Introducing the new Proton VPN Linux app

November 7th, 2023 in Proton News

For over two years, Proton VPN has been one of a very few VPN services to offer a full Linux app with a graphic user…

What is perfect forward secrecy?

October 31st, 2023 in Proton News

Perfect forward secrecy (PFS) is a cryptographic feature of internet communication protocols that ensures even if a session is compromised, past and future sessions remain…

What is a zero-day exploit and why are they dangerous?

October 20th, 2023 in Proton News

A zero-day is a software vulnerability or security flaw in a computer system that its developers or vendors are unaware of. The term zero-day (also…

What is a dedicated IP address and how can it help your business?

October 6th, 2023 in Proton News

A dedicated IP address is a fixed or static internet protocol (IP) address that’s guaranteed not to change for as long as you lease it.…

What is IKEv2?

September 29th, 2023 in Proton News

IKEv2 is a VPN protocol used to secure VPN connections. Part of the IPSec protocol suite, it is sometimes (and strictly speaking, more correctly) referred…

Is Amazon Alexa spying on you?

September 26th, 2023 in Proton News

“Amazon and third parties (including advertising and tracking services) collect smart speaker interaction data. We find that Amazon processes voice data to infer user interests…

What is a VPN kill switch and when should you use one?

September 15th, 2023 in Proton News

A kill switch is a security feature that protects your privacy. It ensures that you don’t connect to the internet thinking you’re protected by a…

Guest networks – What they are, why you need one, and how to set them up

September 12th, 2023 in Proton News

A guest network is a separate WiFi network within your home or office network designed specifically for your guests or customers to use.  Although run…

Can someone see my internet history if we use the same WiFi?

September 1st, 2023 in Proton News

Before WiFi, you had to connect your internet-capable device to a router via an Ethernet cable. The router then connected to a modem, which connected…

Secure
your internet

Get Proton VPN
Get Proton VPN