the country’s critical national infrastructure—a move that also conveniently enables the government to justify building many more of these energy-guzzling facilities.
As I sit pondering the concrete reality of the cloud in Cyberfort’s waiting area, the company’s chief digital officer, Rob Arnold, emerges from a corridor. It was Arnold who arranged my visit, and we head for his office—through a security door with a biometric fingerprint lock—where he talks me through the logic of the bunkered data center.
“The problem with most above-ground data centers is they are often constructed quickly, and not built to withstand physical threats like strong winds, car bombs or server theft from breaking and entering.” Arnold says that “most people tend to think of the cyber-side of data security—hackers, viruses and cyber-attacks—which dangerously overlooks the physical side.”
Amid increasing geopolitical tension, internet infrastructure is now a high-value target as “hybrid” or “cyber-physical” sabotage (when cyber-attacks are combined with physical attacks) becomes increasingly common.
The importance of physical internet security has been highlighted by the war in Ukraine, where drone strikes and other attacks on digital infrastructure have led to internet shutdowns. While precise details about the number of data centers destroyed in the conflict remain scant, it has been observed that Russian attacks on local data centers in Ukraine have led many organizations to migrate their data to cloud facilities located outside of the conflict zone.
Bunkers appeal to what Arnold calls “security-conscious” clients. He says, “It’s difficult to find a structure more secure than a bunker”—before adding dryly: “The client might not survive the apocalypse, but their data will.”
Cyberfort specializes in serving regulated industries. Its customer base includes companies working in defense, health care, finance and critical infrastructure. “Our core offering focuses on providing secure, sovereign and compliant cloud and data-center services,” Arnold explains in a well-rehearsed sales routine. “We do more for our customers than just host systems—we protect their reputations.”
Arnold’s pitch is disrupted by a knock at the door. The head of security (who I’m calling Richard Thomas here) enters—a 6ft-tall ex-royal marine wearing black cargo trousers, black combat boots and a black Cyberfort-branded polo shirt. Thomas is going to show me around the facility today.
The entrance to the bunker is located up a short access road. Engineered to withstand the blast and radiation effects of megaton-level thermonuclear detonations, this cloud storage bunker promises its clients that their data will survive any eventuality.
At the armor-plated entrance door, Thomas taps a passcode into the electronic lock and swipes his card through the access control system. Inside, the air is cool and musty. Another security guard sits in a small room behind bulletproof plexiglass. He buzzes us through a metal mantrap and we descend into the depths of the facility via a steel staircase, our footsteps echoing in this cavernous space.
The heavy blast doors and concrete walls of the bunker appear strangely at odds with the virtual “walls” we typically associate with data security: firewalls, anti-virus vaults, and spyware and spam filters. Similarly, the bunker’s military logics of enclosure and isolation seem somewhat outdated when faced with the transgressive digital “flows” of networked data.
However, to dismiss the bunkered data center as merely an outmoded piece of security theater is to overlook the importance of physical security—today and in the future.
We often think of the internet as an immaterial or ethereal realm that exists in an electronic non-place. Metaphors like the now retro-sounding cyberspace and, more recently, the cloud perpetuate this way of thinking.
But the cloud is a material infrastructure composed of thousands of miles of cables and rows upon rows of computing equipment. It always “touches the ground” somewhere, making it vulnerable to a range of non-cyber threats—from thieves breaking into data centers and stealing servers, to solar storms disrupting electrical supplies, and even to squirrels chewing through cables.
If data center services should go down, even for a few seconds, the economic and societal impact can be calamitous. In recent years we have seen this first-hand.
In July 2020, the 27-minute Cloudflare outage led to a 50% collapse in traffic across the globe, disrupting major platforms like Discord, Shopify, Feedly and Politico. In June 2021, the Fastly outage left some of the world’s most visited websites completely inaccessible, including Amazon, PayPal, Reddit, and the New York Times.
In October 2021, Meta, which owns Facebook, WhatsApp and Instagram, experienced an outage for several hours that affected millions of social media users as well as hundreds of businesses.
Perhaps the largest internet outage yet occurred in July 2024 when the CrowdStrike outage left supermarkets, doctors’ surgeries, pharmacies, airports, train providers and banks (among other critical services) unable to operate. This was described by some in the industry as “one of the largest mass outages in IT history”.
Internet architecture now relies on such a complex and fragile ecosystem of interdependencies that major outages are getting bigger and occurring more often. Downtime events can have a lasting financial and reputational impact on data center providers. Some attempts to quantify the average cost of an unplanned data center outage range from US$9,000 to US$17,000 (about £12,500) per minute.
The geographic location of a data center is also hugely important for data protection regulations, Thomas explains, as we make our way down a brightly lit corridor. “Cyberfort’s facilities are all located in the UK, which gives our clients peace of mind, knowing they comply with data sovereignty laws.”
Data sovereignty regulations subject data to the legal and privacy standards of the country in which it is stored. This means businesses and organizations must be careful about where in the world their data is being relocated when they move it into the cloud. For example, if a UK business opts to store its data with a cloud provider that uses data centers based in the US, then that data will be subject to US privacy standards which do not fully comply with UK standards.
In contrast to early perceptions of the internet as transcending space, eradicating national borders and geopolitics, data sovereignty regulations endow locality with renewed significance in the cloud era.
The survival of data at all costs
Towards the end of the corridor, Thomas opens a large red blast-proof door—beyond which is a smaller air-tight door. Thomas waves his card in front of an e-reader, initiating an unlocking process: we’re about to enter one of the server rooms.
“Get ready,” he says, smiling, “It’s going to be cold and loud!” The door opens, releasing a rush of cold air. The server room is configured and calibrated for the sole purpose of providing optimal conditions for data storage.
Like any computer, servers generate a huge amount of heat when they are running, and must be stored in constantly air-conditioned rooms to ensure they do not overheat. If, for any reason, a server should crash or fail, it can lead to the loss of a client’s valuable data. Data center technicians work in high-pressure conditions where any unexpected server downtime could mean the end of their job.
To try and make sure the servers run optimally, data centers rely on huge amounts of water and energy, which can significantly limit the availability of these resources for the people who live in the vicinity of the buildings.
An average data center consumes an estimated 200 terawatt hours of electricity each year. That’s around 1% of total global electricity demand, which is more than the national energy consumption of some countries. Many of these facilities are powered by non-renewable energy sources, and the data center industry is expected to emit 2.5 billion metric tons of carbon dioxide by 2030.

In addition, to meet expectations for “uninterruptible” service levels, data centers rely on an array of fossil fuel-based back-up infrastructure—primarily diesel generators. For this reason, the Green Web Foundation—a non-profit organization working to decarbonize the internet—has described the internet as the world’s largest coal-powered machine. Data centers are also noisy and have become sites of protest for local residents concerned about noise pollution.
Amid hype and speculation about the rise of AI, which is leading to a boom in the construction of energy-hungry data centers, the carbon footprint of the industry is under increasing scrutiny. Keen to highlight Cyberfort’s efforts to address these issues, Thomas informs me that “environmental impact is a key consideration for Cyberfort, and we take our commitment to these issues very seriously.”
As we walk down a cold aisle of whirring servers, he explains that Cyberfort actively sources electricity from renewable energy supply chains, and uses what he calls a “closed loop” cooling infrastructure which consumes minimal fresh water.
‘Like the pyramids’
After our walk through the server room, we begin to make our way out of the bunker, heading through another heavy-duty blast door. As we walk down the corridor, Thomas promotes the durability of bunkers as a further security selling point. Patting the cold concrete wall with the palm of his hand, he says, “Bunkers are built to last, like the pyramids.”
Bunker scholars have long noted that these buildings are as much about time as they are about space. Bunkers are designed to preserve and transport their contents through time, from an apocalyptic present into a safe future.
Writers such as Paul Virilio, W.G. Sebald and J.G. Ballard were drawn to the decaying bunkers of the Second World War and, like Thomas, compared them with enduring megastructures which have outlived the civilizations that built them. In his 1975 book Bunker Archaeology, Virilio famously compared the abandoned Nazi bunkers along the coast of France with “the Egyptian mastabas, the Etruscan tombs, the Aztec structures.”
The bunker’s durability invites us to take a long-term view of our own data storage needs, which will only increase over the course of our lives.
For technology behemoths like Apple and Google, cloud storage is a key strategic avenue for long-term revenue growth. While the phones, laptops and other digital devices they make have limited lifespans, their cloud services offer potentially lifelong data storage. Apple and Google encourage us to perpetually hoard our data rather than delete it, because this locks us into their cloud subscription services, which become increasingly expensive the more storage we need.
Apple’s marketing for its cloud storage service, iCloud, encourages users to “take all the photos you want without worrying about space on your devices.” Google has made “archive” rather than “delete” the default option on Gmail. While this reduces the likelihood of us accidentally deleting an email, it also means we are steadily consuming more of our Gmail capacity, leading some to purchase more Google Drive storage space.
Cloud hoarders
It is also increasingly difficult to operate off-cloud. Internal storage space on our digital devices is dwindling as the cloud becomes the default storage option on the majority of digital products being developed. Users must pay a premium if they want more than the basic local storage on their laptop or smartphone. Ports to enable expandable, local storage—such as CD drives or SD card slots—are also being removed by tech manufacturers.
As our personal digital archives expand, our cloud storage needs will continue to grow over our lifetimes, as will the payments for more and more cloud storage space. And while we often imagine we will one day take the time to prune our accumulations of digital photos, files, and emails, that task is often indefinitely postponed. In the meantime, it is quicker and easier to simply purchase more cloud storage.

Many consumers simply use whichever cloud storage service is already pre-installed on their devices—often these are neither the cheapest nor most secure option. But once we commit to one provider, it is very difficult to move our data to another if we want a cheaper monthly storage rate, or simply want to switch—this requires investing in enough hard drives on which to download the data from one cloud provider and upload it to another. Not everyone is tech-savvy enough to do that.
In 2013, bank reforms in the UK introduced a switching service which enabled consumers to easily move their money and payments to different banks, in order to access more favorable rates.
Cloud migration services are available for businesses, but until a cloud storage equivalent of the bank switching service is developed for the general public, many of us are essentially locked into whichever cloud provider we have been using. If our data really is the new gold, perhaps we should require cloud providers to offer incentives to deposit it with them.
Some providers now offer “lifetime” cloud packages with no monthly or yearly payments and no inactivity clause. However, the cloud market is volatile, defined by cycles of boom-and-bust, with providers and their data centers constantly rebranding, closing and relocating. In this landscape of mergers and acquisitions, there is no guarantee that lifetime cloud providers will be around long enough to honor these promises.
In addition, the majority of consumer cloud providers currently only offer a maximum of a few terabytes of storage. In the future, most of us will probably need a lot more than this, which could mean a lot more data centers (roughly 100 new data centers are set to be constructed in the UK alone within the next five years). We may also see more bunkers being repurposed as data centers—while some providers, such as Florida-based Data Shelter, are considering building entirely new bunker structures from scratch to house digital data.
Resurfacing
Thomas and I arrive at the steel staircase leading back up to the outside world. The guard buzzes us back through the turnstile, and Thomas unlocks and opens the door. The sunlight stings my eyes.
Back in the reception area, I thank Arnold and Thomas for my surreal trip into the depths of subterranean data storage. The Cyberfort data center is a site of extreme contrasts, where the ethereal promise of the cloud jars with the concrete reality of the bunker.
Sitting in my car, I add to my fieldnotes that the survival of data—whether entombed in bunkers or stored in “lifetime” cloud accounts—is bound to the churn of markets, and depends upon the durability of the infrastructure and organizations behind it.
Permanence, in the digital age, is always provisional. One can’t help but imagine future archaeologists discovering this bunker and rummaging through the unreadable remains of our lost digital civilization.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Citation:
Underground data fortresses: The nuclear bunkers, mines and mountains being transformed to protect data from attack (2025, September 27)
retrieved 27 September 2025
from https://techxplore.com/news/2025-09-underground-fortresses-nuclear-bunkers-mountains.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
Shop Major Appliances at Maytag Starting at Under $300
The Maytag Man is one of the most enduring characters in American advertising, lonely because no one needs his help repairing a Maytag appliance. The Maytag brand, too, has endured—going back to the days when Frederick Maytag’s washers involved wooden tubs and cranks. Maytag was the first company to put an agitator at the bottom of a washing machine, a design still in use today, and it was the first to stack a washer and dryer, and one of the earliest adopters on smart appliances. But mostly, the brand has eschewed novelty and staked its claim on durability and reliability for its heavy-duty dishwashers, washers, dryers, refrigerators, and ovens. This is true even as Maytag folded into ownership by former competitor Whirlpool.
Maytag remains one of the few appliance companies to offer 10-year limited warranties on essential parts. But Maytag promo codes are a bit more ephemeral, offering short-term deals on appliances that will hopefully last a decade. Here’s how to get a Maytag coupon code and Maytag promo codes, and find closeout deals on last season’s Maytag appliances to save even more.
Save Big With Maytag Appliance Closeout Deals
One of the easiest ways to find a deal on Maytag appliances is to look at the overstock and closeout deals, which offer significant markdowns on last season’s items as Maytag looks to clear out space for the new models. These deals do not require a Maytag coupon code, but they do require knowing where to look.
Go to the Maytag outlet site for appliance closeout deals. As of April 2026, this includes a $729 range with a built-in air fryer that used to sell for $1,300, and a $600 deal on a well-reviewed top-load dryer that previously sold for a thousand dollars. These deals generally last only until supplies run out.
Claim Free Delivery on Major Appliances Over $399
From now through April 8, Maytag customers can get free delivery on appliances priced $399 and above. Even better, Maytag will also haul away your old appliance for free. This deal does not require a Maytag discount code and includes standard home delivery for refrigerators, ranges, and laundry units. The discount will be applied automatically in your online shopping cart when you check out. Also, be sure to check the Maytag deals page often for current offers and rotating Maytag discounts and sales.
Select Customers Can Get a Special Maytag Promo Code
Like many big companies, Maytag offers professional discounts for military, first responders, healthcare workers, students, and teachers. To receive up to a 15% discount for active military, veterans, and spouses, you’ll need to create a Maytag account and then verify your military status using the SheerID program. Maytag first responder discounts and healthcare worker discounts also require SheerID verification. There’s also a discount program for both students and teachers, including a teacher savings program and up to 15% off sitewide. Verified students are able to access pricing unique to students, when moving into their first off-campus apartment.
Work Smarter, Not Harder With Maytag Smart Appliances
Maytag is also offering deals on select smart appliances. As of early April, this includes a somewhat unique combination toaster-microwave that’s about $100 off MSRP, and a slide-in electric range with smart connectivity that’s on a steep discount to $1,260—hundreds of dollars less than even other recent sale prices. You can check out the special Maytag deals on connected and smart appliances by scrolling down to the bottom of Maytag’s smart appliance page.
Tech
Meta Pauses Work With Mercor After Data Breach Puts AI Industry Secrets at Risk
Meta has paused all its work with the data contracting firm Mercor while it investigates a major security breach that impacted the startup, two sources confirmed to WIRED. The pause is indefinite, the sources said. Other major AI labs are also reevaluating their work with Mercor as they assess the scope of the incident, according to people familiar with the matter.
Mercor is one of a few firms that OpenAI, Anthropic, and other AI labs rely on to generate training data for their models. The company hires massive networks of human contractors to generate bespoke, proprietary datasets for these labs, which are typically kept highly secret as they’re a core ingredient in the recipe to generate valuable AI models that power products like ChatGPT and Claude Code. AI labs are sensitive about this data because it can reveal to competitors—including other AI labs in the US and China—key details about the ways they train AI models. It’s unclear at this time whether the data exposed in Mercor’s breach would meaningfully help a competitor.
While OpenAI has not stopped its current projects with Mercor, it is investigating the startup’s security incident to see how its proprietary training data may have been exposed, a spokesperson for the company confirmed to WIRED. The spokesperson says that the incident in no way affects OpenAI user data, however. Anthropic did not immediately respond to WIRED’s request for comment.
Mercor confirmed the attack in an email to staff on March 31. “There was a recent security incident that affected our systems along with thousands of other organizations worldwide,” the company wrote.
A Mercor employee echoed these points in a message to contractors on Thursday, WIRED has learned. Contractors who were staffed on Meta projects cannot log hours until—and if—the project resumes, meaning they could functionally be out of work, a source familiar claims. The company is working to find additional projects for those impacted, according to internal conversations viewed by WIRED.
Mercor contractors were not told exactly why their Meta projects were being paused. In a Slack channel related to the Chordus initiative—a Meta-specific project to teach AI models to use multiple internet sources to verify their responses to user queries—a project lead told staff that Mercor was “currently reassessing the project scope.”
An attacker known as TeamPCP appears to have recently compromised two versions of the AI API tool LiteLLM. The breach exposed companies and services that incorporate LiteLLM and installed the tainted updates. There could be thousands of victims, including other major AI companies, but the breach at Mercor illustrates the sensitivity of the compromised data.
Mercor and its competitors—such as Surge, Handshake, Turing, Labelbox, and Scale AI—have developed a reputation for being incredibly secretive about the services they offer to major AI labs. It’s rare to see the CEOs of these firms speaking publicly about the specific work they offer, and they internally use codenames to describe their projects.
Adding to the confusion around the hack, a group going by the well-known name Lapsus$ claimed this week that it had breached Mercor. In a Telegram account and on a BreachForums clone, the actor offered to sell an array of alleged Mercor data, including a 200-plus GB database, nearly 1 TB of source code, and 3 TBs of video and other information. But researchers say that many cybercriminal groups now periodically take up the Lapsus$ name and that Mercor’s confirmation of the LiteLLM connection means that the attacker is likely TeamPCP or an actor connected to the group.
TeamPCP appears to have compromised the two LiteLLM updates as part of an even larger supply chain hacking spree in recent months that has been gaining momentum, catapulting TeamPCP to prominence. And while launching data extortion attacks and working with ransomware groups, such as the group known as Vect, TeamPCP has also strayed into political territory, spreading a data wiping worm known as “CanisterWorm” through vulnerable cloud instances with Farsi as their default language or clocks set to Iran’s time zone.
“TeamPCP is definitely financially motivated,” says Allan Liska, an analyst for the security firm Recorded Future who specializes in ransomware. “There might be some geopolitical stuff as well, but it’s hard to determine what’s real and what’s bluster, especially with a group this new.”
Looking at the dark-web posts of the alleged Mercor data, Liska adds, “There is absolutely nothing that connects this to the original Lapsus$.”
Tech
Our Favorite iPad Is $50 Off
Need a new tablet for your casual couch surfing sessions? There are a variety of options out there, but we think most people will be happy with the standard 11-inch model from 2025. You can grab it right now at Amazon for just $300, a $50 discount from its usual price.
The outside of the iPad hasn’t changed all that much in the few years since it was updated last, with the screen growing a barely noticeable 0.1 inches and the standard USB-C port and selfie camera, plus Touch ID built into the power button. Most of the changes affect the inside of the tablet, including a major processor upgrade to the A16 chip and storage that mean this tablet is much snappier and more responsive than the 2022 version. There’s twice as much storage, with 128 GB as a baseline and up to 512GB on the upgraded model, so you won’t need to keep deleting apps to make room for more movies.
While it does have the A16 processor, which is also found in the iPhone 14 Pro, iPhone 15, and iPhone 15 Plus, the reduced RAM means there’s no support for Apple Intelligence. Whether that’s a benefit or a drawback will depend on how much you like or dislike AI. Beyond the lack of Apple Intelligence, you’re really only making a compromise when it comes to the screen, which isn’t laminated, so the Apple Pencil doesn’t feel quite as sharp as it does on other iPads, and it isn’t nano-textured, so glare and bright rooms may be more of an issue.
For most folks, the 2025 A16 iPad will be more than enough tablet for streaming, web browsing, and even some light gaming. You can head over to Amazon to pick up the iPad in either Silver or Blue at the discounted $300 price, with similar discounts on the 256GB and 512GB models too, but availability by color varies as you climb up the storage ladder. If you’re interested in what the other, more premium iPads offer, make sure to check out our guide that covers the entire lineup.
-
Entertainment1 week agoLee Sang-bo dies at 45: Funeral details revealed
-
Sports1 week agoIllinois defense gets tough, ousts Houston to reach Elite Eight
-
Sports6 days agoUSMNT handed reality check by Doku, Belgium ahead of World Cup
-
Sports6 days ago2026 NCAA men’s hockey tournament: Schedule, results
-
Business1 week agoHow do you spot a fake online review?
-
Fashion1 week agoChina rolls out tariff cuts on Congo imports from April 1
-
Fashion1 week agoEU apparel imports slump 15.48% YoY in Jan; Bangladesh hardest hit
-
Sports6 days agoMan City show why they are worthy WSL title winners as tired United wilt


