Proton VPN 首頁
ProtonVPN

Latest articles

en
  • 隱私基礎
We discuss how to change the external and local IP addresses of your Windows device.
en
  • 隱私深入探討
WPA3 is the latest security standard for keeping your WiFi connections secure, and a great improvement over its aging predecessor (WPA2).
en
  • Proton VPN 新聞
The new Proton VPN Linux app is rebuilt from the ground up to be efficient, elegant, and modular in design.
en
  • 隱私深入探討
Perfect forward secrecy ensures that even if an internet session is compromised, past and future sessions remain secure.
en
  • 隱私深入探討
A zero-day is a previously unknown software vulnerability. A zero-day exploit is a cyberattack that takes advantage of a zero-day.
en
  • 隱私深入探討
IKEv2 is a VPN protocol used to secure a VPN connection. Part of the IPsec protocol suite, it is sometimes referred to as IKEv2/IPsec.
en
  • 隱私深入探討
Amazon Alexa devices undoubtedly bring unparalleled convenience to our lives. But this convenience comes at the price of privacy.
en
  • 隱私基礎
A kill switch is a security feature that protects your IP address in case you unexpectedly lose your connection to a VPN server.
en
  • 隱私基礎
A guest network lets you offer safe WiFi access for friends, office staff, customers, and iOT devices without compromising your own WiFi security.
  • 隱私基礎
在本文中,我們探討了當您使用 WiFi 時誰可以看到您的網際網路歷史記錄、他們可以看到什麼,以及他們為什麼可能會這樣做。
en
  • Proton VPN 新聞
Proton VPN for Business makes network segmentation and access control easy, providing secure internet access and all-around network security.