Proton

Latest articles

Illustration of the Bridge security model
en
  • Обновления продуктов
  • Proton Mail
You can use Proton Mail Bridge with IMAP/SMTP email clients. Here we explain the Bridge security architecture and how it protects your data.
Illustration of Proton Mail Covid-19 response
en
  • Новости Proton
Proton is offering extra storage, free business email accounts, and other resources to support our community through the coronavirus pandemic.
protonmail bridge for linux
en
  • Обновления продуктов
  • Proton Mail
Proton Mail Linux users can now connect their email accounts with the Thunderbird client.
en
  • Руководства по конфиденциальности
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
Illustration of someone working from home.
en
  • Для бизнеса
COVID-19 has forced companies to transition to working from home. We created a guide to help employees and administrators stay safe online.
An illustration of Zoom's attendee attention tracking.
en
  • Новости конфиденциальности
If you’re using Zoom while working from home, you should be aware of Zoom's privacy policies, including its “attention tracking” tool.
An illustration of political campaigns sharing voter data.
en
  • Руководства по конфиденциальности
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
Illustration of alternative routing
  • Обновления продуктов
Proton предоставляет меры против цензуры, чтобы помочь пользователям обходить блокировки DNS. В этой статье объясняется, как работают эти системы.
Illustration of vulnerability disclosure
en
  • Обновления продуктов
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.
Illustration of a user using DKIM keys to stop a hacker spoofing their email.
en
  • Обновления продуктов
  • Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for attackers to spoof their email address.
en
  • Новости Proton
Free digital services have become the norm, but we’re paying for them with our data. At Proton, we’re turning this model upside down and restoring digital freedom.