all-in-one privacy solution":["Proton Unlimited est une solution tout-en-un respectueuse de la vie privée"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Aucune publicité, le respect de la vie privée comme règle absolue"],"People before profits":["Les individus passent avant les profits"],"Security through transparency":["Notre engagement de transparence"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Les meilleures offres ${ BLACK_FRIDAY } de Proton Mail"],"The world’s only community- supported email service":["La seule messagerie au monde soutenue par la communauté"]},"specialoffer:limited":{"${ hours } hour":["${ hours } heure","${ hours } heures"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Temps restant : ${ hoursLeft }, ${ minutesLeft }, ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minute","${ minutes } minutes"],"${ seconds } second":["${ seconds } seconde","${ seconds } secondes"],"Limited time offer":["Offre à durée limitée"]},"specialoffer:listitem":{"Create multiple addresses":["Créez plusieurs adresses"],"Hide-my-email aliases":["Alias « hide-my-email »"],"Quickly unsubscribe from newsletters":["Désabonnez-vous rapidement des newsletters"],"Use your own domain name":["Utilisez votre propre nom de domaine"]},"specialoffer:logos":{"As featured in":["Ils en parlent"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Choisissez une messagerie électronique chiffrée qui protège votre vie privée"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Offre Proton Mail Black Friday - Jusqu'à 40 % de réduction"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Obtenez jusqu'à 40 % de réduction sur les abonnements Proton Mail à l'occasion du Black Friday. Profitez d'offres exceptionnelles sur nos abonnements de messagerie électronique sécurisée et chiffrée de bout en bout."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Offre Black Friday Proton Mail | Jusqu'à 40 % de réduction"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Facturé ${ TOTAL_SUM } pour la première année"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Facturé ${ TOTAL_SUM } pour les 2 premières années"],"30-day money-back guarantee":["Garantie satisfait ou remboursé pendant 30 jours"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Facturé ${ TOTAL_SUM } pour les 2 premières années"],"Billed at ${ TOTAL_SUM } for the first year":["Facturé ${ TOTAL_SUM } pour la première année"],"You save ${ SAVE_SUM }":["Vous économisez ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["-${ DISCOUNT }"],"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["J'adore mon ProtonMail"],"My favorite email service":["Ma messagerie électronique préférée"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Merci Proton de nous garder en sécurité dans l'univers complexe d'internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Vous avez ce pour quoi vous payez. Avec les Big Tech, si vous ne payez rien, vous êtes utilisé. J'ai arrêté d'utiliser Gmail et je suis passée @ProtonMail"]},"specialoffer:time":{"Days":["Jours"],"Hours":["Heures"],"Min":["Min"]},"specialoffer:title":{"And much more":["Avec en plus"],"Make your inbox yours":["Votre boite de réception sur mesure"],"Safe from trackers":["À l'abri des traqueurs"],"Stay organized":["Bien organisé"],"Black Friday email deals":["Offres Black Friday pour la messagerie électronique"],"Don’t just take our word for it":["Ce qu'en disent nos utilisateurs"],"Our story":["Notre histoire"],"Transfer your data from Google in one click":["Transférez vos données depuis Google en un clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_SERVERS } serveurs répartis dans plus de ${ TOTAL_COUNTRIES } pays, la possibilité de connecter jusqu'à 10 appareils, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et d'autres fonctionnalités."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Partagez facilement votre calendrier avec votre famille, vos amis ou collègues et consultez des calendriers externes."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Comprend la prise en charge de 1 domaine de messagerie personnalisé, de 10 adresses e-mail, de 10 alias « hide-my-email », du partage de calendriers et bien d'autres fonctionnalités."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Comprend la prise en charge de 3 domaines de messagerie personnalisés, de 15 adresses e-mail, d'un nombre illimité d'alias « hide-my-email », du partage de calendriers et bien d'autres fonctionnalités."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Jusqu'à 25 calendriers, des applications mobiles, la sécurité avec le chiffrement de bout en bout, l'importation de calendrier en un clic depuis Google..."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Nous rencontrons actuellement des problèmes avec le service Proton VPN."],"Learn more":["En savoir plus"]},"Status banner":{"Learn more":["En savoir plus"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Nous rencontrons actuellement des problèmes avec le service ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["Nous rencontrons actuellement des problèmes avec un ou plusieurs services."]},"suggestions":{"Suggestions":["Suggestions"]},"Support":{"Sub category":["Sous-catégorie","Sous-catégories"]},"Support article":{"${ readingTime } min":["${ readingTime } minute","${ readingTime } minutes"],"Category":["Catégorie","Catégories"],"Didn’t find what you were looking for?":["Vous ne trouvez pas ce que vous cherchez ?"],"General contact":["Contact - Général"],"Get help":["Obtenir de l'aide"],"Legal contact":["Contact - Juridique"],"Media contact":["Contact - Média"],"Partnerships contact":["Contact - Partenariats"],"Reading":["Lecture"]},"Support categories":{"Browse Proton product support":["Parcourez le support produit Proton"]},"Support category":{"There is no article in this category yet.":["Il n'y a pas encore d'article dans cette catégorie."]},"Support troubleshooting":{"--- Select ---":["--- Sélectionner ---"],"App version":["Version de l'application"],"Browser":["Navigateur"],"Check if this helps":["Vérifiez si cela vous aide."],"Choose a category for your question":["Choisissez une catégorie pour votre question"],"Choose a product":["Choisir un produit"],"Did this solve your issue ?":["Cela a-t-il résolu votre problème ?"],"Faster assistance is just a few clicks away — please make your selections":["Il suffit de quelques clics pour obtenir une assistance plus rapide, faites votre sélection."],"No, contact support":["Non, contacter le support"],"Proton account":["Compte Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Nous vous remercions pour votre commentaire."],"Troubleshooting":["Dépannage"],"What can we help with ?":["Comment pouvons-nous vous aider ?"],"Yes":["Oui"]},"support_modal_search_query":{"Search query":["Recherche"]},"support_search_button":{"Search":["Rechercher"]},"support_search_i_am_looking_for":{"I'm looking for":["Je recherche des informations sur..."]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Pour que le problème soit résolu plus rapidement, vous pouvez le signaler à partir de l'application Bridge : Aide > Signaler un bug."],"Information":["Informations"]},"SupportForm:option":{"Account Security":["Sécurité du compte"],"Contacts":["Contacts"],"Custom email domain":["Domaine de messagerie personnalisé"],"Email delivery and Spam":["Distribution des messages et indésirables/spam"],"Encryption":["Chiffrement"],"Login and password":["Identifiant et mot de passe"],"Merge aliases and accounts":["Fusion des alias et des comptes"],"Migrate to Proton":["Migration vers Proton"],"Notifications":["Notifications"],"Other":["Autre"],"Plans and billing":["Abonnements et facturation"],"Proton for Business":["Proton for Business"],"Sign up":["Inscription"],"Storage":["Espace de stockage"],"Users, addresses, and identities":["Utilisateurs, adresses et identités"]},"SupportForm:optionIntro":{"Select a topic":["Choisissez un sujet"]},"swiss_baseed_feature":{"Swiss based":["Basé en Suisse"]},"Testimonial":{"Awards":["Récompenses"],"Customers":["Clients"],"Featured":["Ils en parlent"],"Go to testimonial source":["Accéder aux commentaires"],"Reviews":["Avis"],"Videos":["Vidéos"]},"Text":{"Find the plan that's right for you":["Trouvez l'abonnement adapté à vos besoins"],"If you need help, check out our ${ supportLink }.":["Si vous avez besoin d'aide, consultez notre ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["La page recherchée a peut-être été retirée ou le lien utilisé n'est plus valide."]},"Title":{"On this page":["Sur cette page"],"Related articles":["Articles similaires"],"Share ${ thisPage }":["Partagez ${ thisPage }"],"Thank you!":["Merci !"],"this page":["cette page"]},"Tooltip":{"More information":["Plus d'informations"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Créez jusqu'à 20 calendriers chiffrés personnalisés et partageables. Ajoutez jusqu'à 5 calendriers d'amis, de membres de votre famille, de collègues ou d'organisations."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_SERVERS } serveurs répartis dans plus de ${ TOTAL_COUNTRIES } pays, la vitesse VPN la plus élevée, ${ TOTAL_VPN_CONNECTIONS } connexions VPN, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et d'autres fonctionnalités."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_SERVERS } serveurs répartis dans plus de ${ TOTAL_COUNTRIES } pays, la vitesse VPN la plus élevée, 10 connexions VPN, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et d'autres fonctionnalités."]},"version_history_label":{"Version history":["Historique des versions"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Conservez jusqu'à ${ versionHistoryNumber } versions de chaque fichier pendant ${ years } ans."]},"vpn_features_link":{"View VPN plans":["Voir les abonnements VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Accédez aux contenus bloqués et naviguez en toute confidentialité"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
Dealing with cyberstalking: How to protect your privacy and stay safe online | Proton
With the proliferation of smartphones and social media, cyberstalking is on the rise(new window). Compared to traditional stalking, cyberstalking can be a more threatening form of aggression as cyberstalkers can hide behind the anonymity of the internet and terrorize their victims around the clock. However, there are measures you can take to protect yourself and your privacy.
In this article, we’ll explain what cyberstalking is, how cyberstalking invades your privacy, and what you can do to protect yourself and stay safe online.
What is cyberstalking?
The non-profit organization Protection Against Stalking(new window) defines stalking as “a pattern of fixated and obsessive behavior that is repeated, persistent, and intrusive. It causes fear of violence or engenders alarm and distress in the victim”. Cyberstalking is the online extension of traditional stalking and is carried out using online tools such as social media, email, and chat rooms.
While traditional stalking often involves physical harassment or assaults, unwanted phone calls, and blackmail letters, cyberstalking includes threats of physical violence, online privacy invasions, and technological attacks.
Unlike traditional stalking, cyberstalking does not require close physical proximity to the victim. Instead, it occurs on an omnipresent scale, and has the capacity to do significant harm to the victim’s emotional well-being, social relationships, and reputation through online means.
Who is behind cyberstalking?
Most cyberstalkers have or used to have a relationship with their victims. They may be a former partner, coworker, or acquaintance. Most cyberstalkers harass their victims for one or more of the following reasons:
To take revenge on a grievance they may hold towards a victim.
To demean, embarrass, or scare the victim.
To damage the victim’s reputation.
To track the victim’s whereabouts without them knowing.
To steal the victim’s identity and impersonate them online.
According to preliminary research(new window) conducted by Leroy McFarlane and Paul Bocji, cyberstalkers usually fall under four profiles:
Vindictive: A vindictive cyberstalker is known for their ferocious attacks on their victims. Their stalking tendencies involve both online and offline harassment.
Composed: A composed cyberstalker typically has no relationship to their victim, and their only goal is to inflict distress and annoyance.
Intimate: An intimate cyberstalker is someone who is trying to gain the victim’s attention and/or enter into a relationship with them.
Collective: Collective cyberstalkers involve two or more individuals who work together to harass their victim.
Cyberstalking as an invasion of your privacy
The ease and convenience of the internet have led to an uptick in cyberstalking crimes. What you post online can reveal a lot about you, and with a bit of research, a cyberstalker can easily access your personal information. If you own multiple social media accounts, a cyberstalker can glean information from each account and construct a detailed profile of you.
Additionally, if a cyberstalker gets a hold of your computer, they can even install spyware to track your online interactions, purchases, reading habits, browsing history, and more. Other examples of cyberstalking include:
Sending you manipulative, threatening, or harassing emails
Hacking into your online accounts (such as banking and email) to change your passwords and impersonate you
Posting your private information and photographs on online forums and chat rooms
Encouraging others to join in on the harassment and spread rumors about you
How to protect yourself against cyberstalking
A cyberstalker can compromise your privacy and intimidate you and your loved ones. The first step to preventing cyberstalking is to post as little information about yourself as you can on the internet.
Here are some tips you can take to reduce your digital footprint and protect yourself against cyberstalking.
Tip #1: Review your privacy settings on social media
When you post on social media, you’re sharing more than just the post’s content. You might also be sharing information such as:
The time you made the post
Your location
Personal information about yourself, including gender, date of birth, and contact information
Who your friends and family are
Other links to your social media profiles
By reviewing your privacy settings and restricting social media, you can make intentional choices about what content gets shared, with whom, and where. This reduces the likelihood of a cyberstalker discovering information that might endanger your privacy.
Tip #2: Use a VPN
Using a VPN has many benefits(new window), but one of its biggest advantages is providing you with a greater level of anonymity(new window). When you connect to a VPN, all of your online traffic is routed through an encrypted tunnel and becomes unreadable to third parties, including your ISP and cyberstalkers. Instead of your real IP address, a cyberstalker only sees the IP address of the VPN server you’re connected to. This masks your physical location, protecting you from potential cyberstalkers.
With a VPN, you can surf the internet privately and securely without worrying that your information might fall into the wrong hands.
Tip #3: Create strong passwords for online accounts
Practicing good password hygiene goes a long way in keeping your online accounts secure against cyberstalkers. According to a Verizon report from 2020(new window), 36% of data breaches involve weak or stolen passwords.
If you struggle to remember multiple complex passwords for different online accounts, try using a password manager(new window). A good password manager will generate and save strong passwords(new window) for you, keeping your online accounts safe. The only password you will need to remember is your master password, which enables you to sign in to your password manager.
Alternatively, you can create a passphrase(new window) consisting of a series of words. Passphrases are more secure and easier to remember than a typical password. Changing the capitalization of letters and replacing some letters with numerical and symbolic substitutes can make your passphrase a lot stronger. A secure and complex passphrase might look something like this: Oper@teElseCartOccas!on52.
Tip #4: Enable two-factor authentication
Two-factor authentication (2FA) adds an additional layer of security to your online accounts by requiring a second form of identification. Even if a cyberstalker somehow gets a hold of your username and password, they will not be able to gain access to account data if you have 2FA enabled.
You can activate 2FA on an online account and verify your identity through an authenticator app installed on your mobile device. Every time you log in to an online account, your authenticator app will generate a unique code for you to enter before you can gain access to your account. This ensures that a cyberstalker cannot access your online accounts unless they also have possession of your mobile device.
Tip #5: Use email aliases
Email aliases are a great way to organize your inbox and filter out spam(new window), but they can also help preserve your online privacy. Since email addresses often consist of first and last names, creating an email alias without your full name can help you stay more anonymous while registering for online accounts and newsletters.
Tack on a plus sign (+) to your current email address. For example, if your email address is johnsmith@proton.me, your email alias could be johnsmith+newsletters@proton.me. All emails sent to your email alias will land in your inbox as usual.
However, if your goal is to stay as anonymous as possible, you should not create an email alias from an existing email address that contains your real name. Instead, you should set up a new email address that doesn’t reveal your true identity.
Tip #6: Record and block all suspicious activity
If you suspect that someone is stalking you online, the first thing you should do is to block the person on all channels. If you move fast to block the cyberstalker’s opportunities to harass you, they may lose interest quickly. You should also add the cyberstalker’s email address to your Block List(new window), so their messages land directly in your spam folder.
Additionally, you should gather evidence by keeping a log of stalking-related incidents as they occur. Be sure to include information such as:
Date and time of the incident
Description of the incident
Location of the incident
Witnesses to the incident
Recording all stalking incidents and behaviors will prove useful if you decide to file for criminal prosecution or a protective order.
Use Proton Mail to protect yourself against cyberstalking
As a privacy-first company, our vision is to create a safer and better internet where everyone is in control of their data. Cyberstalking is a threat not only to your security but also your privacy. We believe you should be able to access the internet without worrying if your data might be stolen and how it might be used against you.
If you’re concerned about having a cyberstalker, you can use Proton Mail to defend your online privacy and security:
End-to-end encryption: If you and your recipient both use Proton Mail, you can send end-to-end encrypted emails(new window) to each other. This means your emails cannot be intercepted in transit or accessed by anyone except you and your recipient.
Password-protected Emails: Use our Password-protected Emails(new window) feature to send encrypted emails to your recipients who do not use Proton Mail. To read the email, they must enter a previously agreed-upon password.
Spam filtering, Allow List, and Block List: We use a smart spam detection system to filter out unwanted emails. You can also easily route your cyberstalker’s emails to your spam folder by adding their email address to your Block List.
If you’re a United States citizen or permanent resident, you have a Social
Security number (SSN). This number is the linchpin of much of your existence,
linked to everything from your tax records to your credit cards. Theft is a
massive problem, whic
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Les fuites de données sont de plus en plus courantes. Lorsque vous vous
inscrivez à un service en ligne, vous fournissez des informations personnelles
précieuses pour les pirates, telles que des adresses e-mail, des mots de passe,
des numéros de télé
Une communication sécurisée et fluide est la base de toute entreprise. Alors que
de plus en plus d’organisations sécurisent leurs données avec Proton, nous avons
considérablement élargi notre écosystème avec de nouveaux produits et services,
de notre