Articles récents
- Vie privée, les fondamentaux
Guest networks offer several security, privacy, and network management benefits.
We discuss.
- Vie privée, les fondamentaux
In this article, we look at who can see your internet history when you use WiFi,
what they can see, and why they might do this.
- Entreprises
VPNs are used by businesses worldwide to improve their security, ensure
compliance, and more.
- Actualités Proton VPN
Proton VPN for Business makes network segmentation and access control easy,
providing secure internet access and all-around network security.
- Vie privée, les fondamentaux
Tor Browser is a powerful privacy tool that lets you browse onion sites and
protect your identity. Here’s how it works.
- Vie privée, les fondamentaux
In this article, we look at what a MAC address is and whether it poses a risk to
your privacy or security.
- Actualités Proton
See what independent reviewers are saying about the security and advanced
features that come with Proton VPN's premium VPN plans.
- Vie privée, les fondamentaux
Cyberattacks target weak security systems and unsuspecting victims. Learn the
main cyberattack types and how to protect yourself.
- Vie privée, les fondamentaux
The Invisible Internet Project (I2P) is a decentralized anonymizing network
built on similar principles to Tor.
- Guides pratiques
F-Droid is an app store for Android that features only free and open-source
software. We take a detailed look.
- Vie privée, les fondamentaux
We look at what cookies are and how they are used. Third-party cookies, in
particular, can pose a threat to your online privacy.