<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/</link><language>en</language><feed_url>https://proton.me/feed</feed_url><item><title>What Microsoft 365 Copilot flex routing means for EU businesses</title><link>https://proton.me/business/blog/microsoft365-copilot-flex-routing</link><guid isPermaLink="true">https://proton.me/business/blog/microsoft365-copilot-flex-routing</guid><description>Your business data is about to automatically travel outside the EU. Here&apos;s why you should opt out and how to do it.</description><pubDate>Fri, 17 Apr 2026 16:31:20 GMT</pubDate><content:encoded>
&lt;p&gt;Microsoft’s ‘data sovereignty’ promise for Europe comes with an asterisk. Starting April 17, 2026, the company will start sending Copilot data to foreign servers for processing.&lt;/p&gt;



&lt;p&gt;With the introduction of flex routing for Microsoft 365 Copilot, &lt;a href=&quot;https://proton.me/blog/llm&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Large Language Model&lt;/a&gt; (LLM) inferencing — the step where your data is actually processed — may take place in the US, Canada, or Australia when European data center capacity runs short.&lt;/p&gt;



&lt;p&gt;These changes are being applied by default. For new customer accounts created after March 25, 2026, flex routing is already on. For everyone else, it will be enabled automatically unless you opt out. (Instructions on how to do that below.)&lt;/p&gt;



&lt;p&gt;If your business is based in the European Union or the European Free Trade Association (EFTA), this isn’t a small technical update. Flex routing changes whether your AI workflows stay within the EU or leave it without your knowledge. And it highlights what &lt;a href=&quot;https://proton.me/business/blog/tech-investment-not-cost&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Big Tech&amp;#8217;s version of digital sovereignty&lt;/a&gt; really means for Europe: They&amp;#8217;re still in control.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is flex routing?&lt;/h2&gt;



&lt;p&gt;Inferencing is the moment an AI model processes your prompt to generate a response, whether that’s summarizing a document, answering a question, or drafting content. By the time this happens, your data has already been assembled. Even if your data is stored in Europe, it may now be&amp;nbsp;processed elsewhere — automatically, under a non-EU jurisdiction.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;EU-hosted does not mean EU-processed&lt;/h2&gt;



&lt;p&gt;Microsoft makes it clear that data will remain &lt;a href=&quot;https://proton.me/learn/encryption&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;encrypted&lt;/a&gt; in transit and at rest. That might reassure some customers. But if you’re operating under frameworks like the&amp;nbsp;&lt;a href=&quot;https://proton.me/business/gdpr&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;General Data Protection Regulation&lt;/a&gt; (GDPR), the&amp;nbsp;Network and Information Security Directive (NIS2), or the&amp;nbsp;Digital Operational Resilience Act (DORA), protecting data in storage and transmission isn&amp;#8217;t enough.&lt;/p&gt;



&lt;p&gt;Processing (or inference) is where exposure can occur. And under flex routing, that point can now move.&lt;/p&gt;



&lt;p&gt;For an AI model to perform inference, data must be made accessible for computation. Your prompts, emails, files, and metadata are gathered and sent to the model. With flex routing, that package can be processed outside the EU.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Where your data is processed matters — even if it’s encrypted on the way in and out.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The burden of compliance is yours&lt;/h2&gt;



&lt;p&gt;Microsoft&amp;#8217;s decision to make flex routing a default feature is a red flag. Research shows that most people don&amp;#8217;t bother to check their defaults or update them. If data sovereignty was something the company cared about for its European customers, it would not have implemented flex routing automatically.&lt;/p&gt;



&lt;p&gt;It also puts your compliance department on notice that vendors may suddenly decide to change an important policy. You are now responsible for monitoring vendor updates, interpreting their implications, and adjusting settings to remain compliant. This may seem unfair if you selected a US-based vendor under the impression your data sovereignty was important to them.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What EU businesses can do now&lt;/h2&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Disable flex routing. &lt;/strong&gt;If your policies require EU-only processing, don’t rely on defaults.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Sign in to the Microsoft 365 admin center as an administrator assigned the&amp;nbsp;&lt;a href=&quot;https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;AI Administrator role&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Go to&amp;nbsp;&lt;strong&gt;Copilot&lt;/strong&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;strong&gt;Settings&lt;/strong&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;strong&gt;Flexible inferencing during peak load periods&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Select&amp;nbsp;&lt;strong&gt;Do not allow flex routing&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Understand cross-border implications. &lt;/strong&gt;Your current setup may not meet your business requirements. Consider:
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Data transfer obligations&amp;nbsp;under GDPR and sector-specific rules&lt;/li&gt;



&lt;li&gt;Internal data residency policies&amp;nbsp;and contractual commitments&lt;/li&gt;



&lt;li&gt;Legal access and oversight&amp;nbsp;in non-EU jurisdictions&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Audit AI-specific data flows closely. &lt;/strong&gt;Most businesses know where data is stored. Fewer know where it’s processed. Start questioning:
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Where your data is processed&lt;/li&gt;



&lt;li&gt;Whether there are laws that can compel third-party data disclosure&lt;/li&gt;



&lt;li&gt;Who can access data during processing and if that can change&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Choose vendors that are transparent about how they process your data.&lt;/strong&gt; Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/lumo&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;AI assistant&lt;/a&gt; processes data exclusively on European servers and publishes detailed description of its &lt;a href=&quot;https://proton.me/blog/lumo-security-model&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;security model&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Flex routing reveals something deeper about data governance&lt;/h2&gt;



&lt;p&gt;If your vendors are based in the US, you’re relying on systems built for a different regulatory reality — one you don’t control, but still have to answer to.&lt;/p&gt;



&lt;p&gt;Software updates, support, legal policies, and pricing decisions are made in Silicon Valley or Seattle. The rules your vendor follows are set in Washington. But your business is held to European standards.&lt;/p&gt;



&lt;p&gt;That’s why more companies are starting to look at&amp;nbsp;&lt;a href=&quot;https://proton.me/learn/european-alternatives&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;European alternatives to Big Tech&lt;/a&gt;. When your infrastructure, policies, and legal framework are aligned with the region you operate in, data sovereignty becomes enforceable, not conditional.&lt;/p&gt;
</content:encoded><category>For business</category><category>Lumo AI</category><category>Opinion</category><category>Privacy news</category><author>Alanna Alexander</author></item><item><title>Your tech stack is an investment not a cost</title><link>https://proton.me/business/blog/tech-investment-not-cost</link><guid isPermaLink="true">https://proton.me/business/blog/tech-investment-not-cost</guid><description>Businesses in Europe can reduce their reliance on US tech by investing in real digital sovereignty, not Big Tech sovereignty washing.</description><pubDate>Fri, 17 Apr 2026 11:10:32 GMT</pubDate><content:encoded>
&lt;p&gt;Europe has found itself in a difficult and dangerous situation.&lt;/p&gt;



&lt;p&gt;Last August, Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/europe-tech-watch&quot;&gt;Europe tech sovereignty report&lt;/a&gt; revealed that over 74% of publicly listed European companies depend on US infrastructure for their basic tech services. Whether sending emails or running critical infrastructure in the cloud, Europe places its digital destiny in the hands of a few American service providers and the government they answer to.&lt;/p&gt;



&lt;p&gt;That report now seems prescient. Over the last few months, rifts in the North Atlantic alliance emerged over tariffs and territory, culminating in a recent threat from Washington to break apart NATO itself.&lt;/p&gt;



&lt;p&gt;As Proton CEO Andy Yen &lt;a href=&quot;https://www.youtube.com/live/-3cG3nZhIFA?si=3H_bJZB_uzK9Cm5h&amp;amp;t=10026&quot;&gt;said at a recent tech conference&lt;/a&gt; in France, &amp;#8220;If Trump wants to take Greenland, he doesn&amp;#8217;t have to use force. All he has to say is, &amp;#8216;Tomorrow Google, Apple, Microsoft, and Amazon will stop working in your country if you don&amp;#8217;t sign a contract and give me Greenland.&amp;#8217; And if that happens, they will sign within the hour.&amp;#8221;&lt;/p&gt;



&lt;p&gt;Europe&amp;#8217;s digital sovereignty seemed irrelevant as long as the post-war order held. Now that those foundations are shaking, governments are switching over to technology and cloud services they can control. The French government is &lt;a href=&quot;https://techcrunch.com/2026/04/10/france-to-ditch-windows-for-linux-to-reduce-reliance-on-us-tech/&quot;&gt;reducing its use of Microsoft Windows&lt;/a&gt;, and other European countries are taking &lt;a href=&quot;https://apnews.com/article/europe-digital-sovereignty-big-tech-9f5388b68a0648514cebc8d92f682060&quot;&gt;similar steps&lt;/a&gt;. Our recent survey found that European consumers support these moves. Nearly three-fourths of them told us in a survey that their society was far &lt;a href=&quot;https://proton.me/blog/european-alternative-us-tech-survey&quot;&gt;too dependent on the United States&lt;/a&gt; for technology.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;But what does this mean for business leaders?&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;The problem of dependency isn&amp;#8217;t just political. When your core systems rely on foreign providers, your critical systems — email, files, infrastructure — can be disrupted by economic and political decisions far away.&lt;/p&gt;



&lt;p&gt;That’s why we urge business leaders to treat their tech stack not as a cost, but as an investment in control, resilience, and long-term independence. Retooling your company is as much a practical challenge as it is a mindset shift.&lt;/p&gt;



&lt;p&gt;Here are three questions to ask yourself:&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Should I be investing?&lt;/h2&gt;



&lt;p&gt;Corporate managers face a strategic decision about their internal tools.&lt;/p&gt;



&lt;p&gt;Big Tech platforms offer convenience: They&amp;#8217;re familiar, widely adopted, and easy to justify as the safest choice. &amp;#8220;Nobody gets fired for buying IBM,&amp;#8221; as the saying goes. &lt;strong&gt;But technology isn&amp;#8217;t a commodity.&lt;/strong&gt; Your tech stack shapes how your business operates, who controls your data, and how resilient you are when circumstances change.&lt;/p&gt;



&lt;p&gt;Take for instance: In the late 2000s, the Chinese government realized it was too dependent on foreign oil. So it began to invest in the creation of a new domestic electric vehicle industry. Nearly two decades later, Chinese carmakers produce about &lt;a href=&quot;https://www.iea.org/reports/global-ev-outlook-2025/trends-in-electric-car-markets-2&quot;&gt;two out of every three&lt;/a&gt; electric vehicles sold globally.&lt;/p&gt;



&lt;p&gt;If Chinese decision makers had viewed automobiles as a cost, they would have purchased reliable gas-fueled cars from Japan or Detroit. Instead, they decided automotive tech was an investment. It paid off in the form of a powerful homegrown industry for China and affordable high-quality cars for everyone.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Your tech procurement decisions deserve deeper reflection and long-term thinking. When weighing your options, it&amp;#8217;s worth asking:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Do my service providers share my values and vision?&lt;/li&gt;



&lt;li&gt;Is my business data properly secured and confidential at all times?&lt;/li&gt;



&lt;li&gt;If geopolitical circumstances change, do I own my data?&lt;/li&gt;



&lt;li&gt;Will my tech stack be an asset or a liability when seeking new business?&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Businesses that take these questions seriously are already turning security into a competitive advantage. Our &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;2026 SMB Cybersecurity Report&lt;/a&gt; found that using secure tech was a competitive advantage for 66% of businesses. And the price you pay for those services may not be so different; indeed, it might even be cheaper to buy local.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Is it digital sovereignty washing?&lt;/h2&gt;



&lt;p&gt;First there was &lt;a href=&quot;https://www.un.org/en/climatechange/science/climate-issues/greenwashing&quot;&gt;greenwashing&lt;/a&gt;. Then there was &lt;a href=&quot;https://proton.me/blog/privacy-washing-2023&quot;&gt;privacy washing&lt;/a&gt;. Now there&amp;#8217;s digital sovereignty washing.&lt;/p&gt;



&lt;p&gt;US tech companies know digital sovereignty is important to European businesses. That&amp;#8217;s why Google and Microsoft both promote a &amp;#8220;Sovereign Cloud&amp;#8221; and a European &amp;#8220;data boundary&amp;#8221; that evokes the idea of local control. &amp;#8220;Discover a sovereign cloud without compromise,&amp;#8221; Microsoft says.&lt;/p&gt;



&lt;p&gt;It&amp;#8217;s dangerous marketing because it&amp;#8217;s not quite true. And the only thing worse than bad security is a false sense of security.&lt;/p&gt;



&lt;p&gt;You don&amp;#8217;t gain digital sovereignty just by choosing tech that processes and stores your data locally. You earn it through control — over access, usage, and the laws that ultimately apply to your data. The reality is very different from the marketing spin.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Sovereignty vs. sovereignty washing&lt;/h3&gt;



&lt;p&gt;Here are five clues to tell the difference:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If security updates and product development decisions happen overseas, then it’s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If those decisions are made within your region, under your legal and operational control, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If the software is closed source so you can&amp;#8217;t independently verify security claims, then it could be sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If the code is open to inspection and backed by independent audits, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If suppliers are subject to foreign laws such as the CLOUD Act, which allows US government surveillance even on servers physically in Europe, then it’s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If your data is governed solely by local laws with strong protections, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If geopolitical pressures could result in downtime or changes to pricing and policies, then it’s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If your operations aren’t exposed to external political pressure, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If European capital flows into the US, where it funds further innovation and job creation for Americans, then it&amp;#8217;s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If it strengthens your local economy and creates a cycle of reinvestment in your market, then it&amp;#8217;s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;In the worst case, US tech companies could abandon the idea of data boundaries altogether. In April 2026, Microsoft moved precisely in that direction when it &lt;a href=&quot;https://www.linkedin.com/posts/protonprivacy_33-gdpr-fine-loading-activity-7450534472200069121-AjFj&quot;&gt;announced &amp;#8220;flex routing&amp;#8221;&lt;/a&gt; would be turned on by default for European customers, enabling offshore data processing.&lt;/p&gt;



&lt;p&gt;If your data boundary can be punctured so easily, it&amp;#8217;s sovereignty washing.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Are there European alternatives?&lt;/h2&gt;



&lt;p&gt;Europe has just woken up to the problem of US tech dependence. But that&amp;#8217;s not because it&amp;#8217;s a new problem. American tech companies have dominated the global business market since the beginning of cloud computing. Until now that has left European industry at a disadvantage.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;But over the past 10 years, this has started to change, especially when it comes to enterprise software. &lt;/strong&gt;From &lt;a href=&quot;https://european-alternatives.eu/category/cloud-computing-platforms&quot;&gt;cloud computing&lt;/a&gt; to &lt;a href=&quot;https://proton.me/business/vpn&quot;&gt;network security&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;identity management&lt;/a&gt; to &lt;a href=&quot;https://proton.me/business/lumo&quot;&gt;AI chat assistants&lt;/a&gt;, European providers are reaching feature parity with global competitors.&lt;/p&gt;



&lt;p&gt;In some cases, these providers depend on US infrastructure, but not always. For example, Proton&amp;#8217;s Lumo AI runs open source models on European servers under European legal jurisdiction. That means your data stays under European control, not just physically, but legally and economically. Ironically, thanks to the GDPR and a privacy-first encryption architecture, Americans can gain more control and data privacy by outsourcing the tech stack to Europe.&lt;/p&gt;



&lt;p&gt;By choosing &lt;a href=&quot;https://proton.me/learn/european-alternatives&quot;&gt;European alternatives&lt;/a&gt; and promoting homegrown tech, you&amp;#8217;re investing in how much control your business has over its future. The next wave of entrepreneurs and developers might not flock to Silicon Valley and instead choose Paris, Munich, or Geneva. It becomes a virtuous cycle that stimulates European demand for its own products.&lt;/p&gt;



&lt;p&gt;That’s how this shift happens:&amp;nbsp;not through a top-down policy, but through a multitude of individual choices by businesses like yours.&lt;/p&gt;
</content:encoded><category>For business</category><author>Ben Wolford</author></item><item><title>Proton Drive’s strong start to 2026</title><link>https://proton.me/blog/drive-2026-q1-recap</link><guid isPermaLink="true">https://proton.me/blog/drive-2026-q1-recap</guid><description>From faster file transfers to smoother mobile photo browsing, here’s how strong Proton Drive started in 2026.</description><pubDate>Tue, 14 Apr 2026 09:51:29 GMT</pubDate><content:encoded>
&lt;p&gt;With the launch of &lt;a href=&quot;https://proton.me/blog/sheets-proton-drive&quot;&gt;Proton Sheets&lt;/a&gt; in late 2025 and, more recently, &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt;, Proton Drive took an important step toward becoming a more complete privacy-first workspace for the &lt;a href=&quot;https://proton.me/drive/file-sharing&quot;&gt;files&lt;/a&gt;, &lt;a href=&quot;https://proton.me/drive/photo-storage&quot;&gt;photos&lt;/a&gt;, &lt;a href=&quot;https://proton.me/drive/docs&quot;&gt;documents&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/drive/sheets&quot;&gt;spreadsheets&lt;/a&gt; people use every day.&lt;/p&gt;



&lt;p&gt;So far in 2026, we&amp;#8217;ve focused on making that experience faster, smoother, and more practical across file storage, sharing, and collaboration. Here&amp;#8217;s a look at the changes:&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A faster Drive through a stronger foundation&lt;/h2&gt;



&lt;p&gt;Some of the most meaningful improvements to Drive this year are about speed and reliability. Uploads and downloads are now noticeably faster, whether you&amp;#8217;re saving a file, browsing photos, downloading from a shared folder, or collaborating with others. Early this year, Proton Drive delivered &lt;strong&gt;up to 60% faster uploads on iOS, as well as up to 30% faster uploads and 70% faster downloads on web&lt;/strong&gt;. Shared workflows have improved too: &lt;strong&gt;Downloading shared files is now 70% faster, and uploading to a shared folder is 30% faster&lt;/strong&gt;, even for people without a Proton account.&lt;/p&gt;



&lt;p&gt;Behind these improvements is a stronger foundation: We’ve been rebuilding some of Drive’s most performance-intensive code into a &lt;a href=&quot;https://proton.me/blog/drive-sdk-january-2026&quot;&gt;shared SDK&lt;/a&gt; that powers core file operations across our apps. That means improvements can roll out more consistently across platforms, helping make Drive feel faster, smoother, and more dependable overall.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;More done, more easily on mobile&lt;/h2&gt;



&lt;p&gt;Some of the most meaningful user experience improvements are the ones that remove friction from everyday tasks, especially on mobile, wherever you are. We made a number of updates across the Drive mobile apps to help people get things done faster and with fewer steps:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;The photo gallery has improved on iOS and Android&lt;/strong&gt;, with quicker loading and smoother scrolling through your memories.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Saving files directly to Proton Drive is now possible on both Android and iOS&lt;/strong&gt;, making it easier to save something for later without first downloading it and uploading it again.&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;538&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117004 wp-image-117253&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;831 KB&quot; data-optsize=&quot;104 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.5&quot; data-version=&quot;1776121945&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Document scanning is now supported on both Android and iOS&lt;/strong&gt;, so you can easily save important scans like passports directly in Proton Drive for safekeeping.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;On Android, you can upload entire folders to Proton Drive&lt;/strong&gt;, making it much faster to move lots of files in one go. That&amp;#8217;s something even Google Drive doesn&amp;#8217;t offer.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;More powerful spreadsheets, still privacy-first&lt;/h2&gt;



&lt;p&gt;Spreadsheets often end up holding far more of our lives than we expect. In our &lt;a href=&quot;https://proton.me/blog/spreadsheet-survey&quot;&gt;survey&lt;/a&gt;, we found that over 70% of people use spreadsheets for budgeting and personal finance. But these files often outlive their original purpose: 67% of US respondents said they still have access to spreadsheets or shared documents they no longer need. Many are also unsure what happens to their data behind the scenes, from ad targeting and content scanning to AI training and data sharing.&lt;/p&gt;



&lt;p&gt;That is exactly why Proton Sheets matters, and why we have kept improving our end-to-end encrypted &lt;a href=&quot;https://proton.me/drive/sheets&quot;&gt;spreadsheet editor&lt;/a&gt;.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;2400&quot; height=&quot;1260&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_2400,h_1260,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117004 wp-image-117349&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;852 KB&quot; data-optsize=&quot;125 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.3&quot; data-version=&quot;1776334795&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 2400w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 2400px) 100vw, 2400px&quot; /&gt;&lt;figcaption class=&quot;wp-element-caption&quot;&gt;Image of people collaborating in a Proton Sheets encrypted spreadsheet&lt;/figcaption&gt;&lt;/figure&gt;



&lt;p&gt;Among the changes, we&amp;#8217;ve added and improved support for workflows people expect from modern spreadsheets, including:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Import, edit, and export spreadsheets as ODS (compatible with OpenOffice, LibreOffice, and others). Currently in &lt;a href=&quot;https://proton.me/support/web-beta&quot;&gt;beta&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;Hidden sheets&lt;/li&gt;



&lt;li&gt;New paste special options: formula only and link only&lt;/li&gt;



&lt;li&gt;Custom formulas in conditional formatting and data validation&lt;/li&gt;



&lt;li&gt;Support for the =SWITCH formula&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These updates help make Sheets more practical for everyday use while preserving what matters most: Your spreadsheet data remains protected by Proton’s privacy-first design.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Strong momentum for the rest of 2026&lt;/h2&gt;



&lt;p&gt;So far in 2026, our focus has been clear: making Proton Drive faster and more reliable across all platforms for the moments that matter every day. Many of these improvements came directly from listening to our community. We’re grateful for that feedback, and for the people who keep pushing us to make Proton Drive better.&lt;/p&gt;



&lt;p&gt;At the same time, we haven’t lost sight of our broader priorities for 2026, including the long-awaited Linux client. We’ll keep building on this foundation throughout the rest of the year.&lt;/p&gt;



&lt;p&gt;Thank you for supporting our mission to give people everywhere a secure, private way to store and share files without their data being exploited for profit. Tell us what you would like to see next on &lt;a href=&quot;https://protonmail.uservoice.com/forums/932839-proton-drive&quot;&gt;UserVoice&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Product updates</category><category>Proton Drive</category><author>Anant Vijay Singh</author></item><item><title>In rush for age checks, we’re putting kids’ security at risk</title><link>https://proton.me/blog/is-age-verification-safe</link><guid isPermaLink="true">https://proton.me/blog/is-age-verification-safe</guid><description>Is age verification safe? Learn how age checks can expose children to privacy risks, scams, and data breaches.</description><pubDate>Fri, 10 Apr 2026 19:30:52 GMT</pubDate><content:encoded>
&lt;p&gt;As governments across the world charge ahead with &lt;a href=&quot;https://proton.me/blog/age-verification&quot;&gt;age-verification laws&lt;/a&gt;, a well-intentioned rush to protect children is actually putting them at risk. &lt;/p&gt;



&lt;p&gt;The goal is to shield children from harmful materials, but these laws lack sufficient safeguards to protect privacy. All it takes is a single data breach, and a law intended to protect children could end up exposing their sensitive personal information to the world.&lt;/p&gt;



&lt;p&gt;To be sure, children deserve an internet that they can navigate safely. But explicit content and predatory social media are not the only dangers online. Privacy violations, especially for the young, can also do serious harm. Especially since, as the old warning goes, “The internet is forever.”&amp;nbsp;&lt;/p&gt;



&lt;p&gt;We should not accept simply trading one risk for another.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How the risks could affect kids&lt;/h2&gt;



&lt;p&gt;To verify their ages online, users are often asked to submit government IDs, credit card numbers, selfies, or unique biometric information. When breaches happen — and they do, with depressing regularity — that sensitive data is exposed.&lt;/p&gt;



&lt;p&gt;What’s more, many companies outsource their age-verification services to a handful of third-party vendors. Those suppliers, as storehouses of the data, become all-too-tempting targets for hackers and criminals. Without sufficient policies on data minimization, usage, storage, and privacy, user data remains deeply vulnerable.&lt;/p&gt;



&lt;p&gt;In September, &lt;a href=&quot;https://www.theguardian.com/games/2025/oct/07/discord-data-breach-proof-of-age-id-leaked&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;a cyberattack compromised a third-party vendor&lt;/a&gt; for Discord, a video game chat platform, granting the attacker access to at least &lt;a href=&quot;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;70,000 images of government-issued IDs&lt;/a&gt;, including passports and licenses.&lt;/p&gt;



&lt;p&gt;Discord had been collecting photos of IDs in compliance with the UK’s age-verification law, which took effect in July.&lt;/p&gt;



&lt;p&gt;Since the implementation of the law, the UK’s Office of Communications &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;reported&lt;/a&gt; that “many records were not consistent” with record-keeping and review guidance. Many companies also failed to show how they were taking responsibility for online safety risks.&lt;/p&gt;



&lt;p&gt;This breach highlights the real-life consequences of online attacks. As age-verification laws gain traction on a larger scale, an emphasis should be placed on privacy. Protecting sensitive personal information makes the internet a safer place for everyone, including children.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The need for balance&lt;/h2&gt;



&lt;p&gt;The rush to prioritize age checks for minors without prioritizing secure methods of verification create additional cybersecurity risks that can put children in harm’s way. As governments make premature decisions about these technologies, they are opening a Pandora&amp;#8217;s box for hackers and cybercriminals to mine at their leisure.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Moving forward, governments and legislatures must be thoughtful about the technologies they employ and the risks they come with. Policymakers should prioritize decentralized solutions that protect minors against the real threat of cyberattacks, without compromising users’ anonymity and right to privacy. &lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What are the alternatives to age verification?</title><link>https://proton.me/blog/age-verification-alternatives</link><guid isPermaLink="true">https://proton.me/blog/age-verification-alternatives</guid><description>Explore alternatives to online age verification, from parental controls to zero-knowledge proofs, and how they can protect children without exposing personal data.</description><pubDate>Fri, 10 Apr 2026 19:19:39 GMT</pubDate><content:encoded>
&lt;p&gt;With age-check systems, there isn’t a one-size-fits-all solution.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.cnil.fr/en/online-age-verification-balancing-privacy-and-protection-minors#:~:text=The%20CNIL%20has%20analysed%20several,satisfactorily%20meets%20these%20three%20requirements.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research suggests&lt;/a&gt; that no single method effectively protects children while also balancing concerns about privacy and access to information, but there is a way forward. Applying a broad array of common-sense measures, including parental controls and digital literacy education, can go a long way in helping guard children against potentially harmful content while remaining mindful of privacy rights and the nuanced ways young people use the internet.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Attribute-based verification&lt;/h2&gt;



&lt;p&gt;It’s not exactly an alternative to age verification, but proponents of attribute-based verification argue that it provides a more secure and private method of verifying a user’s age. That’s because it verifies only what’s necessary, such as requiring a self-declared age range rather than a government ID. But it has its limitations. Notably, any method that relies on self-declaration can be easily circumvented. It also fails to address the issue of &lt;a href=&quot;https://www.eff.org/pages/zero-knowledge-proofs-are-not-solution-age-gating-mandates&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;personal data privacy&lt;/a&gt;, as it does not prevent websites from collecting additional information, such as users’ IP addresses.&lt;/p&gt;



&lt;p&gt;Attribute-based age checks, however, store data on the user’s device. This limits the number of people with access to a user’s private data and reduces the cyberattack risks posed by other age-check methods.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Zero Knowledge Proofs&lt;/h2&gt;



&lt;p&gt;Like attribute-based verification, a zero knowledge proof (ZKP) provides a way for websites and apps to verify a user’s age without the user having to explicitly share personal data about their identity. But &lt;a href=&quot;https://www.circularise.com/blogs/zero-knowledge-proofs-explained-in-3-examples&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ZKP isn’t an alternative to age verification&lt;/a&gt;, rather, it’s a cryptographic tool that allows websites and apps to verify information about the user in question without gaining any additional information about the user. &lt;/p&gt;



&lt;p&gt;In 2025, &lt;a href=&quot;https://blog.google/products-and-platforms/platforms/google-pay/google-wallet-age-identity-verifications/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google announced ZKP integration&lt;/a&gt; within Google Wallet to provide age verification across multiple apps. The tech company said it would continue to use ZKP with existing partners, like Bumble, to verify users&amp;#8217; ages without revealing their identities. &lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age-Appropriate Design Code&lt;/h2&gt;



&lt;p&gt;The Electronic Privacy Information Center’s model bill for Age-Appropriate Design Code (AACD) was designed as an alternative to the rise in age verification legislation. &lt;a href=&quot;https://epic.org/epic-model-aadc/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;The AACD gives children agency over their online experiences&lt;/a&gt; while requiring tech companies to evaluate their programs for features that put children at risk for compulsive use. &lt;/p&gt;



&lt;p&gt;Additionally, the AACD would prohibit these companies from implementing programs with high-risk features, and would provide transparency into addictive design practices. &lt;/p&gt;



&lt;p&gt;Unlike age verification legislation, the AACD places responsibility on the manufacturers of these technological platforms, rather than the users they exploit, circumventing issues around privacy and personal security.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Device- and OS-level parental controls&lt;/h2&gt;



&lt;p&gt;Parents and children can work together on a solution that best meets their needs. Device- and OS-level parental controls offer a more personalized approach to gatekeeping what kids see online.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Parents can set up their children’s devices to restrict or limit certain content. OS-level controls can be set up to limit daily screen time, require approval to install apps, and use web content filters, but the internet’s ever-changing nature means web filters can’t always keep up.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Used in conjunction with other protective measures, however, these restrictions can act as guardrails that reduce children’s exposure to harmful content without universal age verification.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/#:~:text=Screen%20time%20is%20inversely%20correlated%20with%20parental%20controls.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research suggests&lt;/a&gt; children who report less screen time are also the most likely to have parental controls on their devices. Yet parental controls are underutilized, according to the nonprofit &lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Family Online Safety Institute&lt;/a&gt;. &lt;/p&gt;



&lt;p&gt;Use of parental controls varies widely across device types, and they are hardly a perfect solution. Children may have access to more than one device, making time limits and content filters harder to enforce.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Education and digital literacy&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Talking with kids about online safety can make parental controls more effective.&lt;/p&gt;



&lt;p&gt;In households that reported six or more conversations about online safety annually, both parents and children were more likely to say that parental controls effectively keep children safe online, &lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/#:~:text=research%20shows%20that%20open%20communication%20remains%20one%20of%20the%20most%20powerful%20tools%20parents%20have%20to%20support%20their%20children%E2%80%99s%20digital%20wellbeing.%E2%80%9D&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research found&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;And those offline lessons can be valuable tools in protecting children when they are online.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://iris.who.int/server/api/core/bitstreams/0ce56bbf-4535-405e-9bd6-e143f64ae2ba/content&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research&lt;/a&gt; from the World Health Organization suggests educational programs and cyberbullying prevention can work to reduce violence against children online. Programs that discuss online dangers and offline violence prevention, as well as healthy relationship skills, can help address children’s vulnerabilities to sexual abuse, harassment, and bullying, a &lt;a href=&quot;https://iris.who.int/server/api/core/bitstreams/0ce56bbf-4535-405e-9bd6-e143f64ae2ba/content&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;WHO study&lt;/a&gt; found.&lt;/p&gt;



&lt;p&gt;Parental guidance, support, and the ability to engage critically with online content all affect how a child might feel about what they see on the internet, &lt;a href=&quot;https://www.unicef.org/innocenti/media/7006/file/GKO-Summary-Report-2019.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research suggests&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The way forward&lt;/h2&gt;



&lt;p&gt;Protecting children doesn’t require turning the entire internet into an ID checkpoint. The widespread deployment of online age checks struggles to balance legitimate child protection concerns against users’ data privacy rights. Until that balance is struck, existing measures can help kids navigate the internet confidently without surrendering sensitive personal information at every turn.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item><item><title>What small businesses still get wrong about password managers</title><link>https://proton.me/business/blog/smb-cybersecurity-report-passwords</link><guid isPermaLink="true">https://proton.me/business/blog/smb-cybersecurity-report-passwords</guid><description>Over half of SMBs use a business password manager, but they&apos;re still not reaping the full benefits. Our research suggests solutions.</description><pubDate>Fri, 10 Apr 2026 10:57:18 GMT</pubDate><content:encoded>
&lt;p&gt;The way small and medium businesses work has changed for good — but so has the way they get attacked. Teams are distributed, SaaS tools handle everything from payroll to project management, and contractors and vendors rotate in and out of systems regularly. With each new tool or employee with access, the number of potential entry points increases.&lt;/p&gt;



&lt;p&gt;That expanding attack surface matters because credential-based attacks, including phishing, account takeovers, and password theft, have become one of the most common ways businesses get breached. They work precisely because &lt;strong&gt;access has sprawled, which makes it difficult to track&lt;/strong&gt;. All an attacker has to do now is find one valid set of credentials to bypass your business’s defenses.&lt;/p&gt;



&lt;p&gt;In this context, it &lt;em&gt;should&lt;/em&gt; be encouraging that over half of small businesses now use a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;. But Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Cybersecurity Report 2026&lt;/a&gt; — a global study of 3,000 SMB decision makers — found that one in four still experienced a breach last year.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;All this points to a gap between how tools are adopted and how they&amp;#8217;re actually used.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How SMBs use password managers today&lt;/h2&gt;



&lt;p&gt;Most password managers are designed to do one thing well: help you remember your password. In practice, that means creating complex and unique passwords and managing them in an encrypted vault. That&amp;#8217;s meaningfully better than the norm of reusing the same credentials across accounts and platforms.&lt;/p&gt;



&lt;p&gt;But with passwords being an attacker&amp;#8217;s easiest point of entry, SMBs need password managers to do much more than just solve memory and convenience problems. They need it to secure access.&lt;/p&gt;



&lt;p&gt;Access is a far broader question. &lt;strong&gt;Do the right people have the right credentials — and would you know what they unlock or if they fell into the wrong hands?&lt;/strong&gt; And as teams grow, subscriptions stack up, and contractors cycle in and out, your organization&amp;#8217;s considerations need to shift from merely strengthening passwords to accounting for real-world security threats.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s the change most businesses don&amp;#8217;t make until something goes wrong.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Where password manager implementations go wrong&lt;/h2&gt;



&lt;p&gt;The key insight of our report was that businesses adopting password managers don&amp;#8217;t consistently use them.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Unsafe credential sharing still persists at surprisingly high rates:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;33% share them in shared documents or spreadsheets&lt;/li&gt;



&lt;li&gt;30% share credentials via email&lt;/li&gt;



&lt;li&gt;27% share them via messaging apps&lt;/li&gt;



&lt;li&gt;25% write them down&lt;/li&gt;



&lt;li&gt;24% share them verbally&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;That&amp;#8217;s a picture of busy people taking the fastest route available at that moment. Instead of toggling over to the password manager app and sharing a new credential in its proper vault, they might paste it into Slack or an email.&lt;/p&gt;



&lt;p&gt;Workarounds feel harmless in isolation. But over time, credentials end up scattered across inboxes, chat histories, and shared documents in ways that are hard to untangle. When an employee leaves, you can&amp;#8217;t later revoke access. And updating passwords on a moment&amp;#8217;s notice after a data breach becomes impossible unless it&amp;#8217;s stored in a centralized secure location.&lt;/p&gt;



&lt;p&gt;Training to enforce security policies can help, but our research revealed even that isn&amp;#8217;t quite enough&amp;#8230;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why security awareness training isn’t enough&lt;/h2&gt;



&lt;p&gt;Our report found that 39% of SMBs have experienced a security incident caused by human error. That statistic is easy to misread; the natural response is to assume that more careful employees means fewer incidents.&lt;/p&gt;



&lt;p&gt;But this framing misses something important: &lt;strong&gt;Security systems that depend on perfect behavior under everyday pressure will always be let down by reality.&lt;/strong&gt; Mistakes happen not because people don&amp;#8217;t care — they happen because the secure option often demands more effort and time than the typical SMB can afford. Even well-intentioned teams will find workarounds when they&amp;#8217;re resource-stretched.&lt;/p&gt;



&lt;p&gt;The lasting fix isn&amp;#8217;t more training. &lt;strong&gt;It&amp;#8217;s designing systems where the secure option is also the easy one.&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;&lt;em&gt;When sharing access safely takes no more effort than dropping a password into a chat message, people will use it.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;When the access problem gets out of control&lt;/h2&gt;



&lt;p&gt;The credential problem compounds as teams grow.&lt;/p&gt;



&lt;p&gt;Eighty-six percent of SMBs now rely on cloud-based services for day-to-day operations. That typically means credentials sprawl across project management tools, finance platforms, marketing software, file storage, and customer systems, each with its own permissions and access history.&lt;/p&gt;



&lt;p&gt;Access doesn’t just scatter across systems; it spreads across the organization, flowing between teams, external partners, contractors, and former employees who may still retain a way in.&lt;/p&gt;



&lt;p&gt;This means that in reality, credentials accumulate, old access continues to linger, and the number of people who have — or have had — the keys to your most sensitive systems scales beyond easy tracking.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Having tools isn&amp;#8217;t the same as being protected&lt;/h2&gt;



&lt;p&gt;The SMBs that experienced breaches last year weren&amp;#8217;t cutting corners: 92% were actively investing in security tools. They had password managers, encrypted email, training programs, and written policies in place. In other words, their setups looked solid on paper.&lt;/p&gt;



&lt;p&gt;What many lacked was consistent enforcement. &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;Multi-factor authentication&lt;/a&gt; (MFA) was switched on but not required, password managers were deployed but not embedded into daily habits, and onboarding and offboarding processes were handled informally rather than systematically. &lt;strong&gt;We suspect, given the popularity of browser password managers, that many were not even using a centralized team platform at all — instead relying on a patchwork of less-safe options on an individual basis.&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;Each of these is a small gap that stays invisible right up until it isn&amp;#8217;t.&lt;/p&gt;



&lt;p&gt;The real measure of a security setup isn&amp;#8217;t what tools are on the list, but whether those tools hold up under the everyday pressure of how people actually work.&lt;/p&gt;



&lt;p&gt;Here are some practices to help bring this reality closer for your business:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Use a password manager built for teams. &lt;/strong&gt;&lt;a href=&quot;https://proton.me/blog/chrome-password-manager&quot;&gt;Browser password managers&lt;/a&gt; are not only less secure, they don&amp;#8217;t have the admin tools managers need to maintain full control of your accounts. Unless you have an &lt;a href=&quot;https://proton.me/business/pass/enterprise-password-manager&quot;&gt;enterprise password manager&lt;/a&gt; that&amp;#8217;s easy to use, it&amp;#8217;s not going to cut it.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Audit who currently has access to what. &lt;/strong&gt;Check the user lists on your most sensitive tools and if any names on there come as a surprise.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Replace shared logins with individual accounts.&lt;/strong&gt; While it&amp;#8217;s easy to share logins in a password manager, it&amp;#8217;s not a best practice: Shared logins reduce visibility at the account level, making it harder to identify and react to a breach.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make multi-factor authentication a requirement.&lt;/strong&gt; MFA is one of the most effective protections available — but only when it&amp;#8217;s enforced by default, not left as an optional setting.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make offboarding systematic.&lt;/strong&gt; Every departure, whether it’s an employee, contractor, or vendor, should trigger an access review immediately rather than as an afterthought.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Want to know what else you could learn from our survey of 3,000 business leaders across six key markets? Read more in our SMB Cybersecurity Report 2026. You&amp;#8217;ll learn what causes breaches and what they actually cost, where human error shows up most often, how cloud and AI adoption are creating new blind spots. It also includes practical steps for beefing up protection that hold up in real-world conditions.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Get the full report&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><author>Risa Tang</author></item><item><title>Proton Calendar now includes secure appointment scheduling</title><link>https://proton.me/business/blog/appointment-scheduling</link><guid isPermaLink="true">https://proton.me/business/blog/appointment-scheduling</guid><description>Share a public booking page where your colleagues, clients, or friends can schedule meetings based on your availability.</description><pubDate>Thu, 09 Apr 2026 11:53:31 GMT</pubDate><content:encoded>
&lt;p&gt;In the 12 years since Proton began, millions of people have joined our mission to make the internet safer and more private, including over 100,000 businesses and nonprofits. They rely on Proton&amp;#8217;s encrypted suite to protect their customers and teams, and we&amp;#8217;ve continued to add more services and plans to support them — most recently with the launch of &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Today we&amp;#8217;re excited to announce the next addition to Proton Workspace with our secure &lt;a href=&quot;https://proton.me/business/mail/appointment-scheduling&quot;&gt;appointment scheduling tool&lt;/a&gt; in Proton Calendar.&lt;/p&gt;



&lt;p&gt;Whether you work with teams, run a side hustle, or take appointments from customers, you can now easily create public booking pages that show when you&amp;#8217;re available, and your clients and colleagues can book an appointment in seconds. It automatically creates a new event on your calendar and generates a private &lt;a href=&quot;https://proton.me/business/meet&quot;&gt;Proton Meet&lt;/a&gt; link where you can have a secure video call. New events are zero-access encrypted, so all the details stay between you and your contact. Not even we have access.&lt;/p&gt;



&lt;p&gt;For people dependent on platforms like Calendly, this means you no longer have to pay an extra subscription or give away calendar data to third-party services where it can be leaked or spied on. It&amp;#8217;s a perfect tool if your business is based on appointments or if you want to save time finding an available slot to meet with colleagues or friends.&lt;/p&gt;



&lt;p&gt;And it&amp;#8217;s available in our new &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt; plan, which combines all our business productivity tools into a single plan for complete data protection.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/mail/pricing&quot;&gt;Try scheduling for teams&lt;/a&gt;&lt;/div&gt;



&lt;p class=&quot;has-text-align-center&quot;&gt;&lt;a href=&quot;https://proton.me/mail/pricing&quot;&gt;Explore plans for individuals&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Part of a seamless encrypted workspace&lt;/h2&gt;



&lt;p&gt;The new appointment scheduling tool is fully integrated with Proton Calendar and Proton Meet to protect your business data end to end.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s important because your team calendar contains a trove of information about you and your business activities: your location, your priorities, and your contacts. It&amp;#8217;s critical to keep that information protected from Big Tech platforms that could monetize or leak it, and from hackers who could use it against you for fraud or phishing attacks. Using a third-party booking platform spreads your information across the internet and increases your risk of a data breach, especially when those tools don&amp;#8217;t use strong encryption.&lt;/p&gt;



&lt;p&gt;Appointment scheduling bridges two fundamental business tools: Proton Calendar and the all-new Proton Meet for encrypted video calls. It&amp;#8217;s not enough for a business to be able to plan and host a secure video conference — they also need to be able to schedule it. Our appointment scheduling tool fills this gap.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How appointment scheduling works&lt;/h2&gt;



&lt;p&gt;Appointment scheduling is simple to set up, and it&amp;#8217;s available on all paid Proton Mail plans, Proton bundles, Meet Professional, and Proton Workspace. Teams with Workspace can create up to 25 booking pages to support multiple meeting purposes and durations.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;538&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA&quot; alt=&quot;Depiction of the user interface that shows the booking page and how it looks to schedule an appointment&quot; class=&quot;wp-post-116956 wp-image-117006&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;424 KB&quot; data-optsize=&quot;84 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.1&quot; data-version=&quot;1775743341&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;In your Proton Calendar, just add a new booking page, give it a name, and specify the times you&amp;#8217;re available. Your booking page will have a link that you can share publicly, such as on your website, email signature, or social media profile.&lt;/p&gt;



&lt;p&gt;Whenever someone books a meeting with you, the event will instantly sync directly to your calendar (so it&amp;#8217;s not possible to double book). And your contact will receive a confirmation email. If you&amp;#8217;ve selected Proton Meet as the location for the meeting, the confirmation will include a secure meeting link.&lt;/p&gt;



&lt;p&gt;The time, description, and participants on every event are &lt;a href=&quot;https://proton.me/security/zero-access-encryption&quot;&gt;zero-access encrypted&lt;/a&gt;, meaning it&amp;#8217;s locked with your private &lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;encryption key&lt;/a&gt; and can&amp;#8217;t be accessed by Proton or anyone else.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/support/calendar-appointment-scheduling&quot;&gt;&lt;em&gt;Learn more about how to use appointment scheduling&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Power your growth with Proton Calendar&lt;/h2&gt;



&lt;p&gt;With appointment scheduling, Proton Calendar becomes more than just a way to track your schedule — it&amp;#8217;s a way to grow your business or side project. If you&amp;#8217;re a professional service provider, letting clients book meetings is a core part of your business model. But even if your business doesn&amp;#8217;t run on external meetings, the appointment scheduling tool can help you save time or be more available to your team.&lt;/p&gt;



&lt;p&gt;Appointment scheduling is perfect for:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Privacy-first providers like therapists, health clinics, law firms, and financial advisers&lt;/li&gt;



&lt;li&gt;Managers or executives looking to save time when setting up meetings&lt;/li&gt;



&lt;li&gt;Tutors scheduling time with students or professors hosting office hours&lt;/li&gt;



&lt;li&gt;People who work for themselves, like content creators, indie hackers, or marketplace sellers &lt;/li&gt;



&lt;li&gt;Anyone with a side project&lt;/li&gt;



&lt;li&gt;And many more business professionals&amp;#8230;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Securing your meetings isn&amp;#8217;t just about protecting your own business, it&amp;#8217;s also about protecting the people you do business with. When it comes to fields like healthcare, data protection is even an ethical and legal obligation. Appointment scheduling in Proton Calendar helps you meet those obligations while signaling to your customers that your business takes security seriously.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business&quot;&gt;Explore Proton Workspace&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><category>Proton Calendar</category><author>Anant Vijay Singh</author></item><item><title>Age checks and child safety: Online age verification systems fail to protect
children </title><link>https://proton.me/blog/online-age-verification-child-safety</link><guid isPermaLink="true">https://proton.me/blog/online-age-verification-child-safety</guid><description>Do online age verification systems improve child safety? See how age restrictions and age checks fall short, and what that means for privacy and protection.</description><pubDate>Wed, 08 Apr 2026 21:03:03 GMT</pubDate><content:encoded>
&lt;p&gt;Online age checks are intended to keep violent, sexually explicit or other age-inappropriate content away from children. But do they?&lt;/p&gt;



&lt;p&gt;Under-age social media users are often able to circumvent age restrictions, especially at the account-creation stage, &lt;a href=&quot;https://www.scitepress.org/Papers/2025/132483/132483.pdf&quot;&gt;research shows&lt;/a&gt;. In other cases, age checks have blocked children from accessing content that was later determined to pose no risk.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;When faced with obvious harms, the desire to “do something” is understandable. But we need a higher standard. When it comes to children, we need to do something &lt;em&gt;that works&lt;/em&gt;. And age verification as it is currently practiced often falls short of that basic goal.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age checks are rooted in real concerns&lt;/h2&gt;



&lt;p&gt;Most parents of adolescents in the United States worry about social media’s effects on mental health, among other issues, according to the US &lt;a href=&quot;https://www.hhs.gov/sites/default/files/sg-youth-mental-health-social-media-advisory.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;surgeon general&lt;/a&gt;. At the same time, parents are concerned about the scope of age checks. In a &lt;a href=&quot;https://cdt.org/wp-content/uploads/2025/08/2025-08-22-CDT-Research-Brief-on-Age-Verification-1.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;study&lt;/a&gt; by the nonpartisan Center for Democracy &amp;amp; Technology, parents and teenagers voiced concerns about the checks’ effectiveness, data privacy, and user agency. &lt;/p&gt;



&lt;p&gt;At their core, age-verification systems aim to prevent young people from accessing harmful or adult-geared content, but many critics have warned that even well-intentioned policies could create risks to free speech and data privacy for all internet users, not just children.&lt;/p&gt;



&lt;p&gt;What’s considered harmful depends on whom you ask. Industry regulations, state laws, and national policies can all dictate which content is deemed harmful to young people, but some language is more vague than others.&lt;/p&gt;



&lt;p&gt;The United Kingdom’s Online Safety Act, for example, lays out categories of content that children must be shielded from online. They include: &lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Pornography&lt;/li&gt;



&lt;li&gt;Content that encourages, promotes, or provides instructions for:
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Self-harm,&lt;/li&gt;



&lt;li&gt;Eating disorders, or&lt;/li&gt;



&lt;li&gt;Suicide&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;Bullying&lt;/li&gt;



&lt;li&gt;Abusive or hateful content&lt;/li&gt;



&lt;li&gt;Content which depicts or encourages serious violence or injury&lt;/li&gt;



&lt;li&gt;Content which encourages dangerous stunts and challenges&lt;/li&gt;



&lt;li&gt;Content which encourages the ingestion, inhalation or exposure to harmful substances&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In Australia, the move to ban social media accounts belonging to people younger than 16 more broadly cites concerns about screen time and mental health.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Whether these measures effectively shield young people from harm is debated.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Content restrictions don’t always get it right&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Some researchers have warned that age checks could impede access to medically accurate sexual information and other educational content.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;After the U.K. Online Safety Act took effect, &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;the government noted&lt;/a&gt; “instances of over-moderation” in which children were blocked from viewing content that didn’t pose a risk. &lt;/p&gt;



&lt;p&gt;Even with age-check systems in place, ​​potentially harmful and age-inappropriate content remains accessible to kids. In some cases, childhood deaths have been linked to suicide- and self-harm-related content and risk-taking social media challenges, according to the surgeon general’s advisory.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The same advisory, however, noted that social media can be a source of positive community, connection, self-expression, and important information.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Age-gating access to those corners of the internet stands to disproportionately affect young people who rely on online communities for support and information.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Measures put in place to label content and guard children from age-inappropriate material have also been flawed.&lt;/p&gt;



&lt;p&gt;In September, &lt;a href=&quot;https://proton.me/blog/disney-coppa-fine&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Disney agreed to pay $10 million to settle allegations&lt;/a&gt; by the Federal Trade Commission, which accused the company of failing to label its children’s videos on YouTube as “Made for Kids.” &lt;/p&gt;



&lt;p&gt;Failing to correctly label the videos meant Disney collected children’s personal information when they watched the unlabeled content and autoplayed “Not Made for Kids” videos when they finished. Children also became targets of online advertisements geared toward older viewers.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Disney didn’t admit any wrongdoing as part of the settlement.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Are age verification systems effective? More research is needed&lt;/h2&gt;



&lt;p&gt;The effectiveness of age checks remains to be seen.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;In the weeks after Australia’s policy took effect, social media companies &lt;a href=&quot;https://www.pbs.org/newshour/world/social-media-platforms-removed-4-7-million-accounts-after-australia-banned-them-for-children-younger-than-16&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;revoked access to about 4.7 million accounts&lt;/a&gt; belonging to children. &lt;/p&gt;



&lt;p&gt;Findings from a &lt;a href=&quot;https://pmc.ncbi.nlm.nih.gov/articles/PMC11429505/#sec7-children-11-01068:~:text=However%2C%20with%20regards%20to%20the%20deployment%20of%20these%20new%2Dage%20verification%20controls%2C%20there%20remains%20a%20question%20on%20how%20effective%20the%20legislation%20will%20be%20when%20responsibility%20for%20how%20to%20satisfy%20legislation%20is%20assigned%20without%20the%20adequate%20guidance%20and%20support.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;2024 study&lt;/a&gt; suggest that the widespread global deployment of age verification has resulted in privacy-invasive or ineffective methods. &lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research&lt;/a&gt; from the U.K.’s independent online safety regulator, the Office of Communications, pointed to some measurable changes in internet behavior, but it’s still too soon to evaluate effectiveness. &lt;/p&gt;



&lt;p&gt;The number of visitors to pornography sites in the U.K. declined by one-third since the Online Safety Act took effect in July, the office noted in a December &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;online safety report&lt;/a&gt;. The office is assessing how much the decline may have reduced children’s exposure to pornography. &lt;/p&gt;



&lt;p&gt;“While it is too soon to assess the long-term impact of these changes, the widespread adoption of age checks means that children of all ages are now less likely to encounter pornography accidentally, which research has shown to be the way most children encounter porn,” the report said.&lt;/p&gt;



&lt;p&gt;The office is expected to publish its initial data and analysis on children’s online experiences by May.&amp;nbsp;&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What happens after age-verification laws take effect</title><link>https://proton.me/blog/age-verification-laws-chilling-effect</link><guid isPermaLink="true">https://proton.me/blog/age-verification-laws-chilling-effect</guid><description>Age verification laws are reshaping the internet. See how ID checks, age filters, and platform rules create chilling effects on speech, access, and privacy.</description><pubDate>Wed, 08 Apr 2026 16:42:31 GMT</pubDate><content:encoded>
&lt;p&gt;Governments around the world are adopting laws intended to protect young people online. Age verification has emerged as a shared policy response, but in practice it produces &lt;a href=&quot;https://www.oecd.org/content/dam/oecd/en/publications/reports/2025/06/the-legal-and-policy-landscape-of-age-assurance-online-for-child-safety-and-well-being_cdf49a15/4a1878aa-en.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;very different internets&lt;/a&gt; shaped by unique legal, technical, and social conditions.&lt;/p&gt;



&lt;p&gt;These case studies show what happens after age-verification laws take effect, focusing on three distinct models: decentralized legal experimentation, direct regulatory enforcement, and platform duty-of-care obligations. Together, they demonstrate how a single policy idea evolves when it moves into the real world.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;United States&lt;/h2&gt;



&lt;p&gt;The US exemplifies how age verification can spread without a national law. State legislation, court challenges, and platform responses have collectively reshaped online access, creating diverse outcomes across the country.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was proposed&lt;/h3&gt;



&lt;p&gt;Federal lawmakers tried long ago to age-gate adult content on the internet. The Child Online Protection Act, passed by Congress in 1998, required commercial websites hosting material deemed harmful to minors to restrict access, often through age-verification mechanisms. Courts blocked the law repeatedly on First Amendment grounds, and it was ultimately struck down after years of litigation. The rulings reinforced protections for lawful online speech, including concerns about overbroad restrictions and the impact on anonymous access, shaping how later policymakers approached age-verification proposals.&lt;/p&gt;



&lt;p&gt;Beginning in 2022, states began introducing legislation requiring adult-content sites to verify age, with early efforts in &lt;a href=&quot;https://www.legis.la.gov/Legis/ViewDocument.aspx?d=1287238&amp;amp;&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Louisiana&lt;/a&gt; and &lt;a href=&quot;https://le.utah.gov/~2023/bills/static/SB0287.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Utah&lt;/a&gt; helping establish a template that other jurisdictions soon followed. Lawmakers framed these measures as &lt;a href=&quot;https://www.congress.gov/crs-product/R47884&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;child-protection policies&lt;/a&gt; inspired by international proposals.&lt;/p&gt;



&lt;p&gt;In lieu of a centralized system, these laws typically made platforms responsible for preventing underage access. Sites could face civil penalties—including fines, private lawsuits, or court-ordered restrictions—if minors accessed restricted content without “reasonable” safeguards in place.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was implemented&lt;/h3&gt;



&lt;p&gt;States &lt;a href=&quot;https://apnews.com/article/porn-age-verification-utah-8f8f4960ad1ec4afc5d59fd7d34c3b9d&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;rolled out age-verification requirements&lt;/a&gt; aimed primarily at porn sites and other explicit content.&lt;/p&gt;



&lt;p&gt;Texas quickly became the bellwether legal test case. Challenges to &lt;a href=&quot;https://capitol.texas.gov/tlodocs/88R/billtext/html/HB01181H.htm&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Texas HB 1181&lt;/a&gt; moved through federal courts and ultimately reached the US Supreme Court, where justices &lt;a href=&quot;https://www.scotusblog.com/2025/06/court-allows-texas-law-on-age-verification-for-pornography-sites/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;allowed the law to take effect&lt;/a&gt; in the midst of legal challenges. The decision signaled that state-level mandates could proceed without definitive resolution.&lt;/p&gt;



&lt;p&gt;That opened the door for other states to advance similar laws alongside &lt;a href=&quot;https://apnews.com/article/porn-age-verification-utah-lawsuit-db5649d2030cb75d652cd55c51513d38&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ongoing litigation&lt;/a&gt;. Because each state set different standards and timelines—and because legal language left a lot of room for interpretation—there was no uniform technical solution, leaving platforms to navigate a rapidly expanding patchwork of regulatory demands.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What changed&lt;/h3&gt;



&lt;p&gt;Rather than uniformly changing how age is treated and proven online, policy pressure changed the internet itself.&lt;/p&gt;



&lt;p&gt;Compliance became a risk calculation for platforms, as they weighed verification costs, liability, and privacy issues. Some—ranging from &lt;a href=&quot;https://www.pcmag.com/news/pornhub-blocked-23-us-states-france-uk-how-to-watch-anyway-free-vpn&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;adult-content sites&lt;/a&gt; to &lt;a href=&quot;https://www.wired.com/story/bluesky-goes-dark-in-mississippi-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;social media&lt;/a&gt;—chose to restrict or withdraw services in affected states. Access began to depend on geographic location, producing a fragmented online experience.&lt;/p&gt;



&lt;p&gt;Proposals and laws have increasingly targeted &lt;a href=&quot;https://utahnewsdispatch.com/2026/02/05/tech-companies-lawsuit-utah-age-verification-law-for-app-stores/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;app stores&lt;/a&gt; and other digital intermediaries, shifting responsibility from individual sites to infrastructure providers. This lets policymakers gauge whether age gating can work at the ecosystem level.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public reaction&lt;/h3&gt;



&lt;p&gt;Americans are sharply divided. Supporters argue that state laws finally imposed accountability on large platforms after years of failed federal legislation, reflecting a &lt;a href=&quot;https://www.politico.com/news/2026/02/21/online-age-newsom-social-media-00791870&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;growing view&lt;/a&gt; among policymakers that voluntary safeguards are not enough to protect minors online. Critics, including &lt;a href=&quot;https://www.aclupa.org/app/uploads/2024/04/aclu_national_age_verification_and_restricting_online_content_2023-12-07.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;civil-liberties organizations&lt;/a&gt; and &lt;a href=&quot;https://www.eff.org/issues/age-verification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;digital-rights advocates&lt;/a&gt;, warn that mandatory age verification chills lawful speech and weakens protections for anonymous expression.&lt;/p&gt;



&lt;p&gt;Litigation is the central arena for resolving these tensions, and state attorneys general are the front-line enforcers. As challenges move through the courts, judges continue to grapple with whether mandates constitute permissible regulation or unconstitutional restriction.&lt;/p&gt;



&lt;p&gt;As a result, America&amp;#8217;s internet is an experiment moving further from legal clarity, even as age verification spreads.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification in the US – litigation model&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;States enact age-verification laws&lt;/li&gt;



&lt;li&gt;Courts determine what survives legal challenge&lt;/li&gt;



&lt;li&gt;Platforms adapt to evolving rulings&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; Legal viability&lt;br&gt;&lt;strong&gt;Outcome:&lt;/strong&gt; Policy is shaped by litigation outcomes&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;United Kingdom&lt;/h2&gt;



&lt;p&gt;After decades of global debate over online safety for minors, the UK became the first country to enforce modern age assurance on a national scale.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was proposed&lt;/h3&gt;



&lt;p&gt;Early UK media regulation, particularly the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2003/21/contents&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Communications Act 2003&lt;/a&gt;, established content protections for minors in broadcast and on-demand services, but it didn&amp;#8217;t address open internet access to pornography.&lt;/p&gt;



&lt;p&gt;Under the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2017/30/contents&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Digital Economy Act 2017&lt;/a&gt;, the original plan was to mandate age checks for access to adult content, requiring age-verification technology specifically. That plan was repeatedly delayed and finally &lt;a href=&quot;https://arstechnica.com/tech-policy/2019/10/uk-government-abandons-planned-porn-age-verification-scheme/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;abandoned in 2019&lt;/a&gt; amid privacy concerns and the practical challenges of enforcing rules against services operating outside the UK.&lt;/p&gt;



&lt;p&gt;Instead of prescribing how content is gated, the &lt;a href=&quot;https://www.legislation.gov.uk/ukpga/2023/50&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Online Safety Act 2023&lt;/a&gt; regulates outcomes, requiring services to deploy “highly effective” age-assurance measures and demonstrate how effectively they protect minors.&lt;/p&gt;



&lt;p&gt;This created a broader safety framework, enforcing platform responsibility through performance standards that extend beyond sites offering adult content.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was implemented&lt;/h3&gt;



&lt;p&gt;Implementation fell to UK communications regulator Ofcom. It &lt;a href=&quot;https://www.ofcom.org.uk/online-safety/illegal-and-harmful-content/online-safety-regulatory-documents&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;outlined expectations&lt;/a&gt; for platforms, requiring age-assurance systems capable of reliably distinguishing adults from minors, with enforcement backed by investigation and financial penalties.&lt;/p&gt;



&lt;p&gt;Ofcom didn’t specify a method. Companies could use identity-document checks, biometric estimation, third-party verification vendors, or alternative approaches—provided they met Ofcom&amp;#8217;s effectiveness thresholds. This flexibility led to a rapid, albeit uneven, rollout of age verification.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What changed&lt;/h3&gt;



&lt;p&gt;The UK&amp;#8217;s internet transitioned from an open-access model moderated after the fact to one requiring proof of eligibility to enter certain spaces.&lt;/p&gt;



&lt;p&gt;When &lt;a href=&quot;https://www.theguardian.com/technology/2025/jul/24/what-are-the-new-uk-online-safety-rules-and-how-will-they-be-enforced&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;enforcement&lt;/a&gt; timelines arrived in 2025, major platforms began modifying access flows, and users began encountering checkpoints where none had existed before. These age checks were embedded in account creation, browsing activity, and content discovery, and that affected anonymity, friction, and participation online.&lt;/p&gt;



&lt;p&gt;For platforms, age assurance became a continuous compliance obligation subject to interpretation, audit, and penalty; and it proved hard to define. Ofcom opened &lt;a href=&quot;https://www.reuters.com/world/uk/uk-probes-34-porn-sites-under-new-age-check-rules-2025-07-31/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;investigations into dozens of porn sites&lt;/a&gt; and issued penalties against operators whose age-assurance measures didn&amp;#8217;t meet the standard. In this way, acceptable gates evolved through strict enforcement actions.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public reaction&lt;/h3&gt;



&lt;p&gt;Public response has been mixed as to whether the system represents overdue protection or&lt;a href=&quot;https://www.theguardian.com/commentisfree/2025/aug/09/uk-online-safety-act-internet-censorship-world-following-suit&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt; risky overreach&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Among the &lt;a href=&quot;https://www.eff.org/pages/uk-online-safety-bill-massive-threat-online-privacy-security-and-speech&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;concerns raised by privacy advocates&lt;/a&gt; are assertions that mandatory age-assurance normalizes identity checks for lawful activity, expands collection of sensitive data, and threatens anonymity for users who rely on it for freedom to explore and express themselves.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.wired.com/story/vpn-use-spike-age-verification-laws-uk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Spikes in VPN use&lt;/a&gt; have been reported, suggesting that some UK users prefer workarounds to participation in verification systems. Others question the effectiveness of age gates, including some young users who&amp;#8217;ve argued that they limit access without resolving &lt;a href=&quot;https://www.lbc.co.uk/article/im-a-teenager-online-safety-act-government-5HjdChs_2/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;underlying harms&lt;/a&gt;. Still others say critics should give these protections &lt;a href=&quot;https://blogs.lse.ac.uk/politicsandpolicy/criticism-of-the-online-safety-act-is-premature/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;time to prove out&lt;/a&gt;, framing the law as a necessary adaptation to a changed digital environment.&lt;/p&gt;



&lt;p&gt;The UK&amp;#8217;s experience shows how age-verification policy alters the internet through cumulative shifts in access, accountability, and user behavior—changes that remain &lt;a href=&quot;https://hansard.parliament.uk/commons/2025-12-15/debates/DA0F7CFE-CCED-4864-BCCF-160E0AF56F92/OnlineSafetyAct2023Repeal&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;contested&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification in the UK – enforcement model&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Parliament sets safety outcomes&lt;/li&gt;



&lt;li&gt;Regulator enforces platform compliance&lt;/li&gt;



&lt;li&gt;Age verification operates as an access gate&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; Access control&lt;br&gt;&lt;strong&gt;Outcome:&lt;/strong&gt; Users must demonstrate eligibility to enter restricted spaces&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Australia&lt;/h2&gt;



&lt;p&gt;Australia has drawn international attention for its &lt;a href=&quot;https://www.esafety.gov.au/research/youth-engagement-and-online-safety&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;online youth-safety agenda&lt;/a&gt;, where age checks emerge from platform duty-of-care obligations instead of a standalone age-verification law.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was proposed&lt;/h3&gt;



&lt;p&gt;Australia’s &lt;a href=&quot;https://www.aph.gov.au/Parliamentary_Business/Bills_LEGislation/Bills_Search_Results/Result?bId=r6680&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Online Safety Act 2021&lt;/a&gt; built on earlier regulatory frameworks (&lt;a href=&quot;https://www.legislation.gov.au/C2004A04401/2020-12-18/text&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;1992&lt;/a&gt;, &lt;a href=&quot;https://www.legislation.gov.au/C2015A00024/latest/versions&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;2015&lt;/a&gt;, and &lt;a href=&quot;https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=s1113&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;2018&lt;/a&gt;) that relied largely on complaint-based takedowns of harmful content. Policymakers concluded that reactive removals were insufficient and shifted toward requiring large platforms to &lt;a href=&quot;https://www.infrastructure.gov.au/media-technology-communications/internet/online-safety/current-legislation&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;reduce risks up front&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;The Act significantly expanded the authority of the &lt;a href=&quot;https://www.infrastructure.gov.au/media-technology-communications/internet/online-safety/esafety-commissioner&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;e Safety Commissioner&lt;/a&gt;, turning the regulator from a complaint handler into a proactive supervisor of online safety. Rather than prescribing specific verification methods, the law made platforms responsible for preventing foreseeable harms to minors.&lt;/p&gt;



&lt;p&gt;This shift laid the groundwork for age assurance by binding platform compliance to the ability to distinguish between adult and underage users.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What was implemented&lt;/h3&gt;



&lt;p&gt;Implementation centered on &lt;a href=&quot;https://www.esafety.gov.au/industry/regulatory-guidance&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;regulatory guidance&lt;/a&gt; and &lt;a href=&quot;https://www.esafety.gov.au/sites/default/files/2024-10/Compliance-and-Enforcement-Policy-Oct2024.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;enforcement powers&lt;/a&gt; exercised by the eSafety Commissioner. Platforms were required to show how their services reduced risks to underage users, guided by regulator-approved safety standards and ongoing oversight.&lt;/p&gt;



&lt;p&gt;In practice, this meant strengthening moderation systems, activating parental controls, restricting features for younger users and developing mechanisms capable of identifying them. So platforms deployed age-assurance measures such as age estimation, behavioral-detection systems, and layered verification approaches combining multiple signals to assess a user’s age, often trialed through government-supported &lt;a href=&quot;https://ageassurance.com.au/wp-content/uploads/2025/08/AATT_Part_D_DIGITAL.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;technology testing programs&lt;/a&gt;. Age assurance therefore functioned less as a single checkpoint and more as an ongoing compliance capability embedded in everyday service operation.&lt;/p&gt;



&lt;p&gt;In December 2025, Australia extended this duty-of-care strategy through a &lt;a href=&quot;https://www.reuters.com/legal/litigation/australia-social-media-ban-takes-effect-world-first-2025-12-09/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;world-first social media ban&lt;/a&gt; for users under 16, explicitly conditioning access to major platforms on the ability to determine a user’s age.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What changed&lt;/h3&gt;



&lt;p&gt;For platforms, safety obligations became continuous and adaptive. Meeting regulatory expectations increasingly required systems capable of reliably distinguishing minors from adults, turning age assurance from an optional safeguard into a prerequisite for enforcing youth-access restrictions.&lt;/p&gt;



&lt;p&gt;For users, changes ranged from stricter defaults and safety features to &lt;a href=&quot;https://www.reuters.com/world/asia-pacific/australia-social-media-ban-hits-47-million-teen-accounts-first-month-2026-01-15/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;large-scale deactivation of accounts&lt;/a&gt; identified as belonging to underage users.&lt;/p&gt;



&lt;p&gt;The result was deeper regulatory influence without universal identity-based age verification, reflecting a &lt;a href=&quot;https://www.esafety.gov.au/research&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research-driven model&lt;/a&gt; that evaluates safety outcomes and emerging age-assurance tools instead of defaulting to biometric or document-based checks.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Public reaction&lt;/h3&gt;



&lt;p&gt;Australia’s approach has generated praise and concern, both inside and outside the country.&lt;/p&gt;



&lt;p&gt;Proponents argue that &lt;a href=&quot;https://www.unsw.edu.au/newsroom/news/2025/04/australians-want-action-to-protect-children-online-new-poll&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;platform design shapes online risk&lt;/a&gt; more than individual behavior alone, and that regulating platforms offers governments a more practical point of intervention. Critics believe that expanding safety mandates fails to adequately protect children and offers a &lt;a href=&quot;https://efa.org.au/efa-joins-opposition-to-australias-porn-passport/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;quick fix&lt;/a&gt; to complex social and political problems.&lt;/p&gt;



&lt;p&gt;As debate intensifies over whether enforcement will ultimately require more invasive age checks, this case shows that when governments regulate platform responsibility first, age verification can be a practical consequence.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification in Australia – governance model&lt;/h3&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Platforms continuously manage risks to minors&lt;/li&gt;



&lt;li&gt;Regulator supervises platform safety systems&lt;/li&gt;



&lt;li&gt;Age verification operates as one of many embedded compliance tools&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;&lt;strong&gt;Focus:&lt;/strong&gt; System design and ongoing oversight&lt;br&gt;&lt;strong&gt;Outcome:&lt;/strong&gt; Platforms must demonstrate their environments are safe for minors&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What age verification actually means (and why the term is misleading)</title><link>https://proton.me/blog/age-verification</link><guid isPermaLink="true">https://proton.me/blog/age-verification</guid><description>What is age verification? Learn how age verification systems, software, and age checks work, including age estimation, age filters, and privacy risks.</description><pubDate>Wed, 08 Apr 2026 16:05:22 GMT</pubDate><content:encoded>
&lt;p&gt;The days of the checkbox honor system are ending as efforts to age-gate the internet spread worldwide. The goal of protecting children is widely embraced: Age should be checked for access to certain content or sometimes &lt;a href=&quot;https://proton.me/blog/australia-social-media-ban-privacy&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;entire platforms&lt;/a&gt;, as young people are exposed to legitimate risks when left to explore and engage without guardrails.        &lt;/p&gt;



&lt;p&gt;But the methods of checking age—both the existing ways and those forming under intense regulatory pressure—&lt;a href=&quot;https://cetas.turing.ac.uk/publications/age-assurance-technologies-and-online-safety&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;vary significantly&lt;/a&gt; in effectiveness and intrusiveness. From one approach to the next, there are stark differences in how much data is collected and who controls it. Regardless of the method, the most consequential moment is the point where age is actually checked. The mechanics of that interaction, and how its outcomes are handled, drive real-world implications for &lt;a href=&quot;https://www.techpolicy.press/when-age-gating-puts-user-privacy-at-risk/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;privacy&lt;/a&gt;, &lt;a href=&quot;https://iacis.org/iis/2025/4_iis_2025_332-347.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;security&lt;/a&gt;, and &lt;a href=&quot;https://archive.org/details/effecting-change-the-human-cost-of-online-age-verification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;free expression&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Yet the distinctions are often blurred, stemming from the &lt;a href=&quot;https://www.eff.org/deeplinks/2025/10/age-verification-estimation-assurance-oh-my-guide-terminology&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;terminology&lt;/a&gt; around age checks. Age gating, age assurance, age estimation, and age verification can get collapsed into a single idea. Understanding why that matters starts with breaking down the language.   &lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Standards versus methods&lt;/h2&gt;



&lt;p&gt;&lt;strong&gt;Age gating&lt;/strong&gt; and &lt;strong&gt;age assurance&lt;/strong&gt; are standards—&lt;strong&gt;policy goals that describe intent and confidence&lt;/strong&gt;, not mechanism. Age gating tells you that an age-based restriction exists. Age assurance signals that some effort is being made to enforce that restriction. These terms don’t specify how, or how effectively, age is determined.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Age estimation&lt;/strong&gt; and &lt;strong&gt;age verification&lt;/strong&gt; are methods — &lt;strong&gt;technical categories for how age is checked&lt;/strong&gt;. And the contrast is central to the debate over how age checks should happen online.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age estimation versus age verification&lt;/h2&gt;



&lt;p&gt;As lawmakers, courts, tech companies, and advocacy groups address both the &lt;a href=&quot;https://builtin.com/articles/age-verification-laws-us-internet-debate&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;complexities and conflicts&lt;/a&gt; of age gating, the terms “age estimation” and “age verification” are sometimes treated as interchangeable. That shorthand obscures meaningful differences in accuracy, accountability, and data exposure.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age estimation &lt;/h3&gt;



&lt;p&gt;Age estimation, also known as age assurance, is exactly what it sounds like—an inference, not a confirmation. These systems draw on data already available within a platform, such as profile photos, videos, audio, declared information (like a birth date), and account metadata (like how long an account has existed). Using biometric techniques like voice or &lt;a href=&quot;https://www.eff.org/deeplinks/2025/01/face-scans-estimate-our-age-creepy-af-and-harmful&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;facial analysis&lt;/a&gt;, combined with account history and behavioral patterns, the system generates a &lt;strong&gt;probability that someone falls within a given age range&lt;/strong&gt;. &lt;/p&gt;



&lt;p&gt;Because this doesn’t require identity documents, age estimation is often framed as “privacy-preserving.” But data exposure depends on the individual system: Is age estimated once or continually? What signals are used? &lt;a href=&quot;https://www.eff.org/deeplinks/2024/06/hack-age-verification-company-shows-privacy-danger-social-media-laws&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;How secure is the system itself&lt;/a&gt;? And if age is misread, what happens?&lt;/p&gt;



&lt;p&gt;Inference-based systems are inexact and can be fooled, such that a user’s age may be misclassified in either direction, with access allowed or denied where it shouldn’t be. On the gaming platform Roblox, which rolled out mandatory age checks for access to certain features, young users &lt;a href=&quot;https://regulaforensics.com/blog/roblox-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;tricked the system&lt;/a&gt; with fake mustaches and other disguises, underscoring the risk of relying on inference alone.&lt;/p&gt;



&lt;p&gt;Other concerns have been raised about &lt;a href=&quot;https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8525.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;accuracy and bias&lt;/a&gt;, as results depend heavily on image quality, vary from algorithm to algorithm, and are affected by unique intersections of personal attributes, with disproportionate misreads on &lt;a href=&quot;https://www.preprints.org/manuscript/202403.1497/v1&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;under-represented groups&lt;/a&gt;. Data from Australia&amp;#8217;s age-assurance technology trial—tied to a nationwide ban on social media for teenagers—showed that age estimation produced higher error rates for people with darker skin tones and for some demographic groups, including those from Indigenous and Southeast Asian backgrounds.&lt;/p&gt;



&lt;p&gt;If eligible users are denied, &lt;a href=&quot;https://www.pcmag.com/explainers/give-us-your-face-or-lose-your-account-ai-age-verification-is-here-and?test_uuid=04IpBmWGZleS0I0J3epvMrC&amp;amp;test_variant=B&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;recourse is limited&lt;/a&gt;. They generally aren’t told why, and the default solution is to upload identity documents—the exact thing age estimation is &lt;a href=&quot;https://cdt.org/insights/age-estimation-requires-verification-for-many-users/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;meant to avoid&lt;/a&gt;.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age verification &lt;/h3&gt;



&lt;p&gt;Age verification aims to confirm age as a fact, using &lt;strong&gt;proof from a trusted source&lt;/strong&gt;. Today, that usually means a government-issued ID like a driver’s license or passport, either uploaded directly to a platform or filtered through a third-party service that verifies age and sends back a yes-or-no result.&lt;/p&gt;



&lt;p&gt;The &lt;a href=&quot;https://proton.me/blog/discord-age-verfication-breach&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;risk of document uploads&lt;/a&gt; is intuitive: Scans can be stolen or misused, particularly as age checks spread across more services. What’s easier to miss is that even when documents are deleted from a platform, the outcome of the age check often persists—stored alongside an account or session and linking back to an identifiable user.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Identity-linked systems versus anonymous or token-based claims&lt;/h2&gt;



&lt;p&gt;Age-verification systems fall into two categories: those that bind age checks to identity and those that try not to.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Identity-linked systems&lt;/h3&gt;



&lt;p&gt;Identity-linked systems are the dominant model today, employing &lt;strong&gt;the familiar ID upload flow&lt;/strong&gt;. Platforms may not retain copies of documents, but the verification outcome is almost always stored, linking lawful content access to a real person who may not want that association recorded.&lt;/p&gt;



&lt;p&gt;Adult-content sites illustrate the conflict. In &lt;a href=&quot;https://action.freespeechcoalition.com/age-verification-resources/state-avs-laws/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;states where age-verification laws have been enacted&lt;/a&gt;, compliance has largely meant identity-linked checks, requiring users to upload IDs through third-party vendors. As a result, industry giant Pornhub &lt;a href=&quot;https://www.pornhub.com/blog/age-verification-in-the-news&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;pulled out of 23 states&lt;/a&gt;, pointing to privacy risks. The company has said it supports age verification “when it is done right,” advocating for &lt;a href=&quot;https://arstechnica.com/tech-policy/2025/11/pornhub-is-urging-tech-giants-to-enact-device-based-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;device-level age checks&lt;/a&gt; rather than site-based age checks. &lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.rstreet.org/commentary/no-conscripting-the-app-stores-doesnt-solve-the-problems-with-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Similar dynamics&lt;/a&gt; appear in app-store ecosystems, with age verification prompted at download, signup, or the account level. When the outcome of that check is tied to an account, it stops being a one-time gate and becomes an attribute, shaping how the platform understands and manages the user. That can include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Reuse across time and contexts (future logins, enforcement actions, compliance audits)&lt;/strong&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;A reusable verification result can be used long after the original check for enforcement, monitoring, or regulatory review, often without the user’s awareness or renewed consent.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Integration with other account data (access logs, platform activity, moderation records)&lt;/strong&gt;&lt;strong&gt;&lt;br&gt;&lt;/strong&gt;When age status is combined with behavioral or moderation data, it becomes part of a broader profile that can influence account treatment and content access in ways unrelated to age alone.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Users typically aren&amp;#8217;t told how long their verification status persists, where it is stored, or how it may be reused, leaving them with little ability to contest errors, revoke consent, or gauge long-term implications.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Anonymous or token-based claims&lt;/h3&gt;



&lt;p&gt;Other age-verification systems attempt to avoid or reduce identity linkage. These approaches rely on credentialed or token-based claims, both of which perform an age check once and then reuse the result to grant access later.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Credentialed claims:&lt;/strong&gt; &lt;a href=&quot;https://www.nist.gov/blogs/cybersecurity-insights/digital-identities-getting-know-verifiable-digital-credential-ecosystem&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Verifiable digital credentials&lt;/a&gt; (VDCs) rely on identity checks already performed by trusted institutions (think DMVs and banks), allowing users to confirm age online with a &lt;strong&gt;digitally signed cryptographic proof&lt;/strong&gt;—aka the issuer vouching for the age claim. Most VDCs employ &lt;a href=&quot;https://spruceid.com/learn/selective-disclosure&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;selective disclosure&lt;/a&gt;, revealing only what’s necessary to meet an age threshold (e.g., confirming that someone is “over 18”), though more advanced &lt;a href=&quot;https://spruceid.com/learn/zkp&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;zero-knowledge proofs&lt;/a&gt; aim to verify eligibility without sharing any personal data at all.&lt;/p&gt;



&lt;p&gt;Both reduce exposure at the point of access. But the privacy and security benefits depend on who issues the credential and &lt;a href=&quot;https://www.identity.org/what-is-blockchain-identity-management/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;how it&amp;#8217;s stored&lt;/a&gt;, as well as which platforms accept it inside the &lt;a href=&quot;https://regulaforensics.com/blog/worldwide-digital-id-overview/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;emerging digital-ID model&lt;/a&gt; (which carries its own impacts to privacy and &lt;a href=&quot;https://www.govtech.com/gov-experience/how-digital-ids-could-help-and-harm-people-with-disabilities&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;access&lt;/a&gt;).&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.experian.com/blogs/insights/what-is-token-based-authentication/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;Token-based claims&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;: &lt;/strong&gt;Tokens are like hand stamps at a concert; &lt;strong&gt;short-lived, site-specific proofs&lt;/strong&gt; that allow repeat access without rechecking age every time.They are typically issued after an initial verification and used internally by a platform to streamline access.While that reduces repeated data exposure within a single service, tokens don’t eliminate identity linkage at the point of issuance and offer users scant visibility into how access is remembered or reused. Users typically can’t examine, limit, or revoke these claims, which turn a one-time access decision into an ongoing state. Tokens are a platform optimization, not a rights-protecting feature.&lt;/p&gt;



&lt;p&gt;Whatever the verification pathway, the highest risk sits at the point where age is checked—and system design and implementation make all the difference.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Government-mandated versus platform-run systems&lt;/h2&gt;



&lt;p&gt;Laws define the obligation to keep young people safe online, but they are carried out by regulators, platforms, vendors, app stores, and OS providers that must &lt;a href=&quot;https://news.bloomberglaw.com/privacy-and-data-security/companies-face-influx-of-conflicting-age-verification-laws&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;interpret vague requirements&lt;/a&gt; under real operational pressure.&lt;/p&gt;



&lt;p&gt;Whether a law calls for “effective age assurance” or “privacy-preserving age verification,” it &lt;a href=&quot;https://www.thecgo.org/research/keeping-kids-safe-online-how-should-policymakers-approach-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;rarely specifies&lt;/a&gt; exactly how the requirement should be met in terms of:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;What data must (or must not) be collected&lt;/li&gt;



&lt;li&gt;Whether a government-issued ID is required&lt;/li&gt;



&lt;li&gt;Whether age can be inferred or must be verified&lt;/li&gt;



&lt;li&gt;Whether identity must be linked to an account&lt;/li&gt;



&lt;li&gt;Whether checks happen once or continually&lt;/li&gt;



&lt;li&gt;Who stores the data and for how long&lt;/li&gt;



&lt;li&gt;Whether third-party verification is allowed&lt;/li&gt;



&lt;li&gt;What counts as “effective” or “privacy-preserving”&lt;/li&gt;



&lt;li&gt;What recourse users have when systems fail&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Such decisions are left to downstream authorities, which is why the same legal language can produce &lt;a href=&quot;https://www.brookings.edu/articles/patchwork-protection-of-minors/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;&lt;strong&gt;radically different outcomes&lt;/strong&gt;&lt;/a&gt;. These authorities are simply optimizing for different things: Regulators are optimizing for governance, platforms for liability, vendors for marketability, and infrastructure providers for uniformity. Beyond these institutional priorities, the primary concern is not democratic legitimacy or proportionality, but defensibility to show that sufficient steps were taken to prevent underage access. In that environment, ambiguity is seen as risk, and &lt;strong&gt;risk is minimized through standardization and overcompliance&lt;/strong&gt;—or through platforms pulling out of states where compliance raises both ideological and financial concerns.&lt;/p&gt;



&lt;p&gt;Social network Bluesky chose to &lt;a href=&quot;https://www.wired.com/story/bluesky-goes-dark-in-mississippi-age-verification/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;block access entirely in Mississippi&lt;/a&gt; rather than comply with a state law that would have forced it to verify age for all users and collect sensitive personal data. The platform said the requirements went beyond child safety goals and would &amp;#8220;limit free speech and disproportionately harm smaller platforms.”&lt;/p&gt;



&lt;p&gt;The most restrictive option becomes the baseline not because of public input or legislative intent, but because of operational risk management. The consequence is an abstraction of policy that narrows the practical scope of all users’ rights online.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is ultimately at stake&lt;/h2&gt;



&lt;p&gt;Advocacy groups &lt;a href=&quot;https://www.eff.org/issues/age-verification&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;warn&lt;/a&gt; that age gating threatens a &lt;a href=&quot;https://documents.un.org/doc/undoc/ltd/g21/173/56/pdf/g2117356.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;free and open internet&lt;/a&gt;. They argue that adults misclassified as minors can be blocked from lawful information. That users unwilling or unable to submit identity documents can be excluded entirely. That communities relying on anonymity for reasons of &lt;a href=&quot;https://www.techpolicy.press/age-verification-and-lgbtq-youth/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;safety, stigma, or self-exploration&lt;/a&gt; may find that essential information and connection now come with conditions they can&amp;#8217;t meet. And that exclusion of children from the internet that isn&amp;#8217;t &amp;#8220;necessary and proportionate&amp;#8221; &lt;a href=&quot;https://edri.org/our-work/why-age-verification-misses-the-mark-and-puts-everyone-at-risk/&quot;&gt;violates their fundamental rights&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;While the spirit of these laws is child safety, &lt;a href=&quot;https://www.pcmag.com/opinions/is-age-verification-really-keeping-kids-safe-or-just-risking-your-privacy?test_uuid=04IpBmWGZleS0I0J3epvMrC&amp;amp;test_variant=B&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;industry analysts worry&lt;/a&gt; that the legal language could be applied to any site offering content with &amp;#8220;adult themes,&amp;#8221; whether that means information about sexual health, creative image boards, or social forums.&lt;/p&gt;



&lt;p&gt;These &lt;a href=&quot;https://iapp.org/news/a/are-new-global-age-verification-requirements-creating-a-children-s-online-safety-legal-patchwork-&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;concerns&lt;/a&gt; have crystallized into &lt;a href=&quot;https://www.politico.com/news/2026/01/05/big-tech-won-in-texas-but-the-age-verification-fight-is-just-getting-started-00709160&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ongoing legal opposition&lt;/a&gt; to age gating at both state and federal levels, despite widespread agreement that the internet should be &lt;a href=&quot;https://proton.me/blog/adolescence-internet-kids&quot;&gt;safer for young users&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Understanding what “age verification” actually means helps clarify the challenges of finding that &lt;a href=&quot;https://www.cato.org/briefing-paper/improving-youth-online-safety-without-sacrificing-privacy-speech&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;balance&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item></channel></rss>