Proton

Przewodniki dot. prywatności

en
  • Przewodniki dot. prywatności
WhatsApp may be secure but it’s not private. Learn about the best alternatives to WhatsApp that genuinely respect your privacy.
Illustration of cloud storage
en
  • Przewodniki dot. prywatności
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more about our storage model and how we protect your privacy.
en
  • Przewodniki dot. prywatności
Flash drives and external hard drives are convenient, but they're not always secure. We explain how you can encrypt your USB drives and protect your data.
An illustration of protesters protecing their privacy.
en
  • Przewodniki dot. prywatności
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
en
  • Przewodniki dot. prywatności
Learn all about TLS/SSL certificates, the digital files that help to authenticate and secure data transfers across the internet.
Illustration of changing email provider
en
  • Przewodniki dot. prywatności
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
  • Przewodniki dot. prywatności
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.
An illustration of anonymized data.
en
  • Przewodniki dot. prywatności
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.
en
  • Przewodniki dot. prywatności
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
An illustration of political campaigns sharing voter data.
en
  • Przewodniki dot. prywatności
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
An illustration of cryptojacking.
en
  • Przewodniki dot. prywatności
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.