Proton

Proton-Blog

An image showing a purple cartoon side profile of a person. A document with a warning sign sits in the bottom right corner
en
Authenticator logo with a shield
en
Google advertising
en
Proton 2025 autumn/winter roadmaps
en

Latest articles

Siehe alle Artikel
A purple foot on a purple background. An @ icon, a location icon, a link icon, and a shopping cart icon surround the foot
en
Online shopping may be convenient, but it presents privacy risks. Find out how to shop safely and privately online
The GrapheneOS logo, the French flag, and an off switch, representing GrapheneOS leaving France due to encryption concerns
en
GrapheneOS leaves France, warning of encryption backdoors. See why end-to-end encryption matters for Pixel users and how backdoors weaken it.
How local authorities and United States Border Patrol abuse flock cameras
en
AI-driven ALPR systems are a mass dragnet-surveillance system that poses a direct threat to the privacy and freedom of everyone in the US.
an image showing a command-line interface on a black background with 'Proton Pass CLI beta' written above
en
To help you work in the terminal, Proton Pass now offers a command-line interface (CLI) for enhanced productivity and increased security.
Proton Mail receives updates on iOS and Android
en
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
Proton Drive for Windows update that adds photo imports from local folders and Google Photos
en
You can now move pictures and albums from Google Photos or any folder into Proton Drive for Windows — all protected by end-to-end encryption.
en
Join Proton’s 2025 Lifetime Fundraiser and help decide which organizations receive grants supporting privacy, free speech, and human rights.
en
To help defend our cultural heritage, Proton Pass Professional password manager plans are free for two years to qualifying organizations. Learn more.
Authenticator logo with a shield
en
You should be able to use 2FA while protecting your privacy. Learn how Authenticator generates secure, private TOTPs.
The GrapheneOS logo, the French flag, and an off switch, representing GrapheneOS leaving France due to encryption concerns
en
GrapheneOS leaves France, warning of encryption backdoors. See why end-to-end encryption matters for Pixel users and how backdoors weaken it.
How local authorities and United States Border Patrol abuse flock cameras
en
AI-driven ALPR systems are a mass dragnet-surveillance system that poses a direct threat to the privacy and freedom of everyone in the US.
a purple cartoon phone screen with an ID card overlaid
en
A new digital ID scheme in the UK is raising concerns among British citizens. We investigate how the scheme could work and the pros and cons
A purple foot on a purple background. An @ icon, a location icon, a link icon, and a shopping cart icon surround the foot
en
Online shopping may be convenient, but it presents privacy risks. Find out how to shop safely and privately online
The Microsoft Copilot logo and an off switch, representing a step-by-step guide for how to turn off Copilot
en
Find out how to disable Copilot AI on Windows, limit Microsoft’s data collection, and protect your privacy and security from AI training.
Inbox detox: How to reclaim your email before Black Friday
en
The average adult receives 80 emails a day, and roughly half of that is spam. Learn how to take control of your inbox before Black Friday makes this even worse.
Illustration of purple robot with speech bubbles
en
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
Illustration of a brain and a shield with the letters AI in the center
en
Big Tech companies are building AI aligned with their surveillance capitalism business model. We need a privacy-first and responsible AI alternative today.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A purple bar chart with a speech bubble showing text on the top left side and a shield icon in a circle on the bottom right side
en
A data breach or a hefty fine from a regulator can end a business: Find out the top four data protection best practices now
A computer screen and keyboard with a chain going across the screen, a lock in the centre of it, and a bag with a dollar icon on the bottom right corner
en
Ransomware groups are avoiding large organizations and targeting SMBs for smaller payments instead: Find out how to protect your business
Network security management
en
Network security tools protect your organization’s data, systems, and users from cyber threats. We look at the best solutions for protecting your business.