Proton

Proton Mail was founded in 2014 to build a better internet where privacy is the default, and to protect activists, journalists, and ordinary people from online surveillance. We are activists ourselves, and over the years we have supported movements around the world from Hong Kong to Belarus to Myanmar(nuova finestra), both with our products and through direct advocacy. In the last three years, we’ve donated(nuova finestra) $500,000 to groups like EDRi, NOYB and the International Federation of Journalist’s Safety Fund in their fight for the right to free expression.

Today, we are happy to announce the launch of Privacy Decrypted, a new blog series that will cover essential privacy knowledge that everybody should know. You can find the first post in the series below.

Privacy Decrypted #1 – What is a threat model?

Why Privacy Decrypted?

We have been listening closely to feedback from the Proton community, and we recognize that Proton doesn’t just have a duty to protect. We have, first and foremost, a duty to educate. Privacy is a complex topic. Privacy-related legislation is often indecipherable, the technology can be complex (we’re trying to change that), and the stakes are high, particularly when serving sensitive groups, such as activists. 

Over the past seven years, Proton has grown significantly, with more than 50 million signups worldwide. Privacy has gone mainstream, with good reason. Tech giants engage in more and more invasive exploitation of our most sensitive data in the pursuit of greater profits, while governments around the world expand the surveillance state to tighten control over citizens. However, privacy knowledge has not gone mainstream, and Privacy Decrypted fills that gap. 

Empowerment through education

We are committed to doing everything in our power to protect users. We’re fighting back with both technology and legal challenges (in 2020, we contested over 750 government attempts to get Proton user data). Our use of encryption also plays a role, and ensures that no court order can compel us to decrypt encrypted messages. This has been proven in court and also via independent third-party audits of our open-source code. These characteristics make Proton Mail unique, but we can do more. When it comes to staying safe, knowledge is power, and with Privacy Decrypted, we’re working to ensure that every activist is empowered and can make a difference. 

Follow us on social media to know each time a new edition of Privacy Decrypted is posted, and feel free to join the conversation and suggest topics for us to cover.

Best Regards,

The Proton Team.

Articoli correlati

The Earth, a recycling symbol, and a warning sign representing a reminder to back up data on World Backup Day
en
Celebrate World Backup Day by learning from data loss stories, from family heirlooms to $500,000 in Bitcoin, and how to avoid a similar fate.
A desktop computer showing cleanup supplies and Proton apps for digital cleaning
en
  • Guide sulla privacy
Take control of your digital life by spring cleaning your inbox, passwords, and cloud storage using Proton's suite of privacy-first tools.
What is ePHI? The difference between PHI and ePHI explained
en
What is the difference between ePHI and PHI, and how can healthcare data can optimally be kept safe as it’s passed from one party to another?
A vial, Erlenmeyer flask, and a DNA double-helix being deleted.
en
If you used 23andMe, your data could soon be for sale. Here's how to delete your data from 23andMe — and why you might want to do so sooner than later.
European alternatives to US tech
en
Take back control of your digital life with privacy-focused European alternatives to US Big Tech apps and services.
A badge representing ISO 27001 certification for file sharing
en
What is ISO 27001 secure file collaboration? Learn about ISO 27001 certification and how to maintain ISO 27001 compliance for your business.