Proton

Privacy guides

Illustration of cloud storage
en
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more about our storage model and how we protect your privacy.
Les clés USB et les disques durs externes sont pratiques, mais pas toujours sécurisés. Nous expliquons comment vous pouvez chiffrer vos clés USB et protéger vos données.
Tout savoir sur les certificats TLS/SSL, ces fichiers numériques qui permettent d'authentifier et de sécuriser les transferts de données sur internet.
Illustration of changing email provider
en
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.
An illustration of anonymized data.
en
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.
en
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
An illustration of political campaigns sharing voter data.
en
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
An illustration of cryptojacking.
en
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
An illustration of different smart devices that make up the Internet of Things.
en
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
illustration of biometric authentication
en
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.