Proton

Blog di Proton

en

en
  • News sulla privacy
The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.
an image showing two cartoon documents with a shield icon containing a lock icon in the bottom right corner
en
Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.
an image showing two purple cartoon computer screens with warning icons on them
en
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
Le operazioni principali sui file in Proton Drive ora utilizzano l'SDK Drive per prestazioni più veloci e affidabili. Guarda i nostri progressi e cosa arriverà nel 2026.
Proton Sheets and a screenshot
en
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A purple screen with a title saying 'Proton Pass CLI' above a CLI interface with white text on a black background
  • Aggiornamenti prodotti
  • Proton Pass
Per aiutarti a lavorare nel terminale, Proton Pass offre ora un'interfaccia a riga di comando (CLI) per una maggiore produttività e una maggiore sicurezza.
Proton's new Mail mobile apps
Le app iOS e Android di prossima generazione di Proton Mail sono state ricostruite da zero. Ecco perché l'abbiamo fatto e cosa cambia per gli utenti.
Representation of a survey about spreadsheet security
Proton ha intervistato 1.000 persone in quattro paesi per rivelare come i dati personali dei fogli di calcolo sopravvivono, rimangono condivisi e possono essere utilizzati molto tempo dopo che li hai dimenticati.
Abbiamo raccolto oltre 1,25 milioni di $ quest'anno per supportare direttamente le organizzazioni in prima linea nella lotta per la privacy e la libertà online.
en
  • News sulla privacy
The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks of AI products for kids.
en
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks for kids.
Una nuova ricerca di Proton mostra che gli europei vogliono liberarsi dalla dipendenza tecnologica dagli USA e costruire la sovranità tecnologica per l'Europa. Leggi il rapporto completo.
an image showing eavesdropping between two purple cartoon mobile phones
en
  • Per le aziende
  • Guide sulla privacy
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
en
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
en
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Dovremmo preoccuparci che l'IA conquisti il mondo un giorno? O le Big Tech ci stanno distraendo da ciò che stanno facendo proprio ora?
Internet predictions for 2026, including icons for AI, privacy and policy
Dalla verifica dell'età e i divieti delle VPN all'AI andata storta, queste sono le nostre previsioni su come internet cambierà nel 2026.
Illustration of purple robot with speech bubbles
L'uso dell'IA sta aumentando rapidamente e molti chatbot tracciano tutto ciò che condividi con loro. Ecco perché questo è importante e perché dovresti preoccuparti.
an image showing two cartoon documents with a shield icon containing a lock icon in the bottom right corner
en
Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.
an image showing two purple cartoon computer screens with warning icons on them
en
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
en
  • Per le aziende
  • Guide sulla privacy
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them