Proton

Guías de privacidad

en
  • Guías de privacidad
Open-source software makes its source code available to the public. Learn how open-source encryption creates transparency and protects your privacy.
en
  • Guías de privacidad
Whether you’re an individual or a business, using end-to-end encrypted email can help you stay secure online. Learn about email encryption in this article.
en
  • Guías de privacidad
Want to be sure that your personal data is safe? Here’s our guide to picking a free email account.
Illustration of email encryption
en
  • Guías de privacidad
Whether you consider your emails ‘sensitive’ or not, everyone deserves email privacy. Email encryption helps to secure your privacy online.
en
  • Guías de privacidad
WhatsApp may be secure but it’s not private. Learn about the best alternatives to WhatsApp that genuinely respect your privacy.
Illustration of cloud storage
en
  • Guías de privacidad
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more about our storage model and how we protect your privacy.
en
  • Guías de privacidad
Flash drives and external hard drives are convenient, but they're not always secure. We explain how you can encrypt your USB drives and protect your data.
An illustration of protesters protecing their privacy.
en
  • Guías de privacidad
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
en
  • Guías de privacidad
Learn all about TLS/SSL certificates, the digital files that help to authenticate and secure data transfers across the internet.
Illustration of changing email provider
en
  • Guías de privacidad
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
  • Guías de privacidad
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.