Proton

People overwhelmingly want #ChoiceOverDefaults in the DMA

The Digital Markets Act (DMA)(new window) is the EU’s chance to ban Big Tech’s self-preferencing via default apps in favor of a choice screen when setting up a new device. By letting you choose the core apps such as email on your device, the amendments on defaults in the DMA can stop Big Tech from locking in consumers and locking out competition. 

In collaboration with Pollfish, we surveyed 4,000 people in Germany and France. The results showed that people overwhelmingly want choice when it comes to deciding which apps they use on their phone.

(new window)

When presented with the choice, people choose privacy. Adopting these amendments to the DMA and making choice the new default is another step towards a more private internet for everyone.

Protect your privacy with Proton
Skapa ett gratis konto

Related articles

en
Cyberattacks aren’t always executed through sophisticated methods like man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on something as simple as looking over your shoulder.  Shoulder surfing attacks are when someone watches you
en
Proton prioritizes our community’s privacy and data security in every aspect of our business.  To further demonstrate our commitment, we underwent a rigorous external audit and – on May 2, 2024 – received our ISO 27001 certification.  As an organiz
en
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo backup capabilities. This feature is gradually rolling out to the Proton community and will be available to everyone by the end of this week. Smartphones have made us all am
en
From the very beginning, Proton has always been a different type of organization. This was probably evident from the way in which we got started via a public crowdfunding campaign that saw 10,000 people donate over $500,000 to launch development. As
en
Your online data is valuable. While it might feel like you’re browsing the web for free, you’re actually paying marketing companies with your personal information. Often, even when you pay for services, these companies still collect and profit from y
en
Password spraying attacks pose a major risk to individuals and organizations as a method to breach network security by trying commonly used passwords across numerous accounts. This article explores password spraying attacks, explaining their methods