Latest articles

en
- Gizlilik haberleri
If you’re using Zoom while working from home, you should be aware of Zoom's
privacy policies, including its “attention tracking” tool.

en
- Gizlilik rehberleri
Political campaigns are as driven by personal data as Google or Facebook. And
these campaigns often share your data with third parties.

- Ürün güncellemeleri
Proton, kullanıcıların DNS engellemelerini atlatmasına yardımcı olmak için
sansür karşıtı önlemler sağlar. Bu makale, bu sistemlerin nasıl çalıştığını
açıklamaktadır.

en
- Ürün güncellemeleri
- Proton Mail
This document describes the vulnerability disclosure policy our security team
follows when we discover flaws in third-party products.

en
- Ürün güncellemeleri
- Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for
attackers to spoof their email address.

en
- Proton haberleri
Free digital services have become the norm, but we’re paying for them with our
data. At Proton, we’re turning this model upside down and restoring digital
freedom.

en
- Gizlilik rehberleri
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And
how can you keep your devices safe? We have a helpful guide.

en
- Gizlilik haberleri
The Edison email app scrapes user data while making claims about practicing
privacy by design. This misleads users and undermines their right to privacy.
en
- Gizlilik rehberleri
The number of IoT (Internet of Things) devices will reach 38 billion in 2020,
opening up a massive opportunity for privacy breaches.

en
- Ürün güncellemeleri
- Proton Mail
Russia has periodically made attempts to block Proton Mail. Here is the current
status and how you can bypass blocks placed on Proton Mail.
en
- Gizlilik rehberleri
Biometric authentication is everywhere, from smartphones to offices and more.
Here's how to be safe while using physical characteristics as your password.