Proton

Proton blog

A graphic presenting the Proton Workspace ecosystem and the logo of each product
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news

Latest articles

See all articles
an animated clipboard with text, checkmarks, and a shield logo on it. a pen sits on the right side
Learn how SMBs can reduce vulnerabilities with a clear incident response plan to detect, contain, and recover from cyber threats.
a purple cylinder with a green shield icon in the top right corner
Discover how password management simplifies GDPR compliance, enhances access control, and supports security and accountability.
warrantless surveillance
As Section 702 renewal approaches, lawmakers warn VPN users could be treated as “foreign” under US surveillance law, exposing a new privacy risk.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
Proton Sheets and a screenshot
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.
A graphic presenting the Proton Workspace ecosystem and the logo of each product
  • For business
  • Product updates
  • Proton news
Enable team productivity while keeping data private and secure with Proton Workspace. Privacy‑first collaboration tools for modern businesses.
Visual representation of Proton Meet end-to-end encrypted video conferencing security features
Learn how Proton Meet delivers an enterprise-grade secure video conferencing experience while ensuring no one, not even Proton, can eavesdrop on your calls.
warrantless surveillance
As Section 702 renewal approaches, lawmakers warn VPN users could be treated as “foreign” under US surveillance law, exposing a new privacy risk.
Meta targets you with scam ads
Meta is testing Instagram Plus, a new paid subscription that lets people anonymously view Stories, plus other features. What it means for privacy.
A smartphone with an eye inside, surrounded by logos of Google, Apple, and Meta, representing government requests to user data held by Big Tech
Proton research shows how government access to Big Tech data is reshaping parenting and putting children’s privacy at risk.
a purple illustrated phone screen with a white Android logo on it, 4 other phone screens sit behind it and an X icon is on the right corner
Find out how to stop apps running in background Android processes, and read our tips to keep your phone more secure.
An image showing a purple illustrated speech bubble containing a key icon with a password field in the bottom right corner
Discover how passkeys work, why they beat passwords on security and usability, and when you still need a password.
The @ (at) sign and an open letter, representing what is an email address
  • Privacy guides
What is an email address, really? Discover how it works, what makes one valid, and simple tips to keep yours private.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
an animated clipboard with text, checkmarks, and a shield logo on it. a pen sits on the right side
Learn how SMBs can reduce vulnerabilities with a clear incident response plan to detect, contain, and recover from cyber threats.
a purple cylinder with a green shield icon in the top right corner
Discover how password management simplifies GDPR compliance, enhances access control, and supports security and accountability.
A visual representation of the UI for Proton Meet end-to-end encrypted video conferencing service
  • For business
  • Proton Meet
  • Proton news
Protect the conversations that matter with a secure, end-to-end encrypted video conferencing from Proton.