Proton

Integritetsguider

An illustration of cryptojacking.
en
  • Integritetsguider
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
An illustration of different smart devices that make up the Internet of Things.
en
  • Integritetsguider
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
illustration of biometric authentication
en
  • Integritetsguider
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.
en
  • Integritetsguider
Android is one of Google’s most important tools for collecting data on users. This guide will help you improve your privacy on Android devices.
  • Integritetsguider
Att använda rätt webbläsare är avgörande för att skydda din integritet. Se de säkraste alternativen för webbläsare som håller dig säker från spårning online under 2025.
illustration of protonmail ios security recommendation
en
  • Integritetsguider
Activate Touch ID, Face ID, or PIN protection in the Proton Mail iOS app for added protection against malware and warrantless device searches.
Data breach prevention illustration
en
  • Integritetsguider
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.
en
  • Integritetsguider
Learn what PGP encryption is and how it works, how secure PGP is, and the simplest way to secure your emails with PGP encryption.
Proton Mail for Journalist
en
  • Integritetsguider
Proton Mail supports independent journalism. Our encrypted messages let journalists protect their sources and whistleblowers safely report wrongdoing.
en
  • Integritetsguider
In this article, we tell you how to create a strong password and the best way to keep it safe.
en
  • Integritetsguider
A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked.