Página inicial do Proton VPN
ProtonVPN

Aprofundamentos sobre privacidade

en
  • Aprofundamentos sobre privacidade
The challenge of achieving a free and private Internet is not merely a question of infrastructure and tools, but of public attitude. That is why educating more people about cybersecurity and data privacy is so important.
en
  • Aprofundamentos sobre privacidade
We wanted to learn more about our users’ privacy concerns, so we posed a series of questions that asked which types of personal data you felt were most sensitive and over 2,000 of you responded. Today, we look at how certain leaks could put more data
en
  • Aprofundamentos sobre privacidade
Here are the top six countries where online freedom is compromised, and some ways you can reliably bypass censorship and safeguard your privacy.
en
  • Aprofundamentos sobre privacidade
The US is a great place for many tech companies. Unfortunately, it is a poor location for any company that wishes to seriously protect privacy.
en
  • Aprofundamentos sobre privacidade
A list of the Five Eyes countries of the UKUSA and other intelligence-sharing agreements, including the Nine Eyes and Fourteen Eyes.
en
  • Aprofundamentos sobre privacidade
The Australian government proposed new legislation that would allow authorities to undermine end-to-end encryption and grant them “alternative-collection powers.”
en
  • Aprofundamentos sobre privacidade
An easy to understand explanation of net neutrality and what it means for your online freedom.
en
  • Aprofundamentos sobre privacidade
Are VPNs blocked or banned in your country? Here’s the updated list of countries that are trying to make VPNs illegal.
wifi vulnerability vpn krack
en
  • Aprofundamentos sobre privacidade
Security researchers have discovered a vulnerability in the WPA2 protocol which allows for virtually any WiFi network to be hacked, exposing sensitive data.
en
  • Aprofundamentos sobre privacidade
In this article, we analyze the VPN threat model. This covers the threats a VPN is designed to guard against, and also the threats a VPN cannot counter.