Proton

Contacts encryption

    1. Contacts encryption
    2. Contacts encryption
    3. Contacts encryption
    4. Contacts encryption

    Address verification with trusted keys

    Use trusted encryption keys to specify which keys should be used to encrypt messages to each contact and verify their identity.

    1. Contacts encryption
    2. Contacts encryption
    3. Contacts encryption
    4. Contacts encryption

    How to manually select trusted keys

    You can select which PGP key to use when sending emails to a trusted contact. This is also know as key pinning.

    1. Contacts encryption
    2. Contacts encryption
    3. Contacts encryption
    4. Contacts encryption

    Proton Contacts

    Proton Contacts encrypts different contact fields in different ways. We explain what is encrypted and how to use encrypted contacts.

Consulta l'assistenza sui prodotti Proton

ProtonCalendar
ProtonVPN
(new window)
ProtonDrive
ProtonPass
ProtonBridge
Proton
account
ProtonFor Business