Proton

Proton-Blog

A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
en

Neueste Artikel

Siehe alle Artikel
An image for a blog about how to avoid insider threats that shows a purple cartoon outline of a person emerging from a computer screen with a warning icon in the top right corner
en
Insider threats can be accidental or deliberate, but they're always dangerous: Find out how to protect your business.
en
Founders see cybersecurity as a later problem. But early decisions (good or bad) compound. Here's how to secure in your first 100 days.
Neue Umfragen von Proton zeigen, dass Europäer die US-Technologieabhängigkeit abbauen und die technologische Souveränität von Europa aufbauen wollen. Lesen Sie den vollständigen Bericht.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
en
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
Proton Sheets and a screenshot
en
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A purple screen with a title saying 'Proton Pass CLI' above a CLI interface with white text on a black background
en
  • Produkt-Updates
  • Proton Pass
To help you work in the terminal, Proton Pass now offers a command-line interface (CLI) for enhanced productivity and increased security.
Proton's new Mail mobile apps
en
Proton Mail’s next-generation iOS and Android apps were rebuilt from the ground up. Here’s why we did it and what it changes for users.
Representation of a survey about spreadsheet security
Proton hat 1.000 Personen in vier Ländern befragt, um aufzudecken, wie persönliche Tabellendaten weiterbestehen, geteilt bleiben und verwendet werden können, lange nachdem du sie vergessen hast.
en
We raised over $1.25 million this year to directly support organizations on the front lines of the fight for online privacy and freedom.
Neue Umfragen von Proton zeigen, dass Europäer die US-Technologieabhängigkeit abbauen und die technologische Souveränität von Europa aufbauen wollen. Lesen Sie den vollständigen Bericht.
Discord age checks
en
From March 2026, all Discord users will have a teen-appropriate experience by default, unless they can verify they are at least 18 years old.
whatsapp-encryption-lawsuit
en
A class-action lawsuit challenges WhatsApp’s end-to-end encryption claims. We break down the allegations, denials, and what’s actually known.
Is BitLocker safe?
en
  • Privacy guides
BitLocker is Microsoft's built-in full-disk encryption solution for Windows. It's convenient, but is it safe?
A photo and a hand, representing ways to stop AI art theft
en
Your creative work is sensitive data. Find out how to stop AI art scraping with simple tips that protect your work from unauthorized use.
A purple cartoon fingerprint icon surrounded by a black eye icon, a black shield icon, a black audio icon, and a black person outline icon
en
Your biometric data is deeply personal, making it valuable to advertisers and scammers: Find out how to protect it.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
en
  • Opinion
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
en
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
en
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
An image for a blog about how to avoid insider threats that shows a purple cartoon outline of a person emerging from a computer screen with a warning icon in the top right corner
en
Insider threats can be accidental or deliberate, but they're always dangerous: Find out how to protect your business.
en
Founders see cybersecurity as a later problem. But early decisions (good or bad) compound. Here's how to secure in your first 100 days.
en
This comprehensive guide shows you how to secure business WiFi. We cover WPA3 encryption and strong passphrases to advanced security steps.