Proton

Blog di Proton

Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
Map of the United States with six images of hacked computers
en
Disney settlement with FTC
en
Computer screen with passwords, access tokens, and a business account.
en

How to write a genuine "Welcome to the team" email (+ 20 templates)
en
“Welcome to the team” messages can fall flat. Write the best onboarding email with these 20 creative templates that will make new hires feel valued from day one.
10 'I hope this email finds you well' alternatives
en
These modern email greetings are far more interesting than the cliché phrase, "I hope this email finds you well".
Should security cost your privacy?
en
  • Privacy news
Former CIA officer Andrew Bustamante and Cato’s Jennifer Huddleston debate what privacy means today and how it shapes security, rights, and the internet.
Proton Drive for Windows update that adds photo imports from local folders and Google Photos
en
You can now move pictures and albums from Google Photos or any folder into Proton Drive for Windows — all protected by end-to-end encryption.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Image of the Lumo purple cat with the words Lumo 1.1 by Proton
en
  • Lumo
  • Product updates
Lumo 1.1 is a faster, smarter AI assistant that matches Big Tech’s capabilities while protecting your privacy with zero-access encryption.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
image shows a Swiss flag in the shape of a shield
Gli Stati Uniti hanno recentemente introdotto un dazio del 39% sulle importazioni dalla Svizzera. In segno di solidarietà, Proton offre sconti sui propri servizi a cittadini e imprese svizzere.
Proton Authenticator logo with a gear wheel
en
  • Proton news
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
Should security cost your privacy?
en
  • Privacy news
Former CIA officer Andrew Bustamante and Cato’s Jennifer Huddleston debate what privacy means today and how it shapes security, rights, and the internet.
The WhatsApp logo split in two, symbolizing WhatsApp security and privacy risks
en
  • Privacy news
WhatsApp's ex-security chief is suing Meta over privacy and security concerns, adding to recent whistleblower claims. Find out how safe WhatsApp is.
Map of the United States with six images of hacked computers
en
China-supported hackers have been monitoring US internet infrastructure for years. Now US security experts suspect they might have stolen data from everyone in the US.
A robot, family photos, and a warning sign, representing AI privacy concerns
en
  • Privacy guides
Find out the main artificial intelligence privacy concerns, from data collection and bias to deepfakes and surveillance, and how to protect yourself.
Illustration of a human brain with the label LLM
en
  • Privacy guides
What is a large language model (LLM) and how does it work? Here's what you need to know about LLMs and the future of privacy-first AI.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
  • For business
  • Privacy guides
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
adolescence and the internet we handed to kids
en
Adolescence shows how platforms shape kids in harmful ways. Here's why transparent, open digital education must lead the change.
How to write a genuine "Welcome to the team" email (+ 20 templates)
en
“Welcome to the team” messages can fall flat. Write the best onboarding email with these 20 creative templates that will make new hires feel valued from day one.
10 'I hope this email finds you well' alternatives
en
These modern email greetings are far more interesting than the cliché phrase, "I hope this email finds you well".
An image showing an open purple envelope with an ID inside, which is being hooked with a fishing hook
en
Cyberattacks come in many forms, but whaling and spear phishing target high-ranking individuals in business: Learn how to protect yourself.