Proton

Proton blog

Proton Mail receives updates on iOS and Android
en
Map of the United States with six images of hacked computers
en
Disney settlement with FTC
en
Computer screen with passwords, access tokens, and a business account.
en

Latest articles

See all articles
An illustration of a clipboard with the NIST password guidelines attached
en
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
Proton Mail receives updates on iOS and Android
en
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
How to send a follow-up email after an interview (templates included)
en
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.
Proton Mail receives updates on iOS and Android
en
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
Proton Drive for Windows update that adds photo imports from local folders and Google Photos
en
You can now move pictures and albums from Google Photos or any folder into Proton Drive for Windows — all protected by end-to-end encryption.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
image shows a Swiss flag in the shape of a shield
en
The US recently implemented a 39% tariff of Swiss imports. In solidarity, Proton is offering discounts on our services to Swiss businesses and citizens.
Proton Authenticator logo with a gear wheel
en
  • Proton news
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
The LinkedIn logo and an AI symbol, representing how LinkedIn is using your data for AI training
en
LinkedIn will share your public data with Microsoft to train AI. Find what this means for your privacy and how to opt out.
Meta accused of bypassing Apple’s tracking rules
en
A former Meta employee alleges the company used internal tracking methods to bypass Apple’s privacy rules and inflate ad metrics.
Should security cost your privacy?
en
Former CIA officer Andrew Bustamante and Cato’s Jennifer Huddleston debate what privacy means today and how it shapes security, rights, and the internet.
An illustration of a clipboard with the NIST password guidelines attached
en
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
A smartphone and a progress bar, representing iPhone storage
en
Running out of iPhone storage? Find out how to free up space, manage files, and maintain data privacy with Proton Drive.
A robot, family photos, and a warning sign, representing AI privacy concerns
en
  • Privacy guides
Find out the main artificial intelligence privacy concerns, from data collection and bias to deepfakes and surveillance, and how to protect yourself.
Illustration of a brain and a shield with the letters AI in the center
en
Big Tech companies are building AI aligned with their surveillance capitalism business model. We need a privacy-first and responsible AI alternative today.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
An illustration of a clipboard with the NIST password guidelines attached
en
Everything you need to know about the 2025 NIST password recommendations. Learn about the latest updates, implementation tips, and more.
How to send a follow-up email after an interview (templates included)
en
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.
How to send a follow-up email after an interview (templates included)
en
Learn how to write a proper email for all situations — big or small — and get your message noticed with these customizable templates.