ProtonBlog(new window)

Privacy basics

  • Privacy basics
Internet users of a certain age might recall earlier days of personal computing, with stacks of labeled floppy disks or CDs lying around the office. Those have all but disappeared thanks to the widespread availability of cloud storage, which took off
how to password protect pdf header image
  • Privacy basics
When you’re emailed an important document, like a completed contract or a bank statement, it usually comes as a PDF. If you’re sending a PDF that contains sensitive information, you should try to prevent it from being accessed by unauthorized parties
can emails be traced
  • Privacy basics
You can’t trace an email to a person. But email providers, ISPs, and law enforcement agencies may identify and track you through your emails if you don’t take steps to protect your privacy. Whether to block spam, check for phishing, or simply invest
what is ciphertext
  • Privacy basics
Ciphertext is unreadable, encrypted data that can only be read if you know the key. Learn all about ciphertext and how it ensures your data privacy by securing computers and online communications, including encrypted email. When Julius Caesar wanted
  • Privacy basics
Data breaches are the most common way for your email address to be leaked on the internet. This can lead to it appearing in online forums, on the dark web, and other public spaces. It takes an average of 277 days to identify and contain a breach acco
  • Privacy basics
From having too many inboxes to manage to switching to a new email provider, there are many reasons why you’d want to delete your Gmail account. You might even be concerned that Google is abusing your privacy, and want to switch to a private Gmail al
  • Privacy basics
Your emails contain a great deal of sensitive information about your identity. If you’re concerned about your online privacy, you should encrypt your inbox and messages to prevent unauthorized third parties from accessing them. As with all online con
send large files securely
  • Privacy basics
Most email services aren’t secure and limit attachment file sizes, but there are ways to send large files securely. If you’ve ever tried attaching multiple images or video files to an email, you’ll know that it doesn’t always work. We explain ways t
  • Privacy basics
Email wasn’t initially designed to be secure. From spam and phishing attempts to malware, unethical marketers and cybercriminals try to undermine the security and privacy of your inbox every day. Since your inbox stores plenty of sensitive informatio
  • Privacy basics
We all rely on email to communicate in our professional and personal lives. From calendar events to flight confirmations and online shopping receipts, our inbox contains private data about our schedules, interests, and habits. Our reliance on email m
secure file sharing
  • Privacy basics
Whether you’re sharing personal documents with family or collaborating on a secret project at work, here’s how to ensure you share files securely. What is secure file sharing? Types of file sharing Why use secure file sharing? 8 tips for secure file