Proton

Privacy guides

  • Privacy guides
For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum length (usually eight characters), plus at least one capital letter, one number, and one special character (like @, #, or !). This
Internet privacy
  • Privacy guides
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated February 2024 Total internet privacy i
black friday scams
  • Privacy guides
You’ve heard the one about the Nigerian prince and the lottery windfall (we just need your bank account and social security number!). But email phishing scams are getting more sophisticated and persuasive. While they come in a variety of forms, the g
Privacy vs security
  • Privacy guides
Four years ago, the Pew Research Center, a US think tank, asked hundreds of cybersecurity experts to weigh in on a simple question: “By 2025, will a major cyber-attack have caused widespread harm to a nation’s security and capacity to defend itself a
  • Privacy guides
If your child is old enough to have a smartphone, then there’s a good chance you didn’t even have access to the Internet when you were a kid. You never had to think about online privacy growing up, and neither did your parents. But today it’s impera
  • Privacy guides
Crossing an international border is often a stressful experience. It becomes all the more stressful if you are pulled aside for further inspection. Border searches, including phone searches and laptop searches, have become more common in recent years
google privacy problem
  • Privacy guides
The Wall Street Journal recently published an article highlighting privacy concerns related to Gmail’s use of third-party apps. When users install tools known as “add-ons” in their Gmail accounts, they are often giving outside companies full access t
protonmail-encryption-backdoor
  • Privacy guides
For decades, law enforcement agencies have lobbied to force technology companies to weaken their own security protocols by adding an encryption backdoor. The FBI has even recently come up with a catchy brand for its anti-encryption campaign: “Going D
What is Zero-access encryption
  • Privacy guides
Most of us would not give our private, personal information to strangers and then trust them not to leak it. But that’s essentially what we do every time we store chat histories, email, documents, and pictures on the cloud. When you save a document t
  • Privacy guides
Hacks are surprisingly commonplace. In 2014, for instance, nearly half of all American adults had some form of data stolen from corporate servers in a 12-month span, according to CNN. Credit cards, telephone numbers, and login credentials are falling
  • Privacy guides
Whether you cover the CIA or city hall, journalism is as much about keeping secrets as exposing them. We created this online security guide to help democracy’s defenders defend themselves too. Part of our mission at Proton Mail has always been to gi