Twilio Incident: What Signal Users Need to Know

Twilio Incident: What Signal Users Need to Know

Twilio Incident: What Signal Users Need to Know. Recently Twilio, the company that provides Signal with phone number verification services, suffered a phishing attack. Here's what our users need to know: All users can rest assured that their message history, contact...

S.A.R. Levels and our mobile phones

S.A.R. Levels and our mobile phones

Today, when we want to buy a mobile phone, tablet, wireless music headset… We worry a lot about color, size, design, price… But we forget something very important, the SAR, what is the S.A.R.? Every mobile device emits an RF (Radio Frequency) at certain levels. Some...

“I do not care”

“I do not care”

It is very common to hear people phrases like "I don't care" or "I have nothing to hide". From my point of view, everyone has something important to protect, for me, the privacy of each person is something important to protect. Each person has their photos, their...

How to send an email to multiple email addresses

How to send an email to multiple email addresses

There are lots of instances when you want to send the same email to multiple people. Sometimes, you want everyone to be part of the conversation and see each other’s responses. Other times, you want to send the same email to multiple people, but you don’t want them to...

Privacy and the metaverse

Privacy and the metaverse

On October 28, 2021, Facebook announced the rebranding of its parent company from Facebook to Meta. Since then, the term “metaverse” has been a hot topic of discussion.  From facial expressions to biometric data, the metaverse has the potential to collect new and...

Proton hosted the sixth OpenPGP Email Summit

Proton hosted the sixth OpenPGP Email Summit

Proton hosted the sixth OpenPGP Email Summit. Last month, developers from numerous OpenPGP-related projects came together at Proton’s headquarters in Geneva to work together and discuss the future of encrypted email using the OpenPGP standard. Proton had offered to...

Proton reaches 70 million accounts

Proton reaches 70 million accounts

In 2010, Mark Zuckerburg dismissed privacy as a social norm that had outlived its usefulness. Fortunately for us all, he was wrong. In the past 12 years, privacy has undergone a resurgence. Citizens are demanding their privacy be respected, policymakers are now...

Why you should stop using SMS

Why you should stop using SMS

Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message was sent over the Vodaphone network in 1992).  SMS is supported by almost every mobile network provider in...

Welcome to the updated Proton VPN

Welcome to the updated Proton VPN

Today, we’re thrilled to present one of the biggest updates to Proton VPN since we set out to revolutionize the VPN industry in 2017. This update brings a new Proton VPN logo, colors, and the launch of Proton’s new privacy-by-default ecosystem. Proton VPN was not the...

An updated Proton is coming

An updated Proton is coming

Earlier this year, we shared how Proton’s services will evolve to better serve you. This evolution is vital as it will allow us to address several demands that the Proton community has raised, both in the 2022 survey and earlier.  Ensuring...

How to secure online banking with a VPN

How to secure online banking with a VPN

Once an industry that revolved around paper (or, in the United States’s case, cotton) currency, banking has now, for the most part, moved online. Today you can cash your paycheck, transfer some money to savings, pay your bills, and reimburse a friend for dinner all...

Fighting for privacy through advocacy

Fighting for privacy through advocacy

Advocacy is an essential part of what we do at Proton because it is integral to our vision of building a better internet where privacy is the default. Technological safeguards like end-to-end encryption can dramatically improve your privacy, but they cannot solve the...

Evolving privacy for the future

Evolving privacy for the future

A few weeks ago, we shared the results of the Proton 2022 community survey. While the quantitative results shared previously were interesting, a deeper look into the qualitative comments left by the community also provides insights into how Proton should evolve in...

Introducing Proton Calendar for Android

Introducing Proton Calendar for Android

At Proton, our mission is to fight for a better internet where privacy is the default. This means developing easy-to-use tools that enable you to defend your privacy. We started with email, one of the world’s most widely used methods of communication, but we want to...

Proton and SimpleLogin are joining forces

Proton and SimpleLogin are joining forces

At Proton, we are fighting for a better internet where privacy is the default. This is a challenging and important mission that requires a collective effort. Since we launched ProtonMail in 2014, we have been excited to see more people care about privacy and more...

The new ProtonMail iOS app is here!

The new ProtonMail iOS app is here!

We are excited to introduce the biggest redesign of our mobile app ever with the new ProtonMail app for iOS! Available for all, it brings the new ProtonMail experience to your iPhone or iPad, offering a sharp new look, with dark mode and an easy-to-use interface with...

The women leading the fight for a better internet 

The women leading the fight for a better internet 

This International Women’s Day, we’re taking the opportunity to talk to some of the world’s top female pioneers in data privacy and security. Here is just a small glimpse into the contributions that female academics, journalists, and scientists have made to the...

Privacy Decrypted #8: What are browser and device fingerprinting?

Privacy Decrypted #8: What are browser and device fingerprinting?

Websites like to know as much about you as they can. This is because the more they know about you, the better they can target ads at you. They are therefore very keen on tracking your activities on the internet to build up a detailed model of your likes, dislikes, hobbies, and more, based on your web browsing history. 

Proton is coming to London

Proton is coming to London

We are excited to announce Proton is expanding to London. Community is everything for Proton, and serving the global Proton user base is our overriding objective. From the beginning, the UK has always been one of the countries with the largest Proton communities, and we are grateful for all the support we have received.

Why open-source encryption is better for your privacy

Why open-source encryption is better for your privacy

Why open-source encryption is better for your privacy. From the creation of the Android mobile operating system to powering the first interplanetary helicopter, open-source projects have been critical to the development of new technologies. In a recent survey of...

Why choice should be the default in the DMA

Why choice should be the default in the DMA

Why choice should be the default in the DMA. The clock may be ticking on Google, Apple, and other tech giants’ ability to impose their email apps on users as default settings. If EU regulators are serious about fair competition in digital markets, letting people...

How to protect your privacy on dating apps

How to protect your privacy on dating apps

How to protect your privacy on dating apps. Back in 2019, we did a deep dive into what you can do to protect your privacy on dating apps while still matching with people. Now that it’s 2022, we have updated this article with the latest news and tips. Dating apps are...

Privacy Decrypted #7: What is PII?

Privacy Decrypted #7: What is PII?

Privacy Decrypted #7: What is PII? If you are doing research into data privacy laws, you will eventually come across the terms “personally identifiable information” and “personal data”. We explain what those terms mean, how they are different, and what you can do to...

How to write professional emails

How to write professional emails

Using ProtonMail to send professional emails means that your business communications will be kept secure in the cloud. This means your outreach, agreements, meetings, and contacts are all kept secure with easy-to-use end-to-end encryption. However, before you can...

Based in Switzerland

Based in Switzerland

Based in Switzerland so you stay private everywhere. ProtonVPN is based in Switzerland, giving you the protection of some of the world’s strongest privacy laws. A Swiss-based VPN service When you connect to ProtonVPN, you enjoy the same legal protections that ensure...

Free VPN for iOS and iPadOS

Free VPN for iOS and iPadOS

Defeat censorship and protect your online activity with our easy-to-use iOS app. Download our secure, free app for your iPhone or iPad ProtonVPN’s app for iOS and iPadOS protects your privacy and defeats online censorship. No logs Based in Switzerland, ProtonVPN has a...

How remove mobile signature protonmail

How remove mobile signature protonmail

How remove mobile signature protonmail. By default, a mobile signature (called a mobile footer in our Android app) saying Sent from ProtonMail mobile is added to all emails you send from your iPhone, iPad, or Android device. If you have a Free account, it is not...

How to send an email to multiple email addresses

How to send an email to multiple email addresses

How to send an email to multiple email addresses There are lots of instances when you want to send the same email to multiple people. Sometimes, you want everyone to be part of the conversation and see each other’s responses. Other times, you want to send the same...

Enjoy a safer email experience free from trackers

Enjoy a safer email experience free from trackers

Enjoy a safer email experience free from trackers At ProtonMail, we believe that reading emails should be as private as our end-to-end encryption makes sending them. Today, we’re happy to introduce enhanced tracking protection, a feature that will provide an...

The 10 biggest privacy wins from 2021

The 10 biggest privacy wins from 2021

The 10 biggest privacy wins from 2021 As we come to the end of Data Privacy Week, it’s important to take stock of our progress. Yes, building an internet where privacy is the default is hard work, and yes, we still have a long way to go, but there were promising...

Help your friends and family be more private

Help your friends and family be more private

Help your friends and family be more private Your personal data is the currency of the digital age. With every click, swipe, and like, you produce a wealth of information about yourself that companies track and collect, making it crucial to protect your online...

What is Incognito mode and is it really private?

What is Incognito mode and is it really private?

What is Incognito mode and is it really private? Incognito mode, or Private Browsing, is a privacy setting in your browser that lets you surf the web more privately. But how private is it? We explain what Incognito mode is, how it works, and how you can use it to...

US data protection: Online habits and data breaches

US data protection: Online habits and data breaches

US data protection: Online habits and data breaches Our survey reveals US online data protection habits and how common data breaches are. As an organization building an internet where privacy is the default, we at Proton are always interested in how people protect...

What is an IP address?

An Internet Protocol (IP) address is a numerical label that uniquely identifies every device that connects to the internet. It is used to: Identify a device or network connected to the internet Route packets (containing data) so they can find a device or network that...

A breakdown of a DKIM replay attack

A breakdown of a DKIM replay attack

On 1 December 2021, we began receiving sporadic reports of delivery failures from protonmail.com addresses to Gmail. This corresponded with a dramatic decline in protonmail.com’s domain reputation as seen via Gmail Postmaster Tools and an increase in sending from...

Privacy Decrypted #6: How to read a privacy policy

Privacy Decrypted #6: How to read a privacy policy

Privacy policies explain how organizations collect and secure your personal information, but few people read them. Here’s how to quickly check a privacy policy to take back control of your data. When you last bought something online, you may have glanced at the terms...

How encrypted email works

How encrypted email works

From holiday photos to our purchasing history to personal correspondences, our emails contain a great deal of sensitive information. It is therefore vital to keep your inbox and messages secure. This is more difficult than it first appears, as email was invented and...

What is AES encryption?

What is AES encryption?

What is AES encryption? AES is a fast, efficient, and secure encryption standard. Certified by the National Institute of Standards and Technology (NIST), AES is used by the United States government to secure classified data. This has led many companies to market AES...

How to delete your Amazon account

How to delete your Amazon account

How to delete your Amazon account Whether you’ve had enough of Big Tech companies monetizing your personal data or just found somewhere else to shop, here’s all you need to know to permanently close your Amazon account.

What is bloatware and is it a security risk?

What is bloatware and is it a security risk?

What is bloatware and is it a security risk? Bloatware is unwanted software pre-installed on new PCs, laptops, and mobile devices by the device manufacturer, OS developer, or network carrier. It is not usually malicious, but it uses up system resources and can...

How to create (and use) a new email address

How to create (and use) a new email address

How to create (and use) a new email address. An email address is your portal to the internet. Without one, you can’t use most of the services available on the web. Research from the Radicati Group shows that most of us have multiple email addresses, with the number of...

ProtonVPN: The ultimate guide to torrenting

ProtonVPN: The ultimate guide to torrenting

Torrenting is an incredibly fast and efficient way to distribute large files over the internet. Although often considered to be synonymous with piracy, there are many legitimate use cases for torrenting. However, before diving into the world of P2P file sharing, you...

What is Secure Core VPN?

What is Secure Core VPN?

A common method to expose VPN traffic is to compromise the server that handles your traffic. This risk is particularly acute for servers located in high-risk jurisdictions. To mitigate this risk, ProtonVPN has Secure Core servers. This article provides an overview of...

VPN Security Features

VPN Security Features

When you use ProtonVPN to browse the web, your Internet connection is encrypted. By routing your connection through encrypted tunnels, ProtonVPN's advanced security features ensure that an attacker cannot eavesdrop on your connection. It also allows you to access...

OpenVPN vs. WireGuard

OpenVPN vs. WireGuard

OpenVPN is beginning to show its age in terms of speed, performance, and efficiency, but remains widely regarded as the most secure and battle-tested VPN protocol available. The ability to run OpenVPN in TCP mode also gives it greater built-in anti-censorship...

Five steps to create and remember strong passwords

Five steps to create and remember strong passwords

If you’re struggling to think up strong passwords you can remember for your online accounts, here’s a simple, secure solution — for you and the whole family. You’ve heard the security advice: “Create a unique, strong password for each account”. But are you doing that...

What is an SSID and should you hide yours?

What is an SSID and should you hide yours?

An SSID is the name of a wireless network. Learn how SSIDs work, how to find your SSID, and whether it’s better to broadcast or hide it. If you set up your home WiFi network, you may have selected the network’s name (SSID) on your devices, entered the default wireless...

Secure Core VPN safeguards your data

Secure Core VPN safeguards your data

ProtonVPN’s Secure Core network gives your data an additional layer of security and defends you against advanced attacks. We installed our Secure Core servers(new window) and continue to operate them ourselves to eliminate any chance that they could be tampered with,...

Which countries have the most digital freedom?

Which countries have the most digital freedom?

Digital freedom is something that much of society takes for granted, but, unfortunately, online liberty doesn’t exist for everyone. Your ability to use a VPN, access social media, or even read freely and fairly reported news in the media is entirely dependent on the...

What is PPTP?

What is PPTP?

The Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol used to secure the connection between your device and a VPN server. One of the oldest VPN protocols, PPTP is plagued by multiple security issues and is now considered obsolete.    

What is an email alias?

What is an email alias?

An alias is an extra email address that can help you protect your privacy, block spam, and keep your inbox organized. Your personal email address is an essential part of your digital identity. Like your phone number, you don’t give it to everyone you meet.

Migrate from Outlook to ProtonMail

Migrate from Outlook to ProtonMail

Please note that ProtonMail does not support importing of PST files, as this is a Microsoft-specific file format. We recommend using our Import-Export tool, but if you prefer importing via a local file then please ensure you export your emails from Outlook as an .mbox...

Guide to Proton Calendar for new users

Guide to Proton Calendar for new users

Proton Calendar helps you stay on top of your schedule while keeping your data secure. You can access Proton Calendar on the web by going to calendar.protonmail.com and logging in with your ProtonMail credentials. Or you can log in to mail.protonmail.com and use the...

ProtonMail: Two-factor authentication (2FA)

ProtonMail: Two-factor authentication (2FA)

Two-factor authentication (2FA) is an additional layer of security for your ProtonMail account. With 2FA enabled, you will be prompted to enter a 6-digit code when you log in to your account. This 6-digit code will be generated by an app installed on your mobile phone.

Two-factor authentication on ProtonVPN

Two-factor authentication on ProtonVPN

Two-factor authentication (2FA) adds an additional layer of security to your ProtonVPN account by requiring a second round of verification to the login process. To use 2FA, you must have a device with an authenticator app installed on it. The authenticator app creates...

Guide to installing ProtonVPN on different routers

Guide to installing ProtonVPN on different routers

There are many advantages to configuring your router to run ProtonVPN. These include: No need to set up a VPN on each device Protects devices that don’t support VPNs Automatically secures all your Internet traffic Protects your entire household with one...

Privacy Decrypted #3: Can encryption be broken?

Privacy Decrypted #3: Can encryption be broken?

Privacy services often rely on strong encryption to protect privacy and confidentiality. Some terms that you have heard probably include AES, RSA, or maybe even elliptic-curve cryptography (ECC). However, is encryption actually bulletproof and a guarantee of safety?

WireGuard speed, Proton privacy

WireGuard speed, Proton privacy

In 2017, we launched ProtonVPN to defeat censorship and protect activists, journalists, and ordinary people on the internet. Since then, we’ve continued to build new features like NetShield Adblocker and, more recently, our unique VPN Accelerator for our community.

What is the difference between a proxy and a VPN?

What is the difference between a proxy and a VPN?

A proxy is any server that sits between your device and a wider network, such as the internet. A virtual private network (VPN) server is a specific kind of proxy, but many other kinds of proxy exist. Although inaccurate (and as a result, confusing), VPNs are often...

Privacy Decrypted #1: What is a threat model?

Privacy Decrypted #1: What is a threat model?

In its broadest sense, threat modeling is the systematic analysis of potential risks and attack vectors, with the aim of developing effective defenses against identified threats. On a personal level, we engage in threat modeling all the time – simply assessing the...

My mobile phone does things for me

My mobile phone does things for me

Today we think that our mobile phones have a certain "artificial intelligence", without doing anything we offer us certain services. The clearest example would be the clothing store, a bar... Any establishment we enter, after a while, the mobile phone asks us to...

What is the HASH code?

What is the HASH code?

When we create a document, there are many details that we can obtain from it. The metadata gives us a lot of information about the document that we have created, that data we can use or not, it depends on the use we want to give it. But within all that data, there is...

Why email security is important

Why email security is important

When we want to communicate with someone we can do it in many ways, one of the ways is using email. This service seems like a very simple way to use, but you have to take into account very important things. Today there are different cyber attacks with different...