Proton

Proton blog

A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news

Latest articles

See all articles
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
Visual representation of Proton Meet end-to-end encrypted video conferencing security features
Learn how Proton Meet delivers an enterprise-grade secure video conferencing experience while ensuring no one, not even Proton, can eavesdrop on your calls.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
Proton Sheets and a screenshot
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
Visual representation of Proton Meet end-to-end encrypted video conferencing security features
Learn how Proton Meet delivers an enterprise-grade secure video conferencing experience while ensuring no one, not even Proton, can eavesdrop on your calls.
When age verification moves into your operating system
Age verification is moving into operating systems. Here’s how OS-level age checks could reshape privacy and access online.
iPhone age verification
Apple now requires UK users to verify their age on iPhone. This signals a broader shift toward identity-based access at the device level.
A computer screen and a school symbol, representing how student data is being funneled into Google's ecosystem
Google Chromebooks and Workspace rule US classrooms. Lawsuits claim they collect student data without parental consent. What you should know.
a purple illustrated phone screen with a white Android logo on it, 4 other phone screens sit behind it and an X icon is on the right corner
Find out how to stop apps running in background Android processes, and read our tips to keep your phone more secure.
An image showing a purple illustrated speech bubble containing a key icon with a password field in the bottom right corner
Discover how passkeys work, why they beat passwords on security and usability, and when you still need a password.
The @ (at) sign and an open letter, representing what is an email address
  • Privacy guides
What is an email address, really? Discover how it works, what makes one valid, and simple tips to keep yours private.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
an image showing a purple animated shield with a person icon in the middle, surrounded by three green circles with a fingerprint, key, and location icon in each
Learn how to safeguard PII data in digital environments with strong controls, clear responsibilities, and best security practices.