Proton

Latest articles

An envelope icon with a document inside and a small briefcase symbol in the corner, representing a job offer letter
  • For business
Download our 4 free job offer letter templates and find out how to write an offer letter to hire the best talent. Quick to edit and use.
How to start an email: 15 professional greetings and opening lines
  • For business
Learn how to start an email professionally with our top greetings, openers, and formal examples, and find out what to avoid (and why).
Why email aliases are better than fake email addresses for privacy and security
  • Privacy guides
Using a fake email generator often isn't secure or private. Here's how you can use an email alias instead to keep your personal email safe.
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
  • Privacy guides
Roughly 90% of Ed Tech apps and websites were found to have trackers. We explain how you can protect your child’s privacy from this surveillance. 
  • Privacy guides
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
  • Privacy guides
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
  • Privacy guides
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
  • For business
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
  • For business
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
  • For business
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
  • Privacy news
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.