Proton

Latest articles

en
  • 隱私指南
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
Illustration of someone working from home.
en
  • 商業使用
COVID-19 has forced companies to transition to working from home. We created a guide to help employees and administrators stay safe online.
An illustration of Zoom's attendee attention tracking.
en
  • 隱私新聞
If you’re using Zoom while working from home, you should be aware of Zoom's privacy policies, including its “attention tracking” tool.
An illustration of political campaigns sharing voter data.
en
  • 隱私指南
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
Illustration of alternative routing
  • 產品更新
Proton 提供反審查措施,協助使用者繞過 DNS 封鎖。本文說明這些系統如何運作。
Illustration of vulnerability disclosure
en
  • 產品更新
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.
Illustration of a user using DKIM keys to stop a hacker spoofing their email.
en
  • 產品更新
  • Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for attackers to spoof their email address.
en
  • Proton 新聞
Free digital services have become the norm, but we’re paying for them with our data. At Proton, we’re turning this model upside down and restoring digital freedom.
An illustration of cryptojacking.
en
  • 隱私指南
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.
illustration of email surveillance
en
  • 隱私新聞
The Edison email app scrapes user data while making claims about practicing privacy by design. This misleads users and undermines their right to privacy.
An illustration of different smart devices that make up the Internet of Things.
en
  • 隱私指南
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.