Latest articles

en
COVID-19 has forced companies to transition to working from home. We created a
guide to help employees and administrators stay safe online.
en
If you’re using Zoom while working from home, you should be aware of Zoom's
privacy policies, including its “attention tracking” tool.
en
- Privacy guides
Political campaigns are as driven by personal data as Google or Facebook. And
these campaigns often share your data with third parties.

en
Proton provides anti-censorship measures to help users bypass DNS blocks. This
article explains how these systems work.
en
- Product updates
- Proton Mail
This document describes the vulnerability disclosure policy our security team
follows when we discover flaws in third-party products.
en
- Product updates
- Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for
attackers to spoof their email address.
en
Free digital services have become the norm, but we’re paying for them with our
data. At Proton, we’re turning this model upside down and restoring digital
freedom.
en
- Privacy guides
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And
how can you keep your devices safe? We have a helpful guide.
en
The Edison email app scrapes user data while making claims about practicing
privacy by design. This misleads users and undermines their right to privacy.
en
- Privacy guides
The number of IoT (Internet of Things) devices will reach 38 billion in 2020,
opening up a massive opportunity for privacy breaches.

en
- Product updates
- Proton Mail
Russia has periodically made attempts to block Proton Mail. Here is the current
status and how you can bypass blocks placed on Proton Mail.