Página principal de Proton VPN
ProtonVPN

Análisis sobre privacidad

safe VPN HMAC authentication sha-384
en
  • Análisis sobre privacidad
HMAC stands for hashed message authentication code and is an important factor in VPN security. Learn why strong HMAC auth matters for VPN security.
ProtonVPN Article 13
en
  • Análisis sobre privacidad
The European Parliament passed a new copyright directive containing the controversial Article 13, the so-called “meme ban.” Proton VPN is committed to helping mitigate the negative effects of this law on Internet freedom. 
en
  • Análisis sobre privacidad
Tor is a free, global network that lets you browse the Internet and the dark web anonymously. There are, however, a few things you need to keep in mind to use Tor securely.
Internet of things, smart devices, smart speakers, smart home devices
en
  • Análisis sobre privacidad
Smart speakers and their digital assistants are here, constantly listening to you, waiting to respond to your requests. Yet they are less like helpful bots and more like diligent stenographers, compiling comprehensive reports of every interaction so
en
  • Análisis sobre privacidad
The challenge of achieving a free and private Internet is not merely a question of infrastructure and tools, but of public attitude. That is why educating more people about cybersecurity and data privacy is so important.
en
  • Análisis sobre privacidad
We wanted to learn more about our users’ privacy concerns, so we posed a series of questions that asked which types of personal data you felt were most sensitive and over 2,000 of you responded. Today, we look at how certain leaks could put more data
en
  • Análisis sobre privacidad
Here are the top six countries where online freedom is compromised, and some ways you can reliably bypass censorship and safeguard your privacy.
en
  • Análisis sobre privacidad
The US is a great place for many tech companies. Unfortunately, it is a poor location for any company that wishes to seriously protect privacy.
en
  • Análisis sobre privacidad
A list of the Five Eyes countries of the UKUSA and other intelligence-sharing agreements, including the Nine Eyes and Fourteen Eyes.
en
  • Análisis sobre privacidad
The Australian government proposed new legislation that would allow authorities to undermine end-to-end encryption and grant them “alternative-collection powers.”
en
  • Análisis sobre privacidad
An easy to understand explanation of net neutrality and what it means for your online freedom.