Proton

Блог Proton

Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
Facial recognition technology: How your face became a commodity
en
  • Новости о конфиденциальности
Gmail logo with a hazard sign in the corner
en
  • Новости о конфиденциальности
Magnifying glass examining a website on a monitor.
en
  • Новости о конфиденциальности

Последние статьи

Посмотреть все статьи
How to send a secure email every time
en
Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.
Out of office messages that say “vacation mode,” professionally
en
Less screen time, more beach time — these are the only 10 out of office message examples you'll need before your summer holiday.
12 email management tips to organize your inbox
en
These 12 email management strategies will help you declutter your inbox, stay organized, and enhance your focus throughout the workday.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
  • Новости о продуктах
  • Новости Proton
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Image of the Lumo purple cat with the words Lumo 1.1 by Proton
en
  • Lumo
  • Новости о продуктах
Lumo 1.1 is a faster, smarter AI assistant that matches Big Tech’s capabilities while protecting your privacy with zero-access encryption.
en
  • Lumo
  • Новости о продуктах
Your AI chats deserve privacy. Learn how Lumo keeps your conversations confidential with zero-access encryption and no logs.
Image showing how Emergency Access works in Proton in which you can grant trusted contacts access to your account in the event of an emergency
en
  • Новости о продуктах
  • Новости Proton
When something unexpected happens, make sure your loved ones can get the critical data they need with Emergency Access for your Proton Account.
Proton Authenticator logo with a gear wheel
en
  • Новости Proton
  • Proton Pass
To build a secure 2FA app for all major devices, Proton turned to Rust. Carlos Quintana explains why we chose Rust and why we'll likely use it more in the future.
Proton's secure authenticator app demonstration of the user interface for mobile and desktop
en
  • Новости Proton
We're launching a secure, independent authenticator app available on desktop and mobile, to help you secure your online accounts.
Facial recognition technology: How your face became a commodity
en
  • Новости о конфиденциальности
Facial recognition technology turns your face into data for ads, surveillance, and tracking. Learn the risks — and how to protect your identity.
Gmail logo with a hazard sign in the corner
en
  • Новости о конфиденциальности
Google has warned Workspace users that they should change to passkeys after a surge in phishing attacks. Learn more and what you can do.
Magnifying glass examining a website on a monitor.
en
  • Новости о конфиденциальности
Several recent studies have found data brokers in the US ignoring data requests, hiding opt-out pages, and more. Learn what you can to do to fight back.
An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
  • Для бизнеса
  • Советы о конфиденциальности
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
A family photo, a location pin, a camera, and a clock, symbolizing the risks of EXIF data for your personal photos
en
  • Советы о конфиденциальности
EXIF data in your photos can reveal more than you think, including your location. Learn how to protect your privacy before sharing online.
A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
en
  • Советы о конфиденциальности
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
Apple's latest DMA compliance proposal is at attempt to confuse users and developers so they don't leave the current terms, where Apple can charge exorbitant fees.
en
  • Мнения
Apple's latest proposal to comply with the DMA is just another attempt to cheat users and developers. We explain its convoluted terms and why they're no good.
A hand holding a person's photo or ID, symbolizing how data brokers are a threat to democracy
en
  • Мнения
  • Новости о конфиденциальности
Data brokers sell your personal info without consent. Here’s how they threaten democracy — and what you can do to stop them.
adolescence and the internet we handed to kids
en
Adolescence shows how platforms shape kids in harmful ways. Here's why transparent, open digital education must lead the change.
How to send a secure email every time
en
Here's a simple, step-by-step guide to sending secure emails using Gmail, Outlook, Proton Mail, and more to keep all of your communications safe.
Out of office messages that say “vacation mode,” professionally
en
Less screen time, more beach time — these are the only 10 out of office message examples you'll need before your summer holiday.
12 email management tips to organize your inbox
en
These 12 email management strategies will help you declutter your inbox, stay organized, and enhance your focus throughout the workday.