Proton

Przewodniki dot. prywatności

how to stop email trackers
en
  • Przewodniki dot. prywatności
Protect your inbox from email trackers. Learn how they work and learn easy ways to block them with Proton Mail’s tracking protection.
en
  • Przewodniki dot. prywatności
In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.
what are email headers
en
  • Przewodniki dot. prywatności
Learn what email headers are, what they contain, and how to read them to keep your inbox secure and spam-free.
how to encrypt files
en
  • Przewodniki dot. prywatności
If you have sensitive files or just want to keep your data private, here’s how to encrypt files on Windows, Mac, Android, and iOS.
what is two factor authentication (2fa)
en
  • Przewodniki dot. prywatności
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.
en
  • Przewodniki dot. prywatności
Cloud storage lets you share large files quickly, back up your data, and more. Read on to find out if you should use cloud storage.
how to password protect pdf header image
en
  • Przewodniki dot. prywatności
PDFs often contain sensitive information. Here’s how to protect PDFs with a password and securely share them with anyone.
can emails be traced
en
  • Przewodniki dot. prywatności
Email providers, ISPs, and law enforcers have ways to trace and track you through your emails. Here’s how to stay private online.
what is ciphertext
en
  • Przewodniki dot. prywatności
Learn all about ciphertext (encrypted text) and how it protects your privacy and secures online communications, including encrypted email.
en
  • Przewodniki dot. prywatności
We explain the different types of encryption for cloud storage, and why end-to-end encryption (e2ee) is the best for your files.
en
  • Przewodniki dot. prywatności
Data breaches leak millions of emails every year. Learn how to check if your email has been leaked and how you should respond.