Proton

Proton blog

Proton Mail receives updates on iOS and Android
Map of the United States with six images of hacked computers
Disney settlement with FTC
Computer screen with passwords, access tokens, and a business account.

Latest articles

See all articles
Get to inbox zero: Privacy-first inbox organization tips
The inbox zero method still works. Here's how to organize your inbox, simplify your workflow, and free up time for your most important tasks.
An illustration of a clipboard with the NIST password guidelines attached
  • For business
  • Privacy guides
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
Proton Mail receives updates on iOS and Android
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
Proton Mail receives updates on iOS and Android
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
Proton Drive for Windows update that adds photo imports from local folders and Google Photos
You can now move pictures and albums from Google Photos or any folder into Proton Drive for Windows — all protected by end-to-end encryption.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
image shows a Swiss flag in the shape of a shield
The US recently implemented a 39% tariff of Swiss imports. In solidarity, Proton is offering discounts on our services to Swiss businesses and citizens.
Proton Authenticator logo with a gear wheel
  • Proton news
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
The LinkedIn logo and an AI symbol, representing how LinkedIn is using your data for AI training
LinkedIn will share your public data with Microsoft to train AI. Find what this means for your privacy and how to opt out.
Meta accused of bypassing Apple’s tracking rules
A former Meta employee alleges the company used internal tracking methods to bypass Apple’s privacy rules and inflate ad metrics.
Should security cost your privacy?
  • Privacy news
Former CIA officer Andrew Bustamante and Cato’s Jennifer Huddleston debate what privacy means today and how it shapes security, rights, and the internet.
Get to inbox zero: Privacy-first inbox organization tips
The inbox zero method still works. Here's how to organize your inbox, simplify your workflow, and free up time for your most important tasks.
An illustration of a clipboard with the NIST password guidelines attached
  • For business
  • Privacy guides
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
A smartphone and a progress bar, representing iPhone storage
Running out of iPhone storage? Find out how to free up space, manage files, and maintain data privacy with Proton Drive.
Illustration of a brain and a shield with the letters AI in the center
Big Tech companies are building AI aligned with their surveillance capitalism business model. We need a privacy-first and responsible AI alternative today.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
An illustration of a clipboard with the NIST password guidelines attached
  • For business
  • Privacy guides
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
How to send a follow-up email after an interview (templates included)
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.
How to send a follow-up email after an interview (templates included)
Learn how to write a proper email for all situations — big or small — and get your message noticed with these customizable templates.