Proton VPN-Startseite
ProtonVPN

Grundlagen der Privatsphäre

en
  • Grundlagen der Privatsphäre
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Grundlagen der Privatsphäre
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Grundlagen der Privatsphäre
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.
en
  • Grundlagen der Privatsphäre
We look at what cookies are and how they are used. Third-party cookies, in particular, can pose a threat to your online privacy.
en
  • Grundlagen der Privatsphäre
We discuss why and how streaming services geoblock content. That is, restrict content based on your geographic location.
en
  • Grundlagen der Privatsphäre
In this article, we discuss DNS — what it is, how it works, and how it impacts issues such as online privacy and censorship.
en
  • Grundlagen der Privatsphäre
VPNs use encryption to create a secure tunnel for your internet traffic. Learn how VPN tunnels work and why you might want to use them.
en
  • Grundlagen der Privatsphäre
A VPN takes over routing your internet connection to the websites you visit, so it can see what you do on the internet instead of your ISP.
en
  • Grundlagen der Privatsphäre
We look at some of the free VPN options available and compare them to commercial VPN services such as Proton VPN.
en
  • Grundlagen der Privatsphäre
In this article, we explain what third-party cookies are and how you can block them in your browser.
en
  • Grundlagen der Privatsphäre
A VPN allows you to access Instagram, whether you live in a restrictive country or at work or school.