Proton

Proton blog


Latest articles

See all articles
an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.
The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
Proton Sheets and a screenshot
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A purple screen with a title saying 'Proton Pass CLI' above a CLI interface with white text on a black background
  • Product updates
  • Proton Pass
To help you work in the terminal, Proton Pass now offers a command-line interface (CLI) for enhanced productivity and increased security.
Proton's new Mail mobile apps
Proton Mail’s next-generation iOS and Android apps were rebuilt from the ground up. Here’s why we did it and what it changes for users.
Representation of a survey about spreadsheet security
Proton surveyed 1,000 people across four countries to reveal how personal spreadsheet data lives on, stays shared, and may be used long after you forget it.
We raised over $1.25 million this year to directly support organizations on the front lines of the fight for online privacy and freedom.
The App Store Accountability Act would require app stores to verify users’ ages and obtain parental consent. Learn how the bill could affect privacy and security.
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks of AI products for kids.
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks for kids.
New research from Proton shows that Europeans want to shed US tech dependence and build tech sovereignty for Europe. Read the full report.
an image showing eavesdropping between two purple cartoon mobile phones
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
an image of a purple cartoon computer screen with a warning icon in the center and a hand in a stop motion in the top right corner
Find out about the data breach risks that UK businesses face and the best practices you need to implement to ensure business continuity.
A purple cartoon computer screen showing six app icons, two of which have warning icons on them
Discover what worm viruses are, how they replicate, and how to protect your organization with a secure business password manager.
an image showing two cartoon documents with a shield icon containing a lock icon in the bottom right corner
Backups aren’t sufficient to ensure business continuity. Find out what else you need to ensure operational resilience.