Proton

Proton blog

The US flag and a warning sign, representing how the FBI is buying location data on Americans from data brokers

Latest articles

See all articles
an image showing a purple animated shield with a person icon in the middle, surrounded by three green circles with a fingerprint, key, and location icon in each
Learn how to safeguard PII data in digital environments with strong controls, clear responsibilities, and best security practices.
When age verification moves into your operating system
Age verification is moving into operating systems. Here’s how OS-level age checks could reshape privacy and access online.
iPhone age verification
Apple now requires UK users to verify their age on iPhone. This signals a broader shift toward identity-based access at the device level.
A box labeled "SDK" with a folder inside, suggesting the Proton Drive SDK
Core file operations in Proton Drive now use the Drive SDK for faster, more reliable performance. See our progress and what’s coming in 2026.
Proton Sheets and a screenshot
Proton Drive now includes Proton Sheets, giving you secure, encrypted spreadsheets for safer collaboration, organized data, and aligned teams.
A purple screen with a title saying 'Proton Pass CLI' above a CLI interface with white text on a black background
  • Product updates
  • Proton Pass
To help you work in the terminal, Proton Pass now offers a command-line interface (CLI) for enhanced productivity and increased security.
Reserve a private email address for your child with Born Private
Give your child a safer start online. Reserve a private, secure, no-ads address with Proton Mail that stays sealed until your child is ready.
Proton's new Mail mobile apps
Proton Mail’s next-generation iOS and Android apps were rebuilt from the ground up. Here’s why we did it and what it changes for users.
Representation of a survey about spreadsheet security
Proton surveyed 1,000 people across four countries to reveal how personal spreadsheet data lives on, stays shared, and may be used long after you forget it.
When age verification moves into your operating system
Age verification is moving into operating systems. Here’s how OS-level age checks could reshape privacy and access online.
iPhone age verification
Apple now requires UK users to verify their age on iPhone. This signals a broader shift toward identity-based access at the device level.
A computer screen and a school symbol, representing how student data is being funneled into Google's ecosystem
Google Chromebooks and Workspace rule US classrooms. Lawsuits claim they collect student data without parental consent. What you should know.
a purple illustrated phone screen with a white Android logo on it, 4 other phone screens sit behind it and an X icon is on the right corner
Find out how to stop apps running in background Android processes, and read our tips to keep your phone more secure.
An image showing a purple illustrated speech bubble containing a key icon with a password field in the bottom right corner
Discover how passkeys work, why they beat passwords on security and usability, and when you still need a password.
The @ (at) sign and an open letter, representing what is an email address
  • Privacy guides
What is an email address, really? Discover how it works, what makes one valid, and simple tips to keep yours private.
A computer screen showing a person icon and text boxes sits behind a purple cartoon brain
Should we be worried about AI taking over the world someday? Or is Big Tech distracting us from what it's doing right now?
Internet predictions for 2026, including icons for AI, privacy and policy
From age verification and VPN bans to AI gone wrong, these are our predictions for how the internet will change in 2026.
Illustration of purple robot with speech bubbles
AI use is increasing rapidly, and many chatbots are tracking everything you share with them. Here’s why that matters and why you should be concerned.
an image showing a purple animated shield with a person icon in the middle, surrounded by three green circles with a fingerprint, key, and location icon in each
Learn how to safeguard PII data in digital environments with strong controls, clear responsibilities, and best security practices.
Illustration of a hand holding a phone and depicting a grocery cart and other objects to represent sectors in the breach report
New incidents uncovered in the 2026 Data Breach Observatory show that small businesses were hit especially hard by cyberattacks.
an image of a purple cartoon envelope with a briefcase logo in the top right corner
Find out what qualifies as a data breach in the UK, your legal obligations, and how to report it to the Information Commissioner’s Office.