Proton

Latest articles

en
  • 隱私新聞
Big Tech CEOs are being called to testify in front of US Congress again. To avoid another embarrassment, Congress must understand these three key facts.
An illustration of the Chinese government using TikTok to watch its users.
en
  • 隱私新聞
TikTok is the fastest growing social media platform in the world. However, its links to the Chinese government also pose a major privacy problem
An illustration of law enforcement breaking through encryption.
en
  • 隱私新聞
The US Congress is considering a bill that will ban end-to-end encryption and give law enforcement access to almost any encrypted app or device.
An illustration of the Chinese government monitoring Hong Kong citizens.
en
  • 隱私新聞
The Chinese government has granted Hong Kong law enforcement agencies sweeping surveillance and Internet censorship powers with Article 43.
Illustration of the Apple monopoly
en
  • 隱私新聞
The EU is investigating Apple’s App Store practices for antitrust violations. Here’s why we must all resist abuses by tech giants.
An image of Proton Mail's open source encryption libraries.
en
  • Proton 新聞
Developers can now quickly see which other cryptographic libraries OpenPGP.js and GopenPGP work with. This makes developing encrypted apps much easier.
Illstration of the surveillance represented by user data requests.
en
  • 隱私新聞
Companies like Facebook and Google collect massive amounts of data on their users, which national governments then request for surveillance purposes.
en
  • 隱私指南
Learn all about TLS/SSL certificates, the digital files that help to authenticate and secure data transfers across the internet.
Illustration of changing email provider
en
  • 隱私指南
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
  • 隱私指南
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.
An illustration of anonymized data.
en
  • 隱私指南
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.