Privacy Deep Dives

Cryptojacking made headlines back in 2017 when hackers hit a series of high profile websites (including several operated by the UK and Australian governments). Whenever somebody visited an infected site, the hackers were able to hijack the visitor’s
  • Privacy Basics
  • Privacy Deep Dives
The Internet of Things has come a long way since the turn of the century when it was a buzzword used by futurists and entrepreneurs. Although not yet as ubiquitous as some predicted a decade ago, Internet-connected devices have crept into many aspect
Proton Mail is a free, encrypted email service that protects your messages from hackers, government surveillance, and data breaches. Not even Proton Mail can access your emails. Download the Proton Mail guide for journalists “Unencrypted journalist
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON MAIL TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated July 2019 Total Internet privacy
Four years ago, the Pew Research Center, a US think tank, asked hundreds of cybersecurity experts to weigh in on a simple question: “By 2025, will a major cyber-attack have caused widespread harm to a nation’s security and capacity to defend itself a
Crossing an international border is often a stressful experience. It becomes all the more stressful if you are pulled aside for further inspection. Border searches, including phone searches and laptop searches, have become more common in recent years
> You may have heard the dark web is a place for drug dealers and hitmen. That’s > correct, but there’s more to it than that. In this article, find out what is > the dark web, how to access it, and what you might find there. The dark web is a part o
For decades, law enforcement agencies have lobbied to force technology companies to weaken their own security protocols by adding an encryption backdoor. The FBI has even recently come up with a catchy brand for its anti-encryption campaign: “Going D
The vulnerability report, which came with its own website, efail.de, has attracted a lot of headlines such as the one below, along with recommendations to disable the usage of PGP plugins. This was not helped by the fact that until earlier today, the
Whether you cover the CIA or city hall, journalism is as much about keeping secrets as exposing them. We created this online security guide to help democracy’s defenders defend themselves too. Part of our mission at Proton Mail has always been to gi
SECURITY IS A KEY CONSIDERATION WHEN IT COMES TO BITCOIN. HERE’S HOW YOU CAN KEEP YOUR BITCOINS SAFE FROM THEFT AND HACKING. You should know that when you invest in Bitcoin, not only could the price of Bitcoin drop, but there’s also the possibility