Proton

Proton blog

US flag and the Statue of Liberty facing the EU flag, the Brandenburg gate, Leaning Tower of Pisa, and Eiffel Tower
en
AI browsers are coming for your clicks — and your privacy
en
SharePoint attack
en
Proton for Business 14-day free trial header image
en

Latest articles

See all articles
AI browsers are coming for your clicks — and your privacy
en
Perplexity’s $34.5B bid for Google Chrome shows how AI companies want your browser not just for speed and convenience, but for your data — and your digital life.
What is email encryption and why should your business prioritize it
en
Defend against email fraud and phishing. Make encryption an essential part of your cybersecurity strategy with Proton Mail today.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
en
  • Lumo
  • Product updates
Your AI chats deserve privacy. Learn how Lumo keeps your conversations confidential with zero-access encryption and no logs.
en
Behind the scenes of Lumo’s design journey, from its name and mascot to its immersive universe. See how Proton brought a private AI assistant to life.
The cat mascot for Lumo on an empty background looking at the logo that says Lumo by Proton
en
Lumo gives you the power to solve problems big and small, while keeping your personal data confidential. Try it now.
Proton Authenticator logo with a gear wheel
en
  • Proton news
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
Proton's secure authenticator app demonstration of the user interface for mobile and desktop
en
We're launching a secure, independent authenticator app available on desktop and mobile, to help you secure your online accounts.
Proton completes SOC 2 Type II audit to support business security
en
Proton has successfully completed its first SOC 2 Type II audit, confirming our security controls meet industry standards and helping teams evaluate us with confidence.
AI browsers are coming for your clicks — and your privacy
en
Perplexity’s $34.5B bid for Google Chrome shows how AI companies want your browser not just for speed and convenience, but for your data — and your digital life.
Illustration of a laptop and key with text boxes containing encrypted passwords
en
Dashlane is axing its free password management plan as of September 2025. Here's what to know — and where you can find a free password manager alternative ASAP.
An image showing a purple version of an Instagram-style logo with a location marker in the top right corner
en
The new 'Friend Map' feature on Instagram might be sharing your precise location without your knowledge. Here's how to turn it off — and why you might want to.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
A family photo, a location pin, a camera, and a clock, symbolizing the risks of EXIF data for your personal photos
en
EXIF data in your photos can reveal more than you think, including your location. Learn how to protect your privacy before sharing online.
A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
en
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
adolescence and the internet we handed to kids
en
Adolescence shows how platforms shape kids in harmful ways. Here's why transparent, open digital education must lead the change.
What is email encryption and why should your business prioritize it
en
Defend against email fraud and phishing. Make encryption an essential part of your cybersecurity strategy with Proton Mail today.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
Authentication vs authorization explained
en
Learn more about the difference between authentication and authorization, key examples, and how they can protect your business.