Proton

Guide sulla privacy

en
  • Guide sulla privacy
Open-source software makes its source code available to the public. Learn how open-source encryption creates transparency and protects your privacy.
en
  • Guide sulla privacy
Whether you’re an individual or a business, using end-to-end encrypted email can help you stay secure online. Learn about email encryption in this article.
en
  • Guide sulla privacy
Want to be sure that your personal data is safe? Here’s our guide to picking a free email account.
Illustration of email encryption
en
  • Guide sulla privacy
Whether you consider your emails ‘sensitive’ or not, everyone deserves email privacy. Email encryption helps to secure your privacy online.
en
  • Guide sulla privacy
WhatsApp may be secure but it’s not private. Learn about the best alternatives to WhatsApp that genuinely respect your privacy.
Illustration of cloud storage
en
  • Guide sulla privacy
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more about our storage model and how we protect your privacy.
  • Guide sulla privacy
Le chiavette USB e i dischi rigidi esterni sono comodi, ma non sempre sicuri. Ti spieghiamo come puoi crittografare le tue chiavette USB e proteggere i tuoi dati.
An illustration of protesters protecing their privacy.
en
  • Guide sulla privacy
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
  • Guide sulla privacy
Scopri tutto sui certificati TLS/SSL, i file digitali che aiutano ad autenticare e proteggere il trasferimento di dati su internet.
Illustration of changing email provider
en
  • Guide sulla privacy
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
  • Guide sulla privacy
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.