all-in-one privacy solution":["Proton Unlimited tam kapsamlı bir gizlilik ve güvenlik çözümüdür"],"Black Friday":["Muhteşem Cuma"],"No ads. Privacy by default.":["Reklamsız. Privacy by default."],"People before profits":["İnsanlar paradan önce gelir"],"Security through transparency":["Şeffaflık ile güvenlik"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["En iyi Proton Mail ${ BLACK_FRIDAY } fırsatları"],"The world’s only community- supported email service":["Dünyanın tek topluluk tarafından desteklenen e-posta hizmeti"]},"specialoffer:limited":{"${ hours } hour":["${ hours } saat","${ hours } saat"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["${ hoursLeft } - ${ minutesLeft } - ${ secondsLeft } kaldı"],"${ minutes } minute":["${ minutes } dakika","${ minutes } dakika"],"${ seconds } second":["${ seconds } saniye","${ seconds } saniye"],"Limited time offer":["Sınırlı süreli teklif"]},"specialoffer:listitem":{"Create multiple addresses":["Birden adres oluşturun"],"Hide-my-email aliases":["Hide-my-email takma adları (e-posta adresi)"],"Quickly unsubscribe from newsletters":["Bülten aboneliğinden hızlı ayrılma"],"Use your own domain name":["Kendi etki alanınızı kullanın"]},"specialoffer:logos":{"As featured in":["Belirtildiği gibi"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Gizliliğinizi koruyan bir şifreli e-posta edinin"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Muhteşem Cuma İndirimleri - %40'a varan indirimler"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Bu Muhteşem Cuma'da Proton Mail aboneliklerinde %40'a varan indirimlerden faydalanın. Uçtan uca şifrelenmiş e-posta tarifelerimiz için muhteşem fırsatlardan yararlanın."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Muhteşem Cuma İndirimleri - Güvenli e-postada %40'a varan indirimler"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*ilk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"30-day money-back guarantee":["30 günlük para iade garantisi"],"Billed at ${ TOTAL_SUM } for the first 2 years":["İlk 2 yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"Billed at ${ TOTAL_SUM } for the first year":["İlk yıl için ${ TOTAL_SUM } üzerinden faturalandırılır"],"You save ${ SAVE_SUM }":["${ SAVE_SUM } tasarruf ediyorsunuz"]},"specialoffer:off":{"${ DISCOUNT } off":["${ DISCOUNT } indirim"],"${ PERCENT_OFF } off":["${ PERCENT_OFF } indirim"]},"specialoffer:testimonial":{"I love my ProtonMail":["ProtonMail'imi seviyorum"],"My favorite email service":["En sevdiğim e-posta hizmeti"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Hepimizi bu karışık internet evreninde güvende tuttuğun için teşekkürler Proton."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Ödediğinizin karşılığını alırsınız. Big Tech şirketleri söz konusu olduğunda, hiçbir şey ödememiyorsanız sizi kullanırlar. Gmail kullanmayı bıraktım ve @ProtonMail hizmetine geçtim"]},"specialoffer:time":{"Days":["Gün"],"Hours":["Saat"],"Min":["Dakika"]},"specialoffer:title":{"And much more":["Ve çok daha fazlası"],"Make your inbox yours":["Gelen kutunuzu kendize özel tutun"],"Safe from trackers":["İzleyicilerden güvende olun"],"Stay organized":["Düzenli kalın"],"Black Friday email deals":["Muhteşem Cuma e-posta fırsatları"],"Don’t just take our word for it":["Sırf bizden duymuş olmayın"],"Our story":["Öykümüz"],"Transfer your data from Google in one click":["Google'dan bilgilerinizi tek tıkla aktarın"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_COUNTRIES } üzeri ülkede ${ TOTAL_SERVERS } üzerinde sunucu, 10 aygıta kadar bağlantı, dünya çapındaki yayın hizmetlerine erişim, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Takviminizi bir bağlantı aracılığıyla ailenizle, arkadaşlarınızla veya iş arkadaşlarınızla paylaşın ve başka takvimleri görüntüleyin."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["1 özel e-posta etki alanı, 10 e-posta adresi, 10 hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["3 özel e-posta etki alanı, 15 e-posta adresi, sınırsız hide-my-email takma adı, takvim paylaşma ve daha fazlası için destek içerir."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["25'ye kadar takvim yönetin, mobil uygulamalar, uçtan uca şifreleme ile koruma, Google'dan tek tıkla aktarma ve daha fazlası."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Şu anda Proton VPN hizmetiyle ilgili sorunlar yaşıyoruz"],"Learn more":["Ayrıntılı bilgi alın"]},"Status banner":{"Learn more":["Ayrıntılı bilgi alın"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Şu anda ${ issues[0] } hizmeti ile ilgili sorun yaşamaktayız, bilginize."],"We are experiencing issues with one or more services at the moment.":["Şu anda bir veya daha fazla hizmet ile ilgili sorun yaşamaktayız."]},"suggestions":{"Suggestions":["Öneriler"]},"Support":{"Sub category":["Alt kategori","Alt kategori"]},"Support article":{"${ readingTime } min":["${ readingTime } dakikalık","${ readingTime } dakikalık"],"Category":["Kategori","Kategori"],"Didn’t find what you were looking for?":["Aradığınızı bulamadınız mı?"],"General contact":["Genel iletişim"],"Get help":["Yardım alın"],"Legal contact":["Hukuki iletişim"],"Media contact":["Medya iletişimi"],"Partnerships contact":["Ortaklık iletişimi"],"Reading":["Okuma süresi"]},"Support categories":{"Browse Proton product support":["Proton ürün desteğine göz atın"]},"Support category":{"There is no article in this category yet.":["Bu kategoride henüz bir makale yok."]},"Support troubleshooting":{"--- Select ---":["--- Seç ---"],"App version":["Uygulama sürümü"],"Browser":["Tarayıcı"],"Check if this helps":["Yardımcı olabilecek bu cevaba bir göz atın"],"Choose a category for your question":["Sorunuz için bir kategori seçin"],"Choose a product":["Bir ürün seçin"],"Did this solve your issue ?":["Bu, sorununuzu çözdü mü?"],"Faster assistance is just a few clicks away — please make your selections":["Daha hızlı yardım birkaç tık uzağınızda, lütfen tercihlerinizi yapın"],"No, contact support":["Hayır, destekle iletişime geçin"],"Proton account":["Proton hesabı"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Geri bildiriminiz için teşekkürler"],"Troubleshooting":["Sorun giderme"],"What can we help with ?":["Ne konuda yardımcı olabiliriz?"],"Yes":["Evet"]},"support_modal_search_query":{"Search query":["Sorgu ara"]},"support_search_button":{"Search":["Ara"]},"support_search_i_am_looking_for":{"I'm looking for":["Şunu arıyorum: -"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Daha hızlı bir çözüm için, lütfen sorunu Bridge uygulamasının Yardım > Bir sorun bildir kısmından bildiririn."],"Information":["Bilgi"]},"SupportForm:option":{"Account Security":["Hesap Güvenliği"],"Contacts":["Kişiler"],"Custom email domain":["Özel e-posta etki alanı"],"Email delivery and Spam":["E-posta iletimi ve istenmeyen e-postalar"],"Encryption":["Şifreleme"],"Login and password":["Oturum ve şifre"],"Merge aliases and accounts":["Takma adları (e-posta adresi) ve hesapları birleştir"],"Migrate to Proton":["Proton üzerine aktarım"],"Notifications":["Bildirimler"],"Other":["Diğer"],"Plans and billing":["Tarifeler ve faturalandırma"],"Proton for Business":["Proton for Business"],"Sign up":["Hesap açma"],"Storage":["Depolama"],"Users, addresses, and identities":["Kullanıcılar, adresler ve kimlikler"]},"SupportForm:optionIntro":{"Select a topic":["Bir konu seç"]},"swiss_baseed_feature":{"Swiss based":["İsviçre merkezli"]},"Testimonial":{"Awards":["Ödüller"],"Customers":["Müşteriler"],"Featured":["Öne Çıkanlar"],"Go to testimonial source":["Müşteri görüşünün kaynağına git"],"Reviews":["İncelemeler"],"Videos":["Videolar"]},"Text":{"Find the plan that's right for you":["Size uygun tarifeyi bulun"],"If you need help, check out our ${ supportLink }.":["Yardıma ihtiyacınız varsa ${ supportLink } ziyaret edebilirsiniz."],"The page you’re looking for might have been removed, or it could be an\nold link.":["Aradığınız sayfa kaldırılmış veya eski bir\nbağlantı olabilir."]},"Title":{"On this page":["Bu sayfada"],"Related articles":["İlgili makaleler"],"Share ${ thisPage }":["${ thisPage } paylaşın"],"Thank you!":["Teşekkürler!"],"this page":["Bu sayfayı"]},"Tooltip":{"More information":["Daha fazla bilgi"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["20'ye varan özel ve paylaşılabilir şifrelenmiş takvim oluşturun. Üstelik arkadaşlarınızdan, ailenizden, iş arkadaşlarınızdan ve kuruluşlardan 5'e kadar takvim ekleyin."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_COUNTRIES } üzeri ülkede ${ TOTAL_SERVERS } üzerinde sunucu, en yüksek VPN hızını, ${ TOTAL_VPN_CONNECTIONS } VPN bağlantısı, dünya çapındaki yayın hizmetlerini, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Yasaklı içeriklere erişin ve gizlice gezinin. ${ TOTAL_COUNTRIES } üzeri ülkede ${ TOTAL_SERVERS } üzerinde sunucu, en yüksek VPN hızını, 10 VPN bağlantısı, dünya çapındaki yayın hizmetlerini, kötü amaçlı yazılım ve reklam engelleyici, ve daha fazlasını içerir."]},"version_history_label":{"Version history":["Sürüm geçmişi"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Her dosyanın ${ versionHistoryNumber } sürümünü ${ years } yıla kadar tutun"]},"vpn_features_link":{"View VPN plans":["VPN tarifelerini görüntüle"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Yasaklı içeriklere erişin ve gizlice gezinin"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
What is the most secure way to store documents? | Proton
Whether it’s personal documents such as your birth certificate or confidential business files like work contracts, we all have sensitive documents we need to store securely. With so many storage options available, it’s important to understand the different ways you can store documents and how secure each method is.
In this article, we show you the pros and cons of each storage method and how you can securely store and protect your sensitive files.
What are the different ways to store documents?
Online in the cloud
One of the most popular ways of storing sensitive documents is in the cloud. You’ve most likely used a cloud storage service, such as Proton Drive or Dropbox, when you upload a file to the internet to share with your friends and family.
Advantages of cloud storage
Accessibility: Cloud storage allows you to access documents from anywhere and at any time, as long as you have an internet-connected device.
Data backup: Cloud storage allows you to automatically back up your data since your file is stored across many servers. If you lose the original copy of your file, you can simply download it again from your cloud account.
Collaboration: Many cloud storage services offer built-in collaboration features, allowing you to work with others in real-time and track changes.
Disadvantages of cloud storage
Security risks: Most cloud storage solutions are designed to withstand common security threats, but they aren’t immune from data breaches. If an attacker hacks your cloud provider’s servers, your files are at risk of being exposed.
Privacy concerns: Once you upload a file to the cloud, your cloud provider encrypts it and stores it in their servers. But the private key that decrypts your file is stored alongside the data. This means your cloud provider and other malicious actors could easily decrypt your file.
Dependence on internet connection: Most cloud storage solutions require you to be online to access your files. However, some cloud providers like Proton Drive allow you to create an offline cache of your files, so that you can access them even without an internet connection.
In folders on your PC locally
Before the arrival of cloud storage solutions, most of us stored files locally on our personal computers (PC).
Advantages of storing files locally
Data control: When you store files locally on your PC, you have full control of your data. You can choose where to store them, how they’re organized, and who can access them. This gives you greater control over the privacy and security of your files.
Offline access: Storing files locally also means you can access them without an internet connection. This can be useful if you work in areas with limited internet access.
No subscription fees: Unlike cloud storage services that may require a subscription, storing files locally on your PC does not involve ongoing subscription costs.
Disadvantages of storing files locally
Risk of data loss: Storing files locally on your PC involves the risk of data loss due to hardware failure or theft. Without proper backup measures in place, you might lose your files permanently.
Limited accessibility: Storing files locally also limits accessibility, as you can only access your files from the specific PC where they’re stored. This may not be suitable for remote work or when you need to access your files from different devices.
Vulnerability to security threats: There are security threats, such as malware, viruses, and ransomware, that might compromise the security of your PC and files.
Storage limitations: Your PC’s hard drive has limited space, which can fill up quickly if you have many files to store.
In physical storage devices
Another common method of storing files is using physical storage devices, such as USBs and hard drives.
Advantages of storing files in physical storage devices
Portability: When you use a physical storage device to store your files, you can bring them everywhere you go and easily transfer them between different devices or locations.
Offline access: Like your PC, physical storage devices let you access your files even without an internet connection.
No subscription fees: Once you buy your physical storage device, you own it for life. This makes it a cost-effective option for your storage needs.
Disadvantages of storing files in physical storage devices
Prone to wear and tear: Physical storage devices are susceptible to environmental damage, such as water damage and physical wear and tear. This can result in a permanent loss of your data.
Storage limitations: Most physical storage devices have limited storage capacity compared to PCs and cloud storage. If you’re trying to store a large file, you may need to split it up and store it in multiple physical storage devices.
Saving files as hard copies
Finally, you could also print out and store important documents as hard copies.
Advantages of saving files as hard copies
Physical tangibility: Hard copies are a tangible form of your documents that can be touched, held, and physically stored. This can provide easy access when you need to quickly locate or reference specific documents.
Offline access: Hard copies do not require an internet connection to access, making them available 24/7.
Increased security: Since you can control physical access to your hard copies, they’re less vulnerable to online data breaches or hacking. You can also choose to store them securely in locked cabinets or safes.
Disadvantages of saving files as hard copies
Risk of loss or damage: Unlike files stored in the cloud, hard copies are susceptible to loss, theft, and damage. Once you lose or damage your hard copy, it may not be easily recoverable.
Lack of version control: If you store your document as a printed document, you won’t be able to easily update or revise it. Managing multiple versions of a document can also be challenging.
Limited accessibility: To share your printed document with others, you’ll need to physically transport it, either by mailing it to your recipient or meeting up in person. This can be time-consuming and costly.
What is the most secure way to store files online?
Ultimately, how you choose to store your files depends on your personal needs and preferences. Storing files locally on your PC and in physical storage devices gives you the advantage of offline access, but cloud storage offers the convenience of accessing your files from multiple locations and the ability to share them easily with others. It also provides you with redundancy and backup options, making it the most secure way of storing your files.
If you’re looking for a trusted and secure cloud storage provider, Proton Drive offers a Free plan that gives you 1 GB of storage. All files you upload are automatically protected with end-to-end encryption on your device before being stored on our servers, which means no one else besides you and the people you share your files with can access your files. That’s because only you have access to your private key.
We also use cryptographic signatures to verify the integrity of your files, giving you peace of mind that your documents haven’t been tampered with.
Monitor suspicious activity by keeping track of file downloads
You don’t need any special skills or technical knowledge to share files with Proton Drive. Simply upload a file and generate a file-sharing link, and let our software handle the encryption. There’s also no file size limit — if you can upload it, you can share it. If you’d like to help us make privacy accessible to everyone, consider upgrading to a paid account.
FAQ
How do I securely store files online?
As with everything on the internet, there’s no such thing as 100% security. But if you’re looking to securely store your files online, opt for a reputable and secure cloud storage provider like Proton Drive. Built by the same makers of Proton Mail and Proton VPN(new window), Proton Drive secures your files with end-to-end encryption. We also offer other advanced security features, such as two-factor authentication and cryptographic signatures, to prevent third parties from accessing your files.
Which is more secure: Google Drive or Dropbox?
Both Google Drive and Dropbox use industry-standard (TLS and AES-256) to encrypt your files in transit and at rest. Both methods are pretty robust when it comes to protecting your files from hackers, but they don’t prevent the cloud providers themselves from accessing your files (such as in the event of a security incident or legal request).
If privacy and security are top priorities for you, you may consider choosing a trusted cloud storage provider, such as Proton Drive.
Can online storage be hacked?
Yes, online storage can be hacked. While cloud storage providers go to great lengths to prevent hacks, no system is completely immune to data breaches. It’s also important to remember that the risk of online storage being hacked is relatively low compared to other security risks, especially if you use a reputable and established cloud storage provider. Keep an eye out for cloud storage services that use end-to-end encryption since that’s a good indicator of a secure cloud storage provider.
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online
service, you provide it with personal information that’s valuable to hackers,
such as email addresses, passwords, phone numbers, and more. Unfortunately, many
online services f
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a