Privacy Basics

The smartphone is one of the most invasive devices ever invented. It’s easy to forget that, of course, because we are so familiar with them, and they are so useful. But while you might value your smartphone for the convenience it gives you, tech comp
This post was updated on June 22, 2022. Your web browser is the vehicle that carries you around the Internet to your desired websites. As such, it knows precisely what sites you have visited, how long you spent browsing them, and what you clicked on
UPDATE Aug. 3, 2020: Cybersecurity experts discovered a new vulnerability that allows access to the private encryption keys stored in old versions of Apple’s Secure Enclave chips. The Secure Enclave chip is a security feature that protects the privat
Earlier this year, security researchers discovered a fire sale taking place on the dark web: 2.2 billion usernames and passwords that had been stolen in data breaches and compiled into a multi-volume database dubbed as Collection #1-5. With so many
The Internet is full of information about what companies should do to keep consumers’ personal data safe from hackers. And there’s plenty of advice for consumers who have already been the victim of a data breach. (You can read our article on the Prot
When you send an encrypted email with Proton Mail, your message is automatically protected with PGP encryption. What is PGP? This article explains the tech behind our security promise. PGP stands for Pretty Good Privacy, but the name is an ironic un
You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know that a password like “Ch@ll3ng3r%$” is not much more secure? Sure, it mixes upper- and lower-case letters, numbers and special c
Several years ago, the science comic blogger Randall Munroe, otherwise known as XKCD, posted a comic comparing passwords and passphrases. The illustration attempts to demonstrate mathematically, using information theory, that passwords tend to be wea
For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum length (usually eight characters), plus at least one capital letter, one number, and one special character (like @, #, or !). This
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON MAIL TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated July 2019 Total Internet privacy
You’ve heard the one about the Nigerian prince and the lottery windfall (we just need your bank account and social security number!). But email phishing scams are getting more sophisticated and persuasive. While they come in a variety of forms, the g