Privacy guides
Authenticated Received Chain (ARC) allows email providers to verify that emails
are genuine when forwarded or sent from a mailing list.
- Privacy guides
You can encrypt pictures on any device or in the cloud. Here are step-by-step
instructions to protect your privacy with image encryption.
- Privacy guides
Zero-knowledge cloud storage protects your files with end-to-end encryption so
only you can access your data. Here’s how it works.
Learn how FIDO U2F security keys help to keep your online accounts secure even
if your passwords are compromised.
- Privacy guides
Google tracks every move you make as you search. Here are five alternative
search engines to protect your privacy.
- Privacy guides
Learn how file sharing links work and the benefits of use an end-to-end
encrypted link sharing app.
- Privacy guides
Learn how digital signatures work and ensure the authenticity and integrity of
digital messages, documents, and other data transfers.
- Privacy guides
Apple promotes its products as a private alternative, but iCloud is not private
by default. Here's what Apple can see in iCloud.
- Privacy guides
There are many ways to store documents, but they aren’t all secure. Learn how to
properly store and protect your documents.
- Privacy guides
Our Anti-abuse team is constantly monitoring new phishing attacks. We explain
two creative new attacks and how Proton Mail can protect you.
- Privacy guides
Learn all about email clients, how they work, and the pros and cons of using one
compared to webmail.