ProtonBlog

Privacy basics

  • Privacy basics
Phishing scams try to trick you into revealing sensitive data or downloading malware, often leading to identity theft, credit card fraud, or other cybercrime. Learn all about phishing and how to prevent it. With billions of phishing emails sent dail
how to stop email trackers
  • Privacy basics
Around 50% of all emails contain trackers that spy on your email activity — over 160 billion messages sent every day. Here’s how they work and how to block them. Working silently in the background, email trackers not only monitor how you respond to
what are email headers
  • Privacy basics
Email headers are the hidden part of emails containing vital information to identify and authenticate messages. Learn how to read them to spot spam and stay secure. Have you received an unexpected email from a strange address? Is it actually from so
how to encrypt files
  • Privacy basics
When you encrypt files on your computer, it’s like storing them in a vault: Only someone with the correct key can access them. That’s useful if you’re concerned about hackers stealing your most sensitive documents or companies scanning your data for
what is two factor authentication (2fa)
  • Privacy basics
Two-factor authentication (2FA) is an extra layer of protection for online accounts that requires you to use more than just your username and password to log in.  With 2FA enabled, you can protect access to your online accounts even if your password
  • Privacy basics
Internet users of a certain age might recall earlier days of personal computing, with stacks of labeled floppy disks or CDs lying around the office. Those have all but disappeared thanks to the widespread availability of cloud storage, which took off
how to password protect pdf header image
  • Privacy basics
When you’re emailed an important document, like a completed contract or a bank statement, it usually comes as a PDF. If you’re sending a PDF that contains sensitive information, you should try to prevent it from being accessed by unauthorized parties
can emails be traced
  • Privacy basics
You can’t trace an email to a person. But email providers, ISPs, and law enforcement agencies may identify and track you through your emails if you don’t take steps to protect your privacy. Whether to block spam, check for phishing, or simply invest
what is ciphertext
  • Privacy basics
Ciphertext is unreadable, encrypted data that can only be read if you know the key. Learn all about ciphertext and how it ensures your data privacy by securing computers and online communications, including encrypted email. When Julius Caesar wanted
  • Privacy basics
Data breaches are the most common way for your email address to be leaked on the internet. This can lead to it appearing in online forums, on the dark web, and other public spaces. It takes an average of 277 days to identify and contain a breach acco
  • Privacy basics
From having too many inboxes to manage to switching to a new email provider, there are many reasons why you’d want to delete your Gmail account. You might even be concerned that Google is abusing your privacy, and want to switch to a private Gmail al