all-in-one privacy solution":["Proton Unlimited is een all-in-one privacy-oplossing"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Geen advertenties. Standaard privacy."],"People before profits":["Mensen vóór winst"],"Security through transparency":["Veiligheid door openheid"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["De beste ${ BLACK_FRIDAY }-deals voor Proton Mail"],"The world’s only community- supported email service":["'s Werelds enige door de community ondersteunde e-mailservice"]},"specialoffer:limited":{"${ hours } hour":["${ hours } uur","${ hours } uur"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Nog ${ hoursLeft }, ${ minutesLeft } en ${ secondsLeft } resterend"],"${ minutes } minute":["${ minutes } minuut","${ minutes } minuten"],"${ seconds } second":["${ seconds } seconde","${ seconds } seconden"],"Limited time offer":["Aanbieding beperkt geldig"]},"specialoffer:listitem":{"Create multiple addresses":["Maak meerdere e-mailadressen aan"],"Hide-my-email aliases":["Hide-my-email-aliassen"],"Quickly unsubscribe from newsletters":["Meld u eenvoudig af voor nieuwsbrieven"],"Use your own domain name":["Gebruik uw eigen domeinnaam"]},"specialoffer:logos":{"As featured in":["Zoals te lezen in"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Kies voor beveiligde e-mail die uw privacy beschermt"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Black Friday Sale - Tot 40% korting"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Profiteer tijdens Black Friday van wel 40% korting op Proton Mail-abonnementen. Bekijk geweldige aanbiedingen voor onze veilige, end-to-end versleutelde e-mailabonnementen."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Black Friday Sale | Tot 40% korting op veilige e-mail"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["*U betaalt ${ TOTAL_SUM } voor het eerste jaar"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*U betaalt ${ TOTAL_SUM } voor de eerste 2 jaar"],"30-day money-back guarantee":["30 dagen niet-goed-geld-terug-garantie"],"Billed at ${ TOTAL_SUM } for the first 2 years":["U betaalt ${ TOTAL_SUM } voor de eerste 2 jaar"],"Billed at ${ TOTAL_SUM } for the first year":["U betaalt ${ TOTAL_SUM } voor het eerste jaar"],"You save ${ SAVE_SUM }":["U bespaart ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["−${ DISCOUNT }"],"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Ik ben fan van ProtonMail"],"My favorite email service":["Mijn favoriete e-mailservice"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Proton houdt ons allemaal veilig in het complexe internetuniversum."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Je krijgt waarvoor je betaalt. In het geval van Big Tech betekent 'gratis' dat je wordt gebruikt. Ik ben gestopt met Gmail en overgestapt op @ProtonMail"]},"specialoffer:time":{"Days":["Dagen"],"Hours":["Uur"],"Min":["Min"]},"specialoffer:title":{"And much more":["En nog veel meer"],"Make your inbox yours":["Personaliseer uw inbox"],"Safe from trackers":["Beschermd tegen trackers"],"Stay organized":["Houd overzicht"],"Black Friday email deals":["Black Friday-deals voor e-mail"],"Don’t just take our word for it":["U hoeft ons niet te geloven"],"Our story":["Ons verhaal"],"Transfer your data from Google in one click":["Zet uw gegevens van Google over met één klik"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, verbinding met maximaal 10 apparaten, wereldwijd toegang tot streamingdiensten, malware- en advertentieblokkering, en meer."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Deel uw agenda eenvoudig met uw familie, vrienden of collega's, en bekijk externe agenda's."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Ondersteuning voor 1 aangepast e-maildomein, 10 e-mailadressen, 10 hide-my-email-aliassen, gedeelde agenda's en meer."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Ondersteuning voor 3 aangepaste e-maildomeinen, 15 e-mailadressen, onbeperkt hide-my-email-aliassen, gedeelde agenda's en meer."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Beheer tot 25 agenda's, mobiele apps, beveiligd met end-to-end versleuteling, agenda's van Google importeren met 1 klik, en meer."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Momenteel werkt de dienst van Proton VPN niet naar behoren"],"Learn more":["Meer informatie"]},"Status banner":{"Learn more":["Meer informatie"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["We ondervinden op dit moment problemen met de ${ issues[0] }service."],"We are experiencing issues with one or more services at the moment.":["We ondervinden momenteel problemen met een of meer services."]},"suggestions":{"Suggestions":["Suggesties"]},"Support":{"Sub category":["Subcategorie","Subcategorieën"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categorie","Categorieën"],"Didn’t find what you were looking for?":["Niet gevonden wat u zocht?"],"General contact":["Algemene contactgegevens"],"Get help":["Krijg hulp"],"Legal contact":["Contactgegevens voor juridische zaken"],"Media contact":["Contactgegevens voor media"],"Partnerships contact":["Contactgegevens voor partnerschappen"],"Reading":["Lezen"]},"Support categories":{"Browse Proton product support":["Zoeken in Proton-productondersteuning"]},"Support category":{"There is no article in this category yet.":["Er zijn nog geen artikelen in deze categorie."]},"Support troubleshooting":{"--- Select ---":["--- Selecteren ---"],"App version":["App-versie"],"Browser":["Browser"],"Check if this helps":["Kijk of dit helpt"],"Choose a category for your question":["Kies een categorie voor uw vraag"],"Choose a product":["Kies een product"],"Did this solve your issue ?":["Heeft dit uw probleem opgelost?"],"Faster assistance is just a few clicks away — please make your selections":["Snellere ondersteuning binnen een paar klikken — maak uw keuze"],"No, contact support":["Nee, contact opnemen met ondersteuning"],"Proton account":["Proton-account"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Bedankt voor uw feedback"],"Troubleshooting":["Probleemoplossing"],"What can we help with ?":["Waar mogen we u bij helpen?"],"Yes":["Ja"]},"support_modal_search_query":{"Search query":["Zoekopdracht"]},"support_search_button":{"Search":["Zoeken"]},"support_search_i_am_looking_for":{"I'm looking for":["Ik ben op zoek naar"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Om problemen sneller op te lossen, meldt u het via de Bridge-app: Help > Een probleem melden."],"Information":["Informatie"]},"SupportForm:option":{"Account Security":["Accountbeveiliging"],"Contacts":["Contactpersonen"],"Custom email domain":["Aangepast e-maildomein"],"Email delivery and Spam":["E-maillevering en spam"],"Encryption":["Versleuteling"],"Login and password":["Inlognaam en wachtwoord"],"Merge aliases and accounts":["Aliassen en accounts samenvoegen"],"Migrate to Proton":["Migreren naar Proton"],"Notifications":["Meldingen"],"Other":["Overig"],"Plans and billing":["Abonnementen en facturering"],"Proton for Business":["Proton for Business"],"Sign up":["Inschrijven"],"Storage":["Opslag"],"Users, addresses, and identities":["Gebruikers, adressen en identiteiten"]},"SupportForm:optionIntro":{"Select a topic":["Kies een onderwerp"]},"swiss_baseed_feature":{"Swiss based":["Gevestigd in Zwitserland"]},"Testimonial":{"Awards":["Awards"],"Customers":["Klanten"],"Featured":["Featured"],"Go to testimonial source":["Naar bron van testimonial"],"Reviews":["Reviews"],"Videos":["Video's"]},"Text":{"Find the plan that's right for you":["Vind het abonnement dat bij u past"],"If you need help, check out our ${ supportLink }.":["Bekijk onze ${ supportLink } als u hulp nodig hebt."],"The page you’re looking for might have been removed, or it could be an\nold link.":["De pagina waarnaar u op zoek bent, is mogelijk verwijderd, of u gebruikt een oude koppeling."]},"Tooltip":{"More information":["Meer informatie"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Maak tot 20 aangepaste en deelbare versleutelde agenda's aan. Voeg daar bovenop tot 5 agenda's toe van vrienden, familie, collega's en organisaties."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met meer dan ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, de hoogste VPN-snelheid, ${ TOTAL_VPN_CONNECTIONS } VPN-verbindingen, wereldwijde streamingdiensten, malware- en advertentieblokkering, en meer."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met meer dan ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, de hoogste VPN-snelheid, 10 VPN-verbindingen, wereldwijde streamingdiensten, malware- en advertentieblokkering, en meer."]},"version_history_label":{"Version history":["Versiegeschiedenis"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Bewaar tot ${ versionHistoryNumber } versies van elk bestand tot wel ${ years } jaar"]},"vpn_features_link":{"View VPN plans":["VPN-abonnementen bekijken"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Bekijk geblokkeerde inhoud en surf privé"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
As the world’s largest encrypted email provider(new window), people have frequently asked us what is the best VPN service. In this article, we discuss what to be aware of when choosing a VPN service, and our recommended VPN security requirements.
What is a VPN?
A Virtual Private Network (VPN) is a tool to secure your internet connection by masking your device’s IP address and encrypting your traffic. When your computer connects to a VPN, all your online activity passes through the Virtual Private Network, which in theory can shield you from surveillance or prevent your identity from being revealed.
Why use a VPN?
The primary use cases for a VPN service are the following:
Prevent your internet browsing from being monitored
Bypass censorship – VPNs allow you to access content that might be blocked in your country by the government or the content provider
Provide higher connection security when connecting to the internet from insecure locations (public wifi hotspot for example)
Whether or not a VPN service can actually accomplish this however depends significantly on the service in question. In fact, the vast majority of VPN services suffer from one or more security problems, which is why great care must be taken when selecting the best VPN service.
VPN Security Problems
About a year ago, we started to analyze VPN services more deeply in response from user inquiries. As we dug deeper however, we found numerous security and privacy flaws with most existing VPN services. This actually was the impetus that drove us to start working on VPN (more about this later). Below is a summary of the main VPN security issues.
VPN Security Vulnerabilities
Using pre-shared keys – A number of mainstream commercial VPNs have their preshared keys (PSKs) posted online; these include PureVPN and IPVPN(new window) . If an attacker knows the PSKs for a VPN service and has access to the network a user is using, the attacker can stage a man in the middle attack and decrypt all of the user’s traffic.
Insecure protocols and encryption – Many VPN services use PPTP protocol as a basic way to tunnel and encapsulate data packets. However, PPTP is fundamentally insecure due to using short length encryption keys and password hashes that can be easily cracked by a well resourced state actor. L2TP/IPSec is another popular VPN protocol. However, the NSA has already succeeded in tampering with it(new window). Furthermore, many VPN services which use more secure protocols such as OpenVPN remain vulnerable because of the use of insecure ciphers.
No Forward Secrecy – Most VPN services do not require use of Perfect Forward Secrecy ciphers, so VPN network traffic can be saved, and decrypted later if the encryption keys or algorithms are compromised.
DNS Leakage – Whenever a web connection is made, a computer will first translate a domain name into an IP address. This lookup is done via DNS servers. Thus, DNS lookup records(new window) also contain a log of all websites visited. While VPN services usually will protect web traffic, many do not protect DNS lookups, meaning that user’s browsing history can still be reconstructed from DNS lookups.
Methods of VPN Compromise
Even if a VPN service is not vulnerable to the internal problems listed above, they can still be compromised externally. Common problems that can lead to a VPN service being compromised include the following:
Jurisdiction – VPN providers are subject to the laws of the country that they operate in, and these laws (like the Investigatory Powers Act(new window) in the UK and the Foreign Intelligence Surveillance Act in the US) can force VPN providers to compromise their users. This means VPN providers with significant US and UK presence are compromised by default. These include HideMyAss (UK), VyperVPN (operated from the US), Strong VPN (US), HotSpot Shield (US), IP Vanish (US) and many others.
Compromised servers – VPN providers cannot maintain physical control and supervision over all servers, especially servers in countries that are not privacy friendly. This creates opportunities for state actors to compromise VPN exit servers, sometimes with the collusion (forced or not) of the companies providing servers to VPN operators. In a typical VPN setup, compromise of the exit server completely compromises the browsing activity of VPN users.
Correlation Attacks – Even if the exit server itself is not compromised, network based correlation attacks can still compromise a user. By seeing who is connecting to an VPN exit server at a given instant, and what sites the VPN exit server is connecting to, a user’s browsing can be reconstructed. Such an attack is easily within reach of most state actors as they can request assistance from ISPs.
What is the best VPN service?
It is clear that it’s not easy to build a VPN service that adequately protects users. In particular, some of the methods of VPN compromise are extremely difficult to defend against. Proton Mail’s mission has always been to protect freedom online, and to provide security and privacy to everyone. Today we protect diverse groups ranging from journalists and activists, to business professionals.
Having a secure VPN is an important part of this, which is why we are also developing Proton VPN(new window). With the Proton VPN project, we hope to bring to the public a secure and trustworthy free VPN service(new window) which addresses many of the security shortcomings which impact existing VPN services.
We believe that Proton VPN is able to meet a much higher standard for VPN security(new window), and the only VPN service which properly addresses all the shortfalls mentioned above. Most importantly, it meets the important conditions for VPN trust(new window).
Is it safe to use a VPN service?
If privacy is your only objective, the best VPN actually isn’t a VPN at all, but a free software known as Tor. Proton Mail has actually recently rolled out improved support for encrypted email with Tor(new window) through our new onion site. While Tor does provide a great deal of anonymity and security, there are still many reasons why you might still want to use a VPN service.
For one, Tor’s privacy comes at the cost of performance, and Tor is notoriously slow compared to the best VPN services out there. Furthermore, Tor is now increasingly being targeted by state actors(new window), so a trusted VPN service could be safer. VPN also has strong use cases for bypassing censorship and content blocks, or for obtaining better security from insecure locations like public wifi hotspots.
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as
the legal justification allowing federal agencies like the NSA, CIA, and FBI to
perform warrantless wiretaps, which sweep up the data of hundreds of thousands
of US citi
In response to the growing number of data breaches, Proton Mail offers a feature
to paid subscribers called Dark Web Monitoring. Our system checks if your
credentials or other data have been leaked to illegal marketplaces and alerts
you if so. Often
Your email address is your online identity, and you share it whenever you create
a new account for an online service. While this offers convenience, it also
leaves your identity exposed if hackers manage to breach the services you use.
Data breaches
Our mission at Proton is to help usher in an internet that protects your privacy
by default, secures your data, and gives you the freedom of choice.
Today we’re taking another step in this direction with the launch of our open
source password manage