Página inicial do Proton VPN
ProtonVPN

Artigos mais recentes

en
  • Aprofundamentos sobre privacidade
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec protocol suite, it is sometimes referred to as IKEv2/IPsec.
en
  • Aprofundamentos sobre privacidade
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives. But this convenience comes at the price of privacy.
en
  • Princípios básicos de privacidade
A kill switch is a security feature that protects your IP address in case you unexpectedly lose your connection to a VPN server.
en
  • Princípios básicos de privacidade
A guest network lets you offer safe WiFi access for friends, office staff, customers, and iOT devices without compromising your own WiFi security.
en
  • Princípios básicos de privacidade
In this article, we look at who can see your internet history when you use WiFi, what they can see, and why they might do this.
en
  • For business
VPNs are used by businesses worldwide to improve their security, ensure compliance, and more.
en
  • Notícias do Proton VPN
Proton VPN for Business makes network segmentation and access control easy, providing secure internet access and all-around network security.
en
  • Princípios básicos de privacidade
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Princípios básicos de privacidade
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Histórias da Proton
See what independent reviewers are saying about the security and advanced features that come with Proton VPN's premium VPN plans.
en
  • Princípios básicos de privacidade
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.