ProtonBlog

Podstawy ochrony prywatności

en
  • Podstawy ochrony prywatności
Setting up your own private email server puts your email infrastructure under your control. This can be great for privacy since it cuts out big email service providers like Gmail and Microsoft Outlook, which can access and misuse your data. On the o
delete Dropbox account
en
  • Podstawy ochrony prywatności
Dropbox may have been the first mainstream cloud storage provider, but it’s no longer the best. It has a history of issues, from bugs in the interface to serious privacy and security problems. If you’re ready to switch providers, below we have instru
Best way to share photos
en
  • Podstawy ochrony prywatności
Thanks to smartphones, nearly everyone always has a high-quality camera with them at all times, and most of us take pictures of just about everything. However, sharing those photos with friends or family can be a bit of a hassle, especially if you wa
en
  • Podstawy ochrony prywatności
There are many reasons why you might want to delete your Outlook account. You may be tired of managing multiple accounts. Or perhaps you’re reevaluating your trust in popular email services due to growing concerns about data privacy.  After Microso
en
  • Podstawy ochrony prywatności
If there’s one thing protecting your personal, financial, and professional information from hackers, it’s your password. Reusing weak passwords is the main culprit in countless data breaches, even though it’s an extremely simple problem to fix. In t
en
  • Podstawy ochrony prywatności
Maybe you’re tired of juggling multiple email accounts. Or perhaps you’re concerned about how companies are angling for new ways to exploit your data for profit.  Whatever the case, there are many reasons why you might delete your Yahoo account for
how to stop google photos backup
en
  • Podstawy ochrony prywatności
Google Photos’ backup feature automatically backs up your photos on your Android device. While automatic backups are convenient, there are good reasons you may want to prevent Google from copying your pictures onto its servers. We’ll show you how to
how to disable Edge password manager
en
  • Podstawy ochrony prywatności
The password manager built into Edge, Microsoft’s proprietary browser, has several significant limitations that make it a poor choice to use as your everyday password manager. As a result, we’ve put together a small guide on how to turn off the Edge
en
  • Podstawy ochrony prywatności
Digital files live on physical devices. When those devices get lost, stolen, or hacked, you can lose all your data unless you’ve created backups on the cloud or another device. Data loss is surprisingly common, and sometimes it’s painful — you can l
What is your online identity?
en
  • Podstawy ochrony prywatności
Your online identity is hard to grasp: for some it’s the email address that you use for all your accounts, while for others it’s their Facebook profile or even a username on an online forum or multiplayer game world. In this article we’ll give one p
how to delete LastPass
en
  • Podstawy ochrony prywatności
If you’re still using LastPass, you probably shouldn’t be. It has some serious issues with security, the worst of which is when it suffered the worst data breach in the history of password managers. To help you get away, we’ve put together this guide