Blog

The Latest From Prolaag

Animation: Timeline of Secure Communications

A brief history of secure communications on the Internet.

Read More

Survey Results - Should unbreakable crypto be available to everyone?

Here's what people think about whether unbreakable encryption should be available to everyone.

Read More

Survey Results - Is there such a thing as unbreakable encryption?

We went to the public and asked if such a thing as unbreakable encryption existed. Here are the results.

Read More

Technical Video: The Importance of Scientific Entropy Collection

Video describing the scientific approach used to verify hardware randomness, and providing live comparisons to common alternatives.

Read More

Stack Usage Graphs

Security through aggressive memory management, with colorful graphs.

Read More

Time-Lapse Assembly Video of Hardware VPL

Time-lapse recording of the soldering and final assembly of the Prolaag Hardware VPL, from base components to the strongest digital privacy appliance available in 87.5 seconds.

Read More

Air-Gapped Dark Intranet Using Raspberry Pi Boards

The same software that drives our flagship product, the PV-110 Hardware VPL, now runs natively on the Raspberry Pi 1, 2, and 3.

Read More

12 Reasons Prolaag is more secure than every other VPN

Check out a few of the reasons we believe Prolaag has the most secure VPN available.

Read More

HWRNG approach

Our 'security-first' approach to hardware random number generation.

Read More

Inline entropy verification

Read how we make it easy to do independent verification of the entropy we produce.

Read More

This is what a .zip file looks like on the inside

How our open source graphical inspection tool helps us measure randomness.

Read More