Proton

Najnowsze artykuły

illustration of Proton Mail iOS client security
en
  • Aktualizacje produktów
  • Proton Mail
We have published the Proton Mail iOS security model to highlight how Proton Mail for iOS has a higher level of security compared to typical apps.
illustration of protonmail ios security recommendation
en
  • Przewodniki dot. prywatności
Activate Touch ID, Face ID, or PIN protection in the Proton Mail iOS app for added protection against malware and warrantless device searches.
en
  • Aktualności Proton
With the latest version of the web app, Proton Mail is laying the groundwork for future products and more customization. Learn how to start using Version 4.0 beta now.
en
  • Aktualności Proton
Protesters around the world are using Proton Mail to secure their communications. We support their right to free speech and privacy.
Illustration of why Proton Mail is trustworthy
en
  • Aktualizacje produktów
  • Proton Mail
It’s important to trust your email provider because they safeguard some of your most sensitive data. Should you trust Proton Mail?
We oppose facial recognition surveillance
en
  • Opinia
Police in the US are using facial recognition surveillance to spy on citizens. We support a moratorium until lawmakers pass protective regulations.
Illustration of multi-account support in Proton Mail Android.
en
  • Aktualizacje produktów
  • Proton Mail
The new version of Proton Mail Android has multi-account support so users can access multiple Proton Mail accounts on their Android device.
Illustration for Proton Mail security update
en
  • Aktualności Proton
Proton Mail announces new security features (including WKD, DANE, and MTA-STS) and working on improvements to provide users with more protection against attackers.
en
  • Aktualizacje produktów
  • Proton Mail
Proton Mail official clarification about Huawei partnership.
en
  • Aktualizacje produktów
  • Proton Mail
The monopoly of Apple and Google over app distribution is bad for the Internet. Here’s how Proton is working to expand users’ choices.
Data breach prevention illustration
en
  • Przewodniki dot. prywatności
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.