Privacy guides
en
- Privacy guides
Daniel Huigens, the head of Proton’s cryptography team, explains how the latest
crypto refresh makes PGP more secure.
en
- Privacy guides
If you’re migrating from iPhone to Android, there are a few ways to transfer
your data. Here are the top three methods.
en
- Privacy guides
Know your rights under the US CAN-SPAM Act to help you identify and beat spam
and comply if you send marketing emails.
en
- Privacy guides
CAPTCHAs perform a vital function, protecting websites from automated bots that
can create fake accounts or DDoS attacks.
en
- Privacy guides
Learn how to beat annoying and potentially harmful spam and keep your email
private and secure with Proton Mail.
en
- Privacy guides
There are two easy ways to password protect an Excel file. This article explains
how to encrypt files in Excel or using encrypted cloud storage.
en
- Privacy guides
Learn about email security, types of email attacks, and 10 tips to secure your
mailbox against common cyberthreats.

en
Your email address is an identifier tech giants use to track you and exploit
your personal data. Learn how to protect yours.

en
- Privacy guides
Cloud storage and physical storage options have advantages and disadvantages.
Learn more about each one.
en
Google claims privacy should be available to everyone. But this claim requires a
new definition of privacy that doesn’t hold up to scrutiny.
en
- Privacy guides
Data privacy means protecting your personal data from those who shouldn’t have
access. Learn how to protect yours.