Latest articles

en
- Privacy deep dives
Perfect forward secrecy ensures that even if an internet session is compromised,
past and future sessions remain secure.

en
- Privacy deep dives
A zero-day is a previously unknown software vulnerability. A zero-day exploit is
a cyberattack that takes advantage of a zero-day.

en
.A static IP address is a fixed internet protocol address that’s guaranteed not
to change for as long as you lease it.

en
- Privacy deep dives
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec
protocol suite, it is sometimes referred to as IKEv2/IPsec.

en
- Privacy deep dives
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives.
But this convenience comes at the price of privacy.

en
- Privacy basics
A kill switch is a security feature that protects your IP address in case you
unexpectedly lose your connection to a VPN server.

en
A guest network lets you offer safe WiFi access for friends, office staff,
customers, and iOT devices without compromising your own WiFi security.

en
In this article, we look at who can see your internet history when you use WiFi,
what they can see, and why they might do this.

en
- For business
VPNs are used by businesses worldwide to improve their security, ensure
compliance, and more.

en
- Proton VPN news
Proton VPN for Business makes network segmentation and access control easy,
providing secure internet access and all-around network security.

en
- Privacy basics
Tor Browser is a powerful privacy tool that lets you browse onion sites and
protect your identity. Here’s how it works.