Privacy guides
- Privacy guides
As part of our Privacy Decrypted series, we look at how strong encryption really
is and ask: can it be broken?
Anonymity and privacy are two related but distinct concepts. Learn how they are
different and the steps you can take to maximize your privacy and anonymity.
- Privacy guides
Developing a threat model allows individuals and companies to assess their
online privacy and security needs. We discuss what this means.
- Privacy guides
Knowledge is power. Today, we're launching Privacy Decrypted, a new initiative
to arm activists with essential knowledge.
The Proton Mail encrypted email app ensures nobody but you can access your
inbox. It automatically keeps your email safe, secure, and private.
- Privacy guides
Open-source software makes its source code available to the public. Learn how
open-source encryption creates transparency and protects your privacy.
- Privacy guides
Whether you’re an individual or a business, using end-to-end encrypted email can
help you stay secure online. Learn about email encryption in this article.
- Privacy guides
Want to be sure that your personal data is safe? Here’s our guide to picking a
free email account.
- Privacy guides
Whether you consider your emails ‘sensitive’ or not, everyone deserves email
privacy. Email encryption helps to secure your privacy online.
- Privacy guides
WhatsApp may be secure but it’s not private. Learn about the best alternatives
to WhatsApp that genuinely respect your privacy.
- Privacy guides
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more
about our storage model and how we protect your privacy.