Proton

Latest articles

A Swiss flag, a man in a suit speaking at a podium, and a hand holding a smartphone with an unlocked padlock, suggesting that the email accounts of Swiss politicians are exposed on the dark web
en
  • 隱私新聞
Roughly 16% of Swiss federal politicians had their official government email leaked on the dark web. This puts them at risk of phishing attacks or blackmail.
  • 隱私新聞
您可能會驚訝於您的生活有多少受到使用來自資料仲介資料的 AI 決策的影響。我們解釋了其問題以及如何保護自己。
在線上找到個人資料有多容易?我們進行了調查。
  • 隱私新聞
我們測試了一個像明尼蘇達州議員槍擊案中涉及的那種尋人網站。
An ID card with a user profile and a wallet, suggesting data brokers
en
  • 隱私指南
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
一篇關於如何防止您的電子郵件地址出現在暗網上的部落格封面圖片。圖片顯示電腦螢幕上有一個電子郵件地址,一個魚鉤穿過密碼欄位的頂部
  • 隱私指南
您的電子郵件地址是否遭到入侵?以下是如何查明您的電子郵件地址是否已在暗網上外洩,以及如果已外洩該怎麼做。
How to start an email: 15 professional greetings and opening lines
en
  • 商業使用
Learn how to start an email professionally with our top greetings, openers, and formal examples, and find out what to avoid (and why).
為什麼電子郵件別名在隱私和安全方面優於假電子郵件地址
  • 隱私指南
使用假的電子郵件產生器通常既不安全也不私有。以下是如何改用電子郵件別名來保持個人電子郵件安全。
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
  • 隱私指南
Roughly 90% of Ed Tech apps and websites were found to have trackers. See how you can protect your child’s privacy from this surveillance. 
en
  • 隱私指南
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
  • 隱私指南
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
  • 隱私指南
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.