Proton

Blog Proton

Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
Facial recognition technology: How your face became a commodity
en
Gmail logo with a hazard sign in the corner
en
Magnifying glass examining a website on a monitor.
en

Nejnovější články

Zobrazit všechny články
en
  • Průvodce ochranou soukromí
What is a large language model (LLM) and how does it work? Here's what you need to know about LLMs and the future of privacy-first AI.
A cloud, a Word document, and a synchronization symbol, representing how Microsoft saves Word documents to OneDrive by default
en
Microsoft plans to make OneDrive the default save location for Word, Excel, and PowerPoint. Here's what that means for your privacy.
How to send a secure email every time
en
Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Image of the Lumo purple cat with the words Lumo 1.1 by Proton
en
  • Lumo
  • Aktualizace produktu
Lumo 1.1 is a faster, smarter AI assistant that matches Big Tech’s capabilities while protecting your privacy with zero-access encryption.
en
  • Lumo
  • Aktualizace produktu
Your AI chats deserve privacy. Learn how Lumo keeps your conversations confidential with zero-access encryption and no logs.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Proton Authenticator logo with a gear wheel
en
  • Novinky Proton
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
Proton's secure authenticator app demonstration of the user interface for mobile and desktop
en
We're launching a secure, independent authenticator app available on desktop and mobile, to help you secure your online accounts.
A cloud, a Word document, and a synchronization symbol, representing how Microsoft saves Word documents to OneDrive by default
en
Microsoft plans to make OneDrive the default save location for Word, Excel, and PowerPoint. Here's what that means for your privacy.
Facial recognition technology: How your face became a commodity
en
Facial recognition technology turns your face into data for ads, surveillance, and tracking. Learn the risks — and how to protect your identity.
Gmail logo with a hazard sign in the corner
en
Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.
en
  • Průvodce ochranou soukromí
What is a large language model (LLM) and how does it work? Here's what you need to know about LLMs and the future of privacy-first AI.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
  • Pro firmy
  • Průvodce ochranou soukromí
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
A family photo, a location pin, a camera, and a clock, symbolizing the risks of EXIF data for your personal photos
en
EXIF data in your photos can reveal more than you think, including your location. Learn how to protect your privacy before sharing online.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
adolescence and the internet we handed to kids
en
Adolescence shows how platforms shape kids in harmful ways. Here's why transparent, open digital education must lead the change.
How to send a secure email every time
en
Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.
Out of office messages that say “vacation mode,” professionally
en
Less screen time, more beach time — these are the only 10 out of office message examples you'll need before your summer holiday.
12 email management tips to organize your inbox
en
These 12 email management strategies will help you declutter your inbox, stay organized, and enhance your focus throughout the workday.