ProtonVPN
-
How to secure online banking with a VPN
Once an industry that revolved around paper (or, in the United States’s case, cotton) currency, banking has now, for the most part, moved online. Today you can cash your paycheck, transfer some money to savings, pay your bills, and reimburse a friend for dinner all from your bank’s app. This is undoubtedly more convenient, but […]
-
Supercharge peer-to-peer speeds with port forwarding
You asked and we listened. Following months of hard work by our engineering team, we are excited to announce a feature that you, our passionate and highly engaged community, have been clamoring for: port forwarding. Now available for our Windows VPN app, port forwarding is a new feature that dramatically improves download speeds when using peer-to-peer (P2P) […]
-
ProtonVPN’s no-logs policy confirmed by an external audit
Today, we are excited to announce we passed a new milestone in our drive to make Proton as transparent as possible with the completion of a third-party audit of our infrastructure that confirmed our strict no-logs policy. Now, when we say we are a no-logs VPN, it is not just a claim: it has been double-checked […]
-
Based in Switzerland
Based in Switzerland so you stay private everywhere. ProtonVPN is based in Switzerland, giving you the protection of some of the world’s strongest privacy laws. A Swiss-based VPN service When you connect to ProtonVPN, you enjoy the same legal protections that ensure the privacy of all Swiss citizens. ProtonVPN is built by the same group […]
-
Free VPN for iOS and iPadOS
Defeat censorship and protect your online activity with our easy-to-use iOS app. Download our secure, free app for your iPhone or iPad ProtonVPN’s app for iOS and iPadOS protects your privacy and defeats online censorship. No logs Based in Switzerland, ProtonVPN has a strict no-logs policy and does not collect any data that might compromise […]
-
What is an IP address?
An Internet Protocol (IP) address is a numerical label that uniquely identifies every device that connects to the internet. It is used to: Identify a device or network connected to the internet Route packets (containing data) so they can find a device or network that is connected to the internet If your device connects directly […]
-
Dealing with cyberstalking: How to protect your privacy and stay safe online
Dealing with cyberstalking: How to protect your privacy and stay safe online With the proliferation of smartphones and social media, cyberstalking is on the rise. Compared to traditional stalking, cyberstalking can be a more threatening form of aggression as cyberstalkers can hide behind the anonymity of the internet and terrorize their victims around the clock. […]
-
ProtonVPN: The ultimate guide to torrenting
Torrenting is an incredibly fast and efficient way to distribute large files over the internet. Although often considered to be synonymous with piracy, there are many legitimate use cases for torrenting. However, before diving into the world of P2P file sharing, you should understand what torrenting is, how it works, and how to protect yourself […]
-
What is Secure Core VPN?
A common method to expose VPN traffic is to compromise the server that handles your traffic. This risk is particularly acute for servers located in high-risk jurisdictions. To mitigate this risk, ProtonVPN has Secure Core servers. This article provides an overview of the attacks and threats that Secure Core mitigates, how it achieves higher VPN privacy, as well as […]
-
VPN Security Features
When you use ProtonVPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, ProtonVPN’s advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access websites that might be blocked in your country.
-
ProtonVPN only uses strong, secure VPN protocols
The VPN protocol determines the security, stability, and speed of your VPN connection, which is why we only use protocols with strong security track records.
-
ProtonVPN keeps no logs and never will
ProtonVPN is committed to protecting your privacy, which is why we have a strict no-logs policy. We do not keep any logs of your online activity and do not store any metadata.
-
Secure Core VPN safeguards your data
ProtonVPN’s Secure Core network gives your data an additional layer of security and defends you against advanced attacks. We installed our Secure Core servers(new window) and continue to operate them ourselves to eliminate any chance that they could be tampered with, and all Secure Core VPN servers are located in countries with strong data privacy […]
-
Save up to 50% with a special offer on our premium VPN Plus plan
Make the best of our year-end discounts and secure your internet connection with a VPN you can trust.
-
Two-factor authentication on ProtonVPN
Two-factor authentication (2FA) adds an additional layer of security to your ProtonVPN account by requiring a second round of verification to the login process. To use 2FA, you must have a device with an authenticator app installed on it. The authenticator app creates one-time passwords to use as verification codes when logging in.
-
Guide to installing ProtonVPN on different routers
There are many advantages to configuring your router to run ProtonVPN. These include: No need to set up a VPN on each device Protects devices that don’t support VPNs Automatically secures all your Internet traffic Protects your entire household with one device
-
WireGuard speed, Proton privacy
In 2017, we launched ProtonVPN to defeat censorship and protect activists, journalists, and ordinary people on the internet. Since then, we’ve continued to build new features like NetShield Adblocker and, more recently, our unique VPN Accelerator for our community.
-
What is the difference between a proxy and a VPN?
A proxy is any server that sits between your device and a wider network, such as the internet. A virtual private network (VPN) server is a specific kind of proxy, but many other kinds of proxy exist. Although inaccurate (and as a result, confusing), VPNs are often contrasted to proxies.