Remember giving Facebook access to your camera roll? Some users don't, so Meta AI could be scanning their photos right now. See how to check.| Proton
What is a large language model (LLM) and how does it work? Here's what you need to know about LLMs and the future of privacy-first AI.| The Proton Blog
Microsoft plans to make OneDrive the default save location for Word, Excel, and PowerPoint. Here's what that means for your privacy.| The Proton Blog
Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.| The Proton Blog
Less screen time, more beach time — these are the only 10 out of office message examples you'll need before your summer holiday.| The Proton Blog
These 12 email management strategies will help you declutter your inbox, stay organized, and enhance your focus throughout the workday.| The Proton Blog
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.| The Proton Blog
Facial recognition technology turns your face into data for ads, surveillance, and tracking. Learn the risks — and how to protect your identity.| The Proton Blog
Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.| Proton
An MDM solution can help you secure your business network, but do you need one? Find out if there's a better option.| The Proton Blog
Surveillance is increasingly in everywhere. Privacy advocate Albert Fox Cahn explains how and where you're monitored — and what you can do about it.| Proton
The new 'Friend Map' feature on Instagram might be sharing your precise location without your knowledge. Here's how to turn it off — and why you might want to.| Proton
You may not like the idea of Google having your password, so here’s how you can turn off Google Password Manager in Chrome.| Proton
On the internet, can you really be whoever you want to be? Let’s take a look at what makes up your online identity and how you can protect it.| Proton
If you want to disable Firefox password manager, just follow these simple steps.| Proton
Email providers, ISPs, and law enforcers have ways to trace and track you through your emails. Here’s how to stay private online.| Proton
Passphrases are a great way to protect your online accounts and digital identity. But what is a passphrase?| Proton
A password manager is a computer program (app) that generates secure passwords and remembers them for you| Proton
Dropbox is the oldest name in cloud storage, but has had some scandals over its long run. In this article, we try to answer the question, is Dropbox secure?| Proton
In this article, we tell you how to create a strong password and the best way to keep it safe.| Proton
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.| Proton
The new 'Friend Map' feature on Instagram might be sharing your precise location without your knowledge. Here's how to turn it off — and why you might want to.| Proton
Proton is offering free business tools to French SMEs to support Europe’s digital sovereignty and reduce reliance on Big Tech platforms.| Proton
Over 74% of European businesses rely on US tech. This is an unsustainable situation, an obstacle for European innovation, and a threat to European sovereignty.| Proton
We explain how the dark web actually works and how you can access it safely.| Proton
Your email address is an identifier tech giants use to track you and exploit your personal data. Learn how to protect yours.| Proton
Here’s how to ditch your generic email address and make an email with a custom domain. Improve your security and brand recognition.| Proton
Lumo gives you the power to solve problems big and small, while keeping your personal data confidential. Try it now.| Proton
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.| Proton
One in five law firms reported a cyberattack in the past year. These are the key tools and strategies that can help protect your firm from costly breaches.| Proton
Apple's anti-competitive App Store policies are gouging consumers, enabling censorship, and harming privacy-focused developers. We're joining a lawsuit to restore internet freedom.| Proton
Roughly 90% of Ed Tech apps and websites were found to have trackers. We explain how you can protect your child’s privacy from this surveillance.| Proton
You should know Chrome's new “ad privacy feature” won't stop Google from tracking you. It’s Google’s most brazen privacy-washing claim yet.| Proton
EU lawmakers have begun deliberations on the DMA before the final vote. Here is what they must add to make it more effective.| Proton
A good username is as important as a strong password. We go over what is a safe username, and how you can make one.| Proton
Password fatigue, when you get tired from keeping track of all your passwords, is a reality for millions. Here’s how to fight it.| Proton
WhatsApp may be secure but it’s not private. Learn about the best alternatives to WhatsApp that genuinely respect your privacy.| Proton
Learn how to password-protect emails or add enhanced encryption to messages in Gmail, Outlook, and Proton Mail.| Proton
Our business password manager with Single Sign-On (SSO) can help keep your company secure and save employees time.| Proton
We look at how encrypted email works and how Proton Mail keeps your messages private with end-to-end encryption and zero-access encryption.| Proton
Learn all about TLS/SSL certificates, the digital files that help to authenticate and secure data transfers across the internet.| Proton
Just as Big Oil has used greenwashing to block environmental protections, Big Tech uses privacy washing to stand in the way of privacy.| Proton
Proton Mail has become the first and only encrypted email provider to support elliptic curve cryptography (ECC), providing more security and performance.| Proton
Proton provides anti-censorship measures to help users bypass DNS blocks. This article explains how these systems work.| Proton
Zero-knowledge cloud storage protects your files with end-to-end encryption so only you can access your data. Here’s how it works.| Proton
Learn how to beat annoying and potentially harmful spam and keep your email private and secure with Proton Mail.| Proton
Your passwords are the keys to your digital life. In this article, we look at how to store and manage your passwords safely.| Proton
Learn how FIDO U2F security keys help to keep your online accounts secure even if your passwords are compromised.| Proton
Learn how digital signatures work and ensure the authenticity and integrity of digital messages, documents, and other data transfers.| Proton
Some of your most sensitive data sit on the cloud, on the servers of Internet service providers. Zero-access encryption gives you control over your data online.| Proton
Learn all about spam emails, how to identify and prevent them, and how spam email filters work.| Proton
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.| Proton
Learn what PGP encryption is and how it works, how secure PGP is, and the simplest way to secure your emails with PGP encryption.| Proton
Our Anti-abuse team is constantly monitoring new phishing attacks. We explain two creative new attacks and how Proton Mail can protect you.| Proton
Switzerland has a strong reputation for privacy, dating back over 100 years, but is this reputation actually backed up by strong laws?| Proton
To ensure our mission always comes first, Proton is transitioning to a non-profit structure and formalizing our promise of people before profits.| Proton
Google claims privacy should be available to everyone. But this claim requires a new definition of privacy that doesn’t hold up to scrutiny.| Proton
ProtonMail, Proton VPN, Proton Calendar, and Proton Drive all passed security audits conducted by the IT security firm Securitum.| Proton
Today, we are happy to become the first and only secure email service to support Secure Remote Password (SRP), a much more secure authentication method.| Proton
Proton uses sophisticated automated anti-abuse systems to protect your account. We also explain how to resolve issues with your account.| Proton
We're introducing the Proton Sentinel program that offers advanced account protection for anyone that deals with sensitive data.| Proton
Learn how Proton Drive uses end-to-end encryption to protect your photos, documents, and other sensitive data.| Proton
The Proton Calendar uses an innovative encryption model to deliver the high level of security Proton users expect.| Proton
Share passwords, bank details, and other sensitive data securely using unique, end-to-end encrypted links with anyone.| Proton
The new Outlook now appears to be a data collection service for Microsoft’s 801 external partners for targeted advertising.| Proton
Identity theft affects millions of people worldwide, causing billions in damage. Here are 5 proven methods for identity theft prevention.| Proton
Google is one of the biggest obstacles to privacy. This article will explore how and why to deGoogle yourself to reclaim and protect your digital privacy.| Proton
Any privacy-focused company in the US faces numerous legal challenges, including multiple programs that allow for warrantless wiretaps.| Proton
With Dark Web Monitoring, you can have Proton watch for data leaks, ensuring you can change the passwords to accounts affected by a breach.| Proton
The Proton Mail desktop app offers a fast and focused experience to access your email and calendar.| Proton
Apple responds to the EU’s DMA with extortionary fees, scare screens, and general contempt. The European Commission must respond.| Proton
Proton Mail is still available in India despite some media reports. Here’s the most up-to-date information on the current situation.| Proton
With hide-my-email aliases, you can keep your email address private, avoid data breaches and prevent phishing or spam emails.| Proton
Looking to create a corporate password policy? Get some best practice tips and advice from Proton Pass for Business.| Proton
Credential-stuffing attacks are a common online threat. We go over what they are and how to prevent them.| Proton
Your data is valuable. And that’s exactly why you should keep it safe by using privacy-focused services.| Proton
Worried about Dropbox security issues? Learn about the big Dropbox breach of 2012 and many other security incidents the cloud storage provider has experienced over the years.| Proton
In this article, we discuss why you need to use a different strong password for each account, and also how to create and remember them.| Proton
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.| Proton
What is an email alias and how can they protect your email address from data breaches? Find out how to create email aliases with Pass| Proton
Google Drive is the most common cloud storage service in the world, but is Google Drive safe? Can you trust it to protect your files from unauthorized access?| Proton
We use end-to-end encryption to secure your emails. Here's what end-to-end encryption means, and how it protects you.| Proton
You probably know encryption is important, but what is encryption exactly, and how does it work?| Proton
The EU Parliament adopted a position that removes attacks on encryption in the Chat Control regulation. This is a positive first step, but the fight’s not over.| Proton
Phishing scams can put you at risk of identity theft, credit card fraud, or other cybercrime. Learn how to spot and prevent phishing.| Proton
HTTPS is the cornerstone of all security on the internet, making possible much of what we take for granted being able to do on the internet.| Proton