The Proton VPN BlogFree VPN Newshttps://protonvpn.com/blog/enhttps://protonvpn.com/blog/feedHow and where to live stream Thanksgiving football games this yearhttps://protonvpn.com/blog/thanksgiving-football-gameshttps://protonvpn.com/blog/thanksgiving-football-gamesHere's how you can live stream this year's Thanksgiving football games using Proton VPN, whether you're watching from home or abroad.Wed, 06 Nov 2024 16:44:49 GMT <p>Thanksgiving Day football games are a longstanding US tradition, featuring both NFL and college games. They&#8217;ve become a cherished part of the holiday, with families gathering to watch their favorite teams play before or after a meal, making it as much a part of the day as turkey and pumpkin pie.&nbsp;</p> <p>If you’re away from home and want to indulge yourself in the full American Thanksgiving experience, you can <a href="https://protonvpn.com/streaming" target="_blank" rel="noreferrer noopener">stream</a> the NFL Thanksgiving games using <a href="https://protonvpn.com/streaming/sports" target="_blank" rel="noreferrer noopener">Proton VPN</a>. </p> <h2 class="wp-block-heading">What football games are on Thanksgiving 2024?</h2> <p>The three big NFL games are officially hosted by CBS, Fox News, and NBC. They’re also available on streaming platforms owned by those broadcasters. Thanksgiving weekend this year also features a Black Friday game showing on amazon Prime, pitting the Las Vegas Raiders against the Kansas City Chiefs.</p> <figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Date</strong></td><td><strong>Game</strong></td><td><strong>Time (EST)</strong></td><td><strong>Stream on</strong></td></tr><tr><td>Thursday, Nov. 28</td><td>Chicago Bears at Detroit Lions</td><td>12:30 p.m.</td><td>CBS, Paramount+&nbsp;</td></tr><tr><td>Thursday, Nov. 28</td><td>New York Giants at Dallas Cowboys</td><td>4:30 p.m.</td><td>Fox News</td></tr><tr><td>Thursday, Nov. 28</td><td>Miami Dolphins at Green Bay Packers</td><td>8:20 p.m.</td><td>NBC, Peacock</td></tr><tr><td>Friday, Nov. 29</td><td>Las Vegas Raiders at Kansas City Chiefs</td><td>3:00 p.m.</td><td>Amazon Prime Video</td></tr></tbody></table></figure> <p>In this guide, we focus on using NBC, Fox, and CBS to watch the official NFL Thanksgiving football games. To watch the games on other platforms (including the Black Friday game on Prime), we have the streaming guides for:&nbsp;</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/support/watch-peacock-with-vpn/" target="_blank" rel="noreferrer noopener">Peacock</a> (NBCUniversal’s streaming service)</li> <li><a href="https://protonvpn.com/support/watch-paramount-with-vpn/" target="_blank" rel="noreferrer noopener">Paramount+</a> (CBS’s streaming service)</li> <li><a href="https://protonvpn.com/support/watch-amazon-prime-with-vpn/" target="_blank" rel="noreferrer noopener">Amazon Prime Video</a></li> </ul> <h2 class="wp-block-heading">How to watch Thanksgiving football games using Proton VPN</h2> <p>To use streaming services via Proton VPN, you’ll need a paid Proton VPN plan. If you already have a Proton VPN Free plan, you can <a href="https://account.protonvpn.com/login/" target="_blank" rel="noreferrer noopener">upgrade your account</a> by logging in and selecting <strong>Plus</strong> (or another paid plan) from your account dashboard. </p> <p>If you don’t have a Proton VPN account, you can <a href="https://protonvpn.com/pricing" target="_blank" rel="noreferrer noopener">sign up for a Plus plan here</a>.</p> <h3 class="wp-block-heading">From your browser</h3> <p>1. If you haven’t already, you’ll need to download and install Proton VPN for your device.&nbsp;</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/download-windows" target="_blank" rel="noreferrer noopener">Proton VPN for Windows</a></li> <li><a href="https://protonvpn.com/download-macos" target="_blank" rel="noreferrer noopener">Proton VPN for macOS</a></li> <li><a href="https://protonvpn.com/download-linux" target="_blank" rel="noreferrer noopener">Proton VPN for Linux</a></li> </ul> <p>2. Log in to Proton VPN and connect to any Plus (not free) server located in the United States.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="500" height="818" data-public-id="wp-vpn/united-states/united-states.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_500,h_818,c_scale/f_auto,q_auto/v1730474774/wp-vpn/united-states/united-states.png?_i=AA" alt="Connect to any Plus server in the US" class="wp-post-10162 wp-image-10148" data-format="png" data-transformations="f_auto,q_auto" data-version="1730474774" data-seo="1" data-filesize="218 KB" data-optsize="29 KB" data-optformat="image/webp" data-percent="86.8" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10148" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1730474774/wp-vpn/united-states/united-states.png?_i=AA 500w, https://res.cloudinary.com/dbulfrlrz/images/w_183,h_300,c_scale/f_auto,q_auto/v1730474774/wp-vpn/united-states/united-states.png?_i=AA 183w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div> <p>3. Visit the <a href="https://www.nbc.com/" target="_blank" rel="noreferrer noopener">NBC</a>, <a href="https://www.foxnews.com/" target="_blank" rel="noreferrer noopener">Fox</a> or <a href="https://www.cbs.com/" target="_blank" rel="noreferrer noopener">CBS</a> websites and just start watching the game.</p> <h3 class="wp-block-heading">On a mobile device</h3> <p>NBC, Fox, and CBS offer mobile apps:</p> <ul class="wp-block-list"> <li><strong>NBC</strong> —  <a href="https://play.google.com/store/apps/details?id=com.nbcuni.nbc&amp;hl=en" target="_blank" rel="noreferrer noopener">Android</a>, <a href="https://apps.apple.com/us/app/the-nbc-app-stream-tv-shows/id442839435" target="_blank" rel="noreferrer noopener">iOS and iPadOS</a></li> <li><strong>Fox</strong> — <a href="https://play.google.com/store/apps/details?id=com.foxnews.android&amp;hl=en" target="_blank" rel="noreferrer noopener">Android</a>, <a href="https://apps.apple.com/us/app/fox-news-us-world-headlines/id367623543?mt=8" target="_blank" rel="noreferrer noopener">iOS and iPadOS</a></li> <li><strong>CBS</strong> — <a href="https://play.google.com/store/apps/details?id=com.cbs.tve&amp;hl=en-US" target="_blank" rel="noreferrer noopener">Android</a>, <a href="https://apps.apple.com/us/app/cbs/id1540866664" target="_blank" rel="noreferrer noopener">iOS and iPadOS</a></li> </ul> <p>1. If you haven’t already, you’ll need to download and install Proton VPN for your device.&nbsp;</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/download-android" target="_blank" rel="noreferrer noopener">Proton VPN for Android</a></li> <li><a href="https://protonvpn.com/download-ios" target="_blank" rel="noreferrer noopener">Proton VPN for iOS and iPadOS</a></li> </ul> <p>2. Log in to Proton VPN and connect to any Plus (not free) server located in the United States.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="400" height="983" data-public-id="wp-vpn/united-states-android/united-states-android.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_400,h_983,c_scale/f_auto,q_auto/v1730474842/wp-vpn/united-states-android/united-states-android.png?_i=AA" alt="Connect to any Plus server in the US" class="wp-post-10162 wp-image-10149" data-format="png" data-transformations="f_auto,q_auto" data-version="1730474842" data-seo="1" data-filesize="96 KB" data-optsize="21 KB" data-optformat="image/webp" data-percent="78.1" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10149" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1730474842/wp-vpn/united-states-android/united-states-android.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_122,h_300,c_scale/f_auto,q_auto/v1730474842/wp-vpn/united-states-android/united-states-android.png?_i=AA 122w" sizes="(max-width: 400px) 100vw, 400px" /></figure></div> <p>3. Download the NBC, Fox, or CBS app and just start watching the game!</p> <h3 class="wp-block-heading">On your smart TV</h3> <p>NBC, Fox, and CBS apps are available for Android TV, Amazon Fire TV (“firestick”), and Apple TV.&nbsp;</p> <p>1. Download Proton VPN for:</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/download-androidtv" target="_blank" rel="noreferrer noopener">Android TV</a></li> <li><a href="https://protonvpn.com/support/firestick/" target="_blank" rel="noreferrer noopener">Fire TV</a></li> <li><a href="https://protonvpn.com/download-appletv" target="_blank" rel="noreferrer noopener">Apple TV</a></li> </ul> <p>2. Log in to Proton VPN and connect to any plus (not-free) server located in the United States.</p> <p>3. Install the NBC or CBS app on your Android TV, Fire TV, or Apple TV device and just start watching the game.</p> <h2 class="wp-block-heading">What are Thanksgiving day football games?</h2> <p>Football on Thanksgiving began with high school and college matchups in the late 1800s, but the NFL established the professional tradition in 1934. The NFL hosts three games on Thanksgiving Day, featuring long standing rivalries and newer matchups:</p> <ul class="wp-block-list"> <li><strong>Detroit Lions</strong>: The Lions have hosted a Thanksgiving Day game every year since 1934 (except during World War II). </li> <li><strong>Dallas Cowboys</strong>: In 1966, the Cowboys joined the tradition, hosting a Thanksgiving game each year (except in 1975 and 1977). </li> <li><strong>Rotating night game</strong>: Since 2006, the NFL has added a third game in the evening, featuring rotating teams. T</li> </ul> How-toDouglas CrawfordHow to watch the Macy&#8217;s Thanksgiving Day Parade live from anywherehttps://protonvpn.com/blog/how-to-watch-macys-thanksgiving-day-paradehttps://protonvpn.com/blog/how-to-watch-macys-thanksgiving-day-paradeHere's how and where to watch Macy's Thanksgiving Day Parade live from anywhere in the world with Proton VPN.Tue, 05 Nov 2024 17:53:03 GMT <p>Although broadcast nationally, live coverage of the Macy&#8217;s Thanksgiving Day Parade is not available outside the United States. However, with <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener">Proton VPN</a>, you can <a href="https://protonvpn.com/streaming" target="_blank" rel="noreferrer noopener">easily watch</a> this fun annual extravaganza from wherever you are in the world.</p> <h2 class="wp-block-heading">Where to watch the Macy&#8217;s Thanksgiving Day Parade</h2> <p>NBC is the official broadcaster for the event, so the easiest way to watch the parade (for free with ads) is on NBC. It’s also available (for free with ads) on CBS, using its own hosts.</p> <p>In this guide, we’ll focus on using NBC and CBS to watch the Macy&#8217;s Thanksgiving Day Parade. But it can also be streamed on the following platforms (possibly subject to specific location):</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/support/watch-peacock-with-vpn/" target="_blank" rel="noreferrer noopener">Peacock</a> (NBCUniversal’s streaming service)</li> <li><a href="https://protonvpn.com/support/watch-sling-tv-with-vpn/" target="_blank" rel="noreferrer noopener">Sling TV</a></li> <li><a href="https://protonvpn.com/support/watch-paramount-with-vpn/" target="_blank" rel="noreferrer noopener">Paramount+</a> (CBS’s streaming service)</li> <li><a href="https://protonvpn.com/support/hulu-vpn/" target="_blank" rel="noreferrer noopener">Hulu + Live TV</a></li> <li><a href="https://protonvpn.com/support/how-to-unblock-youtube-tv-with-proton-vpn/" target="_blank" rel="noreferrer noopener">YouTube TV</a></li> </ul> <h2 class="wp-block-heading">How to watch the Macy&#8217;s Thanksgiving Day Parade using Proton VPN</h2> <p>To use streaming services via Proton VPN, you’ll need a paid Proton VPN plan. If you already have a Proton VPN Free plan, you can <a href="https://account.protonvpn.com/login/" target="_blank" rel="noreferrer noopener">upgrade your account</a> by logging in and selecting <strong>Plus</strong> (or another paid plan) from your account dashboard. </p> <p>If you don’t have a Proton VPN account, you can <a href="https://protonvpn.com/pricing" target="_blank" rel="noreferrer noopener">sign up for a Plus plan here</a>.</p> <h3 class="wp-block-heading">From your browser</h3> <p>1. If you haven’t already, you’ll need to download and install Proton VPN for your device.&nbsp;</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/download-windows" target="_blank" rel="noreferrer noopener">Proton VPN for Windows</a></li> <li><a href="https://protonvpn.com/download-macos" target="_blank" rel="noreferrer noopener">Proton VPN for macOS</a></li> <li><a href="https://protonvpn.com/download-linux" target="_blank" rel="noreferrer noopener">Proton VPN for Linux</a></li> </ul> <p>2. Log in to Proton VPN and connect to any Plus (not free) server located in the United States.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="500" height="818" data-public-id="wp-vpn/united-states/united-states.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_500,h_818,c_scale/f_auto,q_auto/v1730474774/wp-vpn/united-states/united-states.png?_i=AA" alt="Connect to any Plus server in the US" class="wp-post-10147 wp-image-10148" data-format="png" data-transformations="f_auto,q_auto" data-filesize="218 KB" data-optsize="29 KB" data-optformat="image/webp" data-percent="86.8" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10148" data-version="1730474774" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1730474774/wp-vpn/united-states/united-states.png?_i=AA 500w, https://res.cloudinary.com/dbulfrlrz/images/w_183,h_300,c_scale/f_auto,q_auto/v1730474774/wp-vpn/united-states/united-states.png?_i=AA 183w" sizes="(max-width: 500px) 100vw, 500px" /></figure></div> <p>3. Visit either the <a href="https://www.nbc.com/" target="_blank" rel="noreferrer noopener">NBC</a> or <a href="https://www.cbs.com/" target="_blank" rel="noreferrer noopener">CBS</a> website and just start watching the parade.</p> <h3 class="wp-block-heading">On a mobile device</h3> <p>NBC apps are available for <a href="https://play.google.com/store/apps/details?id=com.nbcuni.nbc&amp;hl=en" target="_blank" rel="noreferrer noopener">Android</a>, <a href="https://apps.apple.com/us/app/the-nbc-app-stream-tv-shows/id442839435" target="_blank" rel="noreferrer noopener">iOS and iPadOS</a>. CBS apps are also available for <a href="https://play.google.com/store/apps/details?id=com.cbs.tve&amp;hl=en-US" target="_blank" rel="noreferrer noopener">Android</a>, <a href="https://apps.apple.com/us/app/cbs/id1540866664" target="_blank" rel="noreferrer noopener">iOS and iPadOS</a>. </p> <p>1. If you haven’t already, you’ll need to download and install Proton VPN for your device.&nbsp;</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/download-android" target="_blank" rel="noreferrer noopener">Proton VPN for Android</a></li> <li><a href="https://protonvpn.com/download-ios" target="_blank" rel="noreferrer noopener">Proton VPN for iOS and iPadOS</a></li> </ul> <p>2. Log in to Proton VPN and connect to any Plus (not free) server located in the United States.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="400" height="983" data-public-id="wp-vpn/united-states-android/united-states-android.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_400,h_983,c_scale/f_auto,q_auto/v1730474842/wp-vpn/united-states-android/united-states-android.png?_i=AA" alt="Connect to any Plus server in the US" class="wp-post-10147 wp-image-10149" data-format="png" data-transformations="f_auto,q_auto" data-filesize="96 KB" data-optsize="21 KB" data-optformat="image/webp" data-percent="78.1" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10149" data-version="1730474842" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1730474842/wp-vpn/united-states-android/united-states-android.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_122,h_300,c_scale/f_auto,q_auto/v1730474842/wp-vpn/united-states-android/united-states-android.png?_i=AA 122w" sizes="(max-width: 400px) 100vw, 400px" /></figure></div> <p>3. Download the NBC or CBS app and just start watching the parade.</p> <h3 class="wp-block-heading">On your smart TV</h3> <p>NBC and CBS apps are available for Android TV, Amazon Fire TV (“firestick”), and Apple TV.&nbsp;</p> <p>1. Download Proton VPN for:</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/download-androidtv" target="_blank" rel="noreferrer noopener">Android TV</a></li> <li><a href="https://protonvpn.com/support/firestick/" target="_blank" rel="noreferrer noopener">Fire TV</a></li> <li><a href="https://protonvpn.com/download-appletv" target="_blank" rel="noreferrer noopener">Apple TV</a></li> </ul> <p>2. Log in to Proton VPN and connect to any plus (not-free) server located in the United States.</p> <p>3. Install the NBC or CBS app on your Android TV, Fire TV, or Apple TV device and just start watching the parade.</p> <h2 class="wp-block-heading">Frequently asked questions</h2> <div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1730474902205"><strong class="schema-faq-question"><strong>What is the Macy&#8217;s Thanksgiving Day Parade?</strong></strong> <p class="schema-faq-answer">The Macy&#8217;s Thanksgiving Day Parade is held each year in New York City on Thanksgiving Day, organized and sponsored by the department store Macy&#8217;s. Since 1924, this tradition has drawn large crowds and has become famous for its giant balloons, elaborate floats, musical performances, and celebrity appearances.</p> </div> <div class="schema-faq-section" id="faq-question-1730474924489"><strong class="schema-faq-question"><strong>What time is the Macy&#8217;s Thanksgiving Day Parade 2024?</strong></strong> <p class="schema-faq-answer">The Parade is held on Thursday, November 28. It starts at 9am EST and finishes at midday (12pm).</p> </div> <div class="schema-faq-section" id="faq-question-1730474948240"><strong class="schema-faq-question"><strong>How long is the Macy&#8217;s Thanksgiving Day Parade?</strong></strong> <p class="schema-faq-answer">The parade lasts three hours. You can find the full route <a href="https://www.macys.com/s/parade/route/?lid=parade_primarycta-route">here</a>. </p> </div> <div class="schema-faq-section" id="faq-question-1730474971807"><strong class="schema-faq-question"><strong>When was the first Macy&#8217;s Thanksgiving Day Parade?</strong></strong> <p class="schema-faq-answer">The Macy&#8217;s Thanksgiving Day Parade first took place in 1924, making it the <a href="https://en.wikipedia.org/wiki/America%27s_Thanksgiving_Parade" target="_blank" rel="noreferrer noopener">joint second-oldest</a> Thanksgiving parade in the United States (the 1920 <a href="https://en.wikipedia.org/wiki/6abc_Dunkin%27_Donuts_Thanksgiving_Day_Parade" target="_blank" rel="noreferrer noopener">6abc Dunkin&#8217; Thanksgiving Day Parade</a> in Philadelphia being the first).</p> </div> <div class="schema-faq-section" id="faq-question-1730475006057"><strong class="schema-faq-question"><strong>What channel is the Macy&#8217;s Thanksgiving Day Parade on?</strong></strong> <p class="schema-faq-answer">NBC is the official broadcaster for the Macy&#8217;s Thanksgiving Day Parade, but it&#8217;s also broadcast on CBS with its own presenters. </p> </div> </div> <p></p> <p></p> How-toDouglas CrawfordProton VPN roadmap: Product updates coming this winterhttps://protonvpn.com/blog/product-roadmap-winter-2024-2025https://protonvpn.com/blog/product-roadmap-winter-2024-2025Here are the main things Proton VPN delivered this spring and summer and the exciting changes that lie ahead on our product roadmap this winter.Tue, 05 Nov 2024 11:51:58 GMT <p>As part of <a href="https://protonvpn.com/about#:~:text=Our%20mission%20is%20to%20make,and%20privately%20access%20the%20Internet." target="_blank" rel="noreferrer noopener">our mission</a> to help everyone access digital privacy, we&#8217;ve been continuously evolving Proton VPN. To ensure you don’t miss anything, here&#8217;s a look at what we achieved during the first half of this year, what we’re working on now, and what’s coming.&nbsp;</p> <h2 class="wp-block-heading">What Proton VPN delivered in spring and summer</h2> <p>It’s been a busy year here at Proton VPN, and we’re pleased to say that we’ve been able to fulfill many of the more popular requests from our community. Recent improvements include:</p> <h3 class="wp-block-heading">Stealth protocol for Windows</h3> <p>Our unique <a href="https://protonvpn.com/blog/stealth-vpn-protocol/" target="_blank" rel="noreferrer noopener">Stealth</a> VPN protocol allows you to bypass advanced VPN blocks, access censored sites, and communicate with people on social media, even if your government is trying to restrict access. Already available on most other platforms, Stealth is now available on Windows.&nbsp;</p> <h3 class="wp-block-heading">Discrete app icons on Android</h3> <p>To help keep our community safe, Proton VPN allows you to replace the Proton VPN app icon with an <a href="https://protonvpn.com/support/disguise-app-icon" target="_blank" rel="noreferrer noopener">innocuous-looking icon</a> that’s unlikely to be noticed if your Android device is searched.</p> <h3 class="wp-block-heading">WireGuard support for Linux</h3> <p>In addition to OpenVPN, our Linux app now supports <a href="https://protonvpn.com/blog/what-is-wireguard/" target="_blank" rel="noreferrer noopener">WireGuard</a>. Fast and lightweight, but also highly secure, this modern VPN protocol supersedes most older standards and is available on all our other apps. Now it&#8217;s also available on our Linux app.</p> <h3 class="wp-block-heading">Split tunneling improvements</h3> <p><a href="https://protonvpn.com/support/protonvpn-split-tunneling/#android-tv" target="_blank" rel="noreferrer noopener">Split tunneling</a> allows you to route some connections through the VPN tunnel while excluding others. This means, for example, when traveling, you can watch local content using your real IP address in one app and your favorite shows, moves, and sports events using an IP address from home in another.</p> <p>On Android, you can now either exclude apps and IP addresses from the VPN tunnel or include them (inverse mode). We also brought split tunneling (with both standard and inverse modes) to Android TV.&nbsp;</p> <h3 class="wp-block-heading">IPv6</h3> <p>Every device that connects directly to the internet has a unique <a href="https://protonvpn.com/blog/what-is-an-ip-address" target="_blank" rel="noreferrer noopener">IP address</a>. Unfortunately, almost all IPv4 addresses (still the most-used standard today) are now used up. IPv6 solves this problem by hugely expanding the number of IP addresses available. Proton VPN is beginning to offer full IPv6 support to address this pressing issue and to support our community.</p> <p>The majority of our servers are now IPv6 compatible, and we have added <a href="https://protonvpn.com/support/prevent-ipv6-vpn-leaks/" target="_blank" rel="noreferrer noopener">IPv6 support</a> to our browser extensions and our Linux app (a landmark for us, this is the first time we’ve released a feature on Linux before other platforms).&nbsp;</p> <h3 class="wp-block-heading">Guest mode for Android</h3> <p>Our new <a href="https://www.reddit.com/r/ProtonVPN/comments/1dovjs0/proton_vpn_now_available_without_creating_an/" target="_blank" rel="noreferrer noopener">guest mode</a> for Android allows you to use our Android app without signing up for a Proton Account. Perfect for when you quickly need a VPN to get a job done.&nbsp;</p> <h3 class="wp-block-heading">Apple TV app</h3> <p>The Apple TV app was ready in summer as planned (and we published the <a href="https://github.com/ProtonVPN/ios-mac-app/releases/tag/tv%2F1.0.0" target="_blank" rel="noreferrer noopener">open-source code</a> in September). But in full transparency, it was stuck in Apple&#8217;s review process for several weeks, leading to disappointing delays. The good news is that after working closely with Apple, <a href="https://protonvpn.com/blog/apple-tv-app" target="_blank" rel="noreferrer noopener">Proton VPN for Apple TV is now published and available on the app store</a>.</p> <p>With the Apple TV app, you can easily and securely watch your favorite shows, films, and sports events on your big-screen TV via your Apple TV, no matter where you are.</p> <h3 class="wp-block-heading">Proton for Business</h3> <p>We’ve greatly expanded our support for businesses. Organizations can now lease <a href="https://protonvpn.com/support/dedicated-ips/" target="_blank" rel="noreferrer noopener">dedicated VPN servers</a> with static IP addresses, providing secure segmented access to on-site and SaaS resources. They can also use single sign-on (SSO) technology to allow users to access multiple applications and websites with a single username and password and manage users’ Android and Windows devices using <a href="https://protonvpn.com/support/mdm" target="_blank" rel="noreferrer noopener">mobile device management</a> (MDM).&nbsp;</p> <p>In addition to new features, we’ve also responded to community requests by working on our infrastructure. The Proton VPN network has:</p> <ul class="wp-block-list"> <li>Added over <a href="https://protonvpn.com/vpn-servers" target="_blank" rel="noreferrer noopener">4000 new servers</a>, including in 45 new countries, and in additional cities in existing countries</li> <li>Become one of the fastest VPN services in the world</li> </ul> <p>So you talked, and we’ve listened. We&#8217;re even more excited, however, about what&#8217;s coming over the next few months.</p> <h2 class="wp-block-heading">What is coming up in the fall&nbsp;</h2> <h3 class="wp-block-heading">Improved Stealth and Anti-Censorship</h3> <p>In October, we have already made two rounds of improvements to how our iOS and iPad apps circumvent blocks in countries where the internet is censored, with more enhancements to come across all of our supported platforms.</p> <h3 class="wp-block-heading">ARM support for Windows</h3> <p>The M-series ARM-based “Apple Silicon” chips have been a game-changer for Mac users, improving both performance and battery life. The recent release of Microsoft’s ARM-based Surface Laptop 7th Edition is likely the starter gun for major Windows PC manufacturers to follow suit.&nbsp;</p> <p>To support our entire community, including those upgrading to Windows PCs featuring the new chipset, we’re pleased to announce that we’ve now released a <a href="https://protonvpn.com/blog/windows-arm" target="_blank" rel="noreferrer noopener">native ARM version of our Windows app</a> that offers all the advanced features available on our existing (x64) Windows app.&nbsp;</p> <p>The following new features are also almost ready, so you can expect them over the next few weeks:</p> <h3 class="wp-block-heading">New iOS widget</h3> <p>Our new and improved iOS widget will allow you to check your connection status and get quick access to recent servers.</p> <h3 class="wp-block-heading">More streaming support</h3> <p>We currently support <a href="https://protonvpn.com/streaming" target="_blank" rel="noreferrer noopener">streaming</a> on more than 60 popular national and international platforms. And over the next few weeks (and months), we’ll be continuously expanding this selection based on requests from our user community.</p> <h3 class="wp-block-heading">And more…</h3> <p>The following will also be ready soon:</p> <ul class="wp-block-list"> <li>Battery life improvements on our mobile apps</li> <li>Enhanced VPN profiles that make it easier to quickly connect to the location you want in exactly the way you want</li> </ul> <h2 class="wp-block-heading">Our product roadmap for winter</h2> <p>Taking a longer view, we have several other exciting features under active development on our roadmap.</p> <h3 class="wp-block-heading">Custom DNS for Android, macOS, iOS and iPadOS, and Linux</h3> <p>We recommend that everyone allow Proton VPN to <a href="https://protonvpn.com/blog/what-is-dns" target="_blank" rel="noreferrer noopener">resolve DNS lookups</a> for maximum privacy and security and use <a href="https://protonvpn.com/blog/netshield-ad-blocker/" target="_blank" rel="noreferrer noopener">NetShield Ad-blocker</a> to block ads, trackers, and malware. However, for those who prefer using a third-party DNS service, we’ll bring the Custom DNS option currently available in our Windows app to Android, macOS, iOS, and Linux.</p> <h3 class="wp-block-heading">IPv6 support in more apps</h3> <p>We already support IPv6 on our <strong>browser extensions</strong> and <strong>Linux </strong>app. We’ll start releasing it over the next few months.&nbsp;</p> <h3 class="wp-block-heading">Port forwarding on macOS and Linux</h3> <p>Port forwarding routes connections through the firewall that Proton VPN uses to protect our customers. It’s a feature that’s mainly useful to people who download and share files using P2P protocols such as BitTorrent, although it can also improve performance for online gamers.</p> <p>It’s currently available on our Windows app, with partial support on our Linux app (which requires some manual configuration). Over the next few months (potentially into spring), we’ll introduce full port forwarding support on our macOS and Linux apps.&nbsp;</p> <h3 class="wp-block-heading">Guest mode for iOS and iPadOS</h3> <p>In June, to make Proton VPN’s anti-censorship features more accessible, we made it possible to log in to the Android app without creating an account. We’ll bring this popular feature to your iPhone and iPad.&nbsp;</p> <h3 class="wp-block-heading">New Windows and iOS/iPadOS apps</h3> <p>Our new Windows app not only looks great, but its increased functionality will include some of the most commonly requested features from <a href="https://protonmail.uservoice.com/">Proton User Voice</a>, including sorting servers by server load, selecting a server based on its city (not country), hiding our free servers if you’re on a paid plan‚ and more.&nbsp;</p> <p>We’ll also refresh the look and feel of our app for iPhones and iPads.&nbsp;</p> <h3 class="wp-block-heading">Split tunneling on macOS (with Linux to follow)</h3> <p>Split tunneling allows you to route some connections through the VPN tunnel and some connections outside it. Already available on Windows and Android, this popular feature will soon be coming to macOS. We’re also not leaving Linux users out, although this will follow later.</p> <h3 class="wp-block-heading">More new privacy features&nbsp;</h3> <p>With privacy always at our core, we’re working on new features to improve your privacy online. We can&#8217;t reveal what they are now, but we’re excited about them. Follow Proton VPN on <a href="https://x.com/intent/user?screen_name=ProtonVPN" target="_blank" rel="noreferrer noopener">X (Twitter)</a>, <a href="https://www.linkedin.com/company/protonprivacy/posts/?feedView=all" target="_blank" rel="noreferrer noopener">LinkedIn</a>, <a href="https://mastodon.social/@protonprivacy" target="_blank" rel="noreferrer noopener">Mastodon</a>, or our <a href="https://protonvpn.com/blog/" target="_blank" rel="noreferrer noopener">blog</a> to keep up with our latest news.&nbsp;&nbsp;</p> <h2 class="wp-block-heading">We’re always working to protect your privacy online</h2> <p>Although some of our client apps are more advanced than others in terms of features and functionality, it is on our long-range roadmap to bring feature parity across all of our supported platforms as part of our commitment to bring the best of Proton VPN to our entire user community.&nbsp;</p> <p>Also in our sights are other longer-term projects, such as expanding our server network to new cities in the USA and UK and ensuring people in even more remote locations experience the blazing-fast speed performance already enjoyed by most of our community.&nbsp;</p> <p>We’re also working to improve ping rates for those of you who use Proton VPN for gaming, and we haven’t forgotten the need for a Linux CLI.&nbsp;</p> <p>We hope you’re as excited about our roadmap as we are.</p> <p></p> <p></p> Proton VPN newsAntonio CesaranoProton VPN now supports Windows ARM deviceshttps://protonvpn.com/blog/windows-armhttps://protonvpn.com/blog/windows-armWe’re pleased to announce a new Proton VPN app with native support for Windows devices that use the ARM chipset.Tue, 05 Nov 2024 11:51:53 GMT <p>We’re pleased to announce a new Proton VPN app with native support for <a href="https://protonvpn.com/download-windows" target="_blank" rel="noreferrer noopener">Windows devices</a> that use the <a href="https://en.wikipedia.org/wiki/ARM_architecture_family" target="_blank" rel="noreferrer noopener">ARM chipset</a>. In use, this app works identically to our regular (x64) Windows app, offering all advanced features you’re used to, including:&nbsp;</p> <ul class="wp-block-list"> <li><a href="https://protonvpn.com/support/what-is-kill-switch" target="_blank" rel="noreferrer noopener">Kill switch</a></li> <li><a href="https://protonvpn.com/support/permanent-kill-switch/" target="_blank" rel="noreferrer noopener">Advanced kill switch</a></li> <li><a href="https://protonvpn.com/blog/what-is-wireguard" target="_blank" rel="noreferrer noopener">WireGuard</a>, <a href="https://protonvpn.com/blog/what-is-openvpn" target="_blank" rel="noreferrer noopener">OpenVPN</a>, and <a href="https://protonvpn.com/blog/stealth-vpn-protocol/" target="_blank" rel="noreferrer noopener">Stealth</a> protocols</li> <li><a href="https://protonvpn.com/support/secure-core-vpn/" target="_blank" rel="noreferrer noopener">Secure Core</a></li> <li><a href="https://protonvpn.com/blog/netshield-ad-blocker/" target="_blank" rel="noreferrer noopener">NetShield Ad-blocker</a></li> <li><a href="https://protonvpn.com/features/vpn-accelerator" target="_blank" rel="noreferrer noopener">VPN Accelerator</a></li> <li><a href="https://protonvpn.com/support/protonvpn-split-tunneling/" target="_blank" rel="noreferrer noopener">Split tunneling</a></li> <li><a href="https://protonvpn.com/support/port-forwarding/" target="_blank" rel="noreferrer noopener">Port forwarding</a></li> <li><a href="https://protonvpn.com/support/moderate-nat/" target="_blank" rel="noreferrer noopener">Moderate NAT</a></li> <li><a href="https://proton.me/blog/anti-censorship-alternative-routing" target="_blank" rel="noreferrer noopener">Alternative routing</a></li> </ul> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="2856" height="1986" data-public-id="wp-vpn/windows2-1/windows2-1.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_2856,h_1986,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA" alt="The Proton VPN app for Windows" class="wp-post-10172 wp-image-10174" data-format="png" data-transformations="f_auto,q_auto" data-filesize="442 KB" data-optsize="91 KB" data-optformat="image/webp" data-percent="79.4" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10174" data-version="1730804664" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 2856w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_209,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_712,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_534,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_1068,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1424,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1090,c_scale/f_auto,q_auto/v1730804664/wp-vpn/windows2-1/windows2-1.png?_i=AA 1568w" sizes="(max-width: 2856px) 100vw, 2856px" /></figure></div> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="https://protonvpn.com/download-windows">Download Proton VPN for Windows ARM</a></div> <h2 class="wp-block-heading">What is ARM?</h2> <p>Once an acronym for Advanced RISC Machines (and Acorn RISC Machine before that), ARM is a computer processor architecture (a way of building processor chips). Noted for their high efficiency and low power consumption, ARM processors have been used in mobile devices like smartphones and tablets for many years.&nbsp;</p> <p>However, Intel x86 (32-bit) and x64 (64-bit) processors dominated the world of desktop computing (including laptops) for a long time. This changed dramatically in 2020, when Apple switched to using M-series ARM-based “Apple Silicon” chips to power its lineup of Mac computers (starting with the M1 MacBook Air).</p> <p>This switch to ARM-based processors has been hugely successful, in large part due to excellent work Apple put into developing its <a href="https://en.wikipedia.org/wiki/Rosetta_(software)">Rosetta</a> emulation software, which allowed Mac users to run older (x64) software seamlessly on the new architecture.&nbsp;</p> <h2 class="wp-block-heading">Windows and ARM</h2> <p>Windows versions that support ARM have been available for some years, but with its much more diverse ecosystem and a greater need to support legacy software, Windows PC manufacturers have been slow to adopt the new technology. And while earlier versions of Windows ARM featured emulator software to allow older apps to run on AMD machines, this failed to provide the fast and polished experience of Rosetta on macOS.&nbsp;</p> <p>In June of this year, Microsoft released Windows 11 24H2, featuring the <a href="https://www.theverge.com/2024/6/26/24186432/microsoft-windows-on-arm-qualcomm-copilot-plus-pcs-prism-emulator" target="_blank" rel="noreferrer noopener">Prism emulator</a>, which is as efficient as Apple’s Rosetta 2 translation layer, and can emulate apps twice as fast as the previous generation of Windows on Arm devices.&nbsp;</p> <p>Microsoft is now in a strong position to push manufacturers into building ARM-based devices that run Windows, and the release this summer of its own ARM-based Surface Laptop 7th Edition is likely the starter-gun for major Windows PC manufacturers to follow suit.</p> <h2 class="wp-block-heading">How do I know if my processor is x64 or ARM64?</h2> <p>To find out if your Windows computer uses an x86 (32-bit), x64, or ARM64 processor:</p> <p>1. Open the <strong>System Information</strong> tool. To do this, press <strong>Win + R</strong> to open the <strong>Run</strong> dialog (<strong>Win</strong> is the key with the Windows logo), type <code>msinfo32</code> , and click <strong>Enter</strong>. Alternatively, search for <strong>System Information</strong> from the <strong>Start</strong> menu.</p> <p>2. Go to <strong>System Summary</strong>   → <strong>System Type</strong>. Your system architecture will be listed here. </p> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1024" height="469" data-public-id="wp-vpn/windows-processor/windows-processor.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_469,c_scale/f_auto,q_auto/v1731338737/wp-vpn/windows-processor/windows-processor.png?_i=AA" alt="Find your system type" class="wp-post-10172 wp-image-10241" data-crop="2.18" data-format="png" data-transformations="f_auto,q_auto" data-filesize="40 KB" data-optsize="12 KB" data-optformat="image/webp" data-percent="71.1" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10241" data-version="1731338737" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_469,c_scale/f_auto,q_auto/v1731338737/wp-vpn/windows-processor/windows-processor.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_137,c_scale/f_auto,q_auto/v1731338737/wp-vpn/windows-processor/windows-processor.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_351,c_scale/f_auto,q_auto/v1731338737/wp-vpn/windows-processor/windows-processor.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1731338737/wp-vpn/windows-processor/windows-processor.png?_i=AA 1097w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure></div> <h2 class="wp-block-heading">Proton VPN Windows ARM</h2> <p>At Proton VPN, our mission is to make privacy the default for everyone. Windows remains by far the most popular desktop platform in the world, and — moving forward — an increasingly large number of Windows devices will be powered by ARM.&nbsp;</p> <p>It’s therefore natural for Proton VPN to support our all community with a native (so no emulation layer required) Windows ARM app.</p> <p></p> Proton VPN newsAntonio CesaranoWhat is doxing, and is it illegal?https://protonvpn.com/blog/doxinghttps://protonvpn.com/blog/doxingWe look at what doxing is, who does it (and why), and at how to protect yourself from doxing .Fri, 01 Nov 2024 15:46:33 GMT <p>Doxing — also spelled doxxing — is the act of publicly revealing or publishing someone’s private or personal information online without their consent, almost always with malicious intent.&nbsp;</p> <p>In this article, we look at what doxing is, who does it (and why), and how to protect yourself, as well as how <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener">Proton VPN</a>, <a href="https://proton.me/mail" target="_blank" rel="noreferrer noopener">Proton Mail</a>, <a href="https://proton.me/pass" target="_blank" rel="noreferrer noopener">Proton Pass</a>, and <a href="https://proton.me/drive" target="_blank" rel="noreferrer noopener">Proton Drive</a> can help.</p> <ul class="wp-block-list"> <li><a href="#what">What is doxing?</a></li> <li><a href="#motivations">Motivations for doxing</a></li> <li><a href="#illegal">Is doxing illegal?</a></li> <li><a href="#protect">How to protect yourself from doxing</a></li> <li><a href="#examples">Examples of famous doxing incidents</a></li> <li><a href="#famous">Famous people who have been doxed</a></li> <li><a href="#harassment">Doxing is harassment</a></li> </ul> <h2 class="wp-block-heading" id="what">What is doxing?</h2> <p>The word doxing originated in 1990s hacker slang, meaning to “drop dox (documents)&#8221; to identify rivals in the fiercely competitive hacking scene. Since much of the hacking activity was illegal, this often left the victims exposed to criminal prosecution.&nbsp;</p> <p>The goal of doxing is usually to harass, intimidate, embarrass, or harm the targeted person, and can lead to real-world consequences — like unwanted attention, stalking, threats, or worse.&nbsp;</p> <p>These days, disclosing personal information about people with views that differ from the views of the doxer has become a signature feature of the increasingly ugly culture wars.&nbsp;</p> <p>Doxing attacks can be used to:</p> <ul class="wp-block-list"> <li><strong>De-anonymize individuals</strong>: The most common form of doxing, this approach involves publishing <a href="https://proton.me/blog/personal-data" target="_blank" rel="noreferrer noopener">personally identifiable information</a>, usually on the internet. Details published typically include things like the target’s real name, home address, phone number, email address, and <a href="https://proton.me/blog/what-to-do-if-someone-has-your-social-security-number" target="_blank" rel="noreferrer noopener">social security number</a>.</li> <li><strong>Link individuals to certain internet activity</strong>: Doxing can involve linking individuals to posts on private forums, historical social media, photos, and other evidence that wasn’t made anonymously, as such, but that the targets would rather not be made known to the general public. Early examples of this form of doxing are publishing the names of <a href="https://www.theatlantic.com/technology/archive/2022/04/doxxing-meaning-libs-of-tiktok/629643/" target="_blank" rel="noreferrer noopener">suspected neo-nazis</a> on Usenet forums, and exposing the names of  addresses of <a href="https://slate.com/news-and-politics/2015/05/neal-horsley-of-nuremberg-files-died-true-threats-case-reconsidered-by-supreme-court-in-elonis.html" target="_blank" rel="noreferrer noopener">abortion providers</a> on a website encouraging violence against them. </li> </ul> <h2 class="wp-block-heading" id="motivations">Motivations for doxing&nbsp;</h2> <p>Motivations for doxing might include:</p> <ul class="wp-block-list"> <li><strong>Revenge or retaliation</strong>: Some people dox as an act of personal revenge, possibly after an online disagreement, breakup, or perceived insult.</li> <li><strong>Intimidation or harassment</strong>: Doxing can be used to scare or harass someone by exposing their private information to a large audience, leading to threats or physical harm.</li> <li><strong>Shaming or public exposure</strong>: People sometimes dox others to publicly shame them, often in the context of behavior or statements that the doxer disagrees with.</li> <li><strong>Financial gain</strong>: Some doxers may be motivated by financial reasons, such as blackmail or extortion, threatening to release certain information unless a payment is made</li> <li><strong>Activism or hacktivism</strong>: Sometimes doxing is used as a tool by activists who believe that exposing someone’s personal details is justified, especially when they see the person as having engaged in harmful or unethical activities</li> </ul> <p>Most cases of doxing are highly malicious, but in some cases it’s clear the doxer feels moral justification for their actions. Regardless of the motivation, however, doxing is a serious violation of privacy and can lead to real-world consequences for the victim, including emotional distress, physical danger, or harm.</p> <h2 class="wp-block-heading" id="illegal">Is doxing illegal?</h2> <p>Because doxing often involves publishing information that is publicly available (if you look hard enough), it often doesn’t break the law. However, doxing is almost always illegal if the means of obtaining the information is illegal (such as performing computer fraud or hacking into a server’s database).&nbsp;</p> <p>Depending on the country where it occurs, doxing can also often break privacy laws, harassment and stalking laws, and defamation laws.&nbsp;</p> <p>In the US, for example, there are no federal laws that specifically mention doxing, but there are many state laws related to online harassment, cyberstalking, and threatening behavior that can be used to prosecute those who carry out doxing attacks. Releasing personally identifiable information with malicious intent may also be deemed illegal under federal laws such as the <a href="https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act" target="_blank" rel="noreferrer noopener">Computer Fraud and Abuse Act </a>(CFAA).</p> <p>In the UK, the <a href="https://www.legislation.gov.uk/ukpga/1988/27/section/1" target="_blank" rel="noreferrer noopener">Malicious Communications Act</a> can be used to prosecute doxing if it involves the release of private information or leads to harm or distress. As a general rule (although this varies considerably by jurisdiction), if doxing results in harm, threats, or privacy violations, it will break a criminal law. </p> <h2 class="wp-block-heading" id="protect">How to protect yourself from doxing</h2> <p>The key to protecting yourself from doxing is to limit the amount of personal information about yourself online. Naturally, this includes limiting the personal information you make publicly available, but it also includes limiting the information you give to online services and other third parties that are supposed to keep your information confidential.&nbsp;</p> <p>Unfortunately, data gleaned from hacked servers and databases is a major source of information exploited for the purpose of doxing.&nbsp;</p> <p>Important strategies for limiting the information that can be abused for doxing include:</p> <h3 class="wp-block-heading">1. Don’t overshare</h3> <p>Limit the amount of personal information you share online that can be accessed by the public. Don’t overshare, and where possible, use a pseudonym. If you must share personal details, limit the number of people who can see it. For example, be sure to lock down your Facebook profile so that only trusted friends and family can access it.&nbsp;</p> <h3 class="wp-block-heading">2. Hide your IP address</h3> <p>Every server you connect to logs your <a href="https://protonvpn.com/blog/what-is-an-ip-address/" target="_blank" rel="noreferrer noopener">IP address</a> and a timestamp of when you connected to it. If the server is hacked, it&#8217;s easy to match your activity on that server to your real IP address. When you use a VPN service such as <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener">Proton VPN</a>, all the server can log is the IP address of the VPN server — not your real one. </p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="/download/">Get Proton VPN</a></div> <h3 class="wp-block-heading">3. Use a disposable email address</h3> <p>Most online services these days require you to verify your email address (which is then kept on file, where it can potentially be hacked and used for doxing). You can protect your privacy by using a disposable email address. With Proton Mail, you can create a <a href="https://proton.me/pass/aliases" target="_blank" rel="noreferrer noopener">hide-my-email alias</a> every time you sign up for a new service, and then disable the alias at any time.</p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="https://proton.me/mail/download">Get Proton Mail</a></div> <h3 class="wp-block-heading">4. Secure your documents and photos</h3> <p>No matter where you store your sensitive documents and embarrassing photos online, they can be hacked. This includes most online storage services  —  if the cloud provider can access your files (and most can), then so can hackers.  The solution is to store your documents and photos using end-to-end encryption, so only you can decrypt them. This means that if your cloud service provider is ever compromised, the hacker won&#8217;t be able to access your data. <a href="https://proton.me/drive" target="_blank" rel="noreferrer noopener">Proton Drive</a> is an end-to-end encrypted cloud storage solution with automatic photo backup from your mobile device. </p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="https://proton.me/drive/download">Get Proton Drive</a></div> <h3 class="wp-block-heading">5. Use strong unique passwords and 2FA</h3> <p>The single best thing you can do to secure any account is use a <a href="https://proton.me/pass/password-generator" target="_blank" rel="noreferrer noopener">strong password</a> that is unique to that account. Recalling every password, however, can be difficult, but password managers do the heavy lifting for you – creating strong unique passwords for all your accounts, remembering them, and auto filling them for you when needed.</p> <p>One-factor authentication allows you to verify your identity when signing in to your Proton account using something you know — your login details. <a href="https://proton.me/blog/what-is-two-factor-authentication-2fa" target="_blank" rel="noreferrer noopener">Two-factor authentication</a> (2FA) greatly improves the security of your account by requiring something you have (your phone or security key) or something you are (your faceprint or fingerprint). Unless an adversary knows your login details and also has physical access to this second factor, they cannot access your account. </p> <p><a href="https://proton.me/pass" target="_blank" rel="noreferrer noopener">Proton Pass</a> is an end-to-end encrypted password manager that can conveniently generate 2FA codes (like a 2FA authenticator app) to secure your accounts. It also scans the dark web to alert you if your details have been exposed (doxed) on the dark web.</p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="https://proton.me/pass/download">Get Proton Pass</a></div> <h3 class="wp-block-heading">6. Use more privacy-friendly platforms</h3> <p>Most commercial platforms — including social media platforms, messenger apps, and forums — require you to verify your identity and will log your activity to prevent abuse. If these platforms are hacked, however, data stored on them about you can be stolen and doxed.</p> <p>Using a VPN and an email alias can help protect against this, but so can using open-source, community-based and peer-to-peer (P2P) platforms or distributed services that don&#8217;t ask for your email address or log your IP address in the first place (at least in any centralized way — if using a P2P-based service, always remember that peers can see your real IP address unless you hide it with a VPN).</p> <p>For example <a href="https://mastodon.social/@protonprivacy" target="_blank" rel="noreferrer noopener">Mastodon</a> is a decentralized, open-source social network that allows you to create or join independent servers. Mastodon makes a great alternative to the likes of Facebook, Instagram, and X (Twitter). We have a guide to <a href="https://proton.me/blog/whatsapp-alternatives" target="_blank" rel="noreferrer noopener">privacy-friendly WhatsApp alternatives</a>. </p> <h2 class="wp-block-heading" id="examples">Examples of famous doxing incidents</h2> <p>Below are some of the most notorious (and damaging) doxing incidents in recent memory:</p> <h3 class="wp-block-heading"><a href="https://en.wikipedia.org/wiki/Project_Chanology" target="_blank" rel="noreferrer noopener">1. Project Chanology</a></h3> <p>In 2008, the Church of Scientology attempted to remove an online video of Tom Cruise promoting the church. The hacktivist group Anonymous responded by launching <a href="https://www.theguardian.com/technology/2008/feb/04/news" target="_blank" rel="noreferrer noopener">Project Chanology</a> (a combination of 4Chan and Scientology), in which it doxed high-ranking members of Scientology, revealing private information with the aim of intimidating and disrupting the organization. This campaign was one of the earliest large-scale doxing incidents and set a precedent for internet-based activism and doxing.</p> <h3 class="wp-block-heading"><a href="https://en.wikipedia.org/wiki/Gamergate_(harassment_campaign)" target="_blank" rel="noreferrer noopener">2. Gamergate </a></h3> <p>Infamous for its sheer nastiness, <a href="https://apnews.com/house-elections-united-states-government-united-states-congress-general-news-united-states-house-of-representatives-e07057c8e863431abf7472d8da0e11a0" target="_blank" rel="noreferrer noopener">Gamergate</a> (2014) was a highly misogynistic online harassment campaign against a number of  women prominent in the gaming industry, including game developer Zoe Quinn, media critic Anita Sarkeesian, and game developer Brianna Wu. These women were doxed, leading to threats of violence and harassment. Gamergate brought widespread attention to the issue of online harassment and doxing in the digital age.</p> <h3 class="wp-block-heading"><a href="https://en.wikipedia.org/wiki/Ashley_Madison_data_breach" target="_blank" rel="noreferrer noopener">3. Ashley Madison hack</a></h3> <p>Ashley Madison is a popular dating website that caters to people seeking extramarital affairs. In 2015, the otherwise unknown hacking group (possibly just an individual) known as &#8220;Impact Team&#8221; leaked the personal information of around <a href="https://apnews.com/national-national-general-news-f9f502126fd845fdba191e5e11c55b52" target="_blank" rel="noreferrer noopener">32 million Ashley Madison customers</a>. </p> <p>The leak exposed names, email addresses, and even credit card transactions, leading to public embarrassment and, in some cases, serious personal and legal consequences for users.&nbsp;</p> <h3 class="wp-block-heading"><a href="https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/" target="_blank" rel="noreferrer noopener">4. CIA Director John Brennan</a></h3> <p>In 2015, teen hackers gained access to CIA Director <a href="https://en.wikipedia.org/wiki/John_Brennan_(CIA_officer)" target="_blank" rel="noreferrer noopener">John Brennan</a>&#8216;s personal email account and leaked sensitive information, including contact lists and personal documents. This breach showcased the vulnerabilities even high-ranking government officials face online and raised questions about cybersecurity measures for public figures.</p> <h2 class="wp-block-heading" id="famous">Famous people who have been doxed</h2> <p>The following famous people have been victims of doxing:</p> <h3 class="wp-block-heading"><a href="https://www.wired.com/story/elon-musk-elonjet-flight-tracker-transparency/" target="_blank" rel="noreferrer noopener">1. Elon Musk</a></h3> <p>In 2022, some Twitter (as it was known then) users shared the real-time location of Elon Musk’s private jet on the social media platform. This raised concerns about his safety, especially after Musk publicly stated that his family had been followed by a &#8220;crazy stalker&#8221; following the incident. He responded by suspending several accounts from Twitter that were involved in sharing his location.</p> <h3 class="wp-block-heading"><a href="https://www.thedailybeast.com/taylor-swift-remains-silent-as-fans-doxx-and-harass-music-critic-over-folkore-review/" target="_blank" rel="noreferrer noopener">2. Taylor Swift</a></h3> <p>The pop superstar has had to endure a torrent of abuse, including death threats and doxing by both overzealous fans and critics. In one instance, her private home address was leaked online. Taylor Swift has been a vocal advocate for stronger privacy protections for public figures.</p> <h3 class="wp-block-heading"><a href="https://www.forbes.com/sites/dawnstaceyennis/2021/11/22/jk-rowling-slams-activist-actors-who-doxxed-her-during-trans-rights-protest/" target="_blank" rel="noreferrer noopener">3. J.K. Rowling</a></h3> <p>Harry Potter author J.K. Rowling has become a highly controversial figure thanks to her outspoken views on trans rights. In 2019, some pro-trans activists tweeted a photo of themselves outside Rowlings’ house in Edinburgh that showed her address. The photo was removed following an angry backlash from Rowlings’ supporters (and later re-posted with the address removed).&nbsp;</p> <h3 class="wp-block-heading"><a href="https://www.bbc.com/news/world-us-canada-49321292" target="_blank" rel="noreferrer noopener">4. Kyle Giersdorf (Bugha)</a></h3> <p>Teenage Fortnite champion Kyle Giersdorf, better known as Bugha, experienced a serious doxing incident in 2019 that led to him being “<a href="https://en.wikipedia.org/wiki/Swatting">swatted</a>” by a heavily-armed police SWAT team at his home. This highlights the dangerous consequences of doxing for public figures.</p> <h3 class="wp-block-heading"><a href="https://www.independent.co.uk/tech/doxxing-hackers-target-those-set-to-investigate-them-8531694.html" target="_blank" rel="noreferrer noopener">5. Kim Kardashian, Scarlett Johansson, Jay-Z, Beyoncé, Donald Trump, Lady Gaga, and more</a></h3> <p>In 2013, sensitive information relating to at least 17 celebrities and politicians was posted online, including social security numbers, credit card records and mortgage payments.&nbsp; In addition to those listed above, victims included Mel Gibson, Joe Biden (then vice president), Hillary Clinton, Britney Spears, Sarah Palin, and Arnold Schwarzenegger. The perpetrator(s) was never identified.</p> <h2 class="wp-block-heading" id="harassment">Doxing is harassment</h2> <p>The bottom line is that doxing is a form of harassment that can have very serious consequences, including online abuse, stalking (online and real life), death threats, physical, assault, and swatting attacks against the victim (which have the <a href="https://arstechnica.com/tech-policy/2019/03/man-gets-20-years-for-deadly-swatting-hoax/" target="_blank" rel="noreferrer noopener">potential to be deadly</a>). </p> <p>Celebrities and politicians are particularly vulnerable to doxing attacks, simply because they are in the public eye. However, anyone can become a victim of this kind of attack, so it pays to take sensible precautions against it. Proton can help with this, as all our products are specifically designed to protect your privacy online.</p> Privacy basicsDouglas CrawfordStream content securely with our Apple TV apphttps://protonvpn.com/blog/apple-tv-apphttps://protonvpn.com/blog/apple-tv-appWith the Proton VPN Apple TV app, you can easily and securely watch your favorite content on your big-screen TV no matter where you are.Wed, 30 Oct 2024 11:49:40 GMT <p>Today, we’re excited to release the Proton VPN Apple TV app. Among the most requested features from our community, this app allows you to easily and securely watch your favorite shows, films, and sports events on your big-screen TV via your Apple TV, no matter where you are. The Apple TV app is available to everyone with a paid Proton VPN plan.&nbsp;</p> <p>Proton VPN offers over 8,500 servers across 112 countries, and with our new tvOS app, you can stream TV shows, movies, and live sports from services such as Netflix, Amazon Prime Video, Disney+, as well as a <a href="https://protonvpn.com/support/streaming-guide/" target="_blank" rel="noreferrer noopener">broad range of regional content providers</a> from the comfort of your living room. </p> <p>While doing this, you’ll enjoy the full range of privacy and security benefits that you rightly expect from Proton VPN. This means your <a href="https://protonvpn.com/blog/isp/" target="_blank" rel="noreferrer noopener">internet service provider</a> (ISP) and other third parties won’t be able to monitor your streaming activity, see your location, or abuse your data.</p> <p><a href="https://protonvpn.com/blog/can-be-tracked-using-vpn/" target="_blank" rel="noreferrer noopener"><strong>Learn more about how a VPN prevents you from being tracked online</strong></a></p> <p>The Apple TV app has been carefully designed for ease of use on a large-screen TV, using either the Apple TV remote or any <a href="https://support.apple.com/guide/tv/use-other-remotes-atvb0410f604/tvos" target="_blank" rel="noreferrer noopener">other supported remote</a>.&nbsp;</p> <h2 class="wp-block-heading">How to use up Proton VPN on Apple TV</h2> <p>To set up Proton VPN on your Apple TV:</p> <ol class="wp-block-list"> <li>Install the Proton VPN app from the App Store on your Apple TV and open it.</li> <li>Go to <a href="https://protonvpn.com/appletv" target="_blank" rel="noreferrer noopener">protonvpn.com/appletv</a>, sign in with your Proton Account password and username (plus 2FA if enabled), and enter the code shown on your Apple TV.</li> </ol> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="881" height="488" data-public-id="wp-vpn/apple-tv-4/apple-tv-4.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_881,h_488,c_scale/f_auto,q_auto/v1721061347/wp-vpn/apple-tv-4/apple-tv-4.png?_i=AA" alt="Enter the virification code when reqested to do so." class="wp-post-8078 wp-image-8079" data-format="png" data-transformations="f_auto,q_auto" data-version="1721061347" data-seo="1" data-filesize="119 KB" data-optsize="16 KB" data-optformat="image/webp" data-percent="86.8" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=8079" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1721061347/wp-vpn/apple-tv-4/apple-tv-4.png?_i=AA 881w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_166,c_scale/f_auto,q_auto/v1721061347/wp-vpn/apple-tv-4/apple-tv-4.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_425,c_scale/f_auto,q_auto/v1721061347/wp-vpn/apple-tv-4/apple-tv-4.png?_i=AA 768w" sizes="(max-width: 881px) 100vw, 881px" /></figure></div> <p>You can now use Proton VPN to watch your favorite content. Simply use your remote to select a country, or select <strong>Fastest country</strong> to automatically connect to the fastest server for your location.</p> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1053" height="592" data-public-id="wp-vpn/apple-tv-new-2/apple-tv-new-2.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1053,h_592,c_scale/f_auto,q_auto/v1721061341/wp-vpn/apple-tv-new-2/apple-tv-new-2.png?_i=AA" alt="Select a country, and you&#039;re good to go!" class="wp-post-8078 wp-image-8080" data-format="png" data-transformations="f_auto,q_auto" data-version="1721061341" data-seo="1" data-filesize="144 KB" data-optsize="34 KB" data-optformat="image/webp" data-percent="76.6" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=8080" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1721061341/wp-vpn/apple-tv-new-2/apple-tv-new-2.png?_i=AA 1053w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_169,c_scale/f_auto,q_auto/v1721061341/wp-vpn/apple-tv-new-2/apple-tv-new-2.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_576,c_scale/f_auto,q_auto/v1721061341/wp-vpn/apple-tv-new-2/apple-tv-new-2.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_432,c_scale/f_auto,q_auto/v1721061341/wp-vpn/apple-tv-new-2/apple-tv-new-2.png?_i=AA 768w" sizes="(max-width: 1053px) 100vw, 1053px" /></figure></div> <h2 class="wp-block-heading">Privacy from the comfort of your living room</h2> <p>At Proton, our mission is to build a better internet where privacy is default and you’re in control over your own data. Today’s release represents an important step in Proton’s mission to help all users take control of their data on every platform and device.&nbsp;</p> ReleasesAntonio CesaranoHow to prevent unauthorized access to your business networkhttps://protonvpn.com/blog/unauthorized-accesshttps://protonvpn.com/blog/unauthorized-accessCybercriminals will take any opportunity to gain unauthorized access to your servers. Learn how you can stop them.Mon, 21 Oct 2024 11:01:30 GMT <p>Hackers use various methods to gain unauthorized access to secured networks, and business servers are attractive targets.&nbsp;</p> <p>Through weak passwords that can easily be cracked via <a href="https://proton.me/blog/what-is-brute-force-attack" target="_blank" rel="noreferrer noopener">brute force attacks</a>, security vulnerabilities that can be exploited, and other means, cybercriminals will take any opportunity to gain unauthorized server access. This can lead to stolen data and other consequences. </p> <p>In this article, we explain what unauthorized access is, how it can happen, and ways to <a href="https://protonvpn.com/business">secure your business</a>.&nbsp;</p> <ul class="wp-block-list"> <li><a href="#what">What is unauthorized access?</a></li> <li><a href="#causes">Common causes of unauthorized access</a></li> <li><a href="#prevention">Best ways to prevent unauthorized access</a></li> <li><a href="#Proton-VPN-for-Business">Stay protected from unauthorized access with Proton VPN for Business</a></li> </ul> <h2 class="wp-block-heading" id="what">What is unauthorized access?</h2> <p>Unauthorized access happens when an individual or group enters a network, server, or computer system without permission. There are several ways this can happen, such as hackers using stolen login information to bypass security measures or someone physically entering a workplace to steal data.&nbsp;</p> <p>Unauthorized access methods aren’t limited to cybercriminals, as employees can unintentionally breach controlled systems or leak data by falling for phishing attacks or having a <a href="https://proton.me/blog/how-passwords-become-compromised" target="_blank" rel="noreferrer noopener">weak password</a>.</p> <p>Simple human errors and sophisticated cyberattacks can cause unauthorized access, and the consequences can be severe: <a href="https://proton.me/blog/breach-recommendations" target="_blank" rel="noreferrer noopener">data breaches</a>, financial losses, <a href="https://proton.me/blog/what-is-ransomware" target="_blank" rel="noreferrer noopener">ransomware</a>, system failures, and damage to an organization&#8217;s reputation. </p> <p>With this in mind, using <a href="https://proton.me/blog/cybersecurity-guides" target="_blank" rel="noreferrer noopener">cybersecurity</a> best practices and putting reliable security measures in place can help prevent unauthorized access from happening in the first place.</p> <h2 class="wp-block-heading" id="causes">Common causes of unauthorized access</h2> <p>Unauthorized access occurs through a variety of ways, and is generally caused by someone seeking to gain sensitive information in businesses they don’t have permission to see. However, blame also falls on weak security measures within a business. Many common causes have affected companies big and small.&nbsp;</p> <h3 class="wp-block-heading">Weak passwords</h3> <p>Commonly used passwords that are easily guessable, such as <strong>123456 </strong>or <strong>password123</strong>, make it simple for threat actors to take over an employee’s account and search for unauthorized data. If a server network doesn’t limit the number of login attempts, attackers can use a brute force attack or <a href="https://proton.me/blog/what-is-dictionary-attack" target="_blank" rel="noreferrer noopener">dictionary attack</a> to guess passwords until they find one that works. A weak password is also susceptible to <a href="https://proton.me/blog/password-spraying-attack" target="_blank" rel="noreferrer noopener">password spraying attacks</a>, especially if an employee uses the same password for multiple online accounts. If successful, data breaches will occur, and the consequences can be as severe as the 2024 <a href="https://www.bbc.com/news/world-us-canada-68701958" target="_blank" rel="noreferrer noopener">AT&amp;T breach</a> that exposed as many as 73 million people’s data. </p> <h3 class="wp-block-heading">Phishing attacks&nbsp;</h3> <p><a href="https://proton.me/blog/what-is-phishing" target="_blank" rel="noreferrer noopener">Phishing</a> is a widely used method to trick people into revealing sensitive information or downloading <a href="https://protonvpn.com/blog/what-is-malware" target="_blank" rel="noreferrer noopener">malware</a> on their devices, and both can lead to unauthorized server access. By sending an official-looking message (often emails) to employees, hackers can pretend to be a colleague looking for private documents or mislead someone into clicking a link to a malicious website or infected attachment that can break into a system. Moreover, phishing scams can prompt a ransomware attack, similar to the <a href="https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years" target="_blank" rel="noreferrer noopener">2021 Colonial Pipeline</a> incident. </p> <h3 class="wp-block-heading">Zero-day exploits</h3> <p>If a company’s network suffers from a software vulnerability and it isn’t identified or fixed through updates, cybercriminals can take advantage of such <a href="https://protonvpn.com/blog/zero-day-exploit" target="_blank" rel="noreferrer noopener">zero-day exploits</a> to compromise a system and gain unauthorized access. This allows attackers to leak company data, sell it on the dark web, or inject damaging code into a system. </p> <h3 class="wp-block-heading">Weak network security</h3> <p>Corporate networks with weak security measures, such as a lack of encryption, network monitoring, or VPN configurations, can cause <a href="https://proton.me/blog/protonmail-threat-model" target="_blank" rel="noreferrer noopener">man-in-the-middle (MITM) attacks</a>. Threat actors use this to eavesdrop on communications, where they can steal sensitive information, trick employees into taking action, and even modify communications exchanged between people on the network. Without proper safety measures on business networks, there’s a risk of unauthorized access. </p> <h2 class="wp-block-heading" id="prevention">Best ways to prevent unauthorized access</h2> <p>Given the diversity of methods used to gain unauthorized access to business servers, using several security practices is essential to enhance your company’s privacy.&nbsp;</p> <h3 class="wp-block-heading">1. Create a strong password standard&nbsp;</h3> <p>By using <a href="https://proton.me/blog/create-remember-strong-passwords" target="_blank" rel="noreferrer noopener">strong passwords</a> for all employee accounts, ones that should be <a href="https://proton.me/blog/how-long-should-my-password-be" target="_blank" rel="noreferrer noopener">at least 16 characters long</a>, hackers will have a hard time trying to figure out credentials. It can be tricky to come up with a complex password, but a <a href="https://proton.me/pass/password-generator" target="_blank" rel="noreferrer noopener">password generator</a> can help. It creates a random assortment of letters, numbers, and symbols, which can take thousands (or billions) of years to crack using brute force methods. </p> <h3 class="wp-block-heading">2. Use two-factor authentication (2FA)</h3> <p>Instead of only using one-factor authentication, which involves a username and password to access an account, two-factor authentication adds an extra layer of security to further prove the identity of someone accessing the account. It makes it harder for an attacker to gain unauthorized access, as it requires time-based one-time passwords (TOTPs) that are generally available on an account owner’s physical device, such as your phone or a <a href="https://proton.me/blog/universal-2nd-factor-u2f" target="_blank" rel="noreferrer noopener">2FA security key</a>. Even if an attacker steals a password, they won’t be able to get into the account without the account owner’s smartphone. </p> <h3 class="wp-block-heading">3. Raise security awareness&nbsp;</h3> <p>Human error is one of the biggest factors in unauthorized access, so giving employees mandatory security awareness training can help reduce the risk of many unauthorized access methods. Giving a better understanding of how to spot different kinds of cyberattacks, such as phishing, ransomware, and more, can stop human errors that lead to unauthorized access from happening at all levels.&nbsp;</p> <h3 class="wp-block-heading">4. Update software regularly&nbsp;</h3> <p>Performing regular software updates on systems can fix security vulnerabilities and offer protection against malware threats, reducing the risk of threat actors taking advantage of any security holes that can be exploited. This prevents private information from a business being stolen and raises defenses against any new cyber threats.&nbsp;</p> <h3 class="wp-block-heading">5. Use a secure network&nbsp;&nbsp;</h3> <p>Networks are key for all businesses, as they support private connections between computers, laptops, smartphones, servers, and other devices to help communication and data flow. Whether on a local area network or the internet, <a href="https://proton.me/blog/network-security" target="_blank" rel="noreferrer noopener">network security</a> is vital in keeping this network free from unauthorized access. Implementing a VPN like <a href="https://protonvpn.com/">Proton VPN</a> and using <a href="https://protonvpn.com/support/dedicated-ips" target="_blank" rel="noreferrer noopener">dedicated IP addresses</a> and servers can enhance a business network’s security and privacy. (See below to learn how.)</p> <h3 class="wp-block-heading">6. Monitor network activity&nbsp;</h3> <p>Using Network Access Control (NAC) can help a business manage access to its network, making sure only employees and computers with the right clearance can access private information within the network. NAC solutions will enable a business to keep an eye out for any suspicious behavior on the network, uncovering unauthorized access to devices, servers, or any sensitive data before it causes further problems.&nbsp;</p> <h2 class="wp-block-heading" id="Proton-VPN-for-Business">Stay protected from unauthorized access with Proton VPN for Business</h2> <p>At Proton, we believe in an internet where privacy is a priority, and <a href="https://protonvpn.com/business">Proton VPN for Business</a> offers unique features to ensure businesses are safe from unauthorized access methods. Proton VPN offers an easy-to-use, multi-layered solution to address many security needs:</p> <ul class="wp-block-list"> <li><strong>Proton VPN blocks cyber threats</strong> and <a href="https://protonvpn.com/features/strong-encryption#:~:text=Proton%20VPN%20encrypts%20all%20network,are%20secured%20with%20AES%2D256." target="_blank" rel="noreferrer noopener">encrypts data</a> using battle-tested AES-256 or ChaCha20 algorithms, making it nearly impossible for hackers to break. By encrypting internet traffic, the data you transmit over the internet is inaccessible to anyone monitoring your local network, including your internet service provider. This also provides an additional layer of privacy on public WiFi, such as at airports and coffee shops.</li> <li><strong>Proton VPN offers controls to limit access</strong> only to devices and networks you trust. This enables you to restrict access to network assets on a need-to-know basis.</li> <li><strong>You can configure private gateways</strong> to create network segmentation and isolation.</li> <li><strong>Proton VPN also offers NetShield protection against malware.</strong> So you’ll be safe from malicious websites and unwanted ads.</li> </ul> <p>Additionally, Proton VPN’s dedicated IP addresses, anti-censorship measures, and global server network make it easy for employees to access company resources from anywhere in the world, all while denying access to those without authorization.&nbsp;</p> <p>With additional features such as <a href="https://protonvpn.com/features/vpn-accelerator" target="_blank" rel="noreferrer noopener">VPN Accelerator</a> and <a href="https://protonvpn.com/vpn/censorship" target="_blank" rel="noreferrer noopener">Alternative Routing</a>, you can expect fast and reliable connections, even in restrictive environments such as government censorship. </p> <p>Give your business the protection it deserves by <a href="https://protonvpn.com/business/plans">creating a Proton VPN for Business account today</a>.</p> For businessBen WolfordProton VPN offers exciting new business features  https://protonvpn.com/blog/business-news-october-2024https://protonvpn.com/blog/business-news-october-2024Proton for Business now offers MDM support, more dedicated servers, and gateway monitoring.Wed, 16 Oct 2024 15:47:16 GMT <p>We know you need robust and flexible security solutions. We also know that running a business (or managing a business&#8217;s cybersecurity) demands all your attention, which is why we wanted to highlight three important new features for Proton VPN for Business:</p> <h2 class="wp-block-heading">Streamline VPN deployment with MDM support</h2> <p>You can use platforms that support mobile device management (MDM), such as Google Workspace, Samsung Knox, and Microsoft Intune, to install and manage Proton VPN on your team members&#8217; Android and Windows devices. This allows you to:</p> <ul class="wp-block-list"> <li>Automatically install Proton VPN on your organization users&#8217; Windows PCs</li> <li>Automatically sign your team members in to Proton VPN</li> </ul> <p>And depending on the platform used and devices to be managed, it also allows you to:</p> <ul class="wp-block-list"> <li>Monitor deployment</li> <li>Manage app permissions</li> <li>Configure device restrictions</li> <li>Configure always-on VPN and require an active Proton VPN connection for other apps to connect to the internet</li> </ul> <p><a href="https://protonvpn.com/support/mdm"><strong>Learn more about Proton VPN and MDM</strong></a></p> <h2 class="wp-block-heading">Dedicated servers in more countries&nbsp;</h2> <p>Dedicated servers from Proton VPN allow you to securely segment remote access to your organization&#8217;s servers and online SaaS resources.&nbsp;</p> <p><a href="https://protonvpn.com/support/dedicated-ips/"><strong>Learn how dedicated IPs can help your business</strong></a></p> <p>In response to huge demand from our business plan customers, we’ve now greatly expanded the number of locations where dedicated servers are available from just two countries to twelve countries. We’ve also expanded the number of cities available. You can now lease dedicated servers in:</p> <ul class="wp-block-list"> <li>United States</li> <li>Netherlands</li> <li>United Kingdom</li> <li>Switzerland</li> <li>Germany</li> <li>Canada</li> <li>France</li> <li>Republic of Ireland</li> <li>Japan</li> <li>Singapore</li> <li>Australia</li> <li>Brazil</li> </ul> <p>With these new servers, you can access local resources and support remote teams wherever they are in the world.&nbsp;</p> <p><a href="https://protonvpn.com/support/add-gateway-organization/"><strong>Learn how to add dedicated gateways</strong></a></p> <h2 class="wp-block-heading">Manage dedicated server connections with Gateway monitor</h2> <p>In addition to new dedicated servers, we’ve added a Gateway monitoring feature to the Proton Professional dashboard. This improves your organization&#8217;s security and provides greater oversight on how your business&#8217;s resources are accessed by allowing you to see, at-a-glance, which of your organization users is connected to which Gateway, when, and what device they’re using to do so.</p> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1143" height="779" data-public-id="wp-vpn/gateway-monitor/gateway-monitor.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1143,h_779,c_scale/f_auto,q_auto/v1728982127/wp-vpn/gateway-monitor/gateway-monitor.png?_i=AA" alt="Gateway monitor" class="wp-post-10036 wp-image-10032" data-format="png" data-transformations="f_auto,q_auto" data-version="1728982127" data-seo="1" data-filesize="218 KB" data-optsize="48 KB" data-optformat="image/webp" data-percent="77.8" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10032" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728982127/wp-vpn/gateway-monitor/gateway-monitor.png?_i=AA 1143w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_204,c_scale/f_auto,q_auto/v1728982127/wp-vpn/gateway-monitor/gateway-monitor.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_698,c_scale/f_auto,q_auto/v1728982127/wp-vpn/gateway-monitor/gateway-monitor.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_523,c_scale/f_auto,q_auto/v1728982127/wp-vpn/gateway-monitor/gateway-monitor.png?_i=AA 768w" sizes="(max-width: 1143px) 100vw, 1143px" /></figure></div> <p><a href="https://protonvpn.com/support/gateway-monitor" target="_blank" rel="noreferrer noopener"><strong>Learn how to access your Gateway monitor</strong></a></p> <p>Not sure about how best to keep your small business secure? Be sure to check out <strong>A Practical Guide to Security for Growing Businesses</strong>, our comprehensive security ebook by cybersecurity expert and Head of Security at Proton, Patricia Egger.</p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="https://proton.me/business/security-guide">Download the security guide now</a></div> <p>To discuss how our new features can help your business to grow, please get in touch.&nbsp;</p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="https://proton.me/business/contact">Talk to us</a></div> <p></p> <p>.</p> For businessDouglas CrawfordAre browser extensions safe? Unfortunately, not alwayshttps://protonvpn.com/blog/browser-extensions-safehttps://protonvpn.com/blog/browser-extensions-safeHow safe a browser extension is depends almost entirely on how trustworthy its developer is. We take a deep dive.Fri, 11 Oct 2024 15:20:50 GMT <p>Proton offers browser extensions for <a href="https://protonvpn.com/blog/browser-extension/" target="_blank" rel="noreferrer noopener">Proton VPN</a> and <a href="https://proton.me/support/pass-setup" target="_blank" rel="noreferrer noopener">Proton Pass</a>. Browser extensions are useful (and can be <a href="https://chromewebstore.google.com/collection/fun?pli=1" target="_blank" rel="noreferrer noopener">fun</a>). And with more than <a href="https://cloud.google.com/blog/products/chrome-enterprise/secure-enterprise-browsing-more-data-protections-visibility-and-insights" target="_blank" rel="noreferrer noopener">250,000 extensions available</a> on the Chrome web store alone, they’re very popular.&nbsp;</p> <p>But are they safe?&nbsp;</p> <p>The answer is not always. That is why Google blocks approximately <a href="https://truelist.co/blog/google-chrome-statistics/" target="_blank" rel="noreferrer noopener">1,800 malicious extensions uploaded</a> to Chrome each month. In this article, you’ll learn why – and how you can know whether an extension can be trusted.&nbsp;</p> <ul class="wp-block-list"> <li><a href="#what">What are browser extensions?</a></li> <li><a href="#safe">Are browser extensions safe?</a></li> <li><a href="#use">How to use browser extensions safely</a></li> <li><a href="#uninstall">How to uninstall browser extensions</a></li> <li><a href="#recommended">Recommended safe browser extensions</a></li> <li><a href="#trusted">So can browser extensions be trusted?</a></li> </ul> <h2 class="wp-block-heading" id="what">What are browser extensions?</h2> <p>Browser extensions are small software programs that you can add to your web browser to extend its functionality. Extensions allow you to customize your browsing experience by adding new features or modifying the behavior of websites. They can perform a wide range of tasks, such as <a href="https://protonvpn.com/blog/netshield-ad-blocker" target="_blank" rel="noreferrer noopener">blocking ads</a>, <a href="https://proton.me/pass" target="_blank" rel="noreferrer noopener">managing passwords</a>, translating text, or enhancing privacy by <a href="https://protonvpn.com/features/strong-encryption" target="_blank" rel="noreferrer noopener">encrypting data</a> or <a href="https://protonvpn.com/blog/can-be-tracked-using-vpn" target="_blank" rel="noreferrer noopener">preventing tracking</a>.</p> <p>For example, the <a href="https://protonvpn.com/download-chrome-extension" target="_blank" rel="noreferrer noopener">Proton VPN browser extension</a> encrypts your browser traffic with the VPN, without affecting speeds or the IP address of the other apps on your system.&nbsp; The <a href="https://proton.me/pass/download" target="_blank" rel="noreferrer noopener">Proton Pass browser extension</a> autofills passwords, manages secure notes, and generates unique email aliases.</p> <h2 class="wp-block-heading" id="safe">Are browser extensions safe?</h2> <p>Depending on the permissions they request (which we’ll discuss <a href="#permissions">below</a>), a browser extension can potentially access everything you do in the browser and relay it to a third party. This includes your:</p> <ul class="wp-block-list"> <li>Browsing history (including pages visited, searches made, and even interactions on certain sites)</li> <li>Personal information (including usernames and passwords, email addresses, phone numbers, post address, and more)</li> <li>Payment and bank details</li> <li>Cookies and session data stored on your browser</li> <li>Download and upload activity (including sensitive documents, photos, or other personal data)</li> <li>Clipboard data that you’ve copied into or pasted from your browser</li> <li>Geolocation information</li> <li>Other apps or accounts that you’ve integrated with your browser</li> </ul> <p>Malicious browser extensions can therefore do a huge amount of damage. As with mobile apps, browser developers have developed a permissions system, where extensions should only ask for the permissions they need. In theory, this limits the amount of damage a malicious extension can do. However:</p> <ul class="wp-block-list"> <li>Many extensions genuinely require access to many permissions to function correctly (this notably includes VPN extensions and password extensions)</li> <li>Malicious apps often ask for permissions they wouldn’t need if they were trustworthy. But even if you can tell what permissions an extension needs, how many people actually check these before hitting the install button?</li> </ul> <p>A recent study found that <a href="https://spin.ai/blog/browser-extension-risk-report/" target="_blank" rel="noreferrer noopener">51% of all installed browser extensions</a> have the potential to cause extensive damage (note that most of these will be legitimate extensions that simply have the permissions necessary to do harm).</p> <h2 class="wp-block-heading" id="use">How to use browser extensions safely</h2> <h3 class="wp-block-heading">1. Only download extensions from trusted developers</h3> <p>A big problem with extensions is that there is very little vetting of them. Basically, anyone can upload an extension to the Google Chrome Store, Firefox Browser Add-ons, and similar places.&nbsp;&nbsp;</p> <p>One of the eye-opening facts exposed in the above study was that some 43,000 extensions on the Chrome web Store have anonymous authors.&nbsp;</p> <p>It should go without saying that you should only download extensions from developers you trust.&nbsp;</p> <h3 class="wp-block-heading">2. Use open source extensions</h3> <p>Open source extensions can be independently audited by anyone qualified to ensure that they’re doing what they’re supposed to be doing, and nothing else. This is in sharp contrast to closed-source proprietary extensions, where you just have to thrust the developer.&nbsp;</p> <p>Most open source extensions haven’t been audited in this way, but the fact that they are an open book ready to be audited at any time is a strong indication that they can be trusted (although never a guarantee) .&nbsp;</p> <h3 class="wp-block-heading">3. Download only from reputable sources</h3> <p>As we’ve already discussed, many malicious extensions slip through the net. However, reputable browser extension repositories, such the the Chrome web Store and Firefox Browser Add-ons, do at least try to vet the software they host, and to remove extensions considered malicious.&nbsp;</p> <h3 class="wp-block-heading">4. Monitor changes in ownership or terms of service</h3> <p>A change in ownership or terms of service can mean that an extension that was trustworthy becomes a liability. A <a href="https://www.bleepingcomputer.com/news/software/2-million-users-impacted-by-new-data-collection-policy-in-stylish-browser-add-on/" target="_blank" rel="noreferrer noopener">high-profile example</a> of this happening involved the Stylish extension, once a popular and trusted tool for customizing website appearances.</p> <p>Stylish was sold to a new company in 2017, and soon after the acquisition, the new owners modified the extension to secretly collect users&#8217; complete browsing histories without proper user consent. This included every website visited and search queries, all of which is highly sensitive data. The extension was eventually removed from the Chrome and Firefox web stores after privacy experts and users raised concerns.&nbsp;</p> <p>It’s therefore important to monitor any significant updates or changes in the privacy policies of extensions you use.</p> <h3 class="wp-block-heading" id="permissions">5. Monitor permissions</h3> <p>Browser extension permissions is the system specifically designed to make using browser extensions safer. But as we discussed above, in practice, it’s of limited use.</p> <p>That said, you should keep an eye on permissions, as these can be a big red flag. After all, your ad-blocker extension shouldn’t be asking permission to access your camera and microphone.&nbsp;</p> <h3 class="wp-block-heading">6. Delete unused extensions</h3> <p>Browser extensions you’ve previously installed but don&#8217;t use eat up memory and present potential and unnecessary security risks. So just delete them.&nbsp;</p> <h2 class="wp-block-heading" id="uninstall">How to uninstall browser extensions</h2> <p>After reading this article, you may wish to audit your browser extensions and uninstall any that are suspicious (or simply unused). Here’s a quick guide for how to do this on the most popular <a href="https://proton.me/blog/best-browser-for-privacy" target="_blank" rel="noreferrer noopener">browsers</a>.</p> <h3 class="wp-block-heading">Firefox (desktop)</h3> <p>Open Firefox and select the <strong>Extensions</strong> menu bar icon (looks like a jigsaw piece). Click the <strong>⚙</strong> icon next to the extension you wish to uninstall → <strong>Remove Extension</strong>.</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="650" height="600" data-public-id="wp-vpn/remove-extension-firefox/remove-extension-firefox.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_650,h_600,c_scale/f_auto,q_auto/v1728654959/wp-vpn/remove-extension-firefox/remove-extension-firefox.png?_i=AA" alt="How to remove browser extensions on Firefox (desktop)" class="wp-post-9996 wp-image-9998" data-format="png" data-transformations="f_auto,q_auto" data-filesize="68 KB" data-optsize="14 KB" data-optformat="image/webp" data-percent="80.2" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=9998" data-version="1728654959" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654959/wp-vpn/remove-extension-firefox/remove-extension-firefox.png?_i=AA 650w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_277,c_scale/f_auto,q_auto/v1728654959/wp-vpn/remove-extension-firefox/remove-extension-firefox.png?_i=AA 300w" sizes="(max-width: 650px) 100vw, 650px" /></figure></div> <h3 class="wp-block-heading">Firefox (Android)</h3> <p>1. Open the Firefox app and go to <strong>⋮</strong> → <strong>Extensions</strong> → <strong>Extensions Manager</strong> and select the extension you wish to uninstall.</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="400" height="473" data-public-id="wp-vpn/remove-extension-ff-android-1/remove-extension-ff-android-1.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_400,h_473,c_scale/f_auto,q_auto/v1728654948/wp-vpn/remove-extension-ff-android-1/remove-extension-ff-android-1.png?_i=AA" alt="How to remove browser extensions on Firefox (Android) 1" class="wp-post-9996 wp-image-10000" data-format="png" data-transformations="f_auto,q_auto" data-filesize="57 KB" data-optsize="13 KB" data-optformat="image/webp" data-percent="76.8" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10000" data-version="1728654948" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654948/wp-vpn/remove-extension-ff-android-1/remove-extension-ff-android-1.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_254,h_300,c_scale/f_auto,q_auto/v1728654948/wp-vpn/remove-extension-ff-android-1/remove-extension-ff-android-1.png?_i=AA 254w" sizes="(max-width: 400px) 100vw, 400px" /></figure></div> <p>2. Select <strong>Remove</strong>.</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="400" height="541" data-public-id="wp-vpn/remove-extension-ff-android-2/remove-extension-ff-android-2.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_400,h_541,c_scale/f_auto,q_auto/v1728654945/wp-vpn/remove-extension-ff-android-2/remove-extension-ff-android-2.png?_i=AA" alt="How to remove browser extensions on Firefox (Android) 2" class="wp-post-9996 wp-image-10001" data-format="png" data-transformations="f_auto,q_auto" data-filesize="30 KB" data-optsize="6 KB" data-optformat="image/webp" data-percent="80.6" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10001" data-version="1728654945" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654945/wp-vpn/remove-extension-ff-android-2/remove-extension-ff-android-2.png?_i=AA 400w, https://res.cloudinary.com/dbulfrlrz/images/w_222,h_300,c_scale/f_auto,q_auto/v1728654945/wp-vpn/remove-extension-ff-android-2/remove-extension-ff-android-2.png?_i=AA 222w" sizes="(max-width: 400px) 100vw, 400px" /></figure></div> <h3 class="wp-block-heading">Chrome (desktop)</h3> <p>On Chrome and Chromium, go to <strong>⋮</strong> → <strong>Extensions</strong> → <strong>Manage extensions</strong> → the extension you wish to uninstall → <strong>Remove</strong>.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1311" height="703" data-public-id="wp-vpn/remove-extension-chromium/remove-extension-chromium.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1311,h_703,c_scale/f_auto,q_auto/v1728654953/wp-vpn/remove-extension-chromium/remove-extension-chromium.png?_i=AA" alt="How to remove browser extensions on Chrome (desktop)" class="wp-post-9996 wp-image-9999" data-format="png" data-transformations="f_auto,q_auto" data-filesize="91 KB" data-optsize="21 KB" data-optformat="image/webp" data-percent="77.3" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=9999" data-version="1728654953" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654953/wp-vpn/remove-extension-chromium/remove-extension-chromium.png?_i=AA 1311w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_161,c_scale/f_auto,q_auto/v1728654953/wp-vpn/remove-extension-chromium/remove-extension-chromium.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_549,c_scale/f_auto,q_auto/v1728654953/wp-vpn/remove-extension-chromium/remove-extension-chromium.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_412,c_scale/f_auto,q_auto/v1728654953/wp-vpn/remove-extension-chromium/remove-extension-chromium.png?_i=AA 768w" sizes="(max-width: 1311px) 100vw, 1311px" /></figure></div> <h3 class="wp-block-heading">Brave (desktop)</h3> <p>Open Brave and go to <strong>☰</strong> → <strong>Extensions</strong> → the extension you wish to uninstall → <strong>Remove</strong>.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1192" height="547" data-public-id="wp-vpn/remove-extension-brave/remove-extension-brave.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1192,h_547,c_scale/f_auto,q_auto/v1728654939/wp-vpn/remove-extension-brave/remove-extension-brave.png?_i=AA" alt="How to remove browser extensions on Brave (desktop)" class="wp-post-9996 wp-image-10002" data-format="png" data-transformations="f_auto,q_auto" data-filesize="95 KB" data-optsize="19 KB" data-optformat="image/webp" data-percent="80.4" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10002" data-version="1728654939" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654939/wp-vpn/remove-extension-brave/remove-extension-brave.png?_i=AA 1192w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_138,c_scale/f_auto,q_auto/v1728654939/wp-vpn/remove-extension-brave/remove-extension-brave.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_470,c_scale/f_auto,q_auto/v1728654939/wp-vpn/remove-extension-brave/remove-extension-brave.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_352,c_scale/f_auto,q_auto/v1728654939/wp-vpn/remove-extension-brave/remove-extension-brave.png?_i=AA 768w" sizes="(max-width: 1192px) 100vw, 1192px" /></figure></div> <h3 class="wp-block-heading">Edge for Windows</h3> <p>Open Edge and select the <strong>Extensions</strong> menu bar icon (looks like a jigsaw piece). Click the <strong>⚙</strong> icon next to the extension you wish to uninstall → ⋮ → <strong>Remove from Microsoft Edge</strong>.</p> <div class="wp-block-image"> <figure class="aligncenter size-full"><img width="614" height="476" data-public-id="wp-vpn/remove-extension-edge/remove-extension-edge.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_614,h_476,c_scale/f_auto,q_auto/v1728654935/wp-vpn/remove-extension-edge/remove-extension-edge.png?_i=AA" alt="How to remove browser extensions on Edge" class="wp-post-9996 wp-image-10003" data-format="png" data-transformations="f_auto,q_auto" data-filesize="31 KB" data-optsize="9 KB" data-optformat="image/webp" data-percent="70.4" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10003" data-version="1728654935" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654935/wp-vpn/remove-extension-edge/remove-extension-edge.png?_i=AA 614w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_233,c_scale/f_auto,q_auto/v1728654935/wp-vpn/remove-extension-edge/remove-extension-edge.png?_i=AA 300w" sizes="(max-width: 614px) 100vw, 614px" /></figure></div> <h3 class="wp-block-heading">Safari for macOS</h3> <p>Open Safari and go to the <strong>macOS menu bar</strong> → <strong>Safari</strong> → <strong>Settings…</strong> → <strong>Extensions</strong> tab → the extension you wish to remove → <strong>Uninstall</strong>.&nbsp;</p> <div class="wp-block-image"> <figure class="aligncenter size-large"><img width="1896" height="1408" data-public-id="wp-vpn/remove-extension-safari/remove-extension-safari.png" loading="lazy" decoding="async" src="https://res.cloudinary.com/dbulfrlrz/images/w_1896,h_1408,c_scale/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA" alt="How to remove browser extensions on Safari" class="wp-post-9996 wp-image-10004" data-format="png" data-transformations="f_auto,q_auto" data-filesize="391 KB" data-optsize="96 KB" data-optformat="image/webp" data-percent="75.4" data-permalink="https://vpn.protonblog.tech/wp-admin/admin.php?page=cloudinary&amp;section=edit-asset&amp;asset=10004" data-version="1728654926" data-seo="1" srcset="https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA 1896w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_223,c_scale/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_760,c_scale/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_570,c_scale/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_1141,c_scale/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1164,c_scale/f_auto,q_auto/v1728654926/wp-vpn/remove-extension-safari/remove-extension-safari.png?_i=AA 1568w" sizes="(max-width: 1896px) 100vw, 1896px" /></figure></div> <h2 class="wp-block-heading" id="recommended">Recommended safe browser extensions</h2> <p>The following browser extensions are open source and developed by individuals or organizations widely regarded as being trustworthy. However, other than our own software,&nbsp; Proton VPN has no inside knowledge about these extensions, has not audited them in any way, and takes no responsibility if you choose to install them.&nbsp;</p> <p>As a company with a mission to make privacy the default for everyone, we’ll focus on extensions that make your online browsing safer and more secure.</p> <h3 class="wp-block-heading"><a href="https://protonvpn.com/support/browser-extensions" target="_blank" rel="noreferrer noopener">Proton VPN</a></h3> <p>Proton VPN is a Swiss-based no-logs VPN service <a href="https://protonvpn.com/features/trustworthy">trusted</a> by millions of journalists, activists, and ordinary people around the world. With our browser extension for all major browsers, you can protect your browser traffic with the VPN, without affecting speeds or the IP address of the other apps on your system.</p> <p>For example, you can browse privately without affecting ping rates for online games. Or you can stream from another country in one browser while shopping for the best local deals in a different browser. It’s also ideal for browsing privately on low end devices and on devices where you don’t have the admin rights to install a full VPN app.</p> <p>Unlike most open source browser extensions, the Proton VPN browser extension has been <a href="https://drive.proton.me/urls/RWDD2SHT98#v7ZrwNcafkG8" target="_blank" rel="noreferrer noopener">fully audited</a> by third-party security professions. Our <a href="https://protonvpn.com/blog/no-logs-audit" target="_blank" rel="noreferrer noopener">no-logs infrastructure has also been audited</a>.&nbsp;</p> <div class="text-center"><a class="inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white" href="/pricing/">Get Proton VPN now</a></div> <h3 class="wp-block-heading"><a href="https://proton.me/support/pass-setup" target="_blank" rel="noreferrer noopener">Proton Pass</a></h3> <p>Proton Pass is designed to securely store your passwords, notes, and other sensitive data, while protecting your privacy with end-to-end encryption. This ensures that only you can access your information, and not even Proton can see your data.</p> <p>The browser extension (for all major browsers) can save and autofill your passwords, create secure passwords or passphrases, and generate 2FA authentication codes. Its built-in hide-my-email feature can create disposable email aliases, allowing you to maintain your privacy and avoid spam when signing up for new online services.</p> <p>As with all Proton products, the Proton Pass browser extension is <a href="https://github.com/ProtonMail/WebClients/tree/main/applications/pass-extension" target="_blank" rel="noreferrer noopener">open source</a> and has been <a href="https://drive.proton.me/urls/KXQV3SSGFM#bEm15I8oWA4x" target="_blank" rel="noreferrer noopener">independently audited</a>.&nbsp;</p> <p>&lt;div class=&#8221;text-center&#8221;&gt;&lt;a class=&#8221;inline-block py-2 px-4 rounded-full no-underline font-bold bg-purple-500 text-white hover:text-white focus:text-white&#8221; href=&#8221;https://proton.me/pass&#8221;&gt;Get Proton pass now&lt;/a&gt;&lt;/div&gt;</p> <h3 class="wp-block-heading"><a href="https://privacybadger.org/" target="_blank" rel="noreferrer noopener">Privacy Badger&nbsp;</a></h3> <p>Created by the <a href="https://www.eff.org/" target="_blank" rel="noreferrer noopener">Electronic Frontier Foundation</a> (EFF), Privacy Badger focuses on protecting your privacy by automatically blocking invisible trackers that follow you around the web. Unlike traditional ad blockers (including Proton VPN’s <a href="https://protonvpn.com/blog/netshield-ad-blocker/" target="_blank" rel="noreferrer noopener">Netsheild ad-blocker</a> feature), Privacy Badger learns over time which domains are tracking your behavior and blocks them accordingly.&nbsp;</p> <p>Privacy Badger doesn’t rely on predefined filter lists. Instead, it observes third-party tracking behaviors as you browse. When it detects the same trackers on multiple sites, it automatically blocks them. It also <a href="https://protonvpn.com/blog/how-to-block-third-party-cookies-on-all-browsers/">blocks third-party tracking cookies</a>, but allows ads that don’t track you.&nbsp;</p> <p>Privacy Badger and Proton VPN’s Netshield ad-blocker feature complement each other, and can be used together.&nbsp;</p> <h3 class="wp-block-heading"><a href="https://github.com/Cookie-AutoDelete/Cookie-AutoDelete" target="_blank" rel="noreferrer noopener">Cookie AutoDelete</a></h3> <p>The problem with cookie-blocking software (including browser extensions) is that cookies are often used by websites for legitimate purposes, such as keeping you logged in. In some cases, blocking cookies can even “break” websites that you want to visit.</p> <p>The Cookie AutoDelete extension helps balance privacy and usability by allowing a website to place cookies on your browser when you’re visiting the website, but then automatically deletes them after you close a tab or window.&nbsp;</p> <h3 class="wp-block-heading"><a href="https://decentraleyes.org/" target="_blank" rel="noreferrer noopener">Decentraleyes</a></h3> <p>Websites often rely on third-party <a href="https://en.wikipedia.org/wiki/Content_delivery_network" target="_blank" rel="noreferrer noopener">content delivery networks</a> (CDNs) to host essential resources, but these CDNs can track you across different sites. Decentraleyes hosts popular web libraries used by CDNs locally, so when a web site requests a resource from a CDN,&nbsp; it intercepts the resource and loads it locally.&nbsp;</p> <p>This helps maintain your privacy by blocking this kind of tracking, while still ensuring the websites you visit function properly. It can also help web pages to load faster.</p> <h2 class="wp-block-heading" id="trusted">So can browser extensions be trusted?</h2> <p>Yes. So long as their developer can be trusted.&nbsp;</p> <p>The bottom line is that (as with most other software you run on your system) malicious browser extensions can cause a huge amount of damage, and the safeguards put into place by browser developers are of very limited use in preventing this.</p> <p>However, if you download browser extensions from trusted stores that are verified to belong to trusted developers (open source can help determine which developers are trustworthy), there is little to worry about.&nbsp;</p> Privacy deep divesDouglas CrawfordBest open-source Discord alternativeshttps://protonvpn.com/blog/discord-alternativeshttps://protonvpn.com/blog/discord-alternativesHere's why you might want to consider a Discord alternative — and the pros and cons of seven other apps like Discord that you may want to switch to instead.Fri, 27 Sep 2024 16:47:51 GMT <p>In this article, we look at privacy-friendly <a href="https://proton.me/community/open-source" target="_blank" rel="noreferrer noopener">open-source</a> alternatives to Discord, the wildly popular text, voice, and video chat platform used by over 153 million (primarily) <a href="https://protonvpn.com/gaming">gamers</a> each month. This popularity is due to Discord’s “gamer aesthetic” design choices, clever use of gaming references, and its rock-solid, high-quality, low-latency handling of group chats.</p> <p>Discord’s support for a wide array of bots, custom emojis, GIFs, and public and private channels (which can be easily administered using customizable roles) has fostered numerous large and enthusiastic online communities. Although many of these communities are focused on video gaming (easily outnumbering Steam’s <a href="https://backlinko.com/steam-users" target="_blank" rel="noreferrer noopener">132 million</a> monthly active users), Discord has also become the chat platform of choice for a wide range of hobbies.&nbsp;</p> <p>However, there are good reasons to prefer an alternative group chat option. In this article, we’ll discuss why you might want to use a Discord alternative and also look at the following secure, private, and open-source messaging and VoIP apps like Discord.&nbsp;</p> <ul class="wp-block-list"> <li><a href="#why">Why use a Discord alternative?</a></li> <li><a href="#matrix">Matrix / Element</a></li> <li><a href="#mumble">Mumble</a></li> <li><a href="#jitsi">Jitsi Meet</a></li> <li><a href="#telegram">Telegram</a></li> <li><a href="#mattermost">Mattermost</a></li> <li><a href="#jami">Jami</a></li> <li><a href="#tox">Tox</a></li> <li><a href="#what">What is the best Discord alternative for you?</a></li> </ul> <h2 class="wp-block-heading" id="why">Why use a Discord alternative?</h2> <h3 class="wp-block-heading">Discord is closed source</h3> <p>Discord is proprietary, closed-source software. This means there is no way to i<a href="https://protonvpn.com/blog/no-logs-audit/" target="_blank" rel="noreferrer noopener">ndependently verify</a> how secure it is or guarantee it’s not doing something it shouldn’t. At Proton, we believe open-source is one of the best indicators that an app can be trusted, as anyone can examine the code to ensure the app is secure.</p> <h3 class="wp-block-heading">Discord text chats aren&#8217;t E2EE</h3> <p><a href="https://proton.me/blog/what-is-end-to-end-encryption" target="_blank" rel="noreferrer noopener">End-to-end encryption </a>(E2EE) ensures that only you and the person you send a message to can read it. Discord recently announced that all <a href="https://discord.com/blog/meet-dave-e2ee-for-audio-video" target="_blank" rel="noreferrer noopener">voice and video calls</a> on the platform will be end-to-end encrypted, which is a very welcome move. However, Discord can always access your text chats.&nbsp;</p> <h3 class="wp-block-heading">Discord targets you with personalized ads</h3> <p>Discord is a commercial operation that offers its service to make money. While some of its income derives from its premium ad-free <a href="https://discord.com/nitro" target="_blank" rel="noreferrer noopener">Nitro</a> subscription service, a very large portion comes from advertising — either directly through allowing advertisers to integrate sponsored content into users’ channels or indirectly through game partnerships and band collaborations.&nbsp;</p> <p>Crucially, much like <a href="https://protonvpn.com/blog/google-ip-protection" target="_blank" rel="noreferrer noopener">Google</a> and Meta (Facebook), Discord collects a great deal of personal information that it uses to target you with personalized ads. As its <a href="https://discord.com/privacy" target="_blank" rel="noreferrer noopener">privacy policy</a> explains:</p> <p>“We also collect information automatically from you when you use Discord. This includes:</p> <ul class="wp-block-list"> <li><strong>Information about your device</strong>. We collect information about the device you are using to access the services. For example, this includes information like your IP address, operating system information, browser information, and information about your device settings, such as your microphone and/or camera.&nbsp;</li> <li><strong>Information about your use of the apps or websites</strong>. For example, we collect log and event information related to how and when you use our services (such as the pages, servers, and channels you visit, the activities you engage in, the features you use, and the surfaces or embedded content you interact with).</li> <li><strong>Other information that we collect automatically</strong>. When you take certain actions on other sites, we may receive information about you. For example, when we advertise for Discord on third party platforms, if you click on the ad, we may receive information about which ad you saw and on which platform. Similarly, we may also receive certain information when you click on a referral link, such as which website you came from”.</li> </ul> <h3 class="wp-block-heading">Discord is a hotbed for online scams</h3> <p>Perhaps inevitably, the popularity of Discord has attracted a <a href="https://www.polygon.com/23306974/discord-messaging-app-scam-phishing" target="_blank" rel="noreferrer noopener">wave</a> of <a href="https://www.howtogeek.com/879634/discord-scams-and-how-to-protect-yourself/">scammers</a> keen to separate users from their money. This problem can be at least partially addressed by <a href="https://www.computerhope.com/issues/ch002331.htm" target="_blank" rel="noreferrer noopener">making your Discord channels private</a>, but an even better solution may be to move to a completely different and more private platform.</p> <h2 class="wp-block-heading">Open-source Discord alternatives</h2> <p>There are plenty of group chat apps out there that make good Discord replacements. However, at Proton, we always recommend using open-source options, as these provide the best guarantee that the software is secure and trustworthy. This is why <a href="https://protonvpn.com/blog/open-source/" target="_blank" rel="noreferrer noopener">Proton makes all our apps open source</a>. In addition to this, none of the Discord alternatives discussed below spy on your browsing to deliver targeted ads.&nbsp;</p> <p>Below, we look at some great open-source apps that respect your privacy and can replace Discord. Please note, however, that this is not intended to be an exhaustive list, as there are many more good options out there than we can cover in this article.&nbsp;</p> <h3 class="wp-block-heading" id="matrix">Matrix / Element</h3> <h4 class="wp-block-heading"><strong>Pros</strong></h4> <ul class="wp-block-list"> <li>Free</li> <li>Server federation</li> <li>“Bridges” for interoperability with other apps</li> <li>E2EE text chat</li> <li>Requires no phone number or email to sign up</li> <li>Apps for all major platforms (Element)</li> </ul> <h4 class="wp-block-heading"><strong>Cons</strong></h4> <ul class="wp-block-list"> <li>Questions over Matrix server network reliability</li> <li>Not fully audited</li> </ul> <p>Matrix is a decentralized communications network built on the idea of federation. You can set up your own server using the<a href="https://matrix.org/faq/" target="_blank" rel="noreferrer noopener"> Matrix communications protocol</a> or connect to Matrix servers that others have set up. This federated network has received the<a href="https://twitter.com/Snowden/status/1175457923255951364" target="_blank" rel="noreferrer noopener"> support of Edward Snowden</a> but remains controversial due to the potentially unreliable, ad-hoc, peer-to-peer nature of federated services.</p> <p>Matrix servers are interoperable, so any user of any <a href="https://matrix.org/clients/" target="_blank" rel="noreferrer noopener">Matrix client</a> can communicate with any other Matrix user. Element is the most popular Matrix client, but Matrix “bridges” allow you to communicate with the users of other popular messaging platforms, such as Signal, Slack, or <a href="https://github.com/matrix-org/matrix-appservice-discord" target="_blank" rel="noreferrer noopener">even Discord</a>!</p> <p>Matrix uses the<a href="https://matrix.org/docs/guides/end-to-end-encryption-implementation-guide" target="_blank" rel="noreferrer noopener"> Olm implementation of the Double Ratchet algorithm</a>, with Megolm used for group communications. All Element apps, plus the Matrix protocol itself, are open source but haven’t been formally audited. However,<a href="https://www.nccgroup.trust/globalassets/our-research/us/public-reports/2016/november/ncc_group_olm_cryptogrpahic_review_2016_11_01.pdf" target="_blank" rel="noreferrer noopener"> Olm and Megolm have been audited</a>.</p> <p>Element is the most popular Matrix client. You don’t need to share your email or phone number to register with it, although you can add them to make contact matching easier. By default, messages are hosted on a large public server run by Matrix, but you can connect to any Matrix server or set one up yourself in seconds.</p> <p>All text chats are end-to-end encrypted by default. Voice and video calls use <a href="#jitsi">Jitsi</a>, which provides (optional) end-to-end encryption for up to 50 participants.&nbsp;</p> <h3 class="wp-block-heading" id="mumble">Mumble</h3> <p>Pros</p> <ul class="wp-block-list"> <li>Self-hosted (so you have complete control)</li> <li>Free (although you may need to pay for server hosting)</li> <li>Great in-game audio with positional sound (in supported games)</li> <li>A useful in-game overlay</li> <li>Bots</li> <li>Recognize friends across Mumble servers</li> <li>Apps for all major platforms (mobile apps via third parties)</li> </ul> <p>Cons</p> <ul class="wp-block-list"> <li>Self-hosted (requires time and technical chops to set and maintain)</li> <li>No E2EE</li> <li>No video chat</li> <li>The interface is quite basic</li> </ul> <p>Mumble is an open-source, low-latency, high-quality voice chat software known for its low bandwidth usage and minimal audio delay. Designed specifically with gaming in mind, Mumble offers an in-game overlay that shows the time and your <a href="https://en.wikipedia.org/wiki/Frame_rate" target="_blank" rel="noreferrer noopener">frame rate</a> (FPS). It also offers positional audio (in supported games), so you can hear where other players are located in-game. A number of bot plugins are also available to play music, assist with admin tasks, and more.&nbsp;</p> <p>Mumble servers are self-hosted. This is great in terms of giving you complete control over data and security, and Mumble provides an extensive permissions system that allows you to configure complex scenarios (the example Mumble gives is separating two groups, but the leaders can talk to both groups). The downside of self-hosting is that you need time and technical know-how to set up and maintain a Mumble server.&nbsp;</p> <p>There’s no support for end-to-end encryption, although messages are encrypted in transit using <a href="https://proton.me/blog/https">TLS</a> and will be secured at rest using whatever full-disk encryption software is running on the server (if any). But as instances are self-hosted, this may not be a major concern if you trust the person running the host server.&nbsp;</p> <p>Interestingly for a self-hosted solution, Mumble allows you to recognize friends across different servers that run the Mumble software, even when they are hosted by completely different people.&nbsp;</p> <h2 class="wp-block-heading" id="jitsi">Jitsi Meet</h2> <p><strong>Pros</strong></p> <ul class="wp-block-list"> <li>Open source</li> <li>Free</li> <li>Works in your browser</li> <li>E2EE for up to 50 participants</li> <li>Can be self-hosted</li> </ul> <p><strong>Cons</strong></p> <ul class="wp-block-list"> <li>Meeting hosts must sign in with their Gmail, Facebook, or GitHub account</li> <li>Didn’t work properly for us on Firefox</li> </ul> <p>Jitsi Meet is a free and open-source video chat platform that also supports text chat. As such, it makes a great Discord replacement. Although available as an app for iPhones, iPads, Android devices (including on F-Droid), and on the desktop (as an Electron app), its most notable feature is the ability to hold video calls directly in your browser without the need to install anything.</p> <p>To start a chat, simply go to the website, initiate a session, and share the meeting link with your contacts. By default, the platform creates unique, random names for each meeting room to prevent unwanted guests from <a href="https://en.wikipedia.org/wiki/Zoombombing" target="_blank" rel="noreferrer noopener">zoombombing</a> your discussions. You can pick a custom name for your meeting and secure it with a password for an extra layer of protection.&nbsp;</p> <p>Jitsi supports E2EE for group calls with up to 50 participants. However, in our tests, the video and audio only worked correctly when all participants used Chrome-based browsers (not Firefox).&nbsp;</p> <p>Until August 2023, Jitsi supported anonymous conference hosting. However, in response to abuses of the platform (such as the broadcasting of CSAM during video conferences), all meetings must now have a moderator who must sign in with their Gmail, Facebook, or GitHub account. If this concerns you, you can always self-host your own Jitsi instance.&nbsp;</p> <h3 class="wp-block-heading" id="telegram">Telegram</h3> <h4 class="wp-block-heading"><strong>Pros</strong></h4> <ul class="wp-block-list"> <li>Free</li> <li>Channels for broadcasting messages</li> <li>Bots for managing groups</li> <li>Polls, stickers, sharing live location, identity management</li> <li>E2EE one-to-one text, voice, and video chat (Secret Chats)</li> <li>Apps for all major platforms</li> </ul> <h4 class="wp-block-heading"><strong>Cons</strong></h4> <ul class="wp-block-list"> <li>Encryption concerns</li> <li>Only Secret Chats are E2EE&nbsp;</li> <li>Group chats (text or voice) are not E2EE</li> <li>Collects lots of metadata</li> <li>Requires a valid phone number to sign up</li> <li>Headquartered in the UAE, which is not known for human rights or privacy from the government (despite having some<a href="https://blogs.dlapiper.com/privacymatters/dubai-difc-data-protection-law-2020/" target="_blank" rel="noreferrer noopener"> strong privacy laws</a>)</li> </ul> <p>Much like Discord, Telegram is a wildly popular chat, voice, and video communications platform that supports public channels that any number of other users can subscribe to, polls, stickers, sharing live locations in chats, and an online authorization and identity management system for those who need to prove their identity. As with Discord, you can use bots to assist with managing groups and channels.&nbsp;</p> <p>One-to-one text, voice, and video chats can be end-to-end encrypted using the open-source in-house <a href="https://core.telegram.org/mtproto/description">MTProto 2.0</a> encryption protocol (which has been<a href="https://arxiv.org/pdf/2012.03141v1.pdf" target="_blank" rel="noreferrer noopener"> formally verified</a>), but this is not enabled by default. Discord refugees should also be aware that group chats and channels cannot be end-to-end encrypted.&nbsp;</p> <p>Another issue is that Telegram<a href="https://telegram.org/privacy" target="_blank" rel="noreferrer noopener"> may collect a great deal of metadata</a> from users: “We may collect metadata such as your IP address, devices and Telegram apps you’ve used, history of username changes, etc.”</p> <p>For maximum privacy when using Telegram, you should access the service in a browser (rather than use its apps), sign up using a <a href="https://proton.me/blog/hide-my-email-aliases" target="_blank" rel="noreferrer noopener">hide-my-email alias</a>, a strong password, and <a href="https://proton.me/support/pass-2fa" target="_blank" rel="noreferrer noopener">2FA</a>, and use a <a href="https://protonvpn.com/" target="_blank" rel="noreferrer noopener">VPN</a> to protect your IP address. Ideally, you should also hide your phone number from Telegram, but while <a href="https://techpp.com/2024/01/01/sign-up-for-telegram-without-phone-number-or-sim/" target="_blank" rel="noreferrer noopener">possible</a>, this isn’t easy.&nbsp;</p> <h3 class="wp-block-heading" id="mattermost">Mattermost</h3> <p>Pros</p> <ul class="wp-block-list"> <li>Self-hosted (so you have complete control)</li> <li>Free for up to 50 users (but server hosting fees may apply)</li> <li>Apps for all major platforms</li> </ul> <p>Cons</p> <ul class="wp-block-list"> <li>Self-hosted (requires time and technical chops to set and maintain)</li> <li>Group voice and video calls require third-party integrations&nbsp;</li> </ul> <p>If you’ve ever used Slack or Microsoft Teams for work, you’ll feel instantly at home with Mattermost, an open-source, self-hosted messaging platform designed for team collaboration and communication.</p> <p>Although designed for business use, Mattermost’s focus on collaboration across multiple channels makes it a great Discord replacement. Natively, voice or video calls are only available for one-to-one chats, but Mattermost supports third-party integrations like Jitsi, Zoom, or other conferencing tools to allow group voice and video chats.</p> <p>Mattermost does not offer end-to-end encryption (E2EE) for messages by default. Instead, it <a href="https://docs.mattermost.com/deploy/encryption-options.html">provides</a> encryption in transit (TLS, or the experimental Gossip protocol) and encryption at rest using the host server’s encryption solution.&nbsp;</p> <p>However, if you’re using Mattermost in a non-business context (such as a private Discord alternative), you’ll almost certainly be self-hosting. So if you trust whoever is hosting the Mattermost instance, the lack of E2EE may not be a concern. If it is, third-party E2EE plugins are available.&nbsp;</p> <h3 class="wp-block-heading" id="jami">Jami</h3> <h4 class="wp-block-heading"><strong>Pros</strong></h4> <ul class="wp-block-list"> <li>Free</li> <li>Decentralized (P2P)</li> <li>E2EE for unlimited participants (including video chat)</li> <li>Great support for video calls</li> </ul> <h4 class="wp-block-heading"><strong>Cons</strong></h4> <ul class="wp-block-list"> <li>Requires downloading an app</li> <li>VPN needed for better privacy</li> <li>P2P networks can be unstable</li> </ul> <p>Like Matrix, Jami is a distributed, free, and open-source (FOSS) communications platform that doesn’t require centralized servers or third-party hosting. It doesn’t ask for any personal information or show ads.</p> <p>Although known primarily for its <a href="https://protonvpn.com/blog/zoom-alternatives/#jami" target="_blank" rel="noreferrer noopener">E2EE video chat capabilities</a> (with group chats that can involve an unlimited number of participants), Jitsi also supports E2EE text and voice-only chat. All participants must download the Jami app, which is available for all major platforms (including on F-Droid and even for Android TV).&nbsp;</p> <p>Because there’s no centralized server, there’s no one to collect or store your metadata. However, as a peer-to-peer based technology that connects directly to other peers on the network, other Jami users you connect to can see your IP address. If this concerns you, you can hide it using a VPN.</p> <h3 class="wp-block-heading" id="tox">Tox</h3> <p>Pros</p> <ul class="wp-block-list"> <li>Free</li> <li>Decentralized (P2P)</li> <li>E2EE text, voice, video, and file sharing</li> </ul> <p>Cons</p> <ul class="wp-block-list"> <li>VPN needed for better privacy</li> <li>P2P networks can be unstable</li> </ul> <p>Tox is an open-source, peer-to-peer (P2P) communication platform developed as a response to concerns over privacy in communication. It aims to offer a completely decentralized and secure alternative to popular messaging apps.&nbsp;</p> <p>However, with full support for E2EE group text messaging, voice, video calls, and file sharing, it also makes a great Discord replacement. Thanks to its P2P nature, Tox doesn’t apply a limit to the number of participants for voice or video calls, but factors such as the bandwidth and device performance of each participant will dramatically affect the call’s quality. In practice, Tox performs best with small groups for voice or video calls. Group calls with around 5-10 participants usually run smoothly, but trying to scale up to much larger groups can lead to performance issues due to the P2P nature.</p> <p>For its end-to-end encryption, Tox uses respected cryptographic primitives — <a href="https://en.wikipedia.org/wiki/Curve25519" target="_blank" rel="noreferrer noopener">curve25519</a> for its key exchanges, <a href="https://download.libsodium.org/doc/advanced/xsalsa20.html" target="_blank" rel="noreferrer noopener">xsalsa20</a> for symmetric encryption, and <a href="https://en.wikipedia.org/wiki/Poly1305" target="_blank" rel="noreferrer noopener">poly1305</a> for MAC authentication. It’s worth noting these are the same algorithms used by <a href="https://protonvpn.com/blog/what-is-wireguard/">WireGuard</a> and <a href="https://protonvpn.com/blog/chacha20/" target="_blank" rel="noreferrer noopener">ChaCha20</a>.&nbsp;</p> <p>As with all P2P solutions, other Tox users can see your real IP address unless you hide it with a VPN.&nbsp;</p> <p>[Protect your Privacy with Proton VPN]</p> <h2 class="wp-block-heading" id="what">What is the best Discord alternative for you?</h2> <p>With the exception of Telegram, the above options are self-hosted or decentralized solutions that don&#8217;t require things like an email address or phone number. And because the software is open-source, you shouldn’t need to worry about it spying on you.</p> <p>The biggest issue with most of them is that their existing user bases are tiny compared to Discord — only Telegram rivals Discord in terms of its reach.</p> <p>However, even ignoring its <a href="https://en.wikipedia.org/wiki/Arrest_and_indictment_of_Pavel_Durov" target="_blank" rel="noreferrer noopener">current political woes</a>, Telegram is plagued by a number of problems, including the lack of any E2EE for group chats and extensive metadata collection, making it questionable whether it’s a more privacy-friendly choice than Discord.</p> <p><a href="https://protonvpn.com/blog/is-telegram-safe" target="_blank" rel="noreferrer noopener"><strong>Learn more about whether Telegram is safe</strong></a></p> <p>The other Discord alternatives discussed here are more suited to migrating your private Discord channels, so that you can chat with your existing community on a more secure and privacy-friendly platform.&nbsp;</p> <p>For this, Matrix / Element is probably the closest drop-in replacement for Discord, although Mumble’s razor-like focus on gaming is very attractive if you primarily want to voice chat with friends in-game. But Jitsi, Jami, Mattermost, and Tox are also very good privacy-focused options, so your choice really comes down to personal preference.&nbsp;</p> Privacy deep divesDouglas Crawford