Proton VPN ana sayfası
ProtonVPN

Gizliliğin ayrıntıları

safe VPN HMAC authentication sha-384
en
  • Gizliliğin ayrıntıları
HMAC stands for hashed message authentication code and is an important factor in VPN security. Learn why strong HMAC auth matters for VPN security.
ProtonVPN Article 13
en
  • Gizliliğin ayrıntıları
The European Parliament passed a new copyright directive containing the controversial Article 13, the so-called “meme ban.” Proton VPN is committed to helping mitigate the negative effects of this law on Internet freedom. 
en
  • Gizliliğin ayrıntıları
Tor is a free, global network that lets you browse the Internet and the dark web anonymously. There are, however, a few things you need to keep in mind to use Tor securely.
Internet of things, smart devices, smart speakers, smart home devices
en
  • Gizliliğin ayrıntıları
Smart speakers and their digital assistants are here, constantly listening to you, waiting to respond to your requests. Yet they are less like helpful bots and more like diligent stenographers, compiling comprehensive reports of every interaction so
en
  • Gizliliğin ayrıntıları
The challenge of achieving a free and private Internet is not merely a question of infrastructure and tools, but of public attitude. That is why educating more people about cybersecurity and data privacy is so important.
en
  • Gizliliğin ayrıntıları
We wanted to learn more about our users’ privacy concerns, so we posed a series of questions that asked which types of personal data you felt were most sensitive and over 2,000 of you responded. Today, we look at how certain leaks could put more data
en
  • Gizliliğin ayrıntıları
Here are the top six countries where online freedom is compromised, and some ways you can reliably bypass censorship and safeguard your privacy.
en
  • Gizliliğin ayrıntıları
The US is a great place for many tech companies. Unfortunately, it is a poor location for any company that wishes to seriously protect privacy.
en
  • Gizliliğin ayrıntıları
A list of the Five Eyes countries of the UKUSA and other intelligence-sharing agreements, including the Nine Eyes and Fourteen Eyes.
en
  • Gizliliğin ayrıntıları
The Australian government proposed new legislation that would allow authorities to undermine end-to-end encryption and grant them “alternative-collection powers.”
en
  • Gizliliğin ayrıntıları
An easy to understand explanation of net neutrality and what it means for your online freedom.