Latest articles
- Privacy deep dives
HMAC stands for hashed message authentication code and is an important factor in
VPN security. Learn why strong HMAC auth matters for VPN security.
- Privacy basics
Most websites now use HTTPS to encrypt your connection and add an additional
layer of protection to your data. But if you are on public WiFi, using HTTPS
without a VPN means that some of your data will still be vulnerable.
- Privacy deep dives
The European Parliament passed a new copyright directive containing the
controversial Article 13, the so-called “meme ban.” Proton VPN is committed to
helping mitigate the negative effects of this law on Internet freedom.
- Service updates
Russia is the 32nd country to join the Proton VPN network. These servers offer
secure and private Internet access to the largest country in the world.
- Proton stories
As part of our mission to make a secure and private Internet available to all,
Proton VPN will have to add servers in countries with poor privacy protections.
Here's how to safely use servers in high-risk countries.
- Privacy deep dives
Tor is a free, global network that lets you browse the Internet and the dark web
anonymously. There are, however, a few things you need to keep in mind to use
Tor securely.
- Proton VPN news
The newest version of Proton VPN for Windows supports Split Tunneling, allowing
you to decide which applications should use the VPN encrypted tunnel.
- Privacy basics
For a VPN to reliably protect user data, it must not only use the most secure
encryption and protocols but also shield itself with strong legal protections.
- Service updates
Our new iOS and macOS apps now come with Always-on VPN, a feature that protects
you from VPN disconnects.
- Proton stories
This year, we received recognition for some of the unique advantages that our
VPN service offers. Here are some of the awards for 2018 and 2019 that were just
announced.
- Privacy deep dives
Smart speakers and their digital assistants are here, constantly listening to
you, waiting to respond to your requests. Yet they are less like helpful bots
and more like diligent stenographers, compiling comprehensive reports of every
interaction so