Proton

Latest articles

What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
en
  • For business
Find out how to identify shadow IT risks and help your workers collaborate in a single, secure IT environment.
en
  • For business
  • Guias de privacidade
Learn what an email domain is and how to create the best custom email domain for personal or professional use.
How to delete all photos from Google Photos
en
  • Guias de privacidade
Find out how to delete photos from Google Photos while keeping them safely stored on your device, and use a private cloud storage app instead.
Proton Wallet
en
  • Atualizações de produto
  • Novidades da Proton
  • Proton Wallet
Proton Wallet is an easy-to-use self-custodial wallet that makes financial freedom attainable for everyone.
en
  • Guias de privacidade
Bitcoin is a digital currency built on a decentralized network of nodes that confirm transactions publicly.
en
  • Atualizações de produto
  • Proton Wallet
This article reviews the key features and security architecture that make Proton Wallet a private and secure wallet that is as easy to use as email.
proton scribe
en
  • Atualizações de produto
  • Proton Mail
  • Novidades da Proton
With Proton Scribe, your team will save time writing emails, and you'll protect your business data by reducing the need to expose it to AI assistants.
en
  • For business
This article will explain data sovereignty, why it matters, and how it can be achieved to not only protect you, but your business. 
en
  • Guias de privacidade
Find out how to use AI in Google Docs and how to prevent your data from being used for AI training.
en
  • Guias de privacidade
Learn how to find, edit, and delete your passwords on iPhone and how to improve your security with an encrypted password manager.
en
  • Atualizações de produto
  • Proton Pass
Share passwords, bank details, and other sensitive data securely using unique, end-to-end encrypted links with anyone.