Últimos artículos

en
  • Cuestiones básicas de privacidad
Guest networks offer several security, privacy, and network management benefits. We discuss.
en
  • Cuestiones básicas de privacidad
In this article, we look at who can see your internet history when you use WiFi, what they can see, and why they might do this.
en
  • Para empresas
VPNs are used by businesses worldwide to improve their security, ensure compliance, and more.
en
  • Novedades de Proton VPN
Proton VPN for Business makes network segmentation and access control easy, providing secure internet access and all-around network security.
en
  • Cuestiones básicas de privacidad
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Cuestiones básicas de privacidad
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Historias de Proton
See what independent reviewers are saying about the security and advanced features that come with Proton VPN's premium VPN plans.
en
  • Cuestiones básicas de privacidad
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Cuestiones básicas de privacidad
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.
en
  • Guías básicas
F-Droid is an app store for Android that features only free and open-source software. We take a detailed look.
en
  • Cuestiones básicas de privacidad
We look at what cookies are and how they are used. Third-party cookies, in particular, can pose a threat to your online privacy.