Proton

Najnowsze artykuły

en
  • Przewodniki dot. prywatności
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
  • Przewodniki dot. prywatności
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
  • Przewodniki dot. prywatności
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
  • Dla firm
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
  • Dla firm
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
  • Dla firm
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Co nowego w obszarze ochrony prywatności
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.
Coinbase, the largest Bitcoin exchange in the US, suffered a data breach
en
  • Co nowego w obszarze ochrony prywatności
  • Proton Wallet
Coinbase employees sold sensitive personal information to attackers, including government IDs and BTC transaction history. Proton Wallet is built to avoid these risks.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
  • Przewodniki dot. prywatności
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
  • Przewodniki dot. prywatności
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how
en
  • Przewodniki dot. prywatności
Read what age experts say you should let your child use different platforms and how you can help set them up for success.