Proton

Proton-Blog

US flag and the Statue of Liberty facing the EU flag, the Brandenburg gate, Leaning Tower of Pisa, and Eiffel Tower
en
Gmail logo with a hazard sign in the corner
en
  • Neuigkeiten zur Privatsphäre
Magnifying glass examining a website on a monitor.
en
  • Neuigkeiten zur Privatsphäre
Albert Fox Cahn explaining surveillance in supermarkets
en
  • Neuigkeiten zur Privatsphäre

Neueste Artikel

Siehe alle Artikel
Gmail logo with a hazard sign in the corner
en
  • Neuigkeiten zur Privatsphäre
Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.
A laptop and a smartphone, both with security shield icons, connected by dotted lines to a gear symbol, representing mobile device management (MDM) solutions
en
An MDM solution can help you secure your business network, but do you need one? Find out if there's a better option.
An image of a purple computer screen with a document logo shaped like a piece of paper with writing on it in the top right corner
en
Looking to implement BYOD within your business? Create your policy with our free template and find how how to secure your business data.
Image of the Lumo purple cat with the words Lumo 1.1 by Proton
en
  • Lumo
  • Produkt-Updates
Lumo 1.1 is a faster, smarter AI assistant that matches Big Tech’s capabilities while protecting your privacy with zero-access encryption.
  • Lumo
  • Produkt-Updates
Deine KI-Chats verdienen Privatsphäre. Erfahre, wie Lumo deine Unterhaltungen mit Zero-Access-Verschlüsselung und ohne Protokolle vertraulich hält.
Ein Blick hinter die Kulissen des Designprozesses von Lumo – vom Namen und Maskottchen bis hin zum immersiven Universum. Erfahre, wie Proton einen privaten KI-Assistenten mit einer einzigartigen visuellen Identität zum Leben erweckt hat.
Proton Authenticator logo with a gear wheel
en
  • Neuigkeiten von Proton
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
Proton's secure authenticator app demonstration of the user interface for mobile and desktop
Wir starten eine sichere, unabhängige Authenticator-App für Desktop und Mobilgeräte, um dir zu helfen, deine Online-Konten zu schützen.
Proton completes SOC 2 Type II audit to support business security
en
Proton has successfully completed its first SOC 2 Type II audit, confirming our security controls meet industry standards and helping teams evaluate us with confidence.
Gmail logo with a hazard sign in the corner
en
  • Neuigkeiten zur Privatsphäre
Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.
Magnifying glass examining a website on a monitor.
en
  • Neuigkeiten zur Privatsphäre
Several recent studies have found data brokers in the US ignoring data requests, hiding opt-out pages, and more. Learn what you can to do to fight back.
Albert Fox Cahn explaining surveillance in supermarkets
en
  • Neuigkeiten zur Privatsphäre
Surveillance is increasingly in everywhere. Privacy advocate Albert Fox Cahn explains how and where you're monitored — and what you can do about it.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
  • Für Unternehmen
  • Privatsphäre-Richtlinien
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
A family photo, a location pin, a camera, and a clock, symbolizing the risks of EXIF data for your personal photos
en
EXIF data in your photos can reveal more than you think, including your location. Learn how to protect your privacy before sharing online.
A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
en
  • Privatsphäre-Richtlinien
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
  • Meinung
  • Neuigkeiten zur Privatsphäre
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
adolescence and the internet we handed to kids
en
Adolescence shows how platforms shape kids in harmful ways. Here's why transparent, open digital education must lead the change.
A laptop and a smartphone, both with security shield icons, connected by dotted lines to a gear symbol, representing mobile device management (MDM) solutions
en
An MDM solution can help you secure your business network, but do you need one? Find out if there's a better option.
An image of a purple computer screen with a document logo shaped like a piece of paper with writing on it in the top right corner
en
Looking to implement BYOD within your business? Create your policy with our free template and find how how to secure your business data.
An illustration depicting an alert on a computer screen and a hand showing stop to indicate data breach prevention
en
Learn about common data leak traps, discover the latest in data breach prevention, and get the tools you need to protect your business.