Proton

Privatsphäre-Richtlinien

An illustration of protesters protecing their privacy.
en
  • Privatsphäre-Richtlinien
From Hong Kong to Minneapolis, protesters around the world are standing up for their human rights. The right to peaceful assembly and protest are bedrocks of democracy, and we support everyone’s ability to exercise these rights. We created Proton Mai
  • Privatsphäre-Richtlinien
Erfahre alles über TLS/SSL-Zertifikate, die digitalen Dateien, die zur Authentifizierung und Sicherung von Datenübertragungen im Internet beitragen. Immer wenn du Informationen im Internet sendest oder empfängst, durchlaufen sie ein Netzwerk mehrere
Illustration of changing email provider
en
  • Privatsphäre-Richtlinien
This article takes you through all the factors to consider when moving to a new email provider and leaving privacy-invasive companies such as Gmail, Outlook, and Yahoo Mail. Switching your email provider may feel as difficult as moving to a new hous
An illustration of COVID-19 contact tracing apps.
en
  • Privatsphäre-Richtlinien
Nearly all public health experts say we will have to employ testing and tracing on a massive scale to combat the spread of COVID-19. This has led a number of countries and tech companies to develop coronavirus contact tracing apps for smartphones. Th
An illustration of anonymized data.
en
  • Privatsphäre-Richtlinien
Many companies that handle personal information reassure their users by saying that all the data is “anonymized.” If you don’t know any better, that sounds reassuring. However, the method most companies use to anonymize data and the size of modern d
en
  • Privatsphäre-Richtlinien
As the world is grappling with a sharp rise in the number of COVID-19 cases, fraudsters are trying to capitalize on the state of panic and even the goodwill of others. More than 1,400 coronavirus-related domains were registered over the past three m
An illustration of political campaigns sharing voter data.
en
  • Privatsphäre-Richtlinien
During this American presidential election campaign season, politicians have scored points calling out tech companies for abusing the personal data of their users. Yet many political campaigns are engaged in very similar practices.  Political campai
An illustration of cryptojacking.
en
  • Privatsphäre-Richtlinien
Cryptojacking made headlines back in 2017 when hackers hit a series of high profile websites (including several operated by the UK and Australian governments). Whenever somebody visited an infected site, the hackers were able to hijack the visitor’s
An illustration of different smart devices that make up the Internet of Things.
en
  • Privatsphäre-Richtlinien
The Internet of Things has come a long way since the turn of the century when it was a buzzword used by futurists and entrepreneurs. Although not yet as ubiquitous as some predicted a decade ago, Internet-connected devices have crept into many aspect
illustration of biometric authentication
en
  • Privatsphäre-Richtlinien
Biometric authentication is a growing part of the tech landscape — it’s in our schools, offices, airports, government buildings, and more recently, in our smartphones. Apple’s introduction of Touch ID in 2013 has paved the way for fingerprint-, face-
en
  • Privatsphäre-Richtlinien
The smartphone is one of the most invasive devices ever invented. It’s easy to forget that, of course, because we are so familiar with them, and they are so useful. But while you might value your smartphone for the convenience it gives you, tech comp