Proton VPN 홈페이지
ProtonVPN

Latest articles

en
  • 개인정보 보호 심층 분석
A zero-day is a previously unknown software vulnerability. A zero-day exploit is a cyberattack that takes advantage of a zero-day.
en
  • 개인정보 보호 심층 분석
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec protocol suite, it is sometimes referred to as IKEv2/IPsec.
en
  • 개인정보 보호 심층 분석
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives. But this convenience comes at the price of privacy.
en
  • 개인정보 보호 기본 사항
A kill switch is a security feature that protects your IP address in case you unexpectedly lose your connection to a VPN server.
en
  • 개인정보 보호 기본 사항
A guest network lets you offer safe WiFi access for friends, office staff, customers, and iOT devices without compromising your own WiFi security.
  • 개인정보 보호 기본 사항
이 기사에서는 WiFi를 사용할 때 누가 인터넷 기록을 볼 수 있는지, 무엇을 볼 수 있는지, 왜 보는지에 대해 알아봅니다.
en
  • Proton VPN 뉴스
Proton VPN for Business makes network segmentation and access control easy, providing secure internet access and all-around network security.
en
  • 개인정보 보호 기본 사항
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • 개인정보 보호 기본 사항
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Proton 스토리
See what independent reviewers are saying about the security and advanced features that come with Proton VPN's premium VPN plans.
en
  • 개인정보 보호 기본 사항
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.