Proton

Privacy guides

  • Privacy guides
You can encrypt pictures on any device or in the cloud. Here are step-by-step instructions to protect your privacy with image encryption.
  • Privacy guides
Zero-knowledge cloud storage protects your files with end-to-end encryption so only you can access your data. Here’s how it works.
What is U2F?
  • Privacy guides
Learn how FIDO U2F security keys help to keep your online accounts secure even if your passwords are compromised.
Alternartive search engines to Google
  • Privacy guides
Google tracks every move you make as you search. Here are five alternative search engines to protect your privacy.
  • Privacy guides
Learn how file sharing links work and the benefits of use an end-to-end encrypted link sharing app.
What is a digital signature?
  • Privacy guides
Learn how digital signatures work and ensure the authenticity and integrity of digital messages, documents, and other data transfers.
  • Privacy guides
Apple promotes its products as a private alternative, but iCloud is not private by default. Here's what Apple can see in iCloud.
  • Privacy guides
There are many ways to store documents, but they aren’t all secure. Learn how to properly store and protect your documents.
  • Privacy guides
Our Anti-abuse team is constantly monitoring new phishing attacks. We explain two creative new attacks and how Proton Mail can protect you.
  • Privacy guides
Learn all about email clients, how they work, and the pros and cons of using one compared to webmail.
anonymous email
  • Privacy guides
Learn how to send an email as anonymously as possible using Proton Mail, SimpleLogin, and a VPN or Tor.