Harry Bone, Author at Proton VPN Blog https://protonvpn.com/blog/author/harrybo/ Free VPN News Fri, 17 Nov 2023 14:45:56 +0000 en-US hourly 1 Does a VPN protect you from hackers? https://protonvpn.com/blog/does-vpn-protect-you-from-hackers/ Fri, 13 Jan 2023 16:36:06 +0000 https://protonvpn.com/blog/?p=6820 A VPN can help to protect you from hackers on unsecured public WiFi networks. Malicious hackers try to gain unauthorized access to or otherwise disrupt…

The post Does a VPN protect you from hackers? appeared first on Proton VPN Blog.

]]>
A VPN can help to protect you from hackers on unsecured public WiFi networks.

Malicious hackers try to gain unauthorized access to or otherwise disrupt the operation of your computer, smartphone, or any other internet-connected device. 

While a virtual private network (VPN) is a great way to protect your privacy and security online, it’s not designed to defend you against hackers in all situations. We explain how and when a VPN can help to keep hackers at bay.

How does a VPN protect you from hackers?
Encrypting your internet
Hiding your IP address
What hackers does a VPN protect you against?
Man-in-the-middle attacks
Evil twins (malicious hotspots)
WiFi sniffing
DNS spoofing
Other remote attacks
What hackers does a VPN not prevent?
Get a trusted VPN and more to fight hackers

How does a VPN protect you from hackers?

A good VPN is an essential tool to protect your privacy and improve your overall security online. But it only helps to defend against specific types of online attacks.

By encrypting your internet connection and hiding your IP address, a VPN can help to prevent hackers from exploiting unsecured networks or using your IP address to target you.

Encrypting your internet

With a VPN, all the traffic from your device is securely encrypted, so your internet service provider (ISP), mobile network, or public WiFi provider can’t see your traffic. Your DNS queries, or requests to visit websites, are also encrypted, so your ISP can’t see where you go online.

So if you’re using a VPN on public WiFi, any criminal that hacks into the network can’t monitor your online activity. But most websites and apps now use HTTPS, which has significantly reduced the threat from public WiFi hackers, as we explain below.

Hiding your IP address

When you connect to a VPN, the original IP address assigned to you is hidden from public view. All anyone online can see is the address of the VPN server you’re connected to.

By hiding your original IP address, a VPN can prevent hackers from using it to remotely hack into or otherwise attack your device.

Let’s consider in more detail the types of hacking a VPN can help to prevent.

What hackers does a VPN protect you against?

Since a VPN encrypts all your internet traffic and hides your IP address, the main scenario where a VPN can defend you against hackers is on unsecured public WiFi networks. 

Some free public WiFi networks still use insecure encryption or lack a strong password, so they’re vulnerable to attack: Hackers can break into the network and spy on you.

With a VPN switched on, the encrypted VPN tunnel between your device and the VPN keeps your online activity safe from hackers’ prying eyes.

Encrypted VPN tunnel showing how a VPN protects you from hackers on unsecured public WiFi

However, most websites now use HTTPS, which encrypts the traffic between your device and the website. As HTTPS secures the information you submit online, like personal or financial details, the risk from public WiFi hackers is much lower than it once was.

But HTTPS only encrypts the data you exchange with websites. It doesn’t hide which sites you visit, so a hacker could still monitor where you go online. Nor does it defend you against DNS spoofing (see below).

Man-in-the-middle attacks

In a man-in-the-middle (MITM) attack, the hacker intercepts the traffic between your device and the WiFi router. That way, they can eavesdrop on what you do, for example, to steal your personal details or impersonate you online.

A VPN hides your internet activity, keeping you safe from attack. MITM attacks include evil twins, WiFi sniffing, and DNS spoofing.

Evil twins (malicious hotspots)

Looking to connect to free WiFi in a cafe one day, you might see several networks on your device: “Seattle_Starbucks_WiFi”, “Starbucks_WiFi”, or “FREE_Starbucks_WiFi”. Be careful, as one could be an “evil twin” malicious hotspot created by a hacker — connect, and all your data could be visible to them.

If you do fall for the evil twin, a VPN will hide your data from the intruder.

WiFi sniffing

One way hackers can exploit unsecured networks is to use specialist software to “sniff out” data packets and analyze them. With a packet sniffer, they could monitor your internet traffic and even hijack your cookies to impersonate you online and access your bank (to give a worst-case example).

With your VPN on, your data and real IP address are encrypted and can’t be sniffed.

Get Proton VPN!

DNS spoofing

When you enter a website address in your browser, it sends a DNS query to your ISP to look up the website’s correct numerical IP address. Unfortunately, these DNS requests, which can expose your entire browsing history, are typically unencrypted. If a hacker spoofs or “poisons” your DNS requests, they can redirect you to a malicious site they control.

A good VPN handles and encrypts all your DNS requests, meaning hackers can’t tamper with them. 

Other remote attacks

As a VPN hides your real IP address, it can also shield you from various attacks that exploit your IP address, whatever network you’re on.

For example, if hackers know your IP address, they can scan the ports on your device to spot weaknesses or target you with a denial-of-service (DoS or DDoS) attack.

What hackers does a VPN not prevent?

Apart from exploiting unsecured public WiFi, hackers can use various ways to access or damage your online devices. Here are some threats a VPN won’t stop.

Malware

Hackers can use all kinds of malware to access your device, like spyware, rootkits, and remote access Trojans. A VPN isn’t designed as a primary line of defense against malware.

But some good VPNs like Proton VPN can give you some protection. Get Proton VPN Plus, and you can enable NetShield Ad-blocker to block some malware from ever reaching your device.

Still, a VPN is no substitute for antivirus or internet security software, which actively monitors and scans your device for malware. Install antivirus software on your devices and keep it updated.

Software vulnerabilities

A VPN can’t protect you against hackers attacking weaknesses in your apps or operating system. These range from known vulnerabilities, for which security patches may be available, to so-called zero days, which aren’t known to product developers and have no fixes.

To minimize the risk from known threats, keep your apps, operating system, and antivirus definitions updated to the latest versions. 

Human error 

One of the easiest ways criminals can hack your device is with your help. If you don’t lock down your online accounts with strong passwords and two-factor authentication (2FA) where possible, you’re putting yourself at risk of being hacked.

Hackers can also use social engineering to trick you into disclosing confidential information or taking action that could compromise your device.

A VPN is no defense if you follow a link in a phishing email or download malicious software from an unauthorized website.

Get a trusted VPN and more to fight hackers

A VPN is a great tool to protect your privacy and security online, but it’s only a defense against certain kinds of hacking. As a VPN encrypts your internet connection and hides your IP address, it can help to protect you against public WiFi hackers or anyone using your IP address to attack you.

So a good VPN is just one weapon in your armory against hackers, along with these basic precautions:

  • Use strong passwords and two-factor authentication (2FA).
  • Install antivirus or malware removal software.
  • Beware of phishing, and be careful what you download.
  • Keep your operating systems, apps, and antivirus updated.

Remember that a VPN provider can see your online activity and could itself be hacked, so choosing  a VPN you can trust is vital. Proton VPN is trusted by millions worldwide, including journalists and activists, because we designed it to be as private and secure as possible. 

At Proton, our goal is to give everyone privacy and security online, so join us. Together, we can build a better internet where privacy is the default.

Learn more about what a VPN protects you from

The post Does a VPN protect you from hackers? appeared first on Proton VPN Blog.

]]>
How do free VPNs make money? https://protonvpn.com/blog/how-do-free-vpns-make-money/ Fri, 06 Jan 2023 15:01:33 +0000 https://protonvpn.com/blog/?p=6783 Most “free” VPNs aren’t really free because you pay with your personal data. If you’re looking for a virtual private network (VPN), it’s tempting to…

The post How do free VPNs make money? appeared first on Proton VPN Blog.

]]>
Most “free” VPNs aren’t really free because you pay with your personal data.

If you’re looking for a virtual private network (VPN), it’s tempting to go for one of the hundreds of free services on the market. But you pay for most free VPNs with your privacy or security, and the cost can be high.

We explain how free VPNs make money and how to choose a free VPN that’s safe and genuinely free to use.

Why use a free VPN?
5 ways free VPNs make money
1. Target you with ads
2. Sell your personal data
3. Share your details with partners
4. Infect your device with malware
5. Support you with their paid service
How to choose a free VPN
A free VPN you can trust

Why use a free VPN?

Using a VPN is a great way to protect your privacy and security online. By encrypting the data from your computer, tablet, or smartphone, a VPN keeps your online activity from the prying eyes of your internet service provider (ISP), government, or anyone else who gains access to your network.

Shows how your ISP can't see your personal data, but your VPN can and some VPNs make money from it.

A VPN also changes your IP address, the numerical label that identifies your device online, so you can hide your location or appear to be in a different country.

There are many reasons to use a VPN, but few “free VPNs” do what you want or what they claim.

Many unpaid VPNs are stripped-down versions of paid VPNs that lack essential features. Some cap your bandwidth or monthly traffic, making them unusable. Other “free VPNs” are just scams to distribute malware. Apart from infecting your device, they may not work at all.

Legitimate or not, all free VPNs have to be financed somehow. So it’s vital to understand how a service makes money before you sign up for it. 

5 ways free VPNs make money

With most free VPNs, the old saying “if you’re not paying for the product, you are the product” is often true. Here’s how most free services generate cash.

1. Target you with ads

The most common way “free” VPNs make money is by advertising: Advertisers pay to display ads in VPN apps. Connect to many free VPNs, and you get bombarded with pop-up ads.

More than just an annoyance, these ads are often “personalized”, meaning your VPN service has shared your personal data with the ad providers to target you. This data could include the browsing history that you’re using a VPN to protect in the first place. So the very tool you trust to protect your privacy may be making money by violating it.

2. Sell your personal data

Many free VPNs make money by tracking you in some way. They use technology like cookies, web beacons, and tracking pixels to record where you go online.

They then sell your browsing history to advertisers or data brokers. Moreover, they may combine this with the personal details you submitted when signing up: your name, address, email address, etc. Far from protecting your privacy, these VPNs may sell intimate details about your life to the highest bidder.

3. Share your details with partners

“Free” VPN services are often part of a wider group of companies. Some VPNs cash in by selling your personal details, especially your name and email address, to their partner companies or third parties. 

For example, Hotspot Shield, a VPN service once accused of tracking its users, is part of the Aura group. And Aura’s privacy policy clearly states:

“Neither Aura, nor any of the companies that comprise Aura, sell your personal data (except if you utilize our free products)” [italics added].

4. Infect your device with malware 

Arguably the most shocking way some free VPNs make money is by compromising the security of your computer, tablet, or smartphone.

The most malicious free VPNs can secretly download malware, like spyware or ransomware, onto your device with potentially devastating consequences.

At least one VPN service, Hola, used malware to turn its free users’ devices into exit nodes or VPN servers. If you weren’t paying for the service, Hola used your bandwidth and IP address for users who were paying — without your knowledge. What’s worse, Hola allowed free users’ devices to become part of botnets, networks of devices used to spread spam email or launch cyber attacks.

5. Support you with their paid service

The best free VPNs providers support their free service with funding from paying users. Yet this “freemium” model of funding can have its downsides.

First, many “freemium” VPNs strip out essential features, restrict your speed, or limit your monthly data allowance to encourage you to upgrade. Most legitimate free services limit you to 500 MB or similar, so they’re basically just free trials.

Second, free VPNs often supplement their income by targeting your account with advertising. Overwhelmed by pop-up ads, you may pay up just to use the service without interruptions.

One exception to this rule is our Proton VPN. As Proton VPN has no ads and no data limits, you can use it for free as much as you like.

How to choose a free VPN

There are hundreds of free VPNs on the market, but not all are created equal. They range from trustworthy services, like Proton VPN, to downright scams that spy on you or don’t work at all.

Get Proton VPN!

Here’s what to consider when choosing a free VPN that’s genuinely private, secure, and practical to use.

Choose a VPN with no ads

Pop-up ads in your VPN are annoying and can slow down your internet connection. What’s worse, VPN providers may share your personal data with advertisers to “personalize” these pop-ups.

Check the VPN has no ads before you sign up.

Check the no-logs policy

The best VPNs have a no-logs policy, which means they keep no record of your online activity. If they don’t record what you do, they can’t share or sell this data to third parties. 

Read the company’s privacy policy to check the devil in the details, not just the “no logs” claims in its advertising. If the company doesn’t clearly state that it keeps no logs, don’t use it. Proton VPN’s no-logs claims are independently audited and backed by Swiss law.

Choose a privacy-friendly country

When you use a VPN, your online activity is subject to the laws of the country your VPN is based in. If your VPN’s home country is China, the government could demand your data at any time. If it’s based in one of the countries of the 5 Eyes, 9 Eyes, and 14 Eyes agreements, like the US, the UK, or Australia, your data could be accessed by court order.

Make sure your VPN is based in a privacy-friendly country like Switzerland or Iceland, where the government won’t have access to your online activity.

Check VPN protocols

A VPN is only as secure as its VPN protocols. A VPN protocol is the set of instructions used to establish a secure connection between your device and the VPN server. 

Check that your VPN uses modern protocols with strong encryption, like OpenVPN or WireGuard.

Opt for open source

A VPN can see all your online activity, so you need to make sure it’s as secure as it claims. Most free VPNs are hard to trust because they keep their code secret.

Choose a VPN that is open source and transparent, so anyone can verify it’s secure. Proton VPN publishes independent security audits, so if you can’t check the code yourself, you can see the opinion of experts who can.

Research the VPN’s history

Before deciding on a free VPN, search for news about the company online. Who runs it and where is it located? How is it funded? Does it have a good privacy track record or a history of selling and exploiting users’ data? Is it part of a larger group of companies that might share your data?

Choose a well-established company that’s genuinely committed to protecting privacy, not maximizing profits.

A free VPN you can trust

At Proton, our mission is to give everyone privacy and security online. Privacy and freedom of speech are human rights. That’s why we created a secure VPN that’s genuinely free to use and unlimited — so everyone can be free and beat censorship online, regardless of their ability to pay.

Proton VPN Free is supported by paying members of the Proton community, not by selling your personal data. It’s the only free, open-source VPN with no logs and no bandwidth or monthly data limits. You can use Proton VPN as much as you like.

With Proton VPN Free, you get:

If you want to unblock popular streaming services with servers in over 60 countries and more features, upgrade to Proton VPN Plus.

Join us and millions of others helping us build a better internet where privacy is the default.

The post How do free VPNs make money? appeared first on Proton VPN Blog.

]]>
5 reasons to use a VPN for streaming https://protonvpn.com/blog/reasons-to-use-vpn-for-streaming/ Fri, 02 Dec 2022 13:06:03 +0000 https://protonvpn.com/blog/?p=6691 A good VPN can help you stream your favorite TV shows and movies wherever you travel and protect your privacy and security online. What’s a…

The post 5 reasons to use a VPN for streaming appeared first on Proton VPN Blog.

]]>
A good VPN can help you stream your favorite TV shows and movies wherever you travel and protect your privacy and security online.

What’s a VPN?
Why use a VPN?
Why use a VPN when streaming?
1. Watch geoblocked content
2. Stream on restricted networks
3. Avoid bandwidth throttling
4. Stream securely on public WiFi
5. Keep your streaming private
Is using a VPN for streaming legal?
How to choose a VPN for streaming?
Best VPN for streaming

What’s a VPN?

A virtual private network (VPN) is a tool to protect your internet connection so that you remain private and secure online. A VPN encrypts data from your computer, smartphone, or tablet to keep your online activity private and secure.

A VPN also changes your IP address, the numerical label that identifies your device online, so you can appear to be in a different country. After connecting to a VPN, you can see how your IP address has changed by visiting a site like ip.me

ip.me website showing your current IP address, city, and country - a way to check you IP address when streaming

Why use a VPN?

We recommend using a VPN to protect your privacy and security whenever you’re online on any device. But there are times when it’s essential to use a VPN to browse freely and protect yourself online:

Why use a VPN when streaming?

Here’s why you need a VPN to safely stream your favorite TV shows and movies from anywhere:

1. Watch geoblocked content when you’re abroad

If you travel abroad, you might find you can’t watch your favorite movies and shows online. That’s because many streaming services restrict the content available in different countries based on your IP address, what’s known as “geoblocking”.

Imagine you’re a Netflix subscriber living in New York City, and you go on holiday to Paris. While in France, you may be unable to watch your favorite gripping thriller as it’s only available to US subscribers.

But with a VPN, you can change your public-facing IP address to make it look like you’re back in the US. That way, you can keep up with the plot wherever you travel.

2. Stream on restricted networks

Some authoritarian states use IP addresses to restrict the internet content available to their citizens. By using a good VPN, you can bypass censorship and freely stream what you like to access the truth.

But not only governments cramp your style online. Companies, schools, and universities often block streaming services and entertainment websites. With a VPN, you can unlock the web and be free to stream what you like.

3. Avoid bandwidth throttling

Streaming can take up a lot of data. That’s why your internet service provider (ISP) may intentionally slow down, or “throttle”, your connection if it sees you’re streaming when the network is busy.

A VPN can help you beat this bandwidth throttling. By encrypting your internet traffic, a VPN hides what you’re doing from your ISP, making it less likely to slow down your connection.

Get Proton VPN

4. Stream securely on public WiFi

It’s handy to use public WiFi for streaming when you’re in a cafe or waiting at an airport. But remember that public WiFi is not usually secure. And many “free” public WiFi hotspots are often commercial operations that collect and sell your browsing history.

A VPN allows you to stream securely and privately on WiFi networks wherever you travel.

5. Keep your streaming private

Whether you’re streaming at home or on the move, your (ISP) or mobile network can see where you go online. In the United States, ISPs can even sell your private browsing history.

Stream with a VPN, and your ISP or network provider will just see you’re connected to a VPN server. They won’t be able to track your online activity. 

In most countries, VPN usage is completely legal. So whether you’re using a VPN for streaming or simply to protect your privacy, you won’t risk breaking the law.

However, while it’s not illegal to stream with a VPN, you must comply with the terms and conditions of the service you’re using. For example, the Netflix terms of use say:

“You may access the Netflix content primarily within the country in which you have established your account and only in geographic locations where we offer our service and have licensed such content”.

So using a VPN to watch movies or shows that aren’t licensed for the country you’re visiting is against Netflix’s policy. However, you have a right to watch content you pay for and can normally access when you’re home.

How to choose a VPN for streaming

Many VPNs claim to be great for streaming, but not all VPNs are created equal.

First, you need to choose a reliable VPN you can trust. There’s no point in using a VPN to stream securely if your connection fails and your VPN provider spies on you.

Second, your VPN should have a global network of fast servers and advanced security features so you can stream smoothly and safely wherever you go.

The best VPNs for streaming have as a minimum:

  • Fast speeds: Optimized VPN servers let you securely stream 4K movies and TV without slowdowns or interruptions.
  • Servers worldwide: A global network of VPN servers means you’ll always find one near you.
  • A no-logs policy: They should keep no record of your online activity.
  • Strong encryption: They use only the strongest VPN protocols to keep your connection secure.
  • Advanced security: Features like DNS leak protection and a kill switch protect your privacy, even when your connection fails.

Best VPN for streaming

At Proton, our mission is to give everyone privacy and freedom online. We designed Proton VPN to be the best VPN for streaming — to enable people everywhere to access their favorite content regardless of location.

Sign up for Proton VPN Plus and you’ll get:

Join us, and you’ll not only be able to stream content fast from anywhere, protecting your privacy and security. You’ll also be joining millions of others helping us build a better internet where privacy is the default.

Check out our top-rated apps in the Google Play Store and App Store, and see all the streaming services you can access with our streaming guide for new users.

Please note that Proton VPN is a VPN service not intended to be used as a means of copyright circumvention. For more details, please read the Proton VPN Terms and Conditions of Service and the terms of use of the streaming service you’re using.

The post 5 reasons to use a VPN for streaming appeared first on Proton VPN Blog.

]]>
How to change your IP address on iPhone https://protonvpn.com/blog/how-to-change-ip-address-on-iphone/ Fri, 18 Nov 2022 11:44:03 +0000 https://protonvpn.com/blog/?p=6598 Learn how to change your IP address on your iPhone to protect your privacy and access content restricted by your location.  Your iPhone’s public IP…

The post How to change your IP address on iPhone appeared first on Proton VPN Blog.

]]>
Learn how to change your IP address on your iPhone to protect your privacy and access content restricted by your location. 

Your iPhone’s public IP address identifies your device on the internet. It’s one online label that websites, big tech companies, and governments can use to track you across the internet. Companies and governments may also restrict the content you can access on your iPhone or computer depending on your IP address.

We explain the different types of IP addresses, why you might need to change your iPhone’s public address, and how to do so quickly and easily for free.

What is an IP address?
Types of IP addresses
Public IP address
Local IP address
How to find your IP address on iPhone (iOS)
Why change your iPhone IP address?
Protect your privacy
Access blocked content
Stream content when abroad
Change your local IP address on iPhone
Change your public IP address on iPhone
Change your network
Restart your modem
Contact your ISP
Use a proxy
Connect via Tor
Use a VPN
Easily change your IP address on iPhone for free
Changing your IP address FAQs

What is an IP address?

IP address stands for “internet protocol address”. It’s a string of numbers that uniquely identifies every device connected to the internet.

There are two kinds of internet protocols with different number formats: IPv4 and the newer IPv6. IPv6 was introduced mainly because the world is running out of IPv4 addresses.

While IPv6 addresses are slowly catching on, most internet service providers (ISPs) and mobile networks still use IPv4 addresses. So your iPhone will most likely have an IPv4 address that looks something like 192.168.X.X or any other sequence of four numbers.

Types of IP addresses

There are two types of IP address you may want to change on a connected device: your public IP address and your local IP address.

Public IP address

Your public IP address is visible to anyone who wants to track you or restrict what you can access online. Every website you visit or service you use online will refer to your device using your public IP address.

If your iPhone is connected directly to the internet on a mobile network, it has its own public IP address assigned by the network operator.

If your iPhone is on WiFi, for example, connected to your home network, it will have the same public IP address as your WiFi router. Your ISP assigns your router’s public address. All the devices on your home WiFi network have the same public address.

Local IP address

Your local IP address is the address a WiFi router assigns to your device on a WiFi network. It’s only visible on the network, so third parties can’t use it to track you or restrict your activity online.

How to find your IP address on iPhone (iOS)

To see your public IP address on your iPhone or any other connected device, visit a site like ip.me. There you’ll see:

  • Your public IP address
  • The approximate location of the server you’re connected to
  • Your ISP’s name

What is your IP address website showing your public IP address

If your iPhone’s connected to WiFi, you can find your local IP address as follows:

1. Open Settings and tap Wi-Fi.

iOS Settings showing the Wi-Fi option to find your iPhone's local IP address

2. Tap the name of the WiFi network you’re connected to.

iOS Wi-Fi settings showing the WiFi network your iPhone is connected to

3. Scroll down to the IPv4 Address section, and you’ll see IP Address.

iOS Wi-Fi settings showing your iPhone's IPv4 address

If your iPhone is connected to an IPv6-enabled network, it will also be assigned at least one IPv6 IP address. Tap IP Address in the IPv6 Address section to view those IP addresses.

Why change your iPhone IP address?

As your iPhone’s local IP address is confined to your local WiFi network, no one can use it to track your activity online. So changing it won’t protect your privacy or give you more freedom on the internet.

In contrast, your public IP address is visible to anyone on the internet. Here’s why you might want to change it.

Protect your privacy

Your IP address shows your approximate physical location (to the city level). It’s also one way websites, big tech companies, hackers, and governments can track you across the internet, so changing it can make tracking you more difficult.

Access geoblocked content

Governments and companies use IP addresses to restrict access to content based on your location. You can bypass these restrictions by changing or hiding your public IP address.

Stream content when abroad

Streaming services use public IP addresses to restrict the content available in different parts of the world. By changing your IP address, you can continue to stream your favorite movies and shows when you travel abroad.

Change your local IP address on iPhone

You can manually change your private local IP address in your iPhone’s Settings. 

To change your iPhone’s local IP address:

1. Go to Settings and tap Wi-Fi [network name].

iOS Wi-Fi settings showing the WiFi network your iPhone is connected to

2. In the IPv4 Address section, Note down your current IP address, the Subnet Mask, and the Router address. Then tap Configure IP.

iOS Settings showing the Configure IP option to change your iPhone's IPv4 address manually

3. Select Manual. Then in the Manual IP section, enter a new IP address and add your subnet mask and router address.

iOS Settings showing the Manual IP section to manually change the IPv4 address on your iPhone

Note that the first three sets of numbers in your new IP address should be the same as your router’s. Only the last number should change — choose a number between 1 and 256.

4. Tap Save at the top right when you’re done.

You can only change your local IPv4 address in your iPhone Settings. If you want to change your local IPv6 address, you’ll need to adjust the IPv6 settings in your router (if it supports this).

Change your public IP address on iPhone

If your iPhone is connected to a mobile network, the network provider will set its public IP address.

If you’re on WiFi, your ISP usually assigns the IP address of the router you’re connected to, which will also be your iPhone’s public IP address.

There are various ways to change or hide your public IP address assigned by your mobile network or ISP.

Change your network

Connect to a new wireless network, like a public WiFi hotspot, and your device will be assigned a new public IP address. But make sure you read the terms of service of any “free” WiFi networks, as many make money by selling your personal data.

Restart your modem

Switch off your home WiFi router, wait for at least 10 seconds, then turn it back on again. Your ISP may assign your network a new public IP address, though it’s not guaranteed to work. Even if it does, you’ll likely get another address in the same city.

Contact your ISP

Ask your ISP to change your public IP address. They may not be ready to do this, and there are easier ways to change your address, but it’s one option you can try.

Use a proxy

A proxy is any server that sits between your device and the internet. An IP address from the proxy becomes your new public IP address, so your “real” public IP address is hidden.

There are many types of proxies, both free and paid. But proxies tend to be slow, and very few offer a secure, encrypted connection.

Connect via Tor

One type of proxy that gives you maximum anonymity online is the Tor network, which you can access by installing the Onion Browser on your iPhone.

With Tor, your internet traffic is encrypted and routed through a worldwide network of servers, concealing your original IP address. But using Tor will significantly slow down your internet and is only recommended if you’re looking for the highest level of anonymity.

Use a VPN

One of the simplest ways to change your public IP address is to use a virtual private network (VPN). A VPN is a proxy that creates an encrypted connection between your device and a special VPN server, which then connects to the internet.

While using a VPN is quick and easy, the VPN provider can see all you do online, so it’s essential to choose a VPN you can trust.

Easily change your IP address on iPhone for free

The easiest and most secure way to change your public IP address for free is to use Proton VPN.

Proton VPN is the only free VPN service with no logs, no data limits, and no speed limits, so you can use it as much as you like. 

To change your iPhone’s public IP address for free with Proton VPN:

1. Sign up for Proton VPN Free (if you don’t already have a Proton Account).

2. Install the Proton VPN app from the App Store on your iPhone.

3. Open the Proton VPN app and click Quick Connect to get a new public IP address from one of our free servers in the United States, the Netherlands, or Japan. Or tap the power button next to a country to select that country manually.

Proton VPN app showing the Quick Connect button and the power buttons to connect to a free server in Japan, the Netherlands, or the United States

After you’ve connected, check your new public IP address. It will look something like this:

What is your IP address website showing the IP address of someone connected to a Proton VPN free server in the Netherlands

With alternative routing and our unique Stealth protocol, Proton VPN Free is a great way to change your iPhone’s public IP address to beat government censorship.

We offer Proton VPN Free because we believe everyone has a right to privacy online. Our free service is supported by our paid plans, which give you IP addresses in over 60 countries, support P2P file sharing, and unblock popular streaming services.

Changing your IP address FAQs

Why does my IP address show me to be in a different city?

Most ISPs and mobile operators assign blocks of public IP addresses to devices in certain geographical areas. That means that your public IP address may indicate where you are down to the level of your city or even suburb. But there’s no guarantee. An IP address can sometimes suggest you’re in a completely different area or even another country.

If you change your IP address with a VPN or another type of proxy server, you’ll appear to be wherever the server is located.

Is it illegal to change my IP address?

Not usually, no. Even in restrictive countries that don’t want you to bypass their censorship systems, access to proxies, VPNs, and Tor is often blocked, but it’s rarely a crime. 

Is changing my IP address to stream content worldwide illegal?

It’s not illegal to change your IP address to stream content from abroad. But you need to make sure you comply with the terms and conditions of the service you’re using. For example, the Netflix terms of use say:

“You may access the Netflix content primarily within the country in which you have established your account and only in geographic locations where we offer our service and have licensed such content”.

So using a VPN to watch content that’s not licensed for the area you’re currently in is against Netflix’s policy. However, you have a right to watch content you pay for and can normally access when you’re home.

The post How to change your IP address on iPhone appeared first on Proton VPN Blog.

]]>
What is malware? https://protonvpn.com/blog/what-is-malware/ Thu, 07 Jul 2022 09:16:54 +0000 https://protonvpn.com/blog/?p=6076 Malware is a general term for any software designed to harm computers or computer systems — from viruses and worms to rootkits, spyware, and ransomware.…

The post What is malware? appeared first on Proton VPN Blog.

]]>
Malware is a general term for any software designed to harm computers or computer systems — from viruses and worms to rootkits, spyware, and ransomware. We explain what malware is, how it works, and how best to protect yourself against malware attacks.

What is malware?
What does malware do?
What are the main types of malware?
How can you get malware?
Can Macs get malware?
Can mobiles get malware?
Android malware
iPhone malware
How to detect and remove malware
How to prevent malware attacks
Protect yourself against malware
Protect your business against malware
Final thoughts — update, scan, and beware

What is malware?

Malware, short for “malicious software”, is any file or piece of code designed to harm or gain unauthorized access to a computer or computer network, including your smartphone or tablet — in other words, any software designed with malicious intent.

Almost 40 million new types of malware were detected in the first quarter of 2022, including viruses, worms, Trojans, adware, spyware, and ransomware. But they’re all designed for one thing: to exploit your device or network to benefit whoever created or deployed the malware.

And you no longer need to be a technical whizz to launch a malware attack. Now any rookie cybercriminal can buy and deploy “off-the-shelf” malware. All it takes is a quick search of the Dark Web and a few Bitcoins to pay for it. You can even get malware as a service (MaaS) — complete with your personal online account.

Malware definition

Malware is any file or piece of code designed to harm or gain unauthorized access to a computer or computer network.

What does malware do?

Malware infiltrates or “infects” your computer, laptop, smartphone, or tablet, usually without your knowledge. Depending on the type of malware, whoever deployed it could then:

  • Steal your credit card details or other sensitive personal information
  • Redirect you to pharming websites that trick you into submitting personal information for identity theft
  • Encrypt or lock your computer and demand a ransom to “unlock” it
  • Spy on you and report your activities to third parties, including advertisers, government agencies, or fraudsters
  • Use your computer to launch cyberattacks, such as a denial of service (DoS) attack
  • Exploit your computer to mine Bitcoin or other cryptocurrencies
  • Install software that can track your browsing habits and bombard you with ads

While some types of malware are illegal and can have disastrous consequences, others are legal and just annoying — showing you unwanted ads or slowing down your device.

What are the main types of malware?

People often talk about “viruses” and “malware” as if they’re the same thing. Yet viruses are just one of many types of malicious software.

The most common types of malware can be classified according to how they spread (such as viruses, worms, Trojans, malvertising) or how they behave (like ransomware, spyware, adware, cryptojacking, and rootkits).

Types of malware, including cryptojacking, rootkit, worm, spyware, Trojan, ransomeware, adware, virus, and malvertising

Viruses

A virus is malware that spreads from computer to computer or across networks. Like a biological virus, it infects a host program to replicate itself and cause damage.

Worms

A worm is also designed to spread from device to device and cause harm. But unlike a virus, a worm doesn’t need a host program to survive and thrive. It can wreak havoc alone.

Trojans

Trojans, or Trojan horses, are created to look like useful, legitimate software. But once installed, they execute malicious code you don’t expect and can’t control.

For example, a remote access Trojan (RAT), also known as a “backdoor”, gives an attacker full administrative access, allowing them to control your device remotely.

Malvertising

Malvertising, short for “malicious advertising”, is when fraudsters inject ads or ad networks with code to redirect you to a malicious site or install malware. As malvertising may exploit legitimate and even well-known websites, it can be tough to detect.

Ransomware

Ransomware attacks encrypt your device, scrambling your data or locking you out. Criminals then demand a ransom to decrypt or “unlock” it.

Examples of ransomware include CryptoLocker and the notorious 2017 WannaCry attack, which infected computers in over 150 countries and reportedly caused billions of dollars in losses.

Spyware

Spyware collects information about you and sends it to a third party without your consent. While some spyware may be legitimate (as used by employers, law enforcement, or advertisers), other types may steal sensitive personal details for identity theft.

Keyloggers are a particular kind of spyware that records every keystroke you make — ideal for hackers to steal passwords and other personal data.

Adware

Adware is unwanted software that displays ads on your device, often in pop-up windows. It often gets downloaded automatically as the price you pay for “free” software. While not always illegal or malicious, adware can be annoying and slow down your device.

Cryptojacking

Cryptojacking malware, also known as crypto-malware, takes over your device and exploits it to mine Bitcoin or other cryptocurrencies. Designed to operate secretly in the background, crypto-malware shouldn’t damage your device, but it will drain its resources, slowing it down.

Rootkit

Rootkits can give criminals administrator or root access to everything on your device. As rootkits are a kind of fileless malware using built-in tools in your computer’s operating system, they’re particularly difficult to detect.

Hybrid and other malware

In practice, most online threats are a bundle of more than one type of malware. For example, ransomware often uses a Trojan to attack. And others may be polymorphic malware, which can periodically change their appearance to evade detection.

Another generic type is so-called zero-day malware, any malicious software that takes advantage of computer vulnerabilities before they are patched. A recent example is the Microsoft Office zero-day called “Follina”.

There’s also grayware or potentially unwanted programs (PUP), which includes some adware and spyware. Sitting in the gray area between legitimate apps and malware, grayware may not be primarily malicious but can be annoying and compromise your device’s performance and security.

How can you get malware?

The most common ways to get infected with malware are via email (phishing), infected USB drives, or the internet.

Phishing

Phishing is when fraudsters send you spam emails (malspam) or text messages that look legitimate but contain malicious links or attachments. Unexpected messages from your bank, a government agency, your internet service provider, or PayPal could be from fraudsters aiming to trick you. All you need to do is click on the link or download the attachment and you’ll activate the malware or be redirected to a malicious site.

USB drives

You may think a USB stick or external hard drive is blank, but it can be loaded with malware that installs automatically when you plug it in. There are even malicious cables that can record everything you type, including passwords. So beware of any USB device or cables you don’t own — don’t plug them in unless you know where they’re from.

Bundled with app downloads

Legitimate apps can come bundled with malicious code if you don’t download them from an official app store or trusted website. Make sure you only download real apps from genuine sources.

Malvertising

Malvertising uses legitimate ad networks to deliver malicious software, so beware of clicking on digital ads, even on well-known sites. You could get infected or redirected to a malicious site.

WiFi and Bluetooth

Hackers can exploit insecure WiFi networks, such as networks with weak or no passwords, to spread malware. Malware can also spread via Bluetooth by exploiting unpatched vulnerabilities in older versions of operating systems.

Malicious sites

While most malware is delivered by tricking you into taking action (social engineering), you can also get infected simply by visiting a malicious website or even a legitimate site that has been hacked. Click through to one of these sites and you could fall victim to a drive-by download.

In short, you could be exposed to malware whenever you’re online.

Computer showing malware alert

Can Macs get malware?

It’s often said that Mac computers “don’t get viruses”. Yet recent reports show that Mac malware is on the rise, and even Apple now publishes advice on protecting your Mac from malware.

Cybercriminals used to focus on Windows machines, as they comprised nearly the whole market. But hackers are increasingly targeting Macs as their popularity and market share grow.

While there’s still exponentially more malware for Windows than for macOS, and macOS attracts mainly PUP and adware, Macs aren’t immune to more serious threats.

Even Linux-based operating systems can be hit by malware, though it remains rare on desktop installations. Linux malware increased by 35% in 2021, mainly targeting distros and builds running the growing Internet of Things (IoT).

Can mobiles get malware?

Although malware has traditionally targeted desktop computers and networks, malware designed for mobile devices is a growing threat. That’s no surprise, as around half of global internet traffic is now mobile.

Like personal computers, phones can be infected when we tap a link in spam emails or text messages or install a malicious app. Kaspersky alone recorded around 3.5 million malicious installations on mobiles last year. Malware can also infiltrate mobiles via Bluetooth or WiFi.

Android malware

Since Android phones make up at least 70% of the global mobile market, Android OS remains the prime target for mobile malware.

Google vets apps in the Google Play Store, but malware still manages to sneak in. One recent example is the Dark Herring “fleeceware” campaign, which hit over 100 million Android phones and may have stolen millions of dollars from users.

iPhone malware

While malware on iPhones and iPads is relatively rare compared to Android devices, iOS and iPadOS are by no means impregnable. Like Google, Apple vets apps in its App Store, but multi-million dollar scams have been found on the platform.

If you “jailbreak” your iPhone — remove its restrictions to install apps bypassing the App Store — you’ll leave yourself even more exposed to malware (and void your device’s warranty).

And if you’re unlucky enough to be targeted by a nation-state with millions to spend, you could fall victim to spyware like Pegasus, which hacked into iPhones without users’ knowledge.

How to detect and remove malware

Although some kinds of malware can lay dormant until triggered or operate invisibly in the background, others manifest themselves in different ways.

Look out for these signs of a malware infection:

  • Device slows down: A dramatic decrease in your computer’s speed could be a malicious actor, such as crypto-malware, hogging its resources.
  • Pop-up ads proliferate: Ads and security warnings popping up all over the place? You could be the victim of adware.
  • Storage space is reduced: Disk space disappeared for no apparent reason? It could be malware expanding to fill the space.
  • Operating system (OS) crashes: While your screen can freeze and OS can crash for a whole host of reasons, if the issue persists, check for malware.
  • Unfamiliar apps are installed: Don’t remember installing that app? It could be a potentially unwanted program or something worse.
  • Antivirus software switches off: If your antivirus program stops working without your intervention, malware could have disabled it to access your device.
  • Browser is modified: New plug-ins, toolbars, or browser settings you didn’t authorize? That could be malware taking over.
  • Contacts get weird messages: Friends receiving emails from you that you didn’t send? Malware could have infected your contacts.
  • Ransom demand appears: If messages like “Your files are encrypted” or “Your computer has been locked” suddenly appear on your screen with a demand for payment, you’ve been hit by ransomware.

If you suspect your device is infected, install good antivirus or malware removal software (if you haven’t already) and run a scan. A scan should discover any malware lurking on your device and remove or quarantine it. Or try running Microsoft Defender, the built-in anti-malware solution, if you’re on Windows.

And if you get that dreaded ransom demand, there are ways to recover from ransomware if you’re prepared. But as always, prevention is better than cure. 

How to prevent malware attacks

Malware only works by exploiting computer vulnerabilities and the mistakes we make as users. According to Verizon, over 80% of recent data breaches involved human error.

Protect yourself against malware

Here are some tips to strengthen the security of your devices and help you stay vigilant against malware attacks:

  • Install antivirus or malware removal software: Most good antivirus or internet security software actively scans for all kinds of malware, and many subscriptions cover desktop and mobile OS. Make sure it’s updated with the latest virus/malware definitions.
  • Keep your devices up to date: Update your operating system, browser, browser plug-ins, and other apps to the latest versions with security patches.
  • Use strong passwords and 2FA: Use strong passwords and two-factor authentication to secure your devices and online accounts. And don’t forget your router: set a strong password with WPA2 or WPA3 encryption.
  • Secure your email: Use a secure email provider, like our Proton Mail, which has smart spam filtering to prevent malspam and PhishGuard anti-phishing protection.
  • Beware of suspicious links and attachments: Don’t click on links or download attachments in emails, text messages, or social media from unknown senders. If you use Proton Mail, use our link confirmation feature to verify email links.
  • Install apps from a trusted source: Download apps from official sources, like the Google Play store or Apple’s App Store. And read the download agreement to check you’re not consenting to install grayware (PUP) — apps you don’t need. Avoid downloading software through peer-to-peer (P2P) file sharing or torrenting.
  • Don’t click on digital ads: Avoid clicking on pop-up ads and get an ad-blocker (browser plug-in or standalone app). If you have a paid Proton VPN plan, you can switch on the NetShield (Ad-blocker) to block adware and malware.
  • Delete old apps: Review the apps you have on your devices regularly and remove what you don’t use, especially if they look unfamiliar.
  • Back up often: Make regular backups of your data (including offline backups) in case you get hit by ransomware or other malware that results in data loss.

Protect your business against malware

If you’re running a business, you’ll need to take the same precautions to block malware as you do at home, just scaled up to fit your company:

  • Corporate antivirus: If you have more than a couple of people in your team, consider getting enterprise antivirus/anti-malware software. Advanced corporate antivirus solutions include real-time threat monitoring focusing on endpoint security to secure whole networks.
  • Team cyber hygiene: Train your employees in anti-malware best practices, including how to recognize phishing emails, and block the use of unauthorized USB drives.
  • Passwords and 2FA: Enforce a policy of strong passwords and two-factor authentication on all your team’s devices.
  • Protect critical data: Encrypt your business’s data to prevent data loss in case you get hacked. Consider Proton for Business, which offers end-to-end, zero-access encryption for all your business data.
  • Back up your data: Make regular backups of your company’s critical data, including offline versions, to increase your chances of preserving your data in a ransomware attack.

Final thoughts — update, scan, and beware

From pesky PUP to treacherous Trojans demanding ransoms or stealing your passwords, malware comes in many forms and is constantly evolving.

Remember that even legitimate software can be just plain bad, selling your personal data to the highest bidder or draining your device’s resources. So be careful what you click on — check the fine print before you download and install.

To beat malware, Proton Mail actively checks external incoming email for malspam and includes link confirmation to help you spot phishing. Get a Proton VPN paid plan and you can also switch on NetShield, which blocks malware, adware, and other trackers that slow your device down.

And remember these three takeaways from the tips above to keep malware at bay, whatever device you’re using:

  • Update: Operating systems, antivirus and anti-malware software, browsers, and other apps — set them to update automatically to the latest versions with critical security patches.
  • Scan: Get antivirus software with real-time monitoring and regular system scans for malware, and scan manually if you spot anything suspicious.
  • Beware. Use strong passwords with 2FA and beware of suspicious links and attachments (phishing), unofficial app downloads, file sharing, online ads, and strange USB drives.

In short, to beat malware, update, scan, and beware!

The post What is malware? appeared first on Proton VPN Blog.

]]>
What is Incognito mode (Private Browsing) and is it really private? https://protonvpn.com/blog/incognito-browsing-privacy/ Fri, 07 Jan 2022 14:12:00 +0000 https://protonvpn.com/blog/?p=612 Incognito mode, or Private Browsing, is a privacy setting in your browser that lets you surf the web more privately. But how private is it?…

The post What is Incognito mode (Private Browsing) and is it really private? appeared first on Proton VPN Blog.

]]>
Incognito mode, or Private Browsing, is a privacy setting in your browser that lets you surf the web more privately. But how private is it?

We explain what Incognito mode is, how it works, and how you can use it to enhance your privacy. We’ll also look at what it doesn’t do and what you need to really browse the internet privately.

What is Incognito mode (Private Browsing)?
What does Incognito mode do?
Is Private Browsing really private?
Why go Incognito?
How does Incognito mode work?
Chrome: How to go Incognito
Edge: How to use InPrivate
Firefox: How to use Private Browsing
Safari: How to use Private Browsing
How to go Incognito on Android and iPhone
Can you see your Incognito history?
How to delete your Incognito history
How to browse privately with a VPN

What is Incognito mode (Private Browsing)?

Incognito mode, also known as Private Browsing, is a privacy setting in browsers that allows you to surf the web without leaving a record of where you’ve been on your computer or smartphone.

With Incognito mode or Private Browsing turned on, your browser doesn’t save the addresses (URLs) of the pages you’ve visited, the text you entered in any website forms, or any cookies on your device. That means the sites you’ve visited won’t be visible in your browser’s history.

The most popular browsers all have this setting but give it slightly different names:

  • Incognito mode (or Incognito window/tab) in Google Chrome
  • InPrivate (or InPrivate window/tab) in Microsoft Edge
  • Private Browsing (or Private window/tab) in Apple’s Safari and Mozilla’s Firefox

What does Incognito mode do?

Incognito mode stops your personal browsing history from being saved on your computer, tablet, or smartphone so that no one who uses that device after you can see it.

What happens when you go Incognito?

If you surf the web Incognito, when you close all your private windows, your browser won’t save:

  • The addresses (URLs) of the sites you’ve visited
  • Your cookies, which contain personal information like login details and language preferences, and other temporary files
  • Any information you’ve entered in online forms
  • Any permissions you’ve given websites, for example, to use a camera for a video call

What Incognito mode doesn’t do

Going Incognito prevents anyone else using your device from seeing your browsing history, but there are many other ways you can be tracked:

  • Your internet service provider (ISP) can still see everything you do online.
  • Websites can see your IP address (the unique address that identifies your device on the internet), which gives them an idea of your physical location.
  • Your employer or school may see what you do online if they supplied your device or control the network you use.
  • Any files you downloaded while Incognito will still be available in your Downloads folder or wherever you saved them.
  • Any bookmarks you save will still appear in your Bookmarks or Favorites.

Overall, Incognito mode won’t enhance your privacy on the internet nor add any security against attacks or attempts to access your private data.

Is Private Browsing really private?

Incognito mode/Private Browsing gives you some privacy as your browser doesn’t save your browsing history on your computer, smartphone, or tablet. So anyone using it after you can’t see where you’ve been online.

But ISPs and governments, not to mention your employer or school, may still be able to track you in some way whether you’re Incognito or not. And if you log in to any websites while private browsing, those sites will obviously know you’re there.

Remember, too, that if you sign into any Google app, Google’s Chrome browser will start saving your cookies and tracking you again even if you’re browsing privately. That’s why Google is currently facing a $5 billion lawsuit for alleged Incognito mode tracking.

In short, Incognito mode or Private Browsing gives you some privacy on the particular device you’re using. It doesn’t make you private or anonymous online.

Why go Incognito?

Despite the name, Incognito mode was designed mainly to make it easier to use shared computers, not to hide your identity. Here are instances when it can be useful:

  • Sharing devices: You can browse privately on a shared device, like a home computer, and hide where you’ve been online. For example, if you’re looking for a surprise gift for a family member, you don’t want your search history to be visible with ads for it popping up on the family computer. Or you may want to research a sensitive topic, like a medical question you’d rather keep to yourself.
  • Using a public computer: Your browser won’t remember what you enter in website forms while you’re Incognito. That means you won’t leave any sensitive personal details, like financial information, for others to see (though it’s best not to enter financial details on a public computer at all).
  • Signing in to multiple accounts: As Incognito mode doesn’t store cookies and site data, you can log in to more than one account with the same provider. If you’re logged in to your personal email account, for example, you could log into a work account on the same computer.
  • Looking for better deals: Travel companies, like hotels and airlines, rely on cookies to see how often you check for flights and rooms and may increase their prices accordingly. As cookies aren’t saved when you’re Incognito, you should be offered the best prices.
  • Getting around paywalls: Like airlines, news sites use cookies to keep track of how many times you’ve visited the site. If you can’t read a news story because you’ve reached your article limit for the month, try accessing the site Incognito.

How does Incognito mode work?

Incognito mode/Private Browsing works the same way on all major browsers. To use it, you open a new Incognito or private window. Any tabs you open in that window will also be Incognito.

To exit Incognito mode, simply close all your private windows.

Chrome: How to go Incognito

Turn on Incognito mode

Use keyboard shortcut Ctrl-Shift-N (Windows or Linux) or Command-Shift-N (macOS) to open a new Incognito window. Or click on the vertical ellipsis on the top right and choose New Incognito window.

How to open a new Incognito window in Chrome

That will open a new Incognito window with the header “You’ve gone Incognito” and the hat-and-glasses “spy” icon.

Any tab you open in this window will also be Incognito, so no browsing history, cookies, or other site data will be saved when you close all your Incognito windows. To prevent cross-site tracking, make sure the Block third-party cookies option is switched on (see image below), which is the default setting.

How an Incognito window looks in Chrome showing Block third-party cookies switch

Close Incognito mode

To exit Incognito mode, close all the Incognito windows you have open in the usual way: Click X in the upper right corner on Windows or Linux or the red dot in the upper left corner on macOS.

Edge: How to use InPrivate

Turn on InPrivate

Use keyboard shortcut Ctrl-Shift-N (Windows or Linux) or Command-Shift-N (macOS) to open a new InPrivate window. Or click on the vertical ellipsis on the top right and choose New InPrivate window.

How to open a new InPrivate window in Edge

An InPrivate window will appear with the header “InPrivate browsing” and the blue InPrivate oval at the top right.

Any tab you open in this window will also be InPrivate, and all browsing history, cookies, and other site data will be deleted when you close all InPrivate windows. To block third-party tracking, check that the Always use “Strict” tracking prevention when browsing online option is switched on.

How an InPrivate browsing window looks in Edge showing the Always use "Strict" tracking prevention option

Exit InPrivate

To exit InPrivate mode, close all the InPrivate windows you have open in the usual way: Click X in the upper right corner on Windows or Linux or the red dot in the upper left corner on macOS.

Firefox: How to use Private Browsing

Turn on Private Browsing

Use keyboard shortcut Ctrl-Shift-P (Windows or Linux) or Command-Shift-P (macOS) to open a new private window. Or click on the vertical ellipsis on the top right and choose New private window.

How to open a new Private Browsing window in Firefox

That will open a new private window showing a purple mask and a “Private window” message. Any tabs you open in this window will also be private.

How a Private Browsing window looks in Firefox showing the Private window message

Note that Firefox now has a feature called Enhanced Tracking Protection, which blocks third-party cookies and other cross-site tracking by default in a private window.

Exit Private Browsing

To exit Private Browsing, close all the private windows you have open in the usual way: Click X in the upper right corner on Windows or Linux or the red dot in the upper left corner on macOS.

Safari: How to use Private Browsing

Turn on Private Browsing (macOS)

Use keyboard shortcut Command-Shift-N to open a new private window. Or click on File → New private window.

How to open a Private Browsing window in Safari

A new private window will appear with the “Private Browsing Enabled” header. Any tabs you open in this window will also be private.

Safari also has a Privacy Report that shows you a list of the known trackers that have been blocked. Click on the shield under “Privacy Report” to view the report.

How a Private Browsing window looks in Safari showing the Privacy Report shield

Exit Private Browsing (macOS)

To exit Private Browsing, close all the private windows you have open in the usual way: Click the red dot in the upper left corner.

How to go Incognito on Android and iPhone

You can use Incognito mode/Private Browsing on your Android device (smartphone or tablet) or your iPhone or iPad in the same way as on a computer.

Go Incognito on Android

Google Chrome, Microsoft Edge, and Firefox all have an Incognito/Private Browsing feature, and they all work in a similar way.

For example, to go Incognito in Google Chrome:

1. Open Chrome and tap the vertical three dots to the right of the address bar.

2. Tap New Incognito tab.

How to open a new Incognito tab in Chrome on Android

3. A new Incognito window appears with the message “You’ve gone Incognito”.

To close Incognito mode:

1. Tap the Switch tabs button at the top right.

Chrome window showing the Switch tabs button to reveal your open Incognito tabs

2. You’ll see your open Incognito tabs on the right. Tap X at the top right of each tab to close them.

Turn on Private Browsing on iPhone or iPad

Google Chrome, Microsoft Edge, and Firefox all have an Incognito/Private Browsing feature on iPhone and iPad, and they work in a similar way to Apple’s own Safari browser.

To start Private Browsing on your iPhone or iPad in Safari:

1. Open Safari and tap the Tabs button.

Safari window on iPhone showing the Tabs button – the first step to start Private Browsing

2. Tap [number] Tabs to show the Tab Groups list.

3. Tap Private and then Done.

Safari window on iPhone showing the Private option – the final step to start Private Browsing

To exit Private Browsing:

1. Open Safari and tap the Tabs button.

2. Tap Private to show the private tabs you have open.

3. Tap X at the top right of each tab to close them.

Can you see your Incognito history?

When you use Incognito/Private Browsing, your browser doesn’t record your browsing activity. But that doesn’t mean there’s no trace of it left on your computer or smartphone.

Your device keeps a temporary database of the websites you’ve recently visited called a DNS cache, which helps your browser access those sites more quickly next time you visit them.

While checking the DNS cache on a Mac requires a technical workaround, you can view the DNS cache on a Windows computer in three easy steps:

1. Enter cmd in the Windows search box on the bottom left and click on Run as administrator to open the command prompt.

How to run the command prompt as administrator on Windows

2. Click Yes if prompted (you may have to enter an administrator password if you’re using a standard account).

3. Type the command ipconfig/displaydns and press Enter to see your DNS cache history.

Command prompt showing display DNS cache command on Windows

How to delete your Incognito history

Although your browser doesn’t save your browsing history while you’re Incognito, we’ve seen above how your device temporarily records where you’ve been online in its DNS cache, whether you’re Incognito or not.

But you can delete the contents of the DNS cache in both Windows and Mac.

Delete Incognito history on Windows 10

1. Enter cmd in the Windows search box on the bottom left and click on Run as administrator to open the command prompt.

How to run the command prompt as administrator on Windows

2. Click Yes if prompted (you may have to enter an administrator password if you’re using a standard account).

3. Type the command ipconfig/flushdns and press Enter. You’ll see the message “Successfully flushed the DNS Resolver Cache”.

Command prompt showing delete DNS cache command on Windows

You’ve now cleared the DNS cache and deleted your browsing history from your device.

Delete Incognito history on Mac

1. Click on Go → Utilities.

Finder showing how to find utilities on  Mac

2. Open the Terminal app.

Finder showing how to open Terminal on Mac

3. Type in or cut and paste the command sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponder into the command-line window and press Enter.

Terminal command to flush dns cache on Mac

4. Enter your password to flush the cache.

Unlike Windows, macOS does not give you a success message. Find out more about how to clear the DNS cache on different versions of macOS.

How to browse privately with a VPN

To sum up, going Incognito or using Private Browsing doesn’t protect your privacy online. It only protects you from other people sharing your computer, tablet, or smartphone by not saving your browsing history on that device.

An effective way to enhance your privacy online is to use a virtual private network (VPN). If you use a VPN:

  • The websites you visit won’t know your real IP address or location.
  • Your ISP can’t see what sites you visit and what you’re doing online, so they can’t sell your personal browsing history.
  • Mass government surveillance by agencies like the NSA in the US, or GCHQ in the UK, won’t see what you’re doing online.
  • Public WiFi providers can’t sell your browsing history to advertisers.

At Proton, we believe privacy and security are fundamental human rights. That’s why we provide a free Proton VPN plan for everyone. If you’d like to support our vision to build an internet where privacy is the default, please consider upgrading to a paid plan for more features.

The post What is Incognito mode (Private Browsing) and is it really private? appeared first on Proton VPN Blog.

]]>
What is an SSID and should you hide yours? https://protonvpn.com/blog/what-is-ssid-should-you-hide-yours/ Thu, 18 Nov 2021 12:37:32 +0000 https://protonvpn.com/blog/?p=5408 This aricloe was expanded and updated Novemebr 2023. An SSID is the name of a wireless network. Learn how SSIDs work, how to find your…

The post What is an SSID and should you hide yours? appeared first on Proton VPN Blog.

]]>
This aricloe was expanded and updated Novemebr 2023.

An SSID is the name of a wireless network. Learn how SSIDs work, how to find your SSID, and whether it’s better to broadcast or hide it.

If you set up your home WiFi network, you may have selected the network’s name (SSID) on your devices, entered the default wireless password, and connected. And that’s it — your devices have joined it automatically ever since.

Here we look at the humble SSID and explain why you should review yours and related wireless settings to secure your network.

What is an SSID?

An SSID, also known as a network ID, is the name given to a wireless local area network (WLAN), like your home WiFi. Wireless routers or access points broadcast SSIDs so that devices can find local WiFi networks.

When you look for a WiFi network on your laptop or smartphone, you see a list of SSIDs — the names of the wireless networks available in your area. A lock indicates you’ll need a password to connect to it.

SSIDs of local networks in your area

What does SSID stand for?

SSID stands for Service Set IDentifier — the name that identifies a service set. So what’s a “service set”?

A “basic service set” is the smallest building block of an IEEE 802.11 standard wireless network, better known by the brand name Wi-Fi. In simple terms, a basic service set is a group of devices linked to one access point, forming a wireless network.

When data is transmitted on a wireless network, every data packet carries an SSID to identify which service set or network it belongs to. All devices must use this SSID to communicate on the network.

Where do I find my SSID?

To connect a device to a WiFi network for the first time, you’ll need to know the network’s SSID. If you’re setting up your home WiFi router, you can usually find a label with “SSID” or “Network Name” and a default WiFi password on the bottom or side of your router.

If your device is already connected to a wireless network, you can find the SSID of the network you’re using as follows:

How to find your SSID on Windows 10

1. Go to your  System TrayWiFi icon (by default, this is at the bottom right of your screen).

2. A list of available networks (SSIDs) will appear. Your SSID is at the top, with the message Connected, secured.

How to find your SSID on Windows 10

How to find your SSID on Windows 11

Go to your  System TrayWiFi icon (by default, this is at the bottom right of your screen). You’ll be able to see the SSID your computer is connected to in the Quick Settings menu. 

To see a list of all available WiFi networks, click > next to WiFi button. 

How to find your SSID on Windows 11

How to find your SSID on macOS

Go to the menu barWiFi icon → Known networks (or Preferred Network on older versions of macOS). Your current SSID is designated by a colored WiFi icon. 

How to find your SSID on macOS

How to find your SSID on Linux using the command line

Open a terminal window and enter iwgetid.

How to find your SSID on Linux CLI

How to find your SSID on Linux using NetworkManger 

If you prefer to use a GUI and your desktop environment supports NetworkManager, click the WiFi icon in your notification panel to see a list of available WiFi networks. The SSID of the network you’re connected to is listed at the top. 

(Note: details may vary a little, depending on the desktop environment you use.)

How to find your SSID on Linux NetworkManager

How to find your SSID on Android

Go to SettingsConnectionsWi-Fi. Your SSID name will be listed under Current network

(Details may vary a little, depending on which version of Android you’re running.)

How to find your SSID on Android

How to find your SSID on iOS and iPadOS

Go to SettingsWi-Fi.

Your SSID will appear at the top with a checkmark next to it.

How to find your SSID on iPhone and iPad

How to find your SSID on Chrome OS (Chromebook)

Go to your system TrayWiFi icon. You’ll be able to see the SSID your computer is connected to in the notification menu. 

To see a list of all available WiFi networks, click WiFi button in the notification menu,

How to find your SSID on a Chromebook

Why change your default SSID?

Out of the box, wireless routers and access points have a default SSID. This might be its manufacturer’s name, like Linksys or Netgear, or your internet service provider (ISP) if your router came with your broadband package.

There are several reasons it’s a good idea to change your router’s default SSID:

  • To give your network a unique name you can remember and avoid confusion with your neighbors’ networks, which may use a similar default name.
  • To deter hackers by showing that the home network is actively managed, not left on less secure default settings.
  • To create different SSIDs for different purposes, like one for guests (see below).

Technically, your SSID doesn’t have to be unique, but it’s important to make it different from others in your area. If your neighbor had the SSID “My_Home_WiFi” and you made yours the same, your devices might try to connect to the wrong network at times, depending on the strength of your home WiFi signal.

How to change your SSID and WiFi password

To change your default SSID and password, you need to log in to your router as an administrator (admin).

You can usually do this in a web browser through a specific address, like 192.168.1.1 (check your router’s documentation for your address). Or your router may come with a mobile app that allows you to adjust your wireless settings.

How to change your SSID

1. Enter your router’s IP address in your browser or open its mobile app.

2. Log in using the admin username and password. If you’ve never changed these credentials, you can usually find them on a label on the router’s case, together with the SSID.

3. Open the Wireless or WiFi settings menu and a new name in the Network name or SSID name field.

SSIDs can be up to 32 letters, numbers, or special characters (spaces, periods, underscores, etc.). They’re also case-sensitive, so Network-Name-Example is different from network-name-example. 

Ensure the name is easy to remember, but don’t include personal details, like your name and address.

How to change your SSID on your router

4. Click Apply or Save when you’re done.

The SSID is just the name of your WiFi network and therefore has little impact on security. However, while you’re on your router’s admin page or app, it’s a =good idea to review your WiFi password settings to ensure your network is secure.

  • Check your password encryption protocol Security. If your router supports the latest WiFi security standard for keeping your WiFi connections secure, choose WPA3 (most secure) or WPA3/WPA2 hybrid mode (much less secure, but will work with most devices). Avoid WEP, which can be easily cracked. If your router only offers WEP, you should upgrade its firmware or consider getting a new one.

Learn more about WPA3 and WiFi security standards

  • Change your WiFi password from the default password set by your router’s manufacturer. Use a strong password or passphrase.
  • Disable WiFi Protected Setup (WPS). Designed to make it easier to connect new devices, WPS is a security risk.
  • Change your router’s default admin username and password, adding a strong password if it doesn’t have one. Look for Change password or a similar setting in the admin account. Otherwise, anyone who sees these login details on the case of your router could gain administrator access. In addition to this, the default admin passwords for popular routers are widely available on hacker sites. 

When to use multiple SSIDs

Using more than one SSID allows you to create separate password-protected networks for different purposes. That way you can protect your primary WiFi password and restrict access to your network.

For example, you might see one SSID for students and another for staff if you’re at school. Or if you’re running a small business, you might want to set up one SSID for your employees and a guest SSID for visitors.

Guest SSIDs

Likewise, at home, you can enable a guest SSID with a separate password with most routers.

For example, My-WiFi-Name could be your main SSID with full local network access, including file sharing and printing, while My-WiFi-Name-Guest for visitors could provide internet access only.

Guest SSIDs are usually switched off by default. Log in to your router as an admin (see how above) and look for a switch to enable the guest access point in the Wireless settings. Like your main SSID, you can change the guest SSID name and password.

Learn more about guest networks

Dual-band SSIDs

Another reason to have more than one SSID is to differentiate frequency bands for your wireless network.

Since the introduction of the 802.11n wireless standard in 2009, also known as WiFi 4, many wireless routers have been able to broadcast on two bands simultaneously: 2.4 GHz and 5 GHz. Most routers now use at least 802.11ac (WiFi 5), although routers with the latest 802.11ax (WiFi 6 and WiFi 6E) are becoming increasingly popular.

MAIN WIFI STANDARDS

WiFi standardYear releasedFrequency bandsMax speed
802.11b (WiFi 1)19992.4 GHz11 Mbps
802.11a (WiFi 2)19995 GHz54 Mbps
802.11g (WiFi 3)20032.4 GHz54 Mbps
802.11n (WiFi 4)20092.4 GHz, 5 GHz600 Mbps
802.11ac (WiFi 5)20135 GHz
(optional 2.4 GHz via 802.11n)
3.4 Gbps
802.11ax (WiFi 6)20192.4 GHz, 5 GHz9.6 Gbps
802.11ax (WiFi 6E)20216 GHz 9.6 Gbps
802.11be (WiFi 7)(2024)2.4 GHz, 5 GHz, 6 GHz46 Gbps

While the 5 GHz and 6Ghz bands support faster speeds and are less congested than the 2.4 GHz one, the lower frequency of 2.4 GHz can better penetrate solid objects, offering a better range. So if you have a dual-band router, which should you choose?

By default, most modern routers will choose for you. They broadcast both bands with the same SSID and use band steering to push devices to connect to the best network. That means older devices connect to the 2.4 GHz network, while newer, 5 GHz or 6 GHz-enabled ones should automatically join the faster bands if the signal is strong enough.

However, if you want to be able to choose which band to connect to manually, you can split the two bands into separate SSIDs, for example, named as follows:

  • My-WiFi-Name — 2.4 GHz band for older devices and a longer service range.
  • My-WiFi-Name-5G — 5 GHz band for newer devices and a shorter service range.

Change your SSIDs in your router’s wireless settings, as outlined above (check your router’s documentation for details).

Should you broadcast your SSID?

You can turn off (disable) the broadcast of your SSID so it’s not publicly visible. Then it won’t appear on lists of available WiFi networks on devices in the area. But contrary to popular opinion, that won’t significantly enhance your network security.

First, even when you disable SSID broadcast, your SSID is still included in each data packet on your network. A hacker can easily “sniff” it out using wireless packet-sniffing software.

Second, turning off SSID broadcast could actually attract local hackers to your network. If you’re lying low, they might think you’ve got something to hide.

In short, there’s little point in trying to hide your SSID. And with SSID broadcast disabled, you’ll just make it more difficult to connect a new device — you’ll have to manually enter your SSID every time.

Boost your network security

Following the advice above on SSIDs, encryption, and passwords will help you secure your wireless network. It’s also important to keep your router’s firmware updated.

If you’re tech-savvy and want to further boost your network security, you can set up a VPN on your router. A VPN on your router will automatically encrypt all your traffic, securing your whole network, even for devices that don’t support a VPN.

At Proton, our mission is to make internet privacy and security available to all. That’s why we offer a free Proton VPN service, which you could try installing on your router. If you’d like to support, please consider upgrading to Proton VPN Plus for more features.

Sharing your WiFi and VPN connection

Most operating systems allow you to create a WiFi hotspot that others can connect to so they can share your internet connection. When you create this hotspot, you’ll also need to give it a name (SSID).

On many operating systems, you can also share your VPN connection over this shared WiFi connection so that any devices using your device as a WiFi hotspot also benefit from VPN protection.

The post What is an SSID and should you hide yours? appeared first on Proton VPN Blog.

]]>