Proton's VPN routes users through encrypted tunnels, and the VPN app for iOS supports advanced security features, such as Secure Core, which passes mobile user traffic through multiple servers (325 servers are available) to defend against bad actors attempting to trace mobile IP addresses, and Tor via VPN. The new app also uses the latest Internet Key Exchange (IKEv2) protocol, which provides for higher speeds and stability on a VPN network.
I'm always on the lookout for better VPN services. I started with Protonmail years ago when I was looking for a better way to email tax documents. I liked what Protonmail had to say about privacy. I really like what they are saying about VPN now. But who knows, I could be a sucker on two accounts.
I do think VPNs are a good thing but are too complicated for most of us to understand. There's a lot of trust (or ignorance) required to use them. I already don't trust my mobile carriers or ISPs so the question is who do I mistrust more. One advantage to a VPN in my real-world life is that a VPN can often get around network restrictions that prevent SFTP or SSH access. This is something I run into regularly when trying to manage a server while on a mobile device. VPNs somewhat hide that traffic and get around some network filters.
From Nieman Labs:
The top line takeaway from its analysis of 100 million articles is that social sharing is down by 50 percent across the board compared to just a few years ago. In 2015, articles saw an average of 8 shares; today that number has dropped to 4. Only ...
I shouldn’t have a LinkedIn account. If you think you are contacting me there, you should know that I’m in a non-mutual relationship with LinkedIn. I “deleted” my account back around 2012 when they had their big, poorly communicated, and majorly mishandled data breach. But, I still get ...
Chris Duckett ZDNet article (A VPN will not save you from government surveillance) is informative, if a little hyperbolic:
Under the laws that force telcos to store customers' call records, location information, IP addresses, billing information, and other data for two years, there is a small caveat for journalists that ...
Darren Nix describes how one service can track you and share your name, email and company with every other site you visit:
When a user visits a site without ever having voluntarily supplied information to that site, should the user have an expectation that their identity is private until they ...
Page 1 / 1