Proton

Najnowsze artykuły

An illustration of the Chinese government using TikTok to watch its users.
en
  • Co nowego w obszarze ochrony prywatności
TikTok is the fastest growing social media platform in the world. However, its links to the Chinese government also pose a major privacy problem
An illustration of law enforcement breaking through encryption.
en
  • Co nowego w obszarze ochrony prywatności
The US Congress is considering a bill that will ban end-to-end encryption and give law enforcement access to almost any encrypted app or device.
An illustration of the Chinese government monitoring Hong Kong citizens.
en
  • Co nowego w obszarze ochrony prywatności
The Chinese government has granted Hong Kong law enforcement agencies sweeping surveillance and Internet censorship powers with Article 43.
Illustration of the Apple monopoly
en
  • Co nowego w obszarze ochrony prywatności
The EU is investigating Apple’s App Store practices for antitrust violations. Here’s why we must all resist abuses by tech giants.
An image of Proton Mail's open source encryption libraries.
en
  • Aktualności Proton
Developers can now quickly see which other cryptographic libraries OpenPGP.js and GopenPGP work with. This makes developing encrypted apps much easier.
An illustration of protesters protecing their privacy.
en
  • Przewodniki dot. prywatności
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
Illstration of the surveillance represented by user data requests.
en
  • Co nowego w obszarze ochrony prywatności
Companies like Facebook and Google collect massive amounts of data on their users, which national governments then request for surveillance purposes.
en
  • Przewodniki dot. prywatności
Learn all about TLS/SSL certificates, the digital files that help to authenticate and secure data transfers across the internet.
Illustration of changing email provider
en
  • Przewodniki dot. prywatności
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
  • Przewodniki dot. prywatności
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.
An illustration of anonymized data.
en
  • Przewodniki dot. prywatności
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.