Proton

Proton blog

Proton Mail receives updates on iOS and Android
en
Map of the United States with six images of hacked computers
en
Disney settlement with FTC
en
Computer screen with passwords, access tokens, and a business account.
en

Latest articles

See all articles
Proton Mail receives updates on iOS and Android
en
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
How to send a follow-up email after an interview (templates included)
en
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.
How to send a follow-up email after an interview (templates included)
en
Learn how to write a proper email for all situations — big or small — and get your message noticed with these customizable templates.
Proton Mail receives updates on iOS and Android
en
See what’s new in the redesigned Proton Mail app for iOS and Android. Enjoy offline mode and a smoother experience on both platforms.
Proton Drive for Windows update that adds photo imports from local folders and Google Photos
en
You can now move pictures and albums from Google Photos or any folder into Proton Drive for Windows — all protected by end-to-end encryption.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
image shows a Swiss flag in the shape of a shield
en
The US recently implemented a 39% tariff of Swiss imports. In solidarity, Proton is offering discounts on our services to Swiss businesses and citizens.
Proton Authenticator logo with a gear wheel
en
  • Proton news
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
The LinkedIn logo and an AI symbol, representing how LinkedIn is using your data for AI training
en
LinkedIn will share your public data with Microsoft to train AI. Find what this means for your privacy and how to opt out.
Meta accused of bypassing Apple’s tracking rules
en
A former Meta employee alleges the company used internal tracking methods to bypass Apple’s privacy rules and inflate ad metrics.
Should security cost your privacy?
en
  • Privacy news
Former CIA officer Andrew Bustamante and Cato’s Jennifer Huddleston debate what privacy means today and how it shapes security, rights, and the internet.
A smartphone and a progress bar, representing iPhone storage
en
Running out of iPhone storage? Find out how to free up space, manage files, and maintain data privacy with Proton Drive.
A robot, family photos, and a warning sign, representing AI privacy concerns
en
  • Privacy guides
Find out the main artificial intelligence privacy concerns, from data collection and bias to deepfakes and surveillance, and how to protect yourself.
Illustration of a human brain with the label LLM
en
  • Privacy guides
What is a large language model (LLM) and how does it work? Here's what you need to know about LLMs and the future of privacy-first AI.
Illustration of a brain and a shield with the letters AI in the center
en
Big Tech companies are building AI aligned with their surveillance capitalism business model. We need a privacy-first and responsible AI alternative today.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
How to send a follow-up email after an interview (templates included)
en
Interview follow up emails are far more than good form. Stand out from other candidates with these five professional templates.
How to send a follow-up email after an interview (templates included)
en
Learn how to write a proper email for all situations — big or small — and get your message noticed with these customizable templates.
Illustrated laptop devices representing a network with a shield and a lock in the center of the screen
en
Cybercriminals will take any opportunity to gain unauthorized access to your servers. Learn how you can stop them.