Proton

Privacy news

An illustration of the Chinese government monitoring Hong Kong citizens.
en
  • Privacy news
The Chinese government has granted Hong Kong law enforcement agencies sweeping surveillance and Internet censorship powers with Article 43.
Illustration of the Apple monopoly
en
  • Privacy news
The EU is investigating Apple’s App Store practices for antitrust violations. Here’s why we must all resist abuses by tech giants.
Illstration of the surveillance represented by user data requests.
en
  • Privacy news
Companies like Facebook and Google collect massive amounts of data on their users, which national governments then request for surveillance purposes.
An illustration of Zoom's attendee attention tracking.
en
  • Privacy news
If you’re using Zoom while working from home, you should be aware of Zoom's privacy policies, including its “attention tracking” tool.
illustration of email surveillance
en
  • Privacy news
The Edison email app scrapes user data while making claims about practicing privacy by design. This misleads users and undermines their right to privacy.
illustration of EU e-evidence law
en
  • Privacy news
We signed an open letter that opposes the EU’s proposal to loosen oversight of foreign data requests. We call on the EU to protect its citizens’ privacy.
An illustration of Kazakhstan government surveillance
en
  • Privacy news
Kazakhstan is trying to spy on Internet traffic by forcing citizens to submit to a man-in-the-middle (MITM) attack. Here’s how to stay safe.
en
  • Privacy news
Privacy experts say Gmail confidential mode is neither secure nor private because it does not use end-to-end encryption.
en
  • Privacy news
We have joined Privacy For All Act with 23 other tech companies to support better privacy safeguards.
en
  • Privacy news
We developed Proton Mail and Proton VPN to protect activists, dissidents, and journalists around the world.
australia assistance and access
en
  • Privacy news
The Assistance and Access (A&A) law requires tech companies to help law enforcement agencies break into individuals’ encrypted data.