Proton

Privacy guides

  • Privacy guides
The most private and secure way to communicate online is by using end-to-end encryption. If you send an end-to-end encrypted email, it’s encrypted on your device (your iPhone, Android, or laptop) and isn’t decrypted until it reaches the device of the
  • Privacy guides
DNA companies are using, sharing, and profiting from millions of people’s genetic data in ways they can’t always control. Genetic testing companies have become very popular in the last decade as people seek to find out who they are and where their a
  • Privacy guides
Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message was sent over the Vodafone network in 1992).  SMS is supported by almost every mobile network provider i
  • Privacy guides
Email protocols explained IMAP and SMTP are protocols used by email clients to send and receive secure emails.  POP3 is a legacy standard that is used less and less often these days. * SMTP * IMAP * POP3 * APIs * Proton Mail and SMTP, IMAP, an
  • Privacy guides
Fingerprinting is a way to identify you on the internet and can be very hard to prevent. In this article, we discuss what fingerprinting is, and how to reduce your fingerprint. * What is browser fingerprinting? * What is device fingerprinting? *
What is personally identifiable information
  • Privacy guides
If you’re a little tech savvy, you probably know you need to protect personally identifiable information, also known as PII. But what is considered personally identifiable information exactly? And how can you best protect your personal data? * What
  • Privacy guides
Most of us created our first email addresses when we were teenagers using the internet for the first time. Unfortunately, some of these email addresses consist of childhood nicknames, names of pets, and other awkward monikers, causing us embarrassmen
  • Privacy guides
There are lots of instances when you want to send the same email to multiple people. Sometimes, you want everyone to be part of the conversation and see each other’s responses. Other times, you want to send the same email to multiple people, but you
  • Privacy guides
Everything you need to know about cloud computing. Before the internet, your computer performed all its computing tasks locally. Your computer’s CPU and memory (etc.) were used to process information that was also stored locally (for example, on you
what-is-spam-email
  • Privacy guides
Learn about unsolicited messages sent in bulk by email, how to identify and prevent them, and how spam email filters work. What is spam email? What is the purpose of spam emails? Are spam emails dangerous? How do spammers get your email address? Com
Privacy decrypted: privacy policy
  • Privacy guides
Privacy policies explain how organizations collect and secure your personal information, but few people read them. Here’s how to quickly check a privacy policy to take back control of your data. When you last bought something online, you may have gl