Proton

Co nowego w obszarze ochrony prywatności

Illustration of the Apple monopoly
en
  • Co nowego w obszarze ochrony prywatności
The EU is investigating Apple’s App Store practices for antitrust violations. Here’s why we must all resist abuses by tech giants.
Illstration of the surveillance represented by user data requests.
en
  • Co nowego w obszarze ochrony prywatności
Companies like Facebook and Google collect massive amounts of data on their users, which national governments then request for surveillance purposes.
An illustration of Zoom's attendee attention tracking.
en
  • Co nowego w obszarze ochrony prywatności
If you’re using Zoom while working from home, you should be aware of Zoom's privacy policies, including its “attention tracking” tool.
illustration of email surveillance
en
  • Co nowego w obszarze ochrony prywatności
The Edison email app scrapes user data while making claims about practicing privacy by design. This misleads users and undermines their right to privacy.
illustration of EU e-evidence law
en
  • Co nowego w obszarze ochrony prywatności
We signed an open letter that opposes the EU’s proposal to loosen oversight of foreign data requests. We call on the EU to protect its citizens’ privacy.
An illustration of Kazakhstan government surveillance
en
  • Co nowego w obszarze ochrony prywatności
Kazakhstan is trying to spy on Internet traffic by forcing citizens to submit to a man-in-the-middle (MITM) attack. Here’s how to stay safe.
en
  • Co nowego w obszarze ochrony prywatności
Privacy experts say Gmail confidential mode is neither secure nor private because it does not use end-to-end encryption.
en
  • Co nowego w obszarze ochrony prywatności
We have joined Privacy For All Act with 23 other tech companies to support better privacy safeguards.
en
  • Co nowego w obszarze ochrony prywatności
We developed Proton Mail and Proton VPN to protect activists, dissidents, and journalists around the world.
australia assistance and access
en
  • Co nowego w obszarze ochrony prywatności
The Assistance and Access (A&A) law requires tech companies to help law enforcement agencies break into individuals’ encrypted data.
en
  • Co nowego w obszarze ochrony prywatności
In order to protect our user community, we have a zero-tolerance policy for criminal acts committed against Proton Mail, or criminal acts committed using Proton Mail.