Proton

Latest articles

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
en
  • For business
Find out how to identify shadow IT risks and help your workers collaborate in a single, secure IT environment.
en
  • For business
  • Privacy guides
Learn what an email domain is and how to create the best custom email domain for personal or professional use.
How to delete all photos from Google Photos
en
  • Privacy guides
Find out how to delete photos from Google Photos while keeping them safely stored on your device, and use a private cloud storage app instead.
Proton Wallet
en
  • Product updates
  • Proton news
  • Proton Wallet
Proton Wallet is an easy-to-use self-custodial wallet that makes financial freedom attainable for everyone.
en
  • Privacy guides
Bitcoin is a digital currency built on a decentralized network of nodes that confirm transactions publicly.
en
  • Product updates
  • Proton Wallet
This article reviews the key features and security architecture that make Proton Wallet a private and secure wallet that is as easy to use as email.
proton scribe
en
  • Product updates
  • Proton Mail
  • Proton news
With Proton Scribe, your team will save time writing emails, and you'll protect your business data by reducing the need to expose it to AI assistants.
en
  • For business
This article will explain data sovereignty, why it matters, and how it can be achieved to not only protect you, but your business. 
en
  • Privacy guides
Find out how to use AI in Google Docs and how to prevent your data from being used for AI training.
en
  • Privacy guides
Learn how to find, edit, and delete your passwords on iPhone and how to improve your security with an encrypted password manager.
en
  • Product updates
  • Proton Pass
Share passwords, bank details, and other sensitive data securely using unique, end-to-end encrypted links with anyone.