Página inicial do Proton VPN
ProtonVPN

Princípios básicos de privacidade

en
  • Princípios básicos de privacidade
In this article, we look at who can see your internet history when you use WiFi, what they can see, and why they might do this.
en
  • Princípios básicos de privacidade
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Princípios básicos de privacidade
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Princípios básicos de privacidade
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Princípios básicos de privacidade
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.
en
  • Princípios básicos de privacidade
We look at what cookies are and how they are used. Third-party cookies, in particular, can pose a threat to your online privacy.
en
  • Princípios básicos de privacidade
We discuss why and how streaming services geoblock content. That is, restrict content based on your geographic location.
en
  • Princípios básicos de privacidade
In this article, we discuss DNS — what it is, how it works, and how it impacts issues such as online privacy and censorship.
en
  • Princípios básicos de privacidade
VPNs use encryption to create a secure tunnel for your internet traffic. Learn how VPN tunnels work and why you might want to use them.
en
  • Princípios básicos de privacidade
A VPN takes over routing your internet connection to the websites you visit, so it can see what you do on the internet instead of your ISP.
en
  • Princípios básicos de privacidade
We look at some of the free VPN options available and compare them to commercial VPN services such as Proton VPN.