Proton

개인정보 보호 가이드

A smartphone receiving a suspicious text - AKA a smishing attack
en
  • 개인정보 보호 가이드
Phishing and smishing attacks keep evolving, but do you know the difference? Learn how to tell them apart and protect yourself from smishing.
A digitized face on the internet, representing erasure.
en
  • 개인정보 보호 가이드
After ransom-seekers sent the police to his house, one man embarked on a journey to erase himself online. Find out how he did it.
An ID card with a user profile and a wallet, suggesting data brokers
en
  • 개인정보 보호 가이드
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
the cover image for a blog about what to do to prevent your email address appearing on the dark web. the image shows an email address on a computer screen with a fishing hook piercing the top of the password field
  • 개인정보 보호 가이드
이메일 주소가 유출되었나요? 이메일 주소가 다크 웹에 유출되었는지 확인하는 방법과 대처 방법을 알려드립니다.
Why email aliases are better than fake email addresses for privacy and security
  • 개인정보 보호 가이드
가짜 이메일 생성기를 사용하는 것은 보안이나 개인정보 보호 측면에서 안전하지 않은 경우가 많습니다. 대신 이메일 별칭을 사용하여 개인 이메일을 안전하게 유지하는 방법은 다음과 같습니다.
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
  • 개인정보 보호 가이드
Roughly 90% of Ed Tech apps and websites were found to have trackers. See how you can protect your child’s privacy from this surveillance. 
en
  • 개인정보 보호 가이드
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
  • 개인정보 보호 가이드
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
  • 개인정보 보호 가이드
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Whistleblower's whistle. Journalists must use secure channels to communicate with whistleblowers.
en
  • 개인정보 보호 가이드
Whistleblowers risk everything to expose the truth. This guide helps journalists keep their sources safe using secure tools like Proton Mail, Signal, and SecureDrop.
An image showing a phone screen with a child icon and three icons with '17+' '8-12' and '3-5' to indicate age ratings
en
  • 개인정보 보호 가이드
Parents can help their children develop healthy screen habits by learning about dark design patterns — Proton investigates how