ProtonBlog(new window)

Privacy basics

An illustration of different smart devices that make up the Internet of Things.
  • Privacy basics
  • Privacy deep dives
The Internet of Things has come a long way since the turn of the century when it was a buzzword used by futurists and entrepreneurs. Although not yet as ubiquitous as some predicted a decade ago, Internet-connected devices have crept into many aspect
illustration of biometric authentication
  • Privacy basics
Biometric authentication is a growing part of the tech landscape — it’s in our schools, offices, airports, government buildings, and more recently, in our smartphones. Apple’s introduction of Touch ID in 2013 has paved the way for fingerprint-, face-
  • Privacy basics
The smartphone is one of the most invasive devices ever invented. It’s easy to forget that, of course, because we are so familiar with them, and they are so useful. But while you might value your smartphone for the convenience it gives you, tech comp
  • Privacy basics
This post has been completely refreshed on November 28, 2022 Your web browser is your window into the online world. On desktop PCs and laptops, it’s your primary means of accessing the world wide web and other internet services.  Thanks to the popu
illustration of protonmail ios security recommendation
  • Privacy basics
UPDATE Aug. 3, 2020: Cybersecurity experts discovered a new vulnerability that allows access to the private encryption keys stored in old versions of Apple’s Secure Enclave chips. The Secure Enclave chip is a security feature that protects the privat
Data breach prevention illustration
  • Privacy basics
The Internet is full of information about what companies should do to keep consumers’ personal data safe from hackers. And there’s plenty of advice for consumers who have already been the victim of a data breach. (You can read our article on the Prot
  • Privacy basics
Learn what PGP encryption is, how it works, and the simplest way to secure your emails with PGP. When Edward Snowden secretly communicated his surveillance revelations to journalists in 2013, he used PGP encryption. Over the years, thousands around
  • Privacy basics
You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know a password like “Ch@ll3ng3r%$” is not much more secure?  Sure, it mixes upper- and lower-case letters, numbers and special char
  • Privacy basics
For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum length (usually eight characters), plus at least one capital letter, one number, and one special character (like @, #, or !). This
Internet privacy
  • Privacy basics
  • Privacy deep dives
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated February 2024 Total internet privacy i
black friday scams
  • Privacy basics
You’ve heard the one about the Nigerian prince and the lottery windfall (we just need your bank account and social security number!). But email phishing scams are getting more sophisticated and persuasive. While they come in a variety of forms, the g