Latest articles

en
- Руководства по конфиденциальности
Cloud storage is a popular alternative to hard drives and USBs — but what is
cloud storage and how does it work? Here’s what you need to know.

en
- Руководства по конфиденциальности
Phishing scams can put you at risk of identity theft, credit card fraud, or
other cybercrime. Learn how to spot and prevent phishing.

- Руководства по конфиденциальности
Защитите свой почтовый ящик от почтовых трекеров. Узнайте, как они работают, и
изучите простые способы блокировки их с помощью защиты от отслеживания Proton
Mail.

en
- Руководства по конфиденциальности
In this article, we examine the LastPass data breach and consider the lessons
that can be drawn from it.

en
- Руководства по конфиденциальности
Learn what email headers are, what they contain, and how to read them to keep
your inbox secure and spam-free.

en
- Новости конфиденциальности
Google and Facebook are handing over user data to police for abortion
prosecutions. Learn why Proton would never do that.
en
- Руководства по конфиденциальности
If you have sensitive files or just want to keep your data private, here’s how
to encrypt files on Windows, Mac, Android, and iOS.

en
- Руководства по конфиденциальности
Learn what 2FA is, how it works, and why you should use it wherever you can to
protect your privacy and security online.

en
- Руководства по конфиденциальности
Cloud storage lets you share large files quickly, back up your data, and more.
Read on to find out if you should use cloud storage.

en
The UK’s proposed Online Safety Bill would likely undermine free speech and
end-to-end encryption without tackling illegal content.
en
- Руководства по конфиденциальности
Here's a step-by-step guide outlining how to password-protect PDF files and
other ways to keep your documents safe from prying eyes.