ProtonBlog(new window)

Introducing Privacy Decrypted

Share this page

Proton Mail was founded in 2014 to build a better internet where privacy is the default, and to protect activists, journalists, and ordinary people from online surveillance. We are activists ourselves, and over the years we have supported movements around the world from Hong Kong(new window) to Belarus(new window) to Myanmar(new window), both with our products and through direct advocacy. In the last three years, we’ve donated(new window) $500,000 to groups like EDRi, NOYB and the International Federation of Journalist’s Safety Fund in their fight for the right to free expression.

Today, we are happy to announce the launch of Privacy Decrypted, a new blog series that will cover essential privacy knowledge that everybody should know. You can find the first post in the series below.

Privacy Decrypted #1 – What is a threat model?(new window)

Why Privacy Decrypted?

We have been listening closely to feedback from the Proton community, and we recognize that Proton doesn’t just have a duty to protect. We have, first and foremost, a duty to educate. Privacy is a complex topic. Privacy-related legislation is often indecipherable, the technology can be complex (we’re trying to change that), and the stakes are high, particularly when serving sensitive groups, such as activists. 

Over the past seven years, Proton has grown significantly, with more than 50 million signups worldwide. Privacy has gone mainstream, with good reason. Tech giants engage in more and more invasive exploitation of our most sensitive data in the pursuit of greater profits, while governments around the world expand the surveillance state to tighten control over citizens. However, privacy knowledge has not gone mainstream, and Privacy Decrypted fills that gap. 

Empowerment through education

We are committed to doing everything in our power to protect users. We’re fighting back with both technology and legal challenges (in 2020, we contested over 750 government attempts to get Proton user data). Our use of encryption also plays a role, and ensures that no court order can compel us to decrypt encrypted messages. This has been proven in court and also via independent third-party audits of our open-source code. These characteristics make Proton Mail unique, but we can do more. When it comes to staying safe, knowledge is power, and with Privacy Decrypted, we’re working to ensure that every activist is empowered and can make a difference. 

Follow us on social media to know each time a new edition of Privacy Decrypted is posted, and feel free to join the conversation and suggest topics for us to cover.

Best Regards,

The Proton Team.

Protect your privacy with Proton
Create a free account

Share this page

Proton Team(new window)

We are scientists, engineers, and specialists from around the world drawn together by a shared vision of protecting freedom and privacy online. Proton was born out of a desire to build an internet that puts people before profits, and we're working to create a world where everyone is in control of their digital lives.

Related articles

How to share a PDF
Sharing a PDF with coworkers, friends, or family members can sometimes be trickier than it seems if you’re trying to share a large file or if you want to use secure encryption. In this article, we show you how to share any PDF quickly, easily, and se
Proton Pass for Windows
Proton Pass is launching its new app for Windows, allowing you to access our password manager from your desktop. As one of our community’s most requested features, it’s available to everyone starting today. Proton Pass is the centerpiece of our effo
password policy
Businesses are increasingly dealing with the fallout from cybercrime: The number of attacks is on the rise and the damage done is growing exponentially. One of the most common vulnerabilities for organizations are their passwords. Since they are your
How to free up disk space
If you’ve ever owned an electronic device of any kind, you know the struggle of running out of space. No matter if it’s a smartphone, laptop, or desktop computer, there never seems to be enough room for all your files. Let’s show you some simple ways
What is 3-2-1 backup
Data backup is vital for businesses and individuals alike: In case something happens to your primary computer, you always have a copy of your data to fall back on.  How should you approach backup, though? The 3-2-1 rule can act as a guide when decid
What was your first pet’s name? In what city were you born?  We’ve all had to answer these questions to reset a long-forgotten password, but consider how that works. Much of this information is easy to find for others (or easily forgotten by you), m