Proton

Latest articles

the cover image for a blog about what to do to prevent your email address appearing on the dark web. the image shows an email address on a computer screen with a fishing hook piercing the top of the password field
  • Gizlilik rehberleri
E-posta adresiniz ele geçirildi mi? E-posta adresinizin karanlık ağda sızdırılıp sızdırılmadığını — ve sızdırıldıysa ne yapacağınızı buradan öğrenebilirsiniz.
How to start an email: 15 professional greetings and opening lines
en
  • Kurumlar için
Learn how to start an email professionally with our top greetings, openers, and formal examples, and find out what to avoid (and why).
Why email aliases are better than fake email addresses for privacy and security
  • Gizlilik rehberleri
Sahte e-posta oluşturucu kullanmak genellikle emniyetli veya güvenli değildir. Kişisel e-postanızı güvende tutmak için bunun yerine bir e-posta takma adını nasıl kullanabileceğiniz aşağıda açıklanmıştır.
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
  • Gizlilik rehberleri
Roughly 90% of Ed Tech apps and websites were found to have trackers. See how you can protect your child’s privacy from this surveillance. 
en
  • Gizlilik rehberleri
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
  • Gizlilik rehberleri
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
  • Gizlilik rehberleri
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
  • Kurumlar için
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
  • Kurumlar için
E-posta adresiniz ve parolalarınız bilgisayar korsanlarının sizi dolandırmak için kullanabileceği tek bilgi değildir. Birinin telefon numaranızla neler yapabileceğini ve onu nasıl koruyacağınızı buradan öğrenebilirsiniz.
A web application screen with an unlock icon in the bottom right corner
en
  • Kurumlar için
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.
Investigative journalist Vegas Tenold explains the gear he uses to protect his privacy and stay safe.
en
  • Gizlilik haberleri
Follow investigative journalist Vegas Tenold as he explains his gear and how it keeps him safe from surveillance as he works in the field.