ProtonBlog(new window)

Privacy basics

HTTPS IS THE BACKBONE THAT KEEPS EVERYONE SAFE AND SECURE ON THE INTERNET. HOWEVER, IT DOES LITTLE TO PREVENT YOU FROM BEING TRACKED ONLINE. When you surf the web, you connect to websites using the Hypertext Transfer Protocol (HTTP), first developed
create a new email account visual
An email address is your portal to the internet. Without one, you can’t use most of the services available on the web. Research from the Radicati Group shows that most of us have multiple email addresses, with the number of addresses per email user i
If you’re struggling to think up strong passwords you can remember for your online accounts, here’s a simple, secure solution — for you and the whole family. You’ve heard the security advice: “Create a unique, strong password for each account”. But
Email management tips
With so much of your life spent on the internet, an organized inbox isn’t just a matter of being tidy — it’s about being productive and focusing your attention on tasks that really matter. The average office worker receives around 121 emails and send
Your personal email address is an essential part of your digital identity. Like your phone number, you don’t give it to everyone you meet. That’s why it’s useful to have other email addresses you can use for different purposes. But you may not want
Anonymity is not the same thing as privacy, and confusing these related but different concepts can weaken your online threat model.  * Anonymity – Keeping your identity private, but not your actions. For example, using a pseudonym to post messag
Privacy services often rely on strong encryption to protect privacy and confidentiality. Some terms that you have heard probably include AES, RSA, or maybe even elliptic-curve cryptography (ECC). However, is encryption actually bulletproof and a guar
Privacy and anonymity are often tossed about as synonymous terms but they are actually related ideas that represent different things. Put simply: * Privacy is freedom from observation or attention. * Anonymity is freedom from identification or rec
In its broadest sense, threat modeling is the systematic analysis of potential risks and attack vectors, with the aim of developing effective defenses against identified threats. On a personal level, we engage in threat modeling all the time – simply
Proton Mail was founded in 2014 to build a better internet where privacy is the default, and to protect activists, journalists, and ordinary people from online surveillance. We are activists ourselves, and over the years we have supported movements a
Email is full of private, personal, and everyday data. Letters to friends and colleagues, shopping receipts, calendar events, flight confirmations: email is a continuous stream of data. From days to decades, that everyday data adds up and tells a sto