Proton

Latest articles

An illustration of Zoom's attendee attention tracking.
en
  • Gizlilik haberleri
If you’re using Zoom while working from home, you should be aware of Zoom's privacy policies, including its “attention tracking” tool.
An illustration of political campaigns sharing voter data.
en
  • Gizlilik rehberleri
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
Alternatif yönlendirme çizimi
  • Ürün güncellemeleri
Proton, kullanıcıların DNS engellemelerini atlatmasına yardımcı olmak için sansür karşıtı önlemler sağlar. Bu makale, bu sistemlerin nasıl çalıştığını açıklamaktadır.
Illustration of vulnerability disclosure
en
  • Ürün güncellemeleri
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.
Illustration of a user using DKIM keys to stop a hacker spoofing their email.
en
  • Ürün güncellemeleri
  • Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for attackers to spoof their email address.
en
  • Proton haberleri
Free digital services have become the norm, but we’re paying for them with our data. At Proton, we’re turning this model upside down and restoring digital freedom.
An illustration of cryptojacking.
en
  • Gizlilik rehberleri
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
illustration of email surveillance
en
  • Gizlilik haberleri
The Edison email app scrapes user data while making claims about practicing privacy by design. This misleads users and undermines their right to privacy.
An illustration of different smart devices that make up the Internet of Things.
en
  • Gizlilik rehberleri
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
An illustration of Proton Mail being blocked in Russia.
en
  • Ürün güncellemeleri
  • Proton Mail
Russia has periodically made attempts to block Proton Mail. Here is the current status and how you can bypass blocks placed on Proton Mail.
illustration of biometric authentication
en
  • Gizlilik rehberleri
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.