The story behind the Proton Pass logo
You’ve probably seen by now that Proton Pass, our new password manager, was added to the Proton ecosystem. Earlier this month, Proton Pass entered public...
We Aim to Make People and Companies Aware that Privacy Matters...
The Worlds Times: Explain the background of you and the Company in detail
Xabier Durruti: Xabier Durruti is a Technical Specialist in Cyber Intelligence and Computer...
Privacy Matters: New Communication Protocol “Ibex” and Extended Protocol Suite
Privacy Matters: New Communication Protocol “Ibex” and Extended Protocol Suite.
Just in time for the upcoming tenth anniversary, Threema introduces “Ibex,” a new cryptographic communication...
Privacy Matters: Improved protection against email trackers
Privacy Matters: Improved protection against email trackers.
Big Tech wants all of your data, and they’re constantly looking for new ways to collect it from...
Privacy Matters: Introducing Proton Drive for iOS and Android
Privacy Matters: Introducing Proton Drive for iOS and Android.
At Proton, we’re building a privacy-centric internet, and that end goal guides everything we do. We...
Google’s $391 million settlement pushes Big Tech fines over $3 billion...
Google’s $391 million settlement pushes Big Tech fines over $3 billion in 2022. This week, Google agreed to settle a lawsuit brought by 40...
Protect yourself with our cybersecurity guides
October is European Cybersecurity Month, making this the perfect time to assess your security. We’re sharing some of our most important cybersecurity guides to...
We’re launching Proton Drive, the encrypted cloud storage for everyone
We’re launching Proton Drive the encrypted cloud storage for everyone privacy matters. Since we launched Proton Mail in 2014 as the world’s first encrypted...
Why you need a private email service
Why you need a private email service. Private email is not just about blocking prying eyes or avoiding creepy online ads. Privacy is a...
Proton web’s journey from polyrepo to monorepo
Last year at Proton, we migrated from a polyrepo architecture to a monorepo architecture to make it easier to manage the packages that are...
WFH – Watched from Home: Office 365 and workplace surveillance creep
Imagine your performance at work was assessed directly from the amount of e-mails sent, the amount of time consumed editing a document, or the...
Twilio Incident: What Signal Users Need to Know
Twilio Incident: What Signal Users Need to Know. Recently Twilio, the company that provides Signal with phone number verification services, suffered a phishing attack....
Denmark bans use of Chromebook and Google Workspace in schools
For a long time, the Danish Data Protection Authority has focused on the use of Chromebooks and Google Workspace (formerly G Suite for Education)...
S.A.R. Levels and our mobile phones
Today, when we want to buy a mobile phone, tablet, wireless music headset… We worry a lot about color, size, design, price… But we...
Proton reaches 70 million accounts
In 2010, Mark Zuckerburg dismissed privacy as a social norm that had outlived its usefulness. Fortunately for us all, he was wrong. In the...
Why you should stop using SMS
Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message...
Your schedule is worth protecting
Your calendar is a record of your life. Proton Calendar helps keep it private.
The safest way to store or share your files
Proton Drive is an end-to-end encrypted Swiss vault for your files, ensuring that nobody except those authorized by you can access your data.
Welcome to the updated Proton VPN
Today, we’re thrilled to present one of the biggest updates to Proton VPN since we set out to revolutionize the VPN industry in 2017....
An updated Proton is coming
Earlier this year, we shared how Proton’s services will evolve to better serve you. This evolution is vital as it will allow us to address several...
Fighting for privacy through advocacy
Advocacy is an essential part of what we do at Proton because it is integral to our vision of building a better internet where...
Evolving privacy for the future
A few weeks ago, we shared the results of the Proton 2022 community survey. While the quantitative results shared previously were interesting, a deeper look...
Proton and SimpleLogin are joining forces
At Proton, we are fighting for a better internet where privacy is the default. This is a challenging and important mission that requires a...
The new ProtonMail iOS app is here!
We are excited to introduce the biggest redesign of our mobile app ever with the new ProtonMail app for iOS! Available for all, it...
The women leading the fight for a better internet
This International Women’s Day, we’re taking the opportunity to talk to some of the world’s top female pioneers in data privacy and security. Here...
Proton is coming to London
We are excited to announce Proton is expanding to London. Community is everything for Proton, and serving the global Proton user base is our overriding objective. From the beginning, the UK has always been one of the countries with the largest Proton communities, and we are grateful for all the support we have received.
EARN IT is a dangerous law that could be used to...
EARN IT is a dangerous law that could be used to break encryption. On 2 July 2020, the Senate Judiciary Committee voted to approve...
Security experts declare all Proton apps secure after they pass their...
Security experts declare all Proton apps secure after they pass their pentests. At Proton, transparency is one of our core principles. Simply put, people...
Congress must empower the FTC to deliver the privacy US citizens...
US citizens, conditioned to expect inaction from Congress, have increasingly turned elsewhere for swift action on today’s pressing issues, including when it comes to...
ProtonMail: Safer Internet Day: A quick guide to staying safe and...
ProtonMail: Safer Internet Day. A quick guide to staying safe and private online Since our launch in 2014, our vision has been to build...
The 10 biggest privacy wins from 2021
The 10 biggest privacy wins from 2021
As we come to the end of Data Privacy Week, it’s important to take stock of our progress....
Help your friends and family be more private
Help your friends and family be more private
Your personal data is the currency of the digital age. With every click, swipe, and like, you...
What is Incognito mode and is it really private?
What is Incognito mode and is it really private?
Incognito mode, or Private Browsing, is a privacy setting in your browser that lets you surf...
US data protection: Online habits and data breaches
US data protection: Online habits and data breaches
Our survey reveals US online data protection habits and how common data breaches are.
As an organization building...
A breakdown of a DKIM replay attack
On 1 December 2021, we began receiving sporadic reports of delivery failures from protonmail.com addresses to Gmail. This corresponded with a dramatic decline in...
Privacy Decrypted #6: How to read a privacy policy
Privacy policies explain how organizations collect and secure your personal information, but few people read them. Here’s how to quickly check a privacy policy...
What is AES encryption?
What is AES encryption?
AES is a fast, efficient, and secure encryption standard. Certified by the National Institute of Standards and Technology (NIST), AES is...
How to delete your Amazon account
How to delete your Amazon account
Whether you’ve had enough of Big Tech companies monetizing your personal data or just found somewhere else to shop,...
What is bloatware and is it a security risk?
What is bloatware and is it a security risk?
Bloatware is unwanted software pre-installed on new PCs, laptops, and mobile devices by the device manufacturer,...
Privacy Decrypted #5: How HTTPS keeps you safe (but not private)
Privacy Decrypted #5: How HTTPS keeps you safe (but not private)
HTTPS is the backbone that keeps everyone safe and secure on the internet. However,...
What is an SSID and should you hide yours?
An SSID is the name of a wireless network. Learn how SSIDs work, how to find your SSID, and whether it’s better to broadcast...
Which countries have the most digital freedom?
Digital freedom is something that much of society takes for granted, but, unfortunately, online liberty doesn’t exist for everyone. Your ability to use a...
What is PPTP?
The Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol used to secure the connection between your device and a VPN server. One of the...
Swiss court ruling strengthens privacy for email providers
Since the founding of Proton in 2014, we have fought to advance privacy and freedom around the world. We do this not only through...
Privacy Decrypted #4: Understanding anonymity vs. privacy
Anonymity is not the same thing as privacy, and confusing these related but different concepts can weaken your online threat model.
Privacy Decrypted #3: Can encryption be broken?
Privacy services often rely on strong encryption to protect privacy and confidentiality. Some terms that you have heard probably include AES, RSA, or maybe...
What is end-to-end encryption and how does it work?
End-to-end encryption is the most secure way to communicate privately and securely online. By encrypting messages at both ends of a conversation, end-to-end encryption...
Proton launches new bug bounty program with partner Bug Bounty Switzerland
Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty...
Privacy Decrypted #2: How to use ProtonMail more anonymously
Privacy and anonymity are often tossed about as synonymous terms but they are actually related ideas that represent different things.
Privacy Decrypted #1: What is a threat model?
In its broadest sense, threat modeling is the systematic analysis of potential risks and attack vectors, with the aim of developing effective defenses against...
My mobile phone does things for me
Today we think that our mobile phones have a certain "artificial intelligence", without doing anything we offer us certain services. The clearest example would...
What is the HASH code?
When we create a document, there are many details that we can obtain from it. The metadata gives us a lot of information about...
Google, the privacy of a 13-year-old teenager and her parents
Sometimes when I ask someone "do you think your privacy is safe?" The answer in general is "no". This is a common and normal...
Double factor authentication: what is it and why is it recommended...
Everyone wants security in their private life, our data is very important, our privacy is important and therefore, it must be protected. There are...