Proton

Proton-bloggen

en

Senaste artiklarna

See all articles
an image showing two purple cartoon computer screens with warning icons on them
en
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
en
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
en
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
en
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
Proton Sheets and a screenshot
en
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A purple screen with a title saying 'Proton Pass CLI' above a CLI interface with white text on a black background
en
  • Product updates
  • Proton Pass
To help you work in the terminal, Proton Pass now offers a command-line interface (CLI) for enhanced productivity and increased security.
Proton's new Mail mobile apps
en
Proton Mail’s next-generation iOS and Android apps were rebuilt from the ground up. Here’s why we did it and what it changes for users.
Representation of a survey about spreadsheet security
en
Proton surveyed 1,000 people across four countries to reveal how personal spreadsheet data lives on, stays shared, and may be used long after you forget it.
en
We raised over $1.25 million this year to directly support organizations on the front lines of the fight for online privacy and freedom.
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks of AI products for kids.
en
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks for kids.
en
New research from Proton shows that Europeans want to shed US tech dependence and build tech sovereignty for Europe. Read the full report.
Discord age checks
en
From March 2026, all Discord users will have a teen-appropriate experience by default, unless they can verify they are at least 18 years old.
an image showing eavesdropping between two purple cartoon mobile phones
en
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
en
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
en
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
en
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
en
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
en
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
an image showing two purple cartoon computer screens with warning icons on them
en
Cybersecurity drives compliance and continuity for businesses of all sizes. Find out how credential governance helps prevent breaches.
an image showing eavesdropping between two purple cartoon mobile phones
en
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
en
Proton’s small-business survey upends the “SMBs are unprepared” cliché, showing how leaders are investing in security and why it hasn’t fully worked.