ProtonBlog

Основы конфиденциальности

en
  • Основы конфиденциальности
This post has been completely refreshed on November 28, 2022 Your web browser is your window into the online world. On desktop PCs and laptops, it’s your primary means of accessing the world wide web and other internet services.  Thanks to the popu
illustration of protonmail ios security recommendation
en
  • Основы конфиденциальности
UPDATE Aug. 3, 2020: Cybersecurity experts discovered a new vulnerability that allows access to the private encryption keys stored in old versions of Apple’s Secure Enclave chips. The Secure Enclave chip is a security feature that protects the privat
Data breach prevention illustration
en
  • Основы конфиденциальности
The Internet is full of information about what companies should do to keep consumers’ personal data safe from hackers. And there’s plenty of advice for consumers who have already been the victim of a data breach. (You can read our article on the Prot
en
  • Основы конфиденциальности
Learn what PGP encryption is, how it works, and the simplest way to secure your emails with PGP. When Edward Snowden secretly communicated his surveillance revelations to journalists in 2013, he used PGP encryption. Over the years, thousands around
en
  • Основы конфиденциальности
You probably already know some obvious password safety tips, like don’t use “password” as your password. But did you know a password like “Ch@ll3ng3r%$” is not much more secure?  Sure, it mixes upper- and lower-case letters, numbers and special char
en
  • Основы конфиденциальности
For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum length (usually eight characters), plus at least one capital letter, one number, and one special character (like @, #, or !). This
Internet privacy
en
  • Основы конфиденциальности
  • Подробности о конфиденциальности
IMPROVE YOUR ONLINE PRIVACY WITH THIS COMPREHENSIVE GUIDE, DEVELOPED BY THE PROTON TEAM. HERE, WE’LL HELP YOU DETERMINE YOUR THREAT MODEL AND TAKE STEPS TO ACHIEVE ONLINE PRIVACY THAT MEETS YOUR NEEDS. Updated February 2024 Total internet privacy i
black friday scams
en
  • Основы конфиденциальности
You’ve heard the one about the Nigerian prince and the lottery windfall (we just need your bank account and social security number!). But email phishing scams are getting more sophisticated and persuasive. While they come in a variety of forms, the g
en
  • Основы конфиденциальности
If your child is old enough to have a smartphone, then there’s a good chance you didn’t even have access to the Internet when you were a kid. You never had to think about online privacy growing up, and neither did your parents. But today it’s impera
google privacy problem
en
  • Основы конфиденциальности
The Wall Street Journal recently published an article highlighting privacy concerns related to Gmail’s use of third-party apps. When users install tools known as “add-ons” in their Gmail accounts, they are often giving outside companies full access t
What is Zero-access encryption
en
  • Основы конфиденциальности
Most of us would not give our private, personal information to strangers and then trust them not to leak it. But that’s essentially what we do every time we store chat histories, email, documents, and pictures on the cloud. When you save a document t