What is perfect forward secrecy?

October 31st, 2023 in Privacy deep dives

Perfect forward secrecy (PFS) is a cryptographic feature of internet communication protocols that ensures even if a session is compromised, past and future sessions remain secure. It achieves this by using a new and unique private encryption key for each session.  PFS is sometimes known simply as forward secrecy by those uncomfortable with the idea […]

Proton VPN Blog

Introducing Proton VPN for Business

August 21st, 2023 in Proton News

Today, we’re happy to announce the official launch of Proton VPN for Business. Since 2016, Proton has been progressively bringing our privacy and security services to enterprises. Today, over 50,000 organizations around the world trust Proton to secure their business, representing over 10% of Proton’s annual turnover. Ever since we launched Proton VPN, we’ve received […]

What is Tor Browser?

August 18th, 2023 in Privacy basics

Tor Browser is a privacy-focused browser that lets you navigate the internet without anyone monitoring your activity or identifying you. It relies on the Tor anonymity network to route your internet traffic through multiple random servers before connecting to your desired website or service. You can download Tor Browser here. This article explains more about […]

What is a MAC address, and what can it reveal about you?

August 17th, 2023 in Privacy basics

Every device that connects to a network does so through a network interface controller (NIC). Devices that can connect to multiple networks will have a separate NIC for each connection they support. For example, a laptop that supports WiFi, Ethernet (wired), and Bluetooth connections would have three NICs (each with its own MAC address).    Every […]

Proton VPN Reviews

August 16th, 2023 in Proton Stories

We’ve compiled a full list of recent reviews of Proton VPN’s paid VPN plans. All of these reviews are from independent review sites. This post was updated in August 2023. Proton VPN receives consistently good reviews from professional technology journalists. Here, we collect some of these to make it easier for you to evaluate our […]

8 common types of cyberattacks and how to prevent them

July 28th, 2023 in Privacy basics

Hackers are always looking for ways to break through the security systems that defend your devices and data from criminals. From web browsers to operating systems to chat apps, any piece of software is a potential target. It’s a constant game of cat and mouse, with developers releasing patches whenever security researchers discover a new […]

What is I2P and how does it work?

June 30th, 2023 in Privacy basics

The Invisible Internet Project (I2P) is an open-source, decentralized anonymizing network built on similar principles to Tor. Unlike Tor, which was primarily designed to allow anonymous browsing of the regular internet (but can also be used as a dark web), I2P is primarily designed to browse the dark web (but can also be used to […]

What is a VPN?

June 26th, 2023 in Privacy basics

An almost daily drumbeat of data breaches and online privacy violations has fueled public interest in VPN services such as Proton VPN. This article explains what VPNs are, what they do, and whether you need one. Its sister article, How does a VPN work?, provides a more detailed and technical overview of how a VPN […]

What is F-Droid and should you use it?

June 23rd, 2023 in How-to

F-Droid is an app store for Android that features only free and open-source software (FOSS). This makes it a welcome alternative to the privacy-invading Google Play Store. In this article, we look at what F-Droid is, why you might want to use it, and how to use it. We also examine some concerns about F-Droid.  […]

What are cookies and how are they used?

June 15th, 2023 in Privacy basics

Internet cookies, often called website cookies, computer cookies, or just cookies, are small text files that websites store on your computer or device when you visit them. These files contain data that websites use to remember and track information about your browsing activity. In this article, we look at what cookies are and how they […]

Secure
your internet

Get Proton VPN
Get Proton VPN

Contact us

Support form

Tell us about the problem and we'll get back to you as soon as we can.

Open support form

Live chat

Get help from a support agent in real time. Available with a paid VPN subscription.

Chat with us

Secure email

Send us an encrypted message at contact@protonvpn.com. It may take us longer to respond.

Email us