Proton

Privacy guides

What is Authenticated Received Chain (ARC)?
en
  • Privacy guides
Authenticated Received Chain (ARC) allows email providers to verify that emails are genuine when forwarded or sent from a mailing list.
en
  • Privacy guides
You can encrypt pictures on any device or in the cloud. Here are step-by-step instructions to protect your privacy with image encryption.
en
  • Privacy guides
Zero-knowledge cloud storage protects your files with end-to-end encryption so only you can access your data. Here’s how it works.
What is U2F?
en
  • Privacy guides
Learn how FIDO U2F security keys help to keep your online accounts secure even if your passwords are compromised.
Alternartive search engines to Google
en
  • Privacy guides
Google tracks every move you make as you search. Here are five alternative search engines to protect your privacy.
en
  • Privacy guides
Learn how file sharing links work and the benefits of use an end-to-end encrypted link sharing app.
What is a digital signature?
en
  • Privacy guides
Learn how digital signatures work and ensure the authenticity and integrity of digital messages, documents, and other data transfers.
en
  • Privacy guides
Apple promotes its products as a private alternative, but iCloud is not private by default. Here's what Apple can see in iCloud.
en
  • Privacy guides
There are many ways to store documents, but they aren’t all secure. Learn how to properly store and protect your documents.
en
  • Privacy guides
Our Anti-abuse team is constantly monitoring new phishing attacks. We explain two creative new attacks and how Proton Mail can protect you.
en
  • Privacy guides
Learn all about email clients, how they work, and the pros and cons of using one compared to webmail.