1. Home
  2. Security overview

Security overview — threat models, protocols and what a VPN actually protects

A working editorial overview of Proton VPN security architecture. Threat-model framing, protocol-choice trade-offs, the audited open-source client codebase and the Swiss privacy jurisdiction context that shapes every no-logs claim.

Read the protocols overview

01. Threat-model framing

A VPN protects specific threat surfaces and ignores others.

A secure VPN connection encrypts traffic between the user device and the VPN server. Beyond that hop, the connection uses standard HTTPS to the destination. The VPN protects against ISP-level traffic analysis, public Wi-Fi sniffing and IP-based geographic identification. It does not protect against malware, phishing, browser fingerprinting, account compromise or operating-system surveillance.

Pair a VPN with HTTPS, two-factor authentication, password hygiene and OS updates for layered protection. The CISA publishes consumer-grade guidance on layered security worth reading alongside any VPN coverage.

Treat VPNs as one privacy tool, not a panacea.

Read the secure-connection breakdown →

02. Audited open-source client codebase

Proton VPN clients are open-source and independently audited.

The Windows, macOS, Linux, iOS and Android Proton VPN clients are open-source. Build provenance is verifiable through cryptographic signatures on official store releases and on GitHub-published binaries. Independent security firms have audited the codebase periodically; reports are publicly linked from official Proton documentation.

Open-source clients are not automatically more secure than closed-source, but they enable third-party review that closed-source clients cannot match. Combined with cryptographic build signatures, this materially raises the bar for supply-chain attack.

F-Droid availability for Android adds a fully-reproducible-build distribution path for users who want maximum supply-chain assurance.

Walk the protocol breakdown →

03. Swiss jurisdiction and the no-logs claim

Jurisdiction shapes what a no-logs claim can actually mean in practice.

Proton AG operates under Swiss federal data protection law. Switzerland is not a member of the Five Eyes, Nine Eyes or Fourteen Eyes intelligence-sharing alliances. Swiss courts have, in published cases, declined to compel logging where mandatory data retention is not legally enforceable. The privacy-jurisdiction page on this portal documents the legal architecture in detail.

Jurisdiction is not a magic shield. Swiss law allows judicial cooperation in serious criminal cases, and Switzerland is not a privacy nation-state outside other legal frameworks. The portal treats jurisdiction as a structural input rather than as a guarantee.

No-logs claims become meaningful when paired with jurisdiction that doesn't compel logging in the first place. Proton VPN's claim sits in that intersection.

Read the privacy-jurisdiction page →
What a Proton VPN secure connection protects
Threat surfaceProtectedNotes
ISP traffic analysisYesEncrypts to VPN server
Public Wi-Fi sniffingYesEncrypts metadata
IP-based geolocationYesHides origin IP
Malware on deviceNoOS/AV layer required
PhishingNoUser vigilance required
Browser fingerprintingPartialBrowser-side mitigations needed
Account compromiseNoUse 2FA + unique passphrases

Security overview — reader questions

Five questions about threat model, audits, jurisdiction and protocol choice.

01. What does a Proton VPN secure connection actually protect?

Traffic between the device and the VPN server. Beyond that hop, standard HTTPS protects content. Metadata, public Wi-Fi sniffing and ISP-level traffic analysis are the protected surfaces.


02. Are Proton VPN clients open-source?

Yes. Windows, macOS, Linux, iOS and Android clients are open-source on official Proton GitHub repositories with cryptographic build signatures.


03. How does Swiss jurisdiction matter?

Switzerland sits outside major surveillance alliances. Swiss courts have declined logging compulsion where data retention is not legally required. Jurisdiction shapes what a no-logs claim can mean in practice.


04. What about VPN protocol choice?

WireGuard for modern speed-optimised connections. OpenVPN for legacy compatibility. Stealth (Proton-specific) for restrictive networks. Protocol selection is exposed for advanced users; the default works for most.


05. Is a VPN enough for online security?

No. Pair with HTTPS, two-factor authentication, password hygiene, OS updates and reasonable browsing practices. CISA guidance on layered security applies.

Methodology — how we research and revise

A reproducible methodology beats opinion-based recommendation at every horizon longer than a single subscription cycle.

The reader desk works from four recurring inputs. Weekly catalog and pricing scrapes capture promotional cycles and feature changes. Annual third-party security audits, when published by independent firms, inform the security overview pages. Reader inbox traffic — roughly 600 messages per week on the privacy-software beat — identifies the friction points real users hit. Published Swiss court rulings affecting the broader privacy-software ecosystem, when issued, drive event-driven jurisdiction-page updates.

Revision cadence is weekly for tracker pages, monthly for category explainers and event-driven for security audits, regulator actions or major policy changes. Every page carries a visible last-updated date in the byline. When facts change, the portal prefers visible revision notes over silent edits, because privacy-software readers benefit from seeing how context evolves rather than reading a static snapshot.

Independence is enforced, not claimed. Editors do not hold equity in any privacy-software provider, do not accept affiliate income from any provider, and decline partner-authored copy under any byline. Conflicts of interest, when applicable to a contributor's prior employment in privacy-software, surface at the top of the affected article rather than buried in disclosures footers. Reader donations and newsletter subscriptions are the only revenue streams. The Electronic Frontier Foundation and Privacy International archives provide external frameworks the reader desk consults.

Privacy-software market context in 2026

Understanding the broader privacy-software landscape helps shoppers evaluate any single offering in proper context.

The privacy-software market expanded materially through the 2020s as households became more aware of internet service provider tracking, public Wi-Fi exposure and the data-broker ecosystem. The post-2020 shift toward remote work pushed adoption further, particularly in households where employer-supplied corporate VPNs did not cover personal browsing.

Three structural dynamics shape the 2026 market. First, jurisdictional differentiation: providers domiciled outside major surveillance alliances (Switzerland, Panama, British Virgin Islands) have positioned legal independence as the central trust-building claim. Second, audit transparency: open-source clients with independent security audits have become table stakes for credible providers. Third, multi-product bundling: privacy companies have expanded from single-product offerings into broader privacy-tool ecosystems covering email, file storage, password management and calendar. The bundle math now competes directly with single-product specialty offerings.

Regulatory attention from consumer-protection bodies and privacy commissioners affects how providers communicate features. The Federal Trade Commission has issued guidance on VPN advertising claims; the European Data Protection Board issues rulings affecting EU-jurisdictions providers. The portal tracks regulator actions as event-driven inputs to coverage.

What this hub is and is not

A scope statement keeps reader expectations aligned with reality.

This hub is editorial. It does not sell subscriptions, does not run affiliate links, does not accept supplier placement fees and does not link to commercial properties from body content. Outbound links route to government, educational and editorial sources only. Reader donations and newsletter subscriptions are the funding model. The desk reads every inbound message and synthesises monthly into category-page revisions.

The hub is not the official site for any privacy-software product. Account creation, subscription billing, official client downloads and customer-support tickets all live on the relevant company's official property. Search the official URL directly when reaching for those functions. The disambiguation page covers this distinction in detail.