Proton

隱私指南

en
  • 隱私指南
Cloud storage is a popular alternative to hard drives and USBs — but what is cloud storage and how does it work? Here’s what you need to know.
en
  • 隱私指南
Phishing scams can put you at risk of identity theft, credit card fraud, or other cybercrime. Learn how to spot and prevent phishing.
how to stop email trackers
  • 隱私指南
保護您的收件匣免受電子郵件追蹤程式的侵害。了解它們如何運作,並學習使用 Proton Mail 的追蹤保護來封鎖它們的簡單方法。
en
  • 隱私指南
In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.
what are email headers
en
  • 隱私指南
Learn what email headers are, what they contain, and how to read them to keep your inbox secure and spam-free.
how to encrypt files
en
  • 隱私指南
If you have sensitive files or just want to keep your data private, here’s how to encrypt files on Windows, Mac, Android, and iOS.
what is two factor authentication (2fa)
en
  • 隱私指南
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.
en
  • 隱私指南
Cloud storage lets you share large files quickly, back up your data, and more. Read on to find out if you should use cloud storage.
how to password protect pdf header image
en
  • 隱私指南
Here's a step-by-step guide outlining how to password-protect PDF files and other ways to keep your documents safe from prying eyes.
can emails be traced
  • 隱私指南
電子郵件提供者、ISP 和執法者有辦法透過您的電子郵件追蹤和跟蹤您。以下是如何在線上保持私密。
what is ciphertext
en
  • 隱私指南
Learn all about ciphertext (encrypted text) and how it protects your privacy and secures online communications, including encrypted email.