Nieuwste artikelen
Big Tech companies have found ways to get more and more advertising revenue out
of their users. The secret? They track your activity all over the internet.
- Productupdates
- Proton Mail
The batch GCD algorithm can extract secret keys from large databases of public
keys. Proton Mail is secure against this vulnerability.
Import Assistant lets you migrate messages and folders from your old email
service to your encrypted Proton Mail account.
- Privacygidsen
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more
about our storage model and how we protect your privacy.
The US House subcommittee investigation of tech monopolies confirms the
arguments we have made for years. Antitrust enforcement is essential for
privacy.
The EU Court of Justice ruled EU law applies when governments force
telecommunication providers to process data, making it harder to perform mass
surveillance.
- Proton-nieuws
On September 29, an internet routing error by an Australian ISP redirected a
third of our global traffic. ISPs must start taking BGP hijacking seriously.
- Productupdates
We’re making Proton tools even more seamlessly connected, letting you sign in
once to access your inbox, calendar, cloud storage, and more.
- Proton-nieuws
Proton has joined the Coalition for App Fairness to support regulatory efforts
that favor an open, free, and private internet for all.
Google searches for privacy-focused Gmail alternatives have steadily increased
since 2019. We examine the numbers and potential reasons why.
Flash drives and external hard drives are convenient, but they're not always
secure. We explain how you can encrypt your USB drives and protect your data.