- Stealth uses obfuscation to hide your VPN connection from censors. The general idea is to make VPN traffic look like “normal” traffic — or common HTTPS connections. Stealth does this by using obfuscated TLS tunneling over TCP. This is different from most popular VPN protocols that typically use UDP, making them easier to detect and block. Without going into too much detail, Stealth also establishes VPN connections in a specific and unique way that avoids alerting internet filters.
- Stealth is available on all Proton VPN plans, including our Free plan, because everyone deserves online freedom. For now, you can use Stealth on our Android, macOS, and iOS apps.
No two users can claim the same addresses on the platform ensuring that there is no cross-attestation. Additionally, if a user removes an address or wallet, that address cannot be re-attested for at least 60-days.
Block (formerly Square) will be manufacturing their upcoming hardware wallet in Austin, Texas. This post highlights the process they took when making this decision.
No one other than the intended recipient can read transmitted messages, not even Threema as the service operator. It’s not required to provide any personal data whatsoever: If so desired, Threema can be used completely anonymously, i.e., without disclosing one’s phone number or email address.