Proton

Latest articles

How easy is it to find personal data online? We investigated.
  • Personvernsnyheter
Vi testet en nettside for personsøk lik de som var involvert i skytingene av lovgiverne i Minnesota.
An ID card with a user profile and a wallet, suggesting data brokers
en
  • Personvernsveiledninger
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
the cover image for a blog about what to do to prevent your email address appearing on the dark web. the image shows an email address on a computer screen with a fishing hook piercing the top of the password field
  • Personvernsveiledninger
Har e-postadressen din blitt kompromittert? Slik finner du ut om e-postadressen din har lekket på det mørke nettet – og hva du bør gjøre hvis så er tilfelle.
How to start an email: 15 professional greetings and opening lines
en
  • For bedrift
Learn how to start an email professionally with our top greetings, openers, and formal examples, and find out what to avoid (and why).
Why email aliases are better than fake email addresses for privacy and security
  • Personvernsveiledninger
Å bruke en falsk e-postgenerator er ofte ikke sikkert eller privat. Slik kan du bruke et e-postalias i stedet for å holde den personlige e-posten din trygg.
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
  • Personvernsveiledninger
Roughly 90% of Ed Tech apps and websites were found to have trackers. See how you can protect your child’s privacy from this surveillance. 
en
  • Personvernsveiledninger
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
  • Personvernsveiledninger
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
  • Personvernsveiledninger
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
  • For bedrift
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
  • For bedrift
E-postadressen og passordene dine er ikke den eneste informasjonen hackere kan bruke for å svindle deg. Her er hva noen kan gjøre med telefonnummeret ditt — og hvordan du beskytter det.