
You can learn more about Secure Core here. This provides extra security in the event an advanced adversary is tapping our exit servers and running correlation/timing attacks. Proton VPN also offers some protection in the following situations: Protection against VPN compromiseīecause of Proton VPN’s unique Secure Core architecture, we can protect your identity even if you are exiting through a server in a country that has extensive surveillance infrastructure and capabilities (US, UK, etc). Note, as a Swiss company, our official policy is in line with Swiss law, which only permits file sharing for personal, non-commercial use. Proton VPN allows safe file sharing and bittorrent because we route P2P traffic through safe countries. Even worse, file sharing can lead to severe penalties and fines in some countries. Many ISPs will block bittorrent or other file sharing protocols. If your ISP is blocking traffic to certain websites (or websites are blocking access for visitors from certain countries), a VPN can help to bypass these blocks and ensure that all of the world’s information remains freely accessible. Because all of your traffic is encrypted, your ISP will not be able to selectively throttle or slow down certain types of traffic. Preventing data discriminationĪ VPN service can help ensure net neutrality. The contents of your traffic, including what websites you are visiting, or what data you are transferring, is hidden from your ISP. The only data that is visible to your Internet Service Provider (ISP) is that you have made a connection to a Proton VPN server. Hiding your browsing history from your ISP

This means you can safely browse even on public internet networks. This encrypted tunnel is secured with AES-256, and will successfully prevent an adversary who has control over the internet connection that you are using from being able to snoop on your traffic. Proton VPN establishes an encrypted tunnel between your computer and any one of our VPN servers around the world. Proton VPN is designed to be effective in the following situations: Securing an insecure internet connection
#VPN GUARD PLUGIN HOW TO#
To get a better idea of the security risks that are faced by VPNs in general, please look at this article about how to find the best VPN service. This article applies rather specifically to Proton VPN, because Proton VPN contains unique VPN security features which allow it to defend against a wider range of threats compared to other VPN services. For this reason, whether it is Proton Mail or Proton VPN, we are always fully transparent when it comes to defining the threat model for the services that we provide.

We believe that the only thing worse than no security, is a false sense of security. This covers the threats a VPN is designed to guard against, and also the threats a VPN cannot counter. In this article, we analyze the VPN threat model.
