Latest articles

en
- Proton VPNニュース
The new Proton VPN Linux app is rebuilt from the ground up to be efficient,
elegant, and modular in design.

en
- プライバシーを深掘り
Perfect forward secrecy ensures that even if an internet session is compromised,
past and future sessions remain secure.

en
A zero-day is a previously unknown software vulnerability. A zero-day exploit is
a cyberattack that takes advantage of a zero-day.

en
- プライバシーを深掘り
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec
protocol suite, it is sometimes referred to as IKEv2/IPsec.

en
- プライバシーを深掘り
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives.
But this convenience comes at the price of privacy.

en
A kill switch is a security feature that protects your IP address in case you
unexpectedly lose your connection to a VPN server.

en
A guest network lets you offer safe WiFi access for friends, office staff,
customers, and iOT devices without compromising your own WiFi security.

この記事では、Wi-Fiを使用するときに誰がインターネット履歴を見られるか、彼らが何を見ることができるか、そしてなぜそれを行うかについて見ていきます。

en
- Proton VPNニュース
Proton VPN for Business makes network segmentation and access control easy,
providing secure internet access and all-around network security.

en
- プライバシーの基本
Tor Browser is a powerful privacy tool that lets you browse onion sites and
protect your identity. Here’s how it works.

en
In this article, we look at what a MAC address is and whether it poses a risk to
your privacy or security.