Return to Facebook   Twitter   Reddit   Instagram   Mastodon   ProtonMail

The ultimate guide to torrenting

December 3rd, 2021 in How-to

Torrenting is an incredibly fast and efficient way to distribute large files over the internet. Although often considered to be synonymous with piracy, there are many legitimate use cases for torrenting. However, before diving into the world of P2P file sharing, you should understand what torrenting is, how it works, and how to protect yourself […]

ProtonVPN Blog

How to block online trackers

September 17th, 2018 in How-to

The profiles these organizations create using that information can be surprisingly thorough. Many people do not even know they are being tracked, and those who do seem to accept that constant surveillance is the price you pay to be online. While the data these organizations collect are generally used to sell more targeted ads, having […]

Why it is hard (if not impossible) to run a privacy-focused company in the US

September 12th, 2018 in Privacy & Security, Security

When people think of tech companies, they typically think of Silicon Valley. This is where some of the biggest tech companies got their start and its where most of them have their headquarters. This is no accident. The available talent in the US, the easy access to capital and investors, and a general entrepreneurial spirit […]

Welcome our new VPN servers in Norway

September 10th, 2018 in Service Updates

Norway is the latest country to be added to the ProtonVPN network. It was the most popular country in our community poll, so congratulations to all our Norwegian users! After this latest addition, we have now added servers in the poll’s top five countries – Norway, Poland, South Africa, India, and South Korea. This also […]

Protonvpn incognito

Is Incognito/Private Browsing mode truly private?

September 8th, 2018 in Privacy & Security

What is Incognito Mode? Incognito Mode is a privacy setting for Google Chrome (other browsers have different names for a similar service – Private Browsing Mode for Firefox, Private Browsing for Safari) that prevents the browser from storing a site’s URL, text entered into the site’s forms, and cookies. (Cookies are small data files that […]

Our Privacy Policy and what it means for you

September 7th, 2018 in Privacy & Security

This article highlights some of the main points of our Privacy Policy and Terms and Conditions of Service. Below we explain our policies and how they commit us to protecting your privacy. No logs When you use a VPN, they essentially become your new Internet Service Provider meaning they can see all your online activity. […]

We installed new servers in India!

September 4th, 2018 in Service Updates

India came in fourth place in our community poll to decide where to install our new servers. Be sure to come back to our blog next week to see where our next servers will be installed. These new VPN servers are located in Pune and reserved for users on one of our paid plans: IN […]

What countries are in the 5 Eyes, 9 Eyes, and 14 Eyes agreements?

August 30th, 2018 in Privacy & Security, Security

The Snowden revelations revealed that the NSA is carrying out electronic surveillance on a global scale and unveiled the shadowy networks of intelligence agencies that act as accomplices. When people think of mass surveillance, they rightly think of the NSA, but nearly every country in the world has its own signals intelligence (SIGINT) agency. From […]

The ProtonVPN network keeps growing – this week we installed servers in South Korea!

August 28th, 2018 in Service Updates

Congratulations to all our users who voted for South Korea, which came in at #5 in our ProtonVPN server poll. We continue to add more servers based on the results of that poll, so check this blog each week to see where we will install new VPN servers next. The four new VPN servers are […]

What is the VORACLE attack, and why ProtonVPN is not vulnerable

August 27th, 2018 in Privacy & Security, Security

A new security vulnerability in the OpenVPN protocol was recently revealed that would allow for sophisticated attacker to access a VPN user’s online activity. At the most recent Black Hat and DEF CON security conferences, tech security researcher Ahamed Nafeez presented VORACLE, an attack that can eventually allow the attacker to decrypt data protected by […]

Secure your internet

Get ProtonVPN

For customer support inquiries, please submit the following form for the fastest response:
Support Form

For all other inquiries:

Version: OpenPGP.js v4.10.10


You can also Tweet to us: