Proton

Privatsphäre-Richtlinien

An illustration of anonymized data.
en
  • Privatsphäre-Richtlinien
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.
en
  • Privatsphäre-Richtlinien
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
An illustration of political campaigns sharing voter data.
en
  • Privatsphäre-Richtlinien
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
An illustration of cryptojacking.
en
  • Privatsphäre-Richtlinien
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
An illustration of different smart devices that make up the Internet of Things.
en
  • Privatsphäre-Richtlinien
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
illustration of biometric authentication
en
  • Privatsphäre-Richtlinien
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.
en
  • Privatsphäre-Richtlinien
Android is one of Google’s most important tools for collecting data on users. This guide will help you improve your privacy on Android devices.
  • Privatsphäre-Richtlinien
Den richtigen Webbrowser zu nutzen, ist entscheidend für den Schutz deiner Privatsphäre. Sieh dir die sichersten Webbrowser an, die Online-Tracking verhindern.
illustration of protonmail ios security recommendation
en
  • Privatsphäre-Richtlinien
Activate Touch ID, Face ID, or PIN protection in the Proton Mail iOS app for added protection against malware and warrantless device searches.
Data breach prevention illustration
en
  • Privatsphäre-Richtlinien
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.
  • Privatsphäre-Richtlinien
Erfahre, was PGP-Verschlüsselung ist und wie sie funktioniert, wie sicher PGP ist und der einfachste Weg, deine E-Mails mit PGP-Verschlüsselung zu sichern.