Proton

Guías de privacidad

en
  • Guías de privacidad
Phishing scams can put you at risk of identity theft, credit card fraud, or other cybercrime. Learn how to spot and prevent phishing.
how to stop email trackers
  • Guías de privacidad
Proteja su bandeja de entrada de los rastreadores de correo electrónico. Aprenda cómo funcionan y descubra formas fáciles de bloquearlos con la protección contra el rastreo de Proton Mail.
en
  • Guías de privacidad
In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.
what are email headers
en
  • Guías de privacidad
Learn what email headers are, what they contain, and how to read them to keep your inbox secure and spam-free.
how to encrypt files
en
  • Guías de privacidad
If you have sensitive files or just want to keep your data private, here’s how to encrypt files on Windows, Mac, Android, and iOS.
what is two factor authentication (2fa)
en
  • Guías de privacidad
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.
en
  • Guías de privacidad
Cloud storage lets you share large files quickly, back up your data, and more. Read on to find out if you should use cloud storage.
how to password protect pdf header image
en
  • Guías de privacidad
Here's a step-by-step guide outlining how to password-protect PDF files and other ways to keep your documents safe from prying eyes.
can emails be traced
  • Guías de privacidad
Los proveedores de correo electrónico, los PSI y las fuerzas del orden tienen formas de rastrearle y seguirle a través de sus correos electrónicos. Aquí se explica cómo mantenerse privado en línea.
what is ciphertext
en
  • Guías de privacidad
Learn all about ciphertext (encrypted text) and how it protects your privacy and secures online communications, including encrypted email.
en
  • Guías de privacidad
We explain the different types of encryption for cloud storage, and why end-to-end encryption (e2ee) is the best for your files.