Proton

Guías de privacidad

An illustration of COVID-19 contact tracing apps.
en
  • Guías de privacidad
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.
An illustration of anonymized data.
en
  • Guías de privacidad
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.
en
  • Guías de privacidad
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
An illustration of political campaigns sharing voter data.
en
  • Guías de privacidad
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
An illustration of cryptojacking.
en
  • Guías de privacidad
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
An illustration of different smart devices that make up the Internet of Things.
en
  • Guías de privacidad
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
illustration of biometric authentication
en
  • Guías de privacidad
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.
en
  • Guías de privacidad
Android is one of Google’s most important tools for collecting data on users. This guide will help you improve your privacy on Android devices.
en
  • Guías de privacidad
Using the right web browser is crucial for protecting your privacy. See the most secure web browsers that prevent online tracking.
illustration of protonmail ios security recommendation
en
  • Guías de privacidad
Activate Touch ID, Face ID, or PIN protection in the Proton Mail iOS app for added protection against malware and warrantless device searches.
Data breach prevention illustration
en
  • Guías de privacidad
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.