Proton VPN
ProtonVPN

Protecting Proton VPN’s infrastructure

We protect your data with only the strongest encryption. We also go to great lengths to protect Proton VPN’s physical infrastructure.

  • We own, ship, and install our Secure Core servers ourselves.
  • Our servers are housed in secure data centers with biometric security.
  • All VPN servers have full-disk encryption to secure their server certificates.

Multiple layers of VPN security

Your security is our primary concern, which is why we consider and address every potential vulnerability in our VPN service. To keep your data as secure as possible, we house our critical infrastructure in highly secure locations and limit access to our VPN servers to approved partners.

Secure locations

Our critical infrastructure, like our Secure Core VPN servers, is housed in secure data centers or on former military bases. Using these locations prevents anyone from being able to tamper with our servers.

Limited access

We installed all our Secure Core infrastructure and operate it ourselves to prevent anyone from gaining unauthorized access to our servers. These extra security precautions prevent our hardware from being compromised or tampered with.

Full-disk encryption

Full-disk encryption secures our server certificates, configurations, and other software, so even in the unlikely event that someone was able to get physical access to one of our VPN servers, they would not be able to access its encryption keys.

Keep your connection secure with Proton VPN

DNS leak protection

Your DNS queries can be analyzed to see what websites you visited. To prevent this, we include your DNS queries in the encrypted VPN tunnel and run our own DNS servers. This ensures your DNS queries are resolved without ever exposing your browsing activity.

Kill switch

Our built-in kill switch feature continuously monitors your connection to our VPN servers and will immediately block all network traffic if you lose your connection to the VPN server. By blocking all traffic, the kill switch feature prevents your true IP address from being revealed.

Tor over VPN

If you have a Plus plan, you can use Proton VPN to access the Tor network. Route all your traffic through the Tor anonymity network and access onion sites with a single click using our Tor-enabled VPN servers.

A secure, trusted VPN

Secure Core VPN

Our Secure Core architecture gives you extra security against advanced attacks by routing your traffic through multiple servers before it leaves our network.

No-logs VPN

We follow a strict no-logs policy (which has been confirmed by independent security experts) to ensure your browsing history stays private and cannot be turned over or shared with anyone.

NetShield Ad-blocker

NetShield uses DNS filtering to find, identify, and block ads, malware, and trackers before your device can load them.

Based in Switzerland

Our headquarters is in Switzerland, where we are protected by some of the world’s strongest privacy laws and remain outside of US and EU surveillance jurisdictions.

Audited by independent experts

We have commissioned professional cybersecurity audits for all our apps and published the full results on our website.

Tor over VPN

Easily access onion sites through Proton VPN. Our VPN servers route your connection through the Tor network with one click.

VPN Accelerator

VPN Accelerator can increase your browsing speed by over 400%. It has the greatest effect on performance when you connect to distant VPN servers.

Easy to use

Use our Quick Connect button to easily connect to the fastest VPN server for your location in a single click.

Secure your internet with Proton VPN

  • IPv6 leak protection
  • Secure VPN protocols
  • Strict no-logs policy
  • Advanced encryption
  • Block ads, trackers, and malware

Frequently Asked Questions