Proton

Proton blog

Stylish black and white image of a man in a helmet and white jumpsuit to conceal his identity, sitting in an interview chair

Latest articles

See all articles
Stylish black and white image of a man in a helmet and white jumpsuit to conceal his identity, sitting in an interview chair
In the first video of our Witness Protection series, find out how one anonymous activist infiltrated some of the most dangerous militias in the US.
When age verification moves into your operating system
Age verification is expanding from laws to platforms and operating systems, reshaping the internet. Here’s what it means for privacy and access.
Age checks and child safety: Online age verification systems fail to protect children
The EU unveiled an age verification app and called it technically ready. Security researchers hacked it in under 2 minutes. What it means.
A Gantt chart, representing the Proton Drive roadmap for summer 2025
  • Product updates
  • Proton Drive
From faster file transfers to smoother mobile photo browsing, here’s how strong Proton Drive started in 2026.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
Reserve a private email address for your child with Born Private
Give your child a safer start online. Reserve a private, secure, no-ads address with Proton Mail that stays sealed until your child is ready.
When age verification moves into your operating system
Age verification is expanding from laws to platforms and operating systems, reshaping the internet. Here’s what it means for privacy and access.
Age checks and child safety: Online age verification systems fail to protect children
The EU unveiled an age verification app and called it technically ready. Security researchers hacked it in under 2 minutes. What it means.
Your business data is about to automatically travel outside the EU. Here's why you should opt out and how to do it.
Stylish black and white image of a man in a helmet and white jumpsuit to conceal his identity, sitting in an interview chair
In the first video of our Witness Protection series, find out how one anonymous activist infiltrated some of the most dangerous militias in the US.
What are the alternatives to age verification?
Explore alternatives to online age verification, from parental controls to zero-knowledge proofs, and how they can protect children without exposing personal data.
What age verification actually means (and why the term is misleading)
What is age verification? Learn how age verification systems, software, and age checks work, including age estimation, age filters, and privacy risks.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
Your business data is about to automatically travel outside the EU. Here's why you should opt out and how to do it.
Image of a laptop with the EU flag and a unlocked icon
Businesses in Europe can reduce their reliance on US tech by investing in real digital sovereignty, not Big Tech sovereignty washing.
Over half of SMBs use a business password manager, but they're still not reaping the full benefits. Our research suggests solutions.