Página de inicio de Proton VPN
ProtonVPN

Cuestiones básicas de privacidad

en
  • Cuestiones básicas de privacidad
In this article, we look at who can see your internet history when you use WiFi, what they can see, and why they might do this.
en
  • Cuestiones básicas de privacidad
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Cuestiones básicas de privacidad
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Cuestiones básicas de privacidad
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Cuestiones básicas de privacidad
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.
en
  • Cuestiones básicas de privacidad
We look at what cookies are and how they are used. Third-party cookies, in particular, can pose a threat to your online privacy.
en
  • Cuestiones básicas de privacidad
We discuss why and how streaming services geoblock content. That is, restrict content based on your geographic location.
en
  • Cuestiones básicas de privacidad
In this article, we discuss DNS — what it is, how it works, and how it impacts issues such as online privacy and censorship.
en
  • Cuestiones básicas de privacidad
VPNs use encryption to create a secure tunnel for your internet traffic. Learn how VPN tunnels work and why you might want to use them.
en
  • Cuestiones básicas de privacidad
A VPN takes over routing your internet connection to the websites you visit, so it can see what you do on the internet instead of your ISP.
en
  • Cuestiones básicas de privacidad
We look at some of the free VPN options available and compare them to commercial VPN services such as Proton VPN.