ProtonBlog

Privacy basics

why use private email
Private email is not just about blocking prying eyes or avoiding creepy online ads. Privacy is a basic human right that you need to protect yourself and ultimately defend your freedom, whoever you are, wherever you live. Your personal email is part
Cryptocurrency scams have cost people over a billion dollars — and they’re only becoming more prevalent. Learn what to look out for to avoid being scammed yourself.  The Washington Post recently reported that over $1 billion was lost to cryptocurren
The most private and secure way to communicate online is by using end-to-end encryption. If you send an end-to-end encrypted email, it’s encrypted on your device (your iPhone, Android, or laptop) and isn’t decrypted until it reaches the device of the
Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message was sent over the Vodafone network in 1992).  SMS is supported by almost every mobile network provider i
Email protocols explained IMAP and SMTP are protocols used by email clients to send and receive secure emails.  POP3 is a legacy standard that is used less and less often these days. * SMTP * IMAP * POP3 * APIs * Proton Mail and SMTP, IMAP, an
If you are doing research into data privacy laws, you will eventually come across the terms “personally identifiable information” and “personal data”. We explain what those terms mean, how they are different, and what you can do to protect your PII o
Most of us created our first email addresses when we were teenagers using the internet for the first time. Unfortunately, some of these email addresses consist of childhood nicknames, names of pets, and other awkward monikers, causing us embarrassmen
Safer Internet Day
Since our launch in 2014, our vision has been to build an internet where privacy is the default. For us, this not only means empowering people with the right tools to defend their online privacy, but also encouraging safe and responsible use of the i
There are lots of instances when you want to send the same email to multiple people. Sometimes, you want everyone to be part of the conversation and see each other’s responses. Other times, you want to send the same email to multiple people, but you
  • Privacy basics
Everything you need to know about cloud computing. Before the internet, your computer performed all its computing tasks locally. Your computer’s CPU and memory (etc.) were used to process information that was also stored locally (for example, on you
Data Privacy Week
Your personal data is the currency of the digital age. With every click, swipe, and like, you produce a wealth of information about yourself that companies track and collect, making it crucial to protect your online privacy. However, have you thought