Proton

Latest articles

An illustration of Proton Mail's multiple layers of security
  • Opinion
The Microsoft Exchange hack might be one of the worst breaches of all time. We look at what went wrong and how to better prevent email breaches.
  • For business
HIPAA defines how healthcare services and their business associates in the United States handle sensitive data about their clients.
  • Privacy guides
WhatsApp may be secure but it’s not private. Learn about the best alternatives to WhatsApp that genuinely respect your privacy.
An illustration of Big Tech governing speech through its power as a monopoly.
  • Opinion
Big Tech monopolies have too much control over what can exist on the internet. To preserve democracy, we need to break these monopolies up.
An illustration of four locks.
  • Opinion
Along with Threema, Tresorit, and Tutanota, we are releasing a joint statement calling on the EU to reject any ban or attack on end-to-end encryption.
An illustration of the DMA acting as a counterbalance to Big Tech's power.
  • Privacy news
The DMA is a set of proposed rules from the European Commission aiming to curtail Big Tech’s exploitative practices and make the internet more competitive.
  • For business
We look at some of the various HIPAA violations and the civil and criminal penalties for committing them.
  • Product updates
  • Proton Mail
Keyboard shortcuts allow power users to easily navigate the Proton Mail interface, organize, open, close, or archive your emails
An illustration of Proton Calendar event invitations
  • Product updates
  • Proton Calendar
You can now send and receive event invitations with Proton Calendar. These invitations work with most popular calendar apps, making it easy to plan events with friends.
  • For business
This article reviews the measures an entity needs to take to be HIPAA compliant and to pass an HSA audit.
An illustration of WhatsApp after its new privacy policies are implemented.
  • Privacy news
WhatsApp is forcing its users to share their metadata with Facebook. Privacy requires not just strong technical solutions, but a sound business model.