Proton

Najnowsze artykuły

how to check email attachment is safe
en
  • Przewodniki dot. prywatności
Email attachments may contain malware that can infect your device. Here’s how to check if an attachment is safe to open.
en
  • Przewodniki dot. prywatności
Cloud storage is a popular alternative to hard drives and USBs — but what is cloud storage and how does it work? Here’s what you need to know.
en
  • Przewodniki dot. prywatności
Phishing scams can put you at risk of identity theft, credit card fraud, or other cybercrime. Learn how to spot and prevent phishing.
how to stop email trackers
en
  • Przewodniki dot. prywatności
Protect your inbox from email trackers. Learn how they work and learn easy ways to block them with Proton Mail’s tracking protection.
en
  • Przewodniki dot. prywatności
In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.
what are email headers
en
  • Przewodniki dot. prywatności
Learn what email headers are, what they contain, and how to read them to keep your inbox secure and spam-free.
Swiss laws and encryption protect Proton users from abortion-related data requests
en
  • Co nowego w obszarze ochrony prywatności
Google and Facebook are handing over user data to police for abortion prosecutions. Learn why Proton would never do that.
how to encrypt files
en
  • Przewodniki dot. prywatności
If you have sensitive files or just want to keep your data private, here’s how to encrypt files on Windows, Mac, Android, and iOS.
what is two factor authentication (2fa)
en
  • Przewodniki dot. prywatności
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.
en
  • Przewodniki dot. prywatności
Cloud storage lets you share large files quickly, back up your data, and more. Read on to find out if you should use cloud storage.
en
  • Opinia
The UK’s proposed Online Safety Bill would likely undermine free speech and end-to-end encryption without tackling illegal content.