all-in-one privacy solution":["Proton Unlimited è una soluzione completa per la privacy"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Niente pubblicità. La prima regola è la privacy."],"People before profits":["Le persone prima dei profitti"],"Security through transparency":["Più sicurezza grazie alla trasparenza"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Le migliori offerte di Proton Mail per il ${ BLACK_FRIDAY }"],"The world’s only community- supported email service":["L'unico servizio di posta elettronica al mondo supportato dalla community"]},"specialoffer:limited":{"${ hours } hour":["${ hours } ora","${ hours } ore"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Restano ${ hoursLeft }, ${ minutesLeft } e ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minuto","${ minutes } minuti"],"${ seconds } second":["${ seconds } secondo","${ seconds } secondi"],"Limited time offer":["Offerta a tempo limitato"]},"specialoffer:listitem":{"Create multiple addresses":["Crea indirizzi multipli"],"Hide-my-email aliases":["Alias hide-my-email"],"Quickly unsubscribe from newsletters":["Annulla rapidamente l'iscrizione alle newsletter"],"Use your own domain name":["Utilizza il tuo nome di dominio"]},"specialoffer:logos":{"As featured in":["Ne hanno parlato"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Scegli un'email cifrata per proteggere la tua privacy"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Offerta Black Friday di Proton Mail - sconti fino al 40%"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Per questo Black Friday ti offriamo fino al 40% di sconto sugli abbonamenti a Proton Mail. Scopri le straordinarie offerte sui piani di abbonamento alla nostra email dotata di crittografia end-to-end."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Offerta di Proton Mail per il Black Friday | Fino al 40% di sconto sulla nostra email sicura"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Addebito di ${ TOTAL_SUM } per il primo anno"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Addebito di ${ TOTAL_SUM } per i primi 2 anni"],"30-day money-back guarantee":["Garanzia soddisfatti o rimborsati di 30 giorni"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Addebito di ${ TOTAL_SUM } per i primi 2 anni"],"Billed at ${ TOTAL_SUM } for the first year":["Addebito di ${ TOTAL_SUM } per il primo anno"],"You save ${ SAVE_SUM }":["Risparmi ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["−${ DISCOUNT }"],"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Adoro ProtonMail"],"My favorite email service":["Il mio servizio email preferito"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Grazie Proton perché ci proteggi nell'universo complicato di internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Ottieni quello per cui hai pagato. Nel caso di big tech, se non paghi niente, vieni usato. Ho smesso di usare Gmail e sono passata a @ProtonMail"]},"specialoffer:time":{"Days":["Giorni"],"Hours":["Ore"],"Min":["Min"]},"specialoffer:title":{"And much more":["E molto altro"],"Make your inbox yours":["Personalizza la tua casella di posta"],"Safe from trackers":["Protezione dai tracker"],"Stay organized":["Mantieni tutto organizzato"],"Black Friday email deals":["Offerte email del Black Friday"],"Don’t just take our word for it":["Non lo diciamo solo noi"],"Our story":["La nostra storia"],"Transfer your data from Google in one click":["Trasferisci i tuoi dati da Google con un solo clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accedi a contenuti bloccati e naviga in modalità privata. Include ${ TOTAL_SERVERS } server in più di ${ TOTAL_COUNTRIES } Paesi, possibilità di connettere fino a 10 dispositivi, accesso a servizi di streaming in tutto il mondo, blocco di malware e adblocker, e altro ancora."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Condividi facilmente il tuo calendario con familiari, amici o colleghi e visualizza calendari esterni."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Include il supporto per 1 dominio email personalizzato, 10 indirizzi email, 10 alias hide-my-email, condivisione del calendario e altro ancora."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Include il supporto per 3 domini email personalizzati, 15 indirizzi email, alias hide-my-email illimitati, condivisione del calendario e altro ancora."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Gestisci fino a 25 calendari, app per dispositivi mobili, protezione con la crittografia end-to-end, importazione del calendario da Google in un solo clic e altro ancora."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Al momento abbiamo dei problemi con il servizio di Proton VPN"],"Learn more":["Scopri di più"]},"Status banner":{"Learn more":["Scopri di più"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Attenzione: stiamo riscontrando dei problemi con il servizio di ${ issues[0] }"],"We are experiencing issues with one or more services at the moment.":["Stiamo riscontrando dei problemi con uno o più servizi."]},"suggestions":{"Suggestions":["Suggerimenti"]},"Support":{"Sub category":["Sottocategoria","Sottocategorie"]},"Support article":{"${ readingTime } min":["${ readingTime } minuto","${ readingTime } minuti"],"Category":["Categoria","Categorie"],"Didn’t find what you were looking for?":["Non hai trovato quello che cercavi?"],"General contact":["Contatti generali"],"Get help":["Ottieni supporto"],"Legal contact":["Contatti legali"],"Media contact":["Contatti per la stampa"],"Partnerships contact":["Contatti per collaborazioni"],"Reading":["Lettura"]},"Support categories":{"Browse Proton product support":["Consulta l'assistenza sui prodotti Proton"]},"Support category":{"There is no article in this category yet.":["Per ora non ci sono articoli in questa categoria."]},"Support troubleshooting":{"--- Select ---":["--- Seleziona ---"],"Adding and importing contacts":["Aggiungere e importare i contatti"],"App version":["Versione dell'app"],"Automatically save contacts":["Salvare automaticamente i contatti"],"Bridge connection issues with Outlook, Apple Mail or Thunderbird":["Problemi di connessione al Bridge con Outlook, Apple Mail o Thunderbird"],"Browser":["Browser"],"Check if this helps":["Verifica se questo ti è utile"],"Choose a category for your question":["Scegli una categoria per la tua domanda"],"Connectivity errors on Android and iOS":["Errori di connessione su Android e iOS"],"Contacts":["Contatti"],"Custom domain":["Dominio personalizzato"],"Desktop notifications":["Notifiche desktop"],"Did this solve your issue ?":["Ti ha risolto il problema?"],"Difference between Combined Addresses Mode and Split Addresses Mode":["Differenza tra le modalità Indirizzi combinati e Indirizzi separati"],"Differences between addresses, aliases, and sub-users":["Differenze tra indirizzi, alias e sotto-utenti"],"Email notifications":["Notifiche email"],"Email tracking protection":["Protezione contro il tracking delle email"],"Encryption":["Crittografia"],"Encryption keys management":["Gestione delle chiavi crittografiche"],"Faster assistance is just a few clicks away — please make your selections":["Ottieni assistenza più velocemente con pochi clic. Fai la tua selezione"],"How to avoid receiving spam messages":["Come evitare di ricevere messaggi spam"],"How to block unwanted email":["Come bloccare le email indesiderate"],"How to configure your email client for Bridge":["Come configurare il client di posta del Bridge"],"How to create contact groups":["Come creare dei gruppi di contatti"],"How to create or edit CSV contacts":["Come creare o modificare i contatti CSV"],"How to install Proton Mail Bridge":["Come installare Proton Mail Bridge"],"How to merge duplicate contacts":["Come unificare i contatti duplicati"],"How to send encrypted messages to external users":["Come inviare messaggi crittografati agli utenti esterni"],"How to set up a custom domain":["Come configurare un dominio personalizzato"],"How to unsubscribe from Apple’s TestFlight notification emails":["Come annullare l'iscrizione alle email di notifica TestFlight di Apple"],"How to use auto-reply":["Come usare la risposta automatica"],"How to use filters":["Come usare i filtri"],"How to use folders and labels":["Come usare le cartelle e le etichette"],"How to use PGP encryption":["Come usare la crittografia PGP"],"Invalid password error while setting email client for Bridge":["Errore “password non valida” nella configurazione del client di posta del Bridge"],"Login security notification alerts":["Notifica di sicurezza relativa all'accesso"],"Manage mailbox appearance":["Gestire l'aspetto della casella email"],"Mobile connectivity and synchronization":["Connessione e sincronizzazione dei dispositivi mobili"],"No, contact support":["No, contatta il supporto"],"Notifications":["Notifiche"],"Other":["Altro"],"Problems with deleting messages":["Problemi a eliminare i messaggi"],"Problems with moving messages":["Problemi a spostare i messaggi"],"Problems with read/unread message status":["Problemi con lo stato dei messaggi letti/da leggere"],"Proton Mail Bridge":["Proton Mail Bridge"],"Proton Mail settings":["Impostazioni di Proton Mail"],"Push notifications not arriving":["Notifiche push che non arrivano"],"Sending and receiving messages":["Invio e ricezione dei messaggi"],"Sending and receiving messages limitations":["Limitazioni nell'invio e nella ricezione dei messaggi"],"Sending and receiving troubleshooting":["Risoluzione dei problemi di invio e ricezione"],"Spam filtering, Allow and Block lists":["Filtro antispam, liste di indirizzi autorizzati e bloccati"],"Sub-users and organizations":["Sotto-utenti e organizzazioni"],"Thank you for your feedback":["Grazie per il feedback"],"Troubleshooting":["Risoluzione dei problemi"],"Verify custom domain records & anti-spoofing":["Verificare i record dei domini personalizzati e l'anti-spoofing"],"What can we help with ?":["In cosa possiamo esserti di aiuto?"],"What if your domain records fail (TXT, MX, SPF, DKIM, DMARC)":["Cosa fare se ci sono dei problemi con i record del dominio (TXT, MX, SPF, DKIM, DMARC)"],"What is encrypted on Proton Mail":["Che cosa è crittografato su Proton Mail"],"Yes":["Sì"]},"support_modal_search_query":{"How to use a custom domain?":["Come si usa un dominio personalizzato?"],"Search query":["Query di ricerca"]},"support_modal_search_result":{"Search result":["Risultato della ricerca"]},"support_modal_title":{"Blog search":["Ricerca nel blog"],"Support search":["Cerca nell’assistenza"]},"support_search_button":{"Search":["Cerca"]},"support_search_i_am_looking_for":{"I'm looking for":["Sto cercando"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Per una risoluzione più rapida, segnala il problema dall'app Bridge: Aiuto > Segnala un problema."],"Information":["Informazioni"]},"SupportForm:option":{"Account Security":["Sicurezza dell'account"],"Contacts":["Contatti"],"Custom email domain":["Dominio email personalizzato"],"Email delivery and Spam":["Consegna delle email e spam"],"Encryption":["Crittografia"],"Login and password":["Login e password"],"Merge aliases and accounts":["Unione di alias e account"],"Migrate to Proton":["Migrazione a Proton"],"Notifications":["Notifiche"],"Other":["Altro"],"Plans and billing":["Piani e fatturazione"],"Proton for Business":["Proton for Business"],"Sign up":["Iscrizione"],"Storage":["Archiviazione"],"Users, addresses, and identities":["Utenti, indirizzi e identità"]},"SupportForm:optionIntro":{"Select a topic":["Seleziona un argomento"]},"swiss_baseed_feature":{"Swiss based":["Con sede in Svizzera"]},"Testimonial":{"Awards":["Premi"],"Customers":["Clienti"],"Featured":["In evidenza"],"Go to testimonial source":["Vai alle testimonianze"],"Reviews":["Recensioni"],"Videos":["Video"]},"Text":{"Find the plan that's right for you":["Trova il piano che fa per te"],"If you need help, check out our ${ supportLink }.":["Se ti serve assistenza dai un’occhiata alla nostra ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["La pagina che stai cercando potrebbe essere stata rimossa, o il link potrebbe essere vecchio."]},"Title":{"On this page":["In questa pagina"],"Related articles":["Articoli correlati"],"Share ${ thisPage }":["Condividi ${ thisPage }"],"Thank you!":["Grazie"],"this page":["questa pagina"]},"Tooltip":{"More information":["Ulteriori informazioni"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Puoi creare fino a 20 calendari cifrati personalizzati e condivisibili. Puoi inoltre aggiungere fino a 5 calendari di amici, familiari, colleghi e organizzazioni."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accedi a contenuti bloccati e naviga in modalità privata. Il piano include più di ${ TOTAL_SERVERS } server in oltre ${ TOTAL_COUNTRIES } Paesi, massima velocità della VPN, ${ TOTAL_VPN_CONNECTIONS } connessioni alla VPN, servizi di streaming in tutto il mondo, anti-malware, ad-blocker e altro ancora."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accedi a contenuti bloccati e naviga in modalità privata. Il piano include più di ${ TOTAL_SERVERS } server in oltre ${ TOTAL_COUNTRIES } Paesi, massima velocità della VPN, 10 connessioni alla VPN, servizi di streaming in tutto il mondo, anti-malware, ad-blocker e altro ancora."]},"version_history_label":{"Version history":["Cronologia delle versioni"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Conserva fino a ${ versionHistoryNumber } versioni di ciascun file fino a un massimo di ${ years } anni"]},"VideoModal":{"Get started in 2 minutes":["Inizia in 2 minuti"]},"videosButtonLabel":{"Get started with videos":["Inizia con i video"]},"vpn_features_link":{"View VPN plans":["Visualizza i piani VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Accedi ai contenuti bloccati e naviga in modalità privata"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
What is end-to-end encryption and how does it work? | Proton
The most private and secure way to communicate online is by using end-to-end encryption. If you send an end-to-end encrypted email(new window), it’s encrypted on your device (your iPhone, Android, or laptop) and isn’t decrypted until it reaches the device of the person you sent the message to.
End-to-end encryption (E2EE) has historically been very complicated, which limited who could effectively use it. An early iteration of E2EE for email, known as Pretty Good Privacy (PGP)(new window), required you to handle the encryption keys yourself, making it notoriously difficult even for tech-savvy users.
However, recent technological advances in device capabilities and secure protocols have enabled services (such as Proton Mail) to make end-to-end encryption much easier to use. In fact, Proton Mail handles all end-to-end encryption automatically – you don’t need to do anything.
This article explains what end-to-end encryption is, how it works, and its advantages over other types of encryption.
Encryption is the process of scrambling data that people can read (for example, a plaintext email) into unreadable ciphertext(new window) that only authorized parties can decrypt using the right cryptographic key.
End-to-end encryption is the term used for a type of encryption where your data is encrypted at every stage of its journey from one device to another. The ends in “end-to-end” refer to the beginning and final destination of your data’s journey. For example, if you’re sending an email, the beginning point is your device and the destination is your recipient’s device.
This makes end-to-end encryption a secure communication method that prevents all third parties from accessing the content of your messages, including while they are transferred from one device to another or “at rest” on a server. When you use E2EE to send an email to someone, no one else can see the content of your message — not your network administrator, not your internet service provider (ISP), not hackers, not the government, and not even the company that handles the delivery of your email (for example, Proton Mail). They can’t read your email because your recipient holds the only key that can decrypt it.
How does end-to-end encryption work?
To understand how end-to-end encryption works for email, it helps to look at a diagram. In the example below, Bob wants to say hello to Alice privately. Alice has a public key and a private key, which are two mathematically related cryptographic keys. Alice can share her public key with anyone, but she must keep her private key secure and not let anyone else access it.
First, Bob uses Alice’s public key to encrypt his message, turning “Hello Alice” into ciphertext — scrambled, seemingly random characters.
Bob sends this encrypted message over the public internet. Along the way, it may pass through multiple servers, including those belonging to their email service and internet service providers. Although those companies may try to read the message (or even share it with third parties)(new window), it is computationally unfeasible for them to convert the ciphertext back into readable plaintext. Only Alice can decrypt the message with her private key when it lands in her inbox, as Alice is the only person with access to her private key.
If Alice wants to reply with her own end-to-end encrypted message, she would repeat the process, encrypting her message to Bob using Bob’s public key.
What is the difference between E2EE and other security paradigms?
End-to-end encryption is unique compared to other security paradigms because only the sender and receiver (the “ends” of the communication) can decrypt and read the data that has been encrypted. This differs from other security paradigms, such as point-to-point or in-transit encryption like the Transport Layer Security(new window) (TLS) protocol.
TLS is the security mechanism used in the HTTPS communication protocol(new window) that prevents hackers and your ISP(new window) from seeing what information you submit to websites (like your credit card number or address) and is responsible for encrypting most of the internet, including your connection to our blog right now. However, TLS is only implemented between endpoints of an HTTP channel. For example, as you’re reading our blog, HTTPS is using TLS to encrypt your connection between your device and our server.
This works fine if you are connecting to a website, but it’s insufficient if you’re sending an email. When you use a standard email provider, such as Gmail(new window) or Hotmail, all traffic toward it, including emails sent to you, will be protected in transit by TLS. The same is true in reverse; Emails you send from a standard email provider are also encrypted using TLS and sent to your recipient’s email provider . However, all TLS-protected traffic is decrypted once it arrives at these companies’ servers, including your emails. Most companies will then re-encrypt your messages while they are stored on their servers – using keys they control. This means that the company can decrypt and access the content of your messages at any time.
Services that use end-to-end encryption eliminate this possibility because the service provider does not actually possess the private key required for decryption. With Proton Mail or any other E2EE service, your private key is only available on your device, making E2EE much more secure and private.
Advantages of end-to-end encryption services
End-to-end encryption offers multiple advantages over other security paradigms. Protecting your data with E2EE makes you less vulnerable to leaks or attacks, prevents your government or ISP from snooping on you, and even helps defend democracy.
E2EE keeps your data safe from hacks
When you use end-to-end encryption, fewer parties can access your unencrypted data. Even if hackers compromised the servers where your encrypted data is stored (as was the case with the Yahoo Mail hack(new window)), they would not be able to decrypt your data because they would not possess your private key.
E2EE ensures data is not tampered with
When set up correctly, end-to-end encryption guarantees data integrity across the whole path of a message. This is particularly important when sharing information that might not be sensitive but must be delivered correctly in its original form.
E2EE keeps your data private
End-to-end encryption prevents anyone from accessing your data, including the email service you are using. In contrast, if you use an email service that does not use end-to-end encryption, such as Gmail, it can access every intimate detail stored in your emails at any time, for any reason, without you ever knowing. In fact, Gmail regularly gives third-party developers access to your emails(new window). Using an end-to-end encrypted email service gives you control over who can read your emails.
E2EE is good for democracy
Everyone has a right to privacy. End-to-end encryption protects free speech by preventing governments from accessing their citizens’ data and using the information stored in their emails to persecute or intimidate them. This is particularly important for dissidents, activists, and journalists who live under oppressive regimes.
How to use end-to-end encryption
Although you can set up end-to-end encryption yourself for some methods of communication, the easiest and fastest way to protect your privacy with E2EE is to use a service that implements it automatically for you.
As the first and largest end-to-end encrypted email provider, we protect millions of people every day. End-to-end encryption is the technological backbone of our vision for a more private and secure internet. When you use Proton Mail, your messages are automatically end-to-end encrypted whenever a public key is available for the recipient, including when you send an email to someone who uses Proton Mail or PGP.
You can use end-to-end encryption for free by signing up for a free Proton Mail account. With Easy Switch, you can also quickly transfer your emails and calendars to Proton from other, less private providers.
End-to-end encryption FAQs
What is ciphertext?
Ciphertext(new window) is unreadable encrypted data. An encryption algorithm scrambles plaintext (or human-readable data) into ciphertext, which can only be deciphered by a person or device that holds the unique decryption key. Without the decryption key, anyone who intercepted an encrypted message would only see ciphertext — an unreadable string of letters, numbers, and symbols.
What is encrypted with end-to-end encryption?
When you send an end-to-end encrypted message with Proton Mail, the message body and attachments are fully end-to-end encrypted whenever a public key is available for the recipient. If you email a contact who isn’t using Proton Mail or PGP, the message will only be end-to-end encrypted if you use our Password-protected Emails feature. Otherwise, your message will be encrypted in transit (in most cases) with TLS and will be readable by your recipient’s email provider. Proton Mail encryption explained
What are encryption keys?
An encryption key is a random string of bits used by an encryption algorithm to scramble plaintext into ciphertext. Some types of encryption use the same encryption key to encrypt and decrypt data (this is symmetric encryption), while others will have an encryption and a decryption key (this is asymmetric encryption). However, the most common encryption methodology is a combination of both, called hybrid encryption. Proton Mail’s end-to-end encryption protocol uses hybrid encryption.
What is PGP?
The most popular email encryption system in the world is PGP, which stands for Pretty Good Privacy. PGP is the encryption technique that transforms your messages into unintelligible ciphertext on your device before they are transmitted over the internet. Additionally, it verifies that the message was not altered while in transit and, if keys are obtained from a trustworthy source, it authenticates the sender’s identity. Proton Mail’s end-to-end encryption is based on an open-source version of PGP. Learn more about PGP(new window)
Protecting a folder with a password is a simple yet effective way of securing
files. You may wonder whether you can password-protect a folder in Google Drive.
We explain what access controls Google Drive offers and what you can do to
improve your sec
We’re excited to announce that Proton Pass supports passkeys for everyone,
allowing you to manage and use passkeys across all devices seamlessly. Passkeys
are an easy and secure alternative to traditional passwords that can help
prevent phishing atta
Passkeys are a new way to secure your online accounts using cryptographic keys
instead of passwords. They offer a high level of convenience and security, and
are a real game-changer in the way we access and secure sites. What is a
passkey, though, an
Apple’s marketing team has built a powerful association between the iPhone and
privacy. The company’s ad campaigns claim that “what happens on your iPhone,
stays on your iPhone.” And, “Privacy. That’s iPhone.”
But Apple’s lawyers are telling a diffe
A cyberattack on national public employment service France Travail has exposed
the personal data of as many as 43 million people.
The latest breach is the second major cybersecurity attack to happen in France
in the past month, raising concerns abo
Google Drive makes it easy to share files and folders, but you may have wondered
at some point whether the people you’ve shared a folder with can see your other
folders. We answer this question below and also share some tips for truly secure
link sha
In 2014, Proton Mail was introduced as a web app, revolutionizing how we think
about email privacy.
Today, we’re excited to broaden the horizons of secure communication by
launching the Proton Mail desktop app. Anyone can now use the new Proton Mail