Privacy guides
- Privacy guides
Protect your inbox from email trackers. Learn how they work and learn easy ways
to block them with Proton Mail’s tracking protection.
- Privacy guides
In this article, we examine the LastPass data breach and consider the lessons
that can be drawn from it.
- Privacy guides
Learn what email headers are, what they contain, and how to read them to keep
your inbox secure and spam-free.
- Privacy guides
If you have sensitive files or just want to keep your data private, here’s how
to encrypt files on Windows, Mac, Android, and iOS.
- Privacy guides
Learn what 2FA is, how it works, and why you should use it wherever you can to
protect your privacy and security online.
- Privacy guides
Cloud storage lets you share large files quickly, back up your data, and more.
Read on to find out if you should use cloud storage.
- Privacy guides
PDFs often contain sensitive information. Here’s how to protect PDFs with a
password and securely share them with anyone.
- Privacy guides
Email providers, ISPs, and law enforcers have ways to trace and track you
through your emails. Here’s how to stay private online.
- Privacy guides
Learn all about ciphertext (encrypted text) and how it protects your privacy and
secures online communications, including encrypted email.
- Privacy guides
We explain the different types of encryption for cloud storage, and why
end-to-end encryption (e2ee) is the best for your files.
- Privacy guides
Data breaches leak millions of emails every year. Learn how to check if your
email has been leaked and how you should respond.