Privacy.eus
-
Based in Switzerland
Based in Switzerland so you stay private everywhere. ProtonVPN is based in Switzerland, giving you the protection of some of the world’s strongest privacy laws. A Swiss-based VPN service When you connect to ProtonVPN, you enjoy the same legal protections that ensure the privacy of all Swiss citizens. ProtonVPN is built by the same group […]
-
Free VPN for iOS and iPadOS
Defeat censorship and protect your online activity with our easy-to-use iOS app. Download our secure, free app for your iPhone or iPad ProtonVPN’s app for iOS and iPadOS protects your privacy and defeats online censorship. No logs Based in Switzerland, ProtonVPN has a strict no-logs policy and does not collect any data that might compromise […]
-
How remove mobile signature protonmail
How remove mobile signature protonmail. By default, a mobile signature (called a mobile footer in our Android app) saying Sent from ProtonMail mobile is added to all emails you send from your iPhone, iPad, or Android device. If you have a Free account, it is not possible to edit or disable this mobile signature, although […]
-
How to send an email to multiple email addresses
How to send an email to multiple email addresses There are lots of instances when you want to send the same email to multiple people. Sometimes, you want everyone to be part of the conversation and see each other’s responses. Other times, you want to send the same email to multiple people, but you don’t […]
-
Enjoy a safer email experience free from trackers
Enjoy a safer email experience free from trackers At ProtonMail, we believe that reading emails should be as private as our end-to-end encryption makes sending them. Today, we’re happy to introduce enhanced tracking protection, a feature that will provide an additional layer of privacy to your inbox. Now you can read your emails without letting […]
-
The 10 biggest privacy wins from 2021
The 10 biggest privacy wins from 2021 As we come to the end of Data Privacy Week, it’s important to take stock of our progress. Yes, building an internet where privacy is the default is hard work, and yes, we still have a long way to go, but there were promising developments in 2021 for […]
-
Help your friends and family be more private
Help your friends and family be more private Your personal data is the currency of the digital age. With every click, swipe, and like, you produce a wealth of information about yourself that companies track and collect, making it crucial to protect your online privacy. However, have you thought about how safeguarding your privacy depends […]
-
What is spam email?
Spam email (or just “spam”) is unsolicited messages sent out in bulk by email, usually for commercial purposes.
-
What is Incognito mode and is it really private?
What is Incognito mode and is it really private? Incognito mode, or Private Browsing, is a privacy setting in your browser that lets you surf the web more privately. But how private is it? We explain what Incognito mode is, how it works, and how you can use it to enhance your privacy. We’ll also […]
-
US data protection: Online habits and data breaches
US data protection: Online habits and data breaches Our survey reveals US online data protection habits and how common data breaches are. As an organization building an internet where privacy is the default, we at Proton are always interested in how people protect themselves and their data online. We asked 1,000 randomly selected people over […]
-
What is an IP address?
An Internet Protocol (IP) address is a numerical label that uniquely identifies every device that connects to the internet. It is used to: Identify a device or network connected to the internet Route packets (containing data) so they can find a device or network that is connected to the internet If your device connects directly […]
-
A breakdown of a DKIM replay attack
On 1 December 2021, we began receiving sporadic reports of delivery failures from protonmail.com addresses to Gmail. This corresponded with a dramatic decline in protonmail.com’s domain reputation as seen via Gmail Postmaster Tools and an increase in sending from known bad IP addresses. It was clear both from the bad sending IPs (mostly in Russia) […]
-
Privacy Decrypted #6: How to read a privacy policy
Privacy policies explain how organizations collect and secure your personal information, but few people read them. Here’s how to quickly check a privacy policy to take back control of your data. When you last bought something online, you may have glanced at the terms of use, if only to check the delivery or return details. […]
-
How encrypted email works
From holiday photos to our purchasing history to personal correspondences, our emails contain a great deal of sensitive information. It is therefore vital to keep your inbox and messages secure. This is more difficult than it first appears, as email was invented and widely adopted in the early days of the internet before many of today’s […]
-
Dealing with cyberstalking: How to protect your privacy and stay safe online
Dealing with cyberstalking: How to protect your privacy and stay safe online With the proliferation of smartphones and social media, cyberstalking is on the rise. Compared to traditional stalking, cyberstalking can be a more threatening form of aggression as cyberstalkers can hide behind the anonymity of the internet and terrorize their victims around the clock. […]
-
What is AES encryption?
What is AES encryption? AES is a fast, efficient, and secure encryption standard. Certified by the National Institute of Standards and Technology (NIST), AES is used by the United States government to secure classified data. This has led many companies to market AES (especially AES with a 256-bit key) as “military-grade encryption”, although such terminology […]
-
How to delete your Amazon account
How to delete your Amazon account Whether you’ve had enough of Big Tech companies monetizing your personal data or just found somewhere else to shop, here’s all you need to know to permanently close your Amazon account.
-
What is bloatware and is it a security risk?
What is bloatware and is it a security risk? Bloatware is unwanted software pre-installed on new PCs, laptops, and mobile devices by the device manufacturer, OS developer, or network carrier. It is not usually malicious, but it uses up system resources and can therefore slow down your device.
-
Privacy Decrypted #5: How HTTPS keeps you safe (but not private)
Privacy Decrypted #5: How HTTPS keeps you safe (but not private) HTTPS is the backbone that keeps everyone safe and secure on the internet. However, it does little to prevent you from being tracked online.
-
How to create (and use) a new email address
How to create (and use) a new email address. An email address is your portal to the internet. Without one, you can’t use most of the services available on the web. Research from the Radicati Group shows that most of us have multiple email addresses, with the number of addresses per email user increasing year-on-year. […]
-
ProtonVPN: The ultimate guide to torrenting
Torrenting is an incredibly fast and efficient way to distribute large files over the internet. Although often considered to be synonymous with piracy, there are many legitimate use cases for torrenting. However, before diving into the world of P2P file sharing, you should understand what torrenting is, how it works, and how to protect yourself […]
-
What is Secure Core VPN?
A common method to expose VPN traffic is to compromise the server that handles your traffic. This risk is particularly acute for servers located in high-risk jurisdictions. To mitigate this risk, ProtonVPN has Secure Core servers. This article provides an overview of the attacks and threats that Secure Core mitigates, how it achieves higher VPN privacy, as well as […]
-
VPN Security Features
When you use ProtonVPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, ProtonVPN’s advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access websites that might be blocked in your country.
-
OpenVPN vs. WireGuard
OpenVPN is beginning to show its age in terms of speed, performance, and efficiency, but remains widely regarded as the most secure and battle-tested VPN protocol available. The ability to run OpenVPN in TCP mode also gives it greater built-in anti-censorship capabilities than WireGuard.
-
Five steps to create and remember strong passwords
If you’re struggling to think up strong passwords you can remember for your online accounts, here’s a simple, secure solution — for you and the whole family. You’ve heard the security advice: “Create a unique, strong password for each account”. But are you doing that for every login? And what about the Netflix account you […]
-
Proton welcomes Alisée de Tonnac and Bill Kaiser to its board
≠At Proton, we have experienced incredible growth over the past seven years. Over 50 million people have signed up for Proton services to keep their personal information private. ProtonMail, which we launched in 2014, is now the world’s largest encrypted email service, and ProtonVPN, launched in 2017, is one of the fastest-growing VPNs on the […]
-
ProtonVPN only uses strong, secure VPN protocols
The VPN protocol determines the security, stability, and speed of your VPN connection, which is why we only use protocols with strong security track records.
-
ProtonMail: How to import emails with Import Assistant
Import Assistant is a tool that safely transfers your emails and folders from an external email account to ProtonMail. Your email messages are encrypted the moment they arrive in your ProtonMail inbox, making the transition to a secure email provider easy and risk free. Transferring your emails to ProtonMail is an important first step towards transitioning […]
-
What is an SSID and should you hide yours?
An SSID is the name of a wireless network. Learn how SSIDs work, how to find your SSID, and whether it’s better to broadcast or hide it. If you set up your home WiFi network, you may have selected the network’s name (SSID) on your devices, entered the default wireless password, and connected. And that’s […]
-
ProtonVPN keeps no logs and never will
ProtonVPN is committed to protecting your privacy, which is why we have a strict no-logs policy. We do not keep any logs of your online activity and do not store any metadata.
-
Secure Core VPN safeguards your data
ProtonVPN’s Secure Core network gives your data an additional layer of security and defends you against advanced attacks. We installed our Secure Core servers(new window) and continue to operate them ourselves to eliminate any chance that they could be tampered with, and all Secure Core VPN servers are located in countries with strong data privacy […]
-
Which countries have the most digital freedom?
Digital freedom is something that much of society takes for granted, but, unfortunately, online liberty doesn’t exist for everyone. Your ability to use a VPN, access social media, or even read freely and fairly reported news in the media is entirely dependent on the laws governing the country you live in. This leads to a […]
-
Seven email management tips for organizing your inbox and boosting productivity
With so much of your life spent on the internet, an organized inbox isn’t just a matter of being tidy — it’s about being productive and focusing your attention on tasks that really matter. The average office worker receives around 121 emails and sends 40 each day, leading to unnecessary distractions and dips in concentration. […]
-
What is PPTP?
The Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol used to secure the connection between your device and a VPN server. One of the oldest VPN protocols, PPTP is plagued by multiple security issues and is now considered obsolete.
-
What is an email alias?
An alias is an extra email address that can help you protect your privacy, block spam, and keep your inbox organized. Your personal email address is an essential part of your digital identity. Like your phone number, you don’t give it to everyone you meet.
-
ProtonMail: Encrypted Contacts
For usability reasons, Proton Contacts encrypts different contact fields in different ways. In this article, we look at…
-
Your emails are your business. Protect them with ProtonMail for Business
ProtonMail for Business secures your data on the cloud. We make end-to-end encrypted email easy, on any device.
-
Save up to 50% with a special offer on our premium VPN Plus plan
Make the best of our year-end discounts and secure your internet connection with a VPN you can trust.
-
Migrate from Outlook to ProtonMail
Please note that ProtonMail does not support importing of PST files, as this is a Microsoft-specific file format. We recommend using our Import-Export tool, but if you prefer importing via a local file then please ensure you export your emails from Outlook as an .mbox or .eml file.
-
Swiss court ruling strengthens privacy for email providers
Since the founding of Proton in 2014, we have fought to advance privacy and freedom around the world. We do this not only through technology and advocacy (Proton has contributed over $500,000 toward defending these values around the world) but also through the courtroom.
-
Privacy Decrypted #4: Understanding anonymity vs. privacy
Anonymity is not the same thing as privacy, and confusing these related but different concepts can weaken your online threat model.
-
Guide to Proton Calendar for new users
Proton Calendar helps you stay on top of your schedule while keeping your data secure. You can access Proton Calendar on the web by going to calendar.protonmail.com and logging in with your ProtonMail credentials. Or you can log in to mail.protonmail.com and use the App Selector.
-
ProtonMail: Two-factor authentication (2FA)
Two-factor authentication (2FA) is an additional layer of security for your ProtonMail account. With 2FA enabled, you will be prompted to enter a 6-digit code when you log in to your account. This 6-digit code will be generated by an app installed on your mobile phone.
-
Two-factor authentication on ProtonVPN
Two-factor authentication (2FA) adds an additional layer of security to your ProtonVPN account by requiring a second round of verification to the login process. To use 2FA, you must have a device with an authenticator app installed on it. The authenticator app creates one-time passwords to use as verification codes when logging in.
-
Guide to installing ProtonVPN on different routers
There are many advantages to configuring your router to run ProtonVPN. These include: No need to set up a VPN on each device Protects devices that don’t support VPNs Automatically secures all your Internet traffic Protects your entire household with one device
-
Privacy Decrypted #3: Can encryption be broken?
Privacy services often rely on strong encryption to protect privacy and confidentiality. Some terms that you have heard probably include AES, RSA, or maybe even elliptic-curve cryptography (ECC). However, is encryption actually bulletproof and a guarantee of safety?
-
What is end-to-end encryption and how does it work?
End-to-end encryption is the most secure way to communicate privately and securely online. By encrypting messages at both ends of a conversation, end-to-end encryption prevents anyone in the middle from reading private communications.
-
WireGuard speed, Proton privacy
In 2017, we launched ProtonVPN to defeat censorship and protect activists, journalists, and ordinary people on the internet. Since then, we’ve continued to build new features like NetShield Adblocker and, more recently, our unique VPN Accelerator for our community.
-
Proton launches new bug bounty program with partner Bug Bounty Switzerland
Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland and our new private bug bounty program made up of expert ethical hackers and security researchers.
-
Privacy Decrypted #2: How to use ProtonMail more anonymously
Privacy and anonymity are often tossed about as synonymous terms but they are actually related ideas that represent different things.