Proton

Latest articles

An illustration of Big Tech monetization
en
  • 隱私新聞
Big Tech companies have found ways to get more and more advertising revenue out of their users. The secret? They track your activity all over the internet.
An illustration of Proton Mail's public keys.
en
  • 產品更新
  • Proton Mail
The batch GCD algorithm can extract secret keys from large databases of public keys. Proton Mail is secure against this vulnerability.
Import Assistant Proton Mail
en
  • Proton 新聞
Import Assistant lets you migrate messages and folders from your old email service to your encrypted Proton Mail account.
Illustration of cloud storage
en
  • 隱私指南
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more about our storage model and how we protect your privacy.
en
  • 隱私新聞
The US House subcommittee investigation of tech monopolies confirms the arguments we have made for years. Antitrust enforcement is essential for privacy.
An illustration of the Court of Justice for the EU banning indiscriminate metadata collection and retention.
en
  • 隱私新聞
The EU Court of Justice ruled EU law applies when governments force telecommunication providers to process data, making it harder to perform mass surveillance.
Illustration of BGP hijacking
en
  • Proton 新聞
On September 29, an internet routing error by an Australian ISP redirected a third of our global traffic. ISPs must start taking BGP hijacking seriously.
Proton 4.0 is now in beta
en
  • 產品更新
We’re making Proton tools even more seamlessly connected, letting you sign in once to access your inbox, calendar, cloud storage, and more.
Proton launches the Coalition for App Fairness
en
  • Proton 新聞
Proton has joined the Coalition for App Fairness to support regulatory efforts that favor an open, free, and private internet for all.
Illustration of searching for privacy-focused email services.
en
  • 隱私新聞
Google searches for privacy-focused Gmail alternatives have steadily increased since 2019. We examine the numbers and potential reasons why.
en
  • 隱私指南
Flash drives and external hard drives are convenient, but they're not always secure. We explain how you can encrypt your USB drives and protect your data.