Proton

隱私指南

An image showing a purple computer screen and keyboard with a key icon in the top right corner of the screen
en
  • 商業使用
  • 隱私指南
Learn how to use an authenticator app to protect your workplace accounts with two-factor authentication (2FA).
A family photo, a location pin, a camera, and a clock, symbolizing the risks of EXIF data for your personal photos
en
  • 隱私指南
EXIF data in your photos can reveal more than you think, including your location. Learn how to protect your privacy before sharing online.
大多數「一次性電子郵件」服務並不安全,但這個替代方案是安全的
  • 隱私指南
一次性電子郵件服務並不像您想像的那麼安全 —— 但有一個更好的方法。進一步瞭解關於可拋棄式電子郵件地址的簡單、安全替代方案。
A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
en
  • 隱私指南
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
A smartphone, the Android logo, Gemini AI, and an off toggle, representing how to turn off Gemini on Android
en
  • 隱私指南
Learn how to turn off Gemini on Android, what the Google AI can see, its privacy risks, and how to limit its reach across your device.
Proxy VPN
en
  • 隱私指南
A VPN is a special type of proxy. We look at what a proxy is and provide an overview of the different kinds of proxy that are available (including VPNs).
Three envelopes, with the middle one showing a newsletter inside, symbolizing inbox decluttering
en
  • 隱私指南
Learn how to organize your inbox and reduce email clutter using folders, labels, spam protection, custom filters, aliases, and more.
A smartphone receiving a suspicious text - AKA a smishing attack
en
  • 隱私指南
Phishing and smishing attacks keep evolving, but do you know the difference? Learn how to tell them apart and protect yourself from smishing.
A digitized face on the internet, representing erasure.
en
  • 隱私指南
After ransom-seekers sent the police to his house, one man embarked on a journey to erase himself online. Find out how he did it.
An ID card with a user profile and a wallet, suggesting data brokers
en
  • 隱私指南
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
一篇關於如何防止您的電子郵件地址出現在暗網上的部落格封面圖片。圖片顯示電腦螢幕上有一個電子郵件地址,一個魚鉤穿過密碼欄位的頂部
  • 隱私指南
您的電子郵件地址是否遭到入侵?以下是如何查明您的電子郵件地址是否已在暗網上外洩,以及如果已外洩該怎麼做。