![]() ![]() This makes us perhaps the only VPN provider that has had its claims verified by a trusted third party. Recently, Mozilla, a longtime advocate for user privacy and strong cybersecurity practices themselves, conducted a thorough evaluation of our no logs policy, our infrastructure, and the cryptography we use to encrypt user traffic. We’re happy to see that our focus on transparency and security is starting to be more widely recognized. The fact that one million people use Proton VPN today to protect their privacy indicates that this was the right approach. As former CERN scientists, we decided to build Proton VPN to meet our own exacting standards of transparency and security. However, the VPN industry in general is shadowy and rife with unethical business practices. Back in September 2016, we were invited to the Second Asia Investigative Journalism Conference, and there we had an opportunity to see how Proton Mail was being used out in the field, and what other tools would benefit our community.įrom those observations we saw how VPNs are necessary to keep online activity private and how they allow journalists to bypass censorship blocks to reach important online resources. Proton VPN came into being when we began speaking with Proton Mail users with special security requirements. This represents a major milestone in our journey towards helping our users take back their online privacy and freedom. With the release of our iOS app (available as a free download at the App Store), Proton VPN protection is now available on all the most popular operating systems (Windows, MacOS, Linux, Android, and iOS). ![]() The Proton VPN app for iOS has been eagerly awaited by our community almost since the day we launched. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |