Latest articles
- Privacy guides
If you’re comparing different password managers or researching password
security, you’ll quickly run into terms like hashing and salting. While these
terms might sound like steps you take to make breakfast potatoes, they’re
actually processes that ar
People often choose to remove their personal information from the internet due
to privacy and security concerns. For example, oversharing on social media can
expose you to phishing attacks, identity theft, and cyberstalking.
Plus, your data is highl
It’s been roughly three months since the European Union’s Digital Markets Act
(DMA), which aims to restore competition and fairness to the internet, came into
effect for Big Tech monopolies. Since then, Google has done precisely nothing to
comply wit
Today we’re announcing enhancements to our business plans, further enriching our
commitment to delivering the best privacy experience for businesses. These
upgrades will help us continue expanding our feature suite for organizations,
while giving mor
- Product updates
- Proton Pass
Today, we’re excited to announce the launch of the Proton Pass macOS app and the
Proton Pass Linux app. One of the most popular requests from the Proton
community was a standalone desktop app, which is now available on every major
platform — Windows,
When you use the internet at home, connected to everything from fitness
equipment to game consoles, smartphones, and laptops, marketing companies could
be watching you with a tiny piece of surveillance tech you might not even know
about.
We’re talki
- Proton news
Every year, we send a survey to the Proton community asking for your feedback
and ideas. We then use that information to guide our future plans. This year, we
received thousands of responses, giving us insight into what you expect from
us.
As one o
- Privacy guides
Hackers use various methods to crack passwords, and one of them is the rainbow
table attack. In certain cases, this method can be faster than dictionary
attacks or credential stuffing.
In this article, we explore how rainbow table attacks work and d
The more personal information we share on the internet, the greater the privacy
risks that make us vulnerable to identity theft. This issue affects millions
globally, impacting people financially and personally, with over 24 million
victims in 2021 i
- For business
Ensuring HIPAA compliance is crucial for any healthcare business that handles
sensitive patient information. Failing to use HIPAA-compliant services, such as
email, can result in severe consequences, including hefty fines and legal
repercussions.
If
The email addresses and other sensitive information of 918 British MPs, members
of the European Parliament, and French deputies and senators have been leaked to
dark web marketplaces where data is illegally bought and sold. As part of our
investigati