ProtonBlog

Privacy basics

Data breach prevention illustration
The Internet is full of information about what companies should do to keep consumers’ personal data safe from hackers. And there’s plenty of advice for consumers who have already been the victim of a data breach. (You can read our article on the Prot
Learn what PGP encryption is, how it works, and the simplest way to secure your emails with PGP. When Edward Snowden secretly communicated his surveillance revelations to journalists in 2013, he used PGP encryption. Over the years, thousands around
You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know a password like “Ch@ll3ng3r%$” is not much more secure?  Sure, it mixes upper- and lower-case letters, numbers and special char
Several years ago, the science comic blogger Randall Munroe, otherwise known as XKCD, posted a comic comparing passwords and passphrases. The illustration attempts to demonstrate mathematically, using information theory, that passwords tend to be wea
For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum length (usually eight characters), plus at least one capital letter, one number, and one special character (like @, #, or !). This
Internet privacy
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON MAIL TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated July 2019 Total Internet privacy
black friday scams
You’ve heard the one about the Nigerian prince and the lottery windfall (we just need your bank account and social security number!). But email phishing scams are getting more sophisticated and persuasive. While they come in a variety of forms, the g
If your child is old enough to have a smartphone, then there’s a good chance you didn’t even have access to the Internet when you were a kid. You never had to think about online privacy growing up, and neither did your parents. But today it’s impera
google privacy problem
The Wall Street Journal recently published an article highlighting privacy concerns related to Gmail’s use of third-party apps. When users install tools known as “add-ons” in their Gmail accounts, they are often giving outside companies full access t
zero access encryption
Most of us would not give our private, personal information to strangers and then trust them not to leak it. But that’s essentially what we do every time we store chat histories, email, documents, and pictures on the cloud. When you save a document t
Hacks are surprisingly commonplace. In 2014, for instance, nearly half of all American adults had some form of data stolen from corporate servers in a 12-month span, according to CNN. Credit cards, telephone numbers, and login credentials are falling