ProtonBlog(new window)

Privacy deep dives

An illustration of Zoom's attendee attention tracking.
Zoom has seen a flood of new users as the COVID-19 outbreak forces more and more employees to transition to working from home. Zoom’s big selling point is its near-frictionless video calls. However, new users should be aware of the company’s privacy
An illustration of political campaigns sharing voter data.
During this American presidential election campaign season, politicians have scored points calling out tech companies for abusing the personal data of their users. Yet many political campaigns are engaged in very similar practices.  Political campai
An illustration of cryptojacking.
Cryptojacking made headlines back in 2017 when hackers hit a series of high profile websites (including several operated by the UK and Australian governments). Whenever somebody visited an infected site, the hackers were able to hijack the visitor’s
An illustration of different smart devices that make up the Internet of Things.
The Internet of Things has come a long way since the turn of the century when it was a buzzword used by futurists and entrepreneurs. Although not yet as ubiquitous as some predicted a decade ago, Internet-connected devices have crept into many aspect
Proton Mail for Journalist
Proton Mail is a free, encrypted email service that protects your messages from hackers, government surveillance, and data breaches. Not even Proton Mail can access your emails. Download the Proton Mail guide for journalists “Unencrypted journalist
Internet privacy
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON MAIL TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated July 2019 Total Internet privacy
Privacy vs security
Four years ago, the Pew Research Center, a US think tank, asked hundreds of cybersecurity experts to weigh in on a simple question: “By 2025, will a major cyber-attack have caused widespread harm to a nation’s security and capacity to defend itself a
Crossing an international border is often a stressful experience. It becomes all the more stressful if you are pulled aside for further inspection. Border searches, including phone searches and laptop searches, have become more common in recent years
protonmail-encryption-backdoor
For decades, law enforcement agencies have lobbied to force technology companies to weaken their own security protocols by adding an encryption backdoor. The FBI has even recently come up with a catchy brand for its anti-encryption campaign: “Going D
The vulnerability report, which came with its own website, efail.de, has attracted a lot of headlines such as the one below, along with recommendations to disable the usage of PGP plugins. This was not helped by the fact that until earlier today, the
Whether you cover the CIA or city hall, journalism is as much about keeping secrets as exposing them. We created this online security guide to help democracy’s defenders defend themselves too. Part of our mission at Proton Mail has always been to gi