Whether it is challenging governments, educating the public, or training journalists, we have a long history of fighting for privacy online and contributing to the open-source community. Our team has a long track record in security, having previously built Proton Mail - the world's largest encrypted email service. It is important you use a trustworthy VPN, which is why we are one of the only VPN companies that is transparent about exactly who is running the service. This means that unlike VPN providers based in a fourteen eyes country, we cannot be coerced into spying on our users. Because we are based in Switzerland, Proton VPN is protected by some of the world's strongest privacy laws and remains outside of US and EU jurisdiction. In addition to strong technical security, Proton VPN also benefits from strong legal protection. Full disk encryption secures server certificates and all other configurations and software stored on an exit server, so that even if the server is somehow compromised, attackers would not be able to access any data stored on it. This helps secure them from resource-intensive man-in-the-middle attacks of the kind that can be performed by governments. Learn MoreĪlthough virtually no personally identifiable data is stored on them anyway, all Proton VPN servers are protected by full disk encryption. If you live in a restrictive country, our unique Stealth VPN protocol allows you to avoid detection and bypass most internet censorship and VPN blocks. By using Proton VPN, you can be confident that your VPN tunnel is protected by the most reliable protocol. Proton VPN does not have any servers that support PPTP and L2TP/IPSec, even though they are less costly to operate. We use only VPN protocols known to be secure - OpenVPN, IKEv2, and WireGuard. With each connection, we generate a new encryption key, so a key is never used for more than one session. This means that your encrypted traffic cannot be captured and decrypted later if the encryption key from a subsequent session gets compromised. We have carefully selected our encryption cipher suites to only include ones that have perfect forward secrecy. This means all your network traffic is encrypted with AES-256, key exchange is done with 4096-bit RSA, and HMAC with SHA384 is used for message authentication. We use only the highest-strength encryption to protect your internet connection.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |