Latest articles

en
- Proton ストーリー
See what independent reviewers are saying about the security and advanced
features that come with Proton VPN's premium VPN plans.

en
Cyberattacks target weak security systems and unsuspecting victims. Learn the
main cyberattack types and how to protect yourself.

en
- プライバシーの基本
The Invisible Internet Project (I2P) is a decentralized anonymizing network
built on similar principles to Tor.

en
F-Droid is an app store for Android that features only free and open-source
software. We take a detailed look.

en
We look at what cookies are and how they are used. Third-party cookies, in
particular, can pose a threat to your online privacy.

en
We discuss why and how streaming services geoblock content. That is, restrict
content based on your geographic location.

en
- プライバシーの基本
In this article, we discuss DNS — what it is, how it works, and how it impacts
issues such as online privacy and censorship.

en
VPNs use encryption to create a secure tunnel for your internet traffic. Learn
how VPN tunnels work and why you might want to use them.

en
- プライバシーの基本
A VPN takes over routing your internet connection to the websites you visit, so
it can see what you do on the internet instead of your ISP.

en
- プライバシーを深掘り
OpenVPN is a secure and battle-tested VPN protocol that remains useful despite
showing signs of age.
