Proton

Руководства по конфиденциальности

en
  • Руководства по конфиденциальности
Here are three real-life phishing email examples that almost reeled us in — and how Proton Mail protects inboxes from scammers with anti-phishing features.
en
  • Руководства по конфиденциальности
Learn all about email clients, how they work, and the pros and cons of using one compared to webmail.
anonymous email
  • Руководства по конфиденциальности
Узнайте, как отправить электронное письмо максимально анонимно, используя Proton Mail, SimpleLogin и VPN или Tor.
How do scammers get your personal info?
en
  • Руководства по конфиденциальности
Fraudsters have many ways to get your personal data and steal your identity and money. Learn how to protect yourself.
How to share encrypted files easily and securely
en
  • Руководства по конфиденциальности
Whenever you’re sharing sensitive documents, you should send the file in encrypted format. Here’s the easiest and most secure way to do that.
en
  • Руководства по конфиденциальности
In this article, we show you 10 easy ways to share large video files from your desktop, iPhone, and Android.
en
  • Руководства по конфиденциальности
ChatGPT is no longer banned in Italy, but it and other AI tools will likely face many GDPR challenges in the coming months and years.
What is DMARC?
en
  • Руководства по конфиденциальности
Learn how DMARC email authentication works and why you need it to protect your domain and ensure your emails are delivered.
What is Sender Policy Framework (SPF)?
en
  • Руководства по конфиденциальности
Learn about SPF email authentication and why you need it to help protect your domain and ensure your messages are delivered.
en
  • Руководства по конфиденциальности
Cloud storage is a great way to store and share files, but it isn’t immune to hacking. We explain how you can protect your cloud account.
What is DKIM?
en
  • Руководства по конфиденциальности
Learn how DKIM is used to authenticate emails and why you need it to help prevent your domain from being spoofed.