Homepage di Proton VPN
ProtonVPN

Approfondimenti sulla privacy

safe VPN HMAC authentication sha-384
en
  • Approfondimenti sulla privacy
HMAC stands for hashed message authentication code and is an important factor in VPN security. Learn why strong HMAC auth matters for VPN security.
ProtonVPN Article 13
en
  • Approfondimenti sulla privacy
The European Parliament passed a new copyright directive containing the controversial Article 13, the so-called “meme ban.” Proton VPN is committed to helping mitigate the negative effects of this law on Internet freedom. 
en
  • Approfondimenti sulla privacy
Tor is a free, global network that lets you browse the Internet and the dark web anonymously. There are, however, a few things you need to keep in mind to use Tor securely.
Internet of things, smart devices, smart speakers, smart home devices
en
  • Approfondimenti sulla privacy
Smart speakers and their digital assistants are here, constantly listening to you, waiting to respond to your requests. Yet they are less like helpful bots and more like diligent stenographers, compiling comprehensive reports of every interaction so
en
  • Approfondimenti sulla privacy
The challenge of achieving a free and private Internet is not merely a question of infrastructure and tools, but of public attitude. That is why educating more people about cybersecurity and data privacy is so important.
en
  • Approfondimenti sulla privacy
We wanted to learn more about our users’ privacy concerns, so we posed a series of questions that asked which types of personal data you felt were most sensitive and over 2,000 of you responded. Today, we look at how certain leaks could put more data
en
  • Approfondimenti sulla privacy
Here are the top six countries where online freedom is compromised, and some ways you can reliably bypass censorship and safeguard your privacy.
en
  • Approfondimenti sulla privacy
The US is a great place for many tech companies. Unfortunately, it is a poor location for any company that wishes to seriously protect privacy.
en
  • Approfondimenti sulla privacy
A list of the Five Eyes countries of the UKUSA and other intelligence-sharing agreements, including the Nine Eyes and Fourteen Eyes.
en
  • Approfondimenti sulla privacy
The Australian government proposed new legislation that would allow authorities to undermine end-to-end encryption and grant them “alternative-collection powers.”
en
  • Approfondimenti sulla privacy
An easy to understand explanation of net neutrality and what it means for your online freedom.