Proton

Руководства по конфиденциальности

A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
en
  • Руководства по конфиденциальности
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
A smartphone, the Android logo, Gemini AI, and an off toggle, representing how to turn off Gemini on Android
en
  • Руководства по конфиденциальности
Learn how to turn off Gemini on Android, what the Google AI can see, its privacy risks, and how to limit its reach across your device.
Proxy VPN
en
  • Руководства по конфиденциальности
A VPN is a special type of proxy. We look at what a proxy is and provide an overview of the different kinds of proxy that are available (including VPNs).
Three envelopes, with the middle one showing a newsletter inside, symbolizing inbox decluttering
en
  • Руководства по конфиденциальности
Learn how to organize your inbox and reduce email clutter using folders, labels, spam protection, custom filters, aliases, and more.
A smartphone receiving a suspicious text - AKA a smishing attack
en
  • Руководства по конфиденциальности
Phishing and smishing attacks keep evolving, but do you know the difference? Learn how to tell them apart and protect yourself from smishing.
A digitized face on the internet, representing erasure.
en
  • Руководства по конфиденциальности
After ransom-seekers sent the police to his house, one man embarked on a journey to erase himself online. Find out how he did it.
An ID card with a user profile and a wallet, suggesting data brokers
en
  • Руководства по конфиденциальности
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
the cover image for a blog about what to do to prevent your email address appearing on the dark web. the image shows an email address on a computer screen with a fishing hook piercing the top of the password field
  • Руководства по конфиденциальности
Ваш адрес электронной почты был скомпрометирован? Вот как узнать, утек ли ваш адрес электронной почты в даркнет, — и что делать, если это произошло.
Why email aliases are better than fake email addresses for privacy and security
  • Руководства по конфиденциальности
Использование генератора поддельных писем часто небезопасно и неконфиденциально. Вот как можно использовать псевдоним электронной почты вместо этого, чтобы обеспечить безопасность вашей личной почты.
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
  • Руководства по конфиденциальности
Roughly 90% of Ed Tech apps and websites were found to have trackers. See how you can protect your child’s privacy from this surveillance. 
en
  • Руководства по конфиденциальности
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.