What is a VPN kill switch and when should you use one?

September 15th, 2023 in Privacy basics

A kill switch is a security feature that protects your privacy. It ensures that you don’t connect to the internet thinking you’re protected by a VPN when you aren’t.  When you use a virtual private network (VPN), your device connects to VPN server run by a VPN service such as Proton VPN. The connection between […]

Proton VPN Blog

What is a VPN kill switch and when should you use one?

September 15th, 2023 in Privacy basics

A kill switch is a security feature that protects your privacy. It ensures that you don’t connect to the internet thinking you’re protected by a VPN when you aren’t.  When you use a virtual private network (VPN), your device connects to VPN server run by a VPN service such as Proton VPN. The connection between […]

Guest networks – What they are, why you need one, and how to set them up

September 12th, 2023 in Privacy basics

A guest network is a separate WiFi network within your home or office network designed specifically for your guests or customers to use.  Although run from the same router (which may also be your modem), a guest network operates as an entirely separate WiFi network, providing guests with internet access without giving them access to […]

Can someone see my internet history if we use the same WiFi?

September 1st, 2023 in Privacy basics

Before WiFi, you had to connect your internet-capable device to a router via an Ethernet cable. The router then connected to a modem, which connected your device to the internet. Routers and modems are so often housed in the same device, that the term “router” usually refers to a combined router and modem.  These cables […]

Why use a VPN for business?

August 23rd, 2023 in For business

These days, virtual private networks (VPNs) are most commonly associated with commercial consumer-facing VPN services, such as Proton VPN, that allow individuals to bypass censorship, access the internet privately, and “spoof” their geographic location.  However, VPNs were originally developed to let remote workers securely access corporate intranets as though they were physically connected to their […]

Introducing Proton VPN for Business

August 21st, 2023 in Proton News

Today, we’re happy to announce the official launch of Proton VPN for Business. Since 2016, Proton has been progressively bringing our privacy and security services to enterprises. Today, over 50,000 organizations around the world trust Proton to secure their business, representing over 10% of Proton’s annual turnover. Ever since we launched Proton VPN, we’ve received […]

What is Tor Browser?

August 18th, 2023 in Privacy basics

Tor Browser is a privacy-focused browser that lets you navigate the internet without anyone monitoring your activity or identifying you. It relies on the Tor anonymity network to route your internet traffic through multiple random servers before connecting to your desired website or service. You can download Tor Browser here. This article explains more about […]

What is a MAC address, and what can it reveal about you?

August 17th, 2023 in Privacy basics

Every device that connects to a network does so through a network interface controller (NIC). Devices that can connect to multiple networks will have a separate NIC for each connection they support. For example, a laptop that supports WiFi, Ethernet (wired), and Bluetooth connections would have three NICs (each with its own MAC address).    Every […]

Proton VPN Reviews

August 16th, 2023 in Proton Stories

We’ve compiled a full list of recent reviews of Proton VPN’s paid VPN plans. All of these reviews are from independent review sites. This post was updated in August 2023. Proton VPN receives consistently good reviews from professional technology journalists. Here, we collect some of these to make it easier for you to evaluate our […]

8 common types of cyberattacks and how to prevent them

July 28th, 2023 in Privacy basics

Hackers are always looking for ways to break through the security systems that defend your devices and data from criminals. From web browsers to operating systems to chat apps, any piece of software is a potential target. It’s a constant game of cat and mouse, with developers releasing patches whenever security researchers discover a new […]

Secure
your internet

Get Proton VPN
Get Proton VPN

Contact us

Support form

Tell us about the problem and we'll get back to you as soon as we can.

Open support form

Live chat

Get help from a support agent in real time. Available with a paid VPN subscription.

Chat with us

Secure email

Send us an encrypted message at contact@protonvpn.com. It may take us longer to respond.

Email us