Latest articles

en
- Actualizaciones de productos
- Proton Mail
Proton Mail is joining the cryptocurrency revolution. Bitcoin is one of our
officially accepted payment methods. And no worries we will HODL for you!

en
- Actualizaciones de productos
- Proton Mail
Secure your business communications with end-to-end encrypted mail, calendar,
storage, and VPN. Find out more about Proton for Business.

en
- Noticias de privacidad
Today, we are participating in the Internet-wide Day of Action alongside Amazon,
Netflix, Github, and many others to counter this decision.

en
- Novedades de Proton
We are excited to announce that Proton VPN finally launched this morning and is
now open to the general public. This is an important milestone in our mission to
provide secure Internet to everyone in the world.

en
- Guías de privacidad
Nowadays, almost everyone has heard of Bitcoin. In this article, we provide a
step by step guide for buying and storing Bitcoins securely.
en
- Noticias de privacidad
Last Friday, a weaponized version of a NSA exploit was used to infect over two
hundred thousand computers in 150 countries with the WannaCry ransomware.

en
- Guías de privacidad
Determining whether a VPN service is trustworthy can be complicated.
Fortunately, there are a few easy steps you can follow to know if a VPN service
can be trusted.

en
- Noticias de privacidad
Whether it's Facebook, New York Times or a website that you visit in secret,
your ISP has a record of all of your browsing history. This highly personal and
intimate data can be sold to the highest bidder.
en
- Novedades de Proton
Last March, Proton Mail launched out of beta. This March, we're bringing back
Proton Mail Beta so you can test new Proton Mail features before they are
released.

en
- Guías de privacidad
We are fighting against online censorship to bring freedom of information to
everyone around the world.

en
- Noticias de privacidad
Earlier today, Wikileaks dumped a large database of secret documents from the
CIA. We did a deeper analysis of the leak and its implications on online
security and privacy.