Privacy Basics

The most private and secure way to communicate online is by using end-to-end encryption. If you send an end-to-end encrypted message, it is encrypted on your device (your iPhone, Android, or laptop), and it is not decrypted until it reaches the devic
Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message was sent over the Vodaphone network in 1992).  SMS is supported by almost every mobile network provider
Email protocols explained IMAP and SMTP are protocols used by email clients to send and receive emails.  POP3 is a legacy standard that is used less and less often these days. * SMTP * IMAP * POP3 * APIs * Proton Mail and SMTP, IMAP, and POP3
If you are doing research into data privacy laws, you will eventually come across the terms “personally identifiable information” and “personal data”. We explain what those terms mean, how they are different, and what you can do to protect your PII o
Most of us created our first email addresses when we were teenagers using the internet for the first time. Unfortunately, some of these email addresses consist of childhood nicknames, names of pets, and other awkward monikers, causing us embarrassmen
Since our launch in 2014, our vision has been to build an internet where privacy is the default. For us, this not only means empowering people with the right tools to defend their online privacy, but also encouraging safe and responsible use of the i
There are lots of instances when you want to send the same email to multiple people. Sometimes, you want everyone to be part of the conversation and see each other’s responses. Other times, you want to send the same email to multiple people, but you
  • Privacy Basics
Everything you need to know about cloud computing. Before the internet, your computer performed all its computing tasks locally. Your computer’s CPU and memory (etc.) were used to process information that was also stored locally (for example, on you
Your personal data is the currency of the digital age. With every click, swipe, and like, you produce a wealth of information about yourself that companies track and collect, making it crucial to protect your online privacy. However, have you thought
Privacy policies explain how organizations collect and secure your personal information, but few people read them. Here’s how to quickly check a privacy policy to take back control of your data. When you last bought something online, you may have gl
From holiday photos to our purchasing history to personal correspondences, our emails contain a great deal of sensitive information. It is therefore vital to keep your inbox and messages secure. This is more difficult than it first appears, as email