Proton

Privacy guides

  • Privacy guides
Zero-knowledge cloud storage is the most secure way to store files and folders online. It uses strong encryption protocols, including end-to-end encryption, so that no one but you can access your data. Many popular cloud storage services, such as Go
What is U2F?
  • Privacy guides
U2F security keys help to keep your online accounts secure even if your passwords are compromised. Passwords alone aren’t enough to secure your online accounts. Too many passwords are easy for hackers to crack, and even if you use unique, strong pas
Alternartive search engines to Google
  • Privacy guides
Google records everything you do as you use its search engine and other apps. Here are some alternative search engines that respect your privacy. With around 90% of the search engine market share worldwide and billions of daily searches, Google rema
  • Privacy guides
Sharing digital content with others is an essential part of our daily lives. From sending an interesting news article to a friend to showcasing your portfolio to a client, there are countless scenarios where link sharing is the quickest and most conv
What is a digital signature?
  • Privacy guides
A digital signature on a document is like a virtual fingerprint that verifies the identity of the person or entity that signed it. Unlike handwritten signatures, which you can easily forge, digital signatures are highly secure because they’re protec
  • Privacy guides
Many people who use Apple products assume their data is private because of the company’s aggressive marketing on the topic. “Some things shouldn’t be shared. iPhone helps keep it that way,” goes one famous ad. “Privacy. That’s iPhone.” But if you u
  • Privacy guides
Whether it’s personal documents such as your birth certificate or confidential business files like work contracts, we all have sensitive documents we need to store securely. With so many storage options available, it’s important to understand the dif
  • Privacy guides
At Proton Mail, your security is our number one priority. Normally, this means protecting your inbox from unauthorized outside access. However, rather than trying to hack your software, phishing emails try to hack you. By spoofing emails from trusted
  • Privacy guides
Learn all about email clients and why you might use one instead of webmail. If you’ve used an app like Gmail on your mobile phone or Outlook on your computer, you’ve used an email client. We explain how an email client works and the pros and cons of
anonymous email
  • Privacy guides
No email service is completely anonymous. Learn how to send an email as anonymously as possible using private email, aliases, and a VPN or Tor. Do you need to send an email without revealing who you are? Unfortunately, you can’t just sign up for a f
How do scammers get your personal info?
  • Privacy guides
Fraudsters have many ways to steal your identity and money, but there are simple steps you can take to protect yourself. Given how much valuable personal data we store online, scammers have a strong incentive to try to steal it. With just a few pers