Proton

Советы о конфиденциальности

An illustration of anonymized data.
en
  • Советы о конфиденциальности
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.
en
  • Советы о конфиденциальности
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
An illustration of political campaigns sharing voter data.
en
  • Советы о конфиденциальности
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
An illustration of cryptojacking.
en
  • Советы о конфиденциальности
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
An illustration of different smart devices that make up the Internet of Things.
en
  • Советы о конфиденциальности
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
illustration of biometric authentication
en
  • Советы о конфиденциальности
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.
en
  • Советы о конфиденциальности
Android is one of Google’s most important tools for collecting data on users. This guide will help you improve your privacy on Android devices.
en
  • Советы о конфиденциальности
Using the right web browser is crucial for protecting your privacy. See the most secure web browsers that prevent online tracking.
illustration of protonmail ios security recommendation
en
  • Советы о конфиденциальности
Activate Touch ID, Face ID, or PIN protection in the Proton Mail iOS app for added protection against malware and warrantless device searches.
Data breach prevention illustration
en
  • Советы о конфиденциальности
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.
en
  • Советы о конфиденциальности
Learn what PGP encryption is and how it works, how secure PGP is, and the simplest way to secure your emails with PGP encryption.