Página inicial do Proton VPN
ProtonVPN

Latest articles

en
  • Princípios básicos de privacidade
Tor Browser is a powerful privacy tool that lets you browse onion sites and protect your identity. Here’s how it works.
en
  • Princípios básicos de privacidade
In this article, we look at what a MAC address is and whether it poses a risk to your privacy or security.
en
  • Histórias da Proton
See what independent reviewers are saying about the security and advanced features that come with Proton VPN's premium VPN plans.
en
  • Princípios básicos de privacidade
Cyberattacks target weak security systems and unsuspecting victims. Learn the main cyberattack types and how to protect yourself.
en
  • Princípios básicos de privacidade
The Invisible Internet Project (I2P) is a decentralized anonymizing network built on similar principles to Tor.
en
  • Como fazer
F-Droid is an app store for Android that features only free and open-source software. We take a detailed look.
en
  • Princípios básicos de privacidade
We look at what cookies are and how they are used. Third-party cookies, in particular, can pose a threat to your online privacy.
en
  • Princípios básicos de privacidade
We discuss why and how streaming services geoblock content. That is, restrict content based on your geographic location.
  • Como fazer
Um guia para compartilhar sua conexão VPN do Windows e Linux com dispositivos como consoles de jogos e smart TVs.
en
  • Princípios básicos de privacidade
In this article, we discuss DNS — what it is, how it works, and how it impacts issues such as online privacy and censorship.
en
  • Princípios básicos de privacidade
VPNs use encryption to create a secure tunnel for your internet traffic. Learn how VPN tunnels work and why you might want to use them.