Privacy guides
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Learn what 2FA is, how it works, and why you should use it wherever you can to
protect your privacy and security online.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Cloud storage lets you share large files quickly, back up your data, and more.
Read on to find out if you should use cloud storage.
![how to password protect pdf header image](https://pmecdn.protonweb.com/image-transformation/?s=c&image=images%2Ff_auto%2Cq_auto%2Fv1707564639%2Fwp-pme%2Fhow-to-pp-pdf-blog%402x%2Fhow-to-pp-pdf-blog%402x.png%3F_i%3DAA)
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
PDFs often contain sensitive information. Here’s how to protect PDFs with a
password and securely share them with anyone.
![can emails be traced](https://pmecdn.protonweb.com/image-transformation/?s=c&image=images%2Ff_auto%2Cq_auto%2Fv1707733036%2Fwp-pme%2Fcan-emails-be-traced_263899348b%2Fcan-emails-be-traced_263899348b.png%3F_i%3DAA)
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Email providers, ISPs, and law enforcers have ways to trace and track you
through your emails. Here’s how to stay private online.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Learn all about ciphertext (encrypted text) and how it protects your privacy and
secures online communications, including encrypted email.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
We explain the different types of encryption for cloud storage, and why
end-to-end encryption (e2ee) is the best for your files.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Data breaches leak millions of emails every year. Learn how to check if your
email has been leaked and how you should respond.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Jack Crompton, an engineer on our Web Core team, explains how we've enabled data
recovery without compromising your privacy.
![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=images%2Ff_auto%2Cq_auto%2Fv1707726829%2Fwp-pme%2Fhow-to-delete-gmail-blog%402x_25890a3c82%2Fhow-to-delete-gmail-blog%402x_25890a3c82.png%3F_i%3DAA)
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Gmail makes you pay for its free account with your data and privacy. Learn how
to delete your Gmail account and reclaim your privacy.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Your inbox contains sensitive information about your life. Here are five ways to
encrypt your emails and keep them safe from third parties.
en![](https://pmecdn.protonweb.com/image-transformation/?s=c&image=image%2Fupload%2Fv1693302053%2Fstatic%2Fflags%2Fen_kcfprj.svg)
- Privacy guides
Most email services aren’t secure and limit attachment file sizes. Here’s how to
send large files securely for free.