Last Friday, a weaponized version of a NSA exploit was used to infect over two
hundred thousand computers in 150 countries with the WannaCry ransomware.
Determining whether a VPN service is trustworthy can be complicated.
Fortunately, there are a few easy steps you can follow to know if a VPN service
can be trusted.
Whether it's Facebook, New York Times or a website that you visit in secret,
your ISP has a record of all of your browsing history. This highly personal and
intimate data can be sold to the highest bidder.
Last March, Proton Mail launched out of beta. This March, we're bringing back
Proton Mail Beta so you can test new Proton Mail features before they are
released.
Earlier today, Wikileaks dumped a large database of secret documents from the
CIA. We did a deeper analysis of the leak and its implications on online
security and privacy.
As part of our efforts to continue protecting user privacy, we are launching a
Tor hidden service to combat censorship and surveillance of Proton Mail users.