The story behind the Proton Pass logo

0
You’ve probably seen by now that Proton Pass, our new password manager, was added to the Proton ecosystem. Earlier this month, Proton Pass entered public...

We Aim to Make People and Companies Aware that Privacy Matters...

0
The Worlds Times: Explain the background of you and the Company in detail Xabier Durruti: Xabier Durruti is a Technical Specialist in Cyber Intelligence and Computer...

Privacy Matters: New Communication Protocol “Ibex” and Extended Protocol Suite

0
Privacy Matters: New Communication Protocol “Ibex” and Extended Protocol Suite. Just in time for the upcoming tenth anniversary, Threema introduces “Ibex,” a new cryptographic communication...

Privacy Matters: Improved protection against email trackers

0
Privacy Matters: Improved protection against email trackers. Big Tech wants all of your data, and they’re constantly looking for new ways to collect it from...

Privacy Matters: Introducing Proton Drive for iOS and Android

0
Privacy Matters: Introducing Proton Drive for iOS and Android. At Proton, we’re building a privacy-centric internet, and that end goal guides everything we do. We...

Google’s $391 million settlement pushes Big Tech fines over $3 billion...

0
Google’s $391 million settlement pushes Big Tech fines over $3 billion in 2022. This week, Google agreed to settle a lawsuit brought by 40...

Protect yourself with our cybersecurity guides

0
October is European Cybersecurity Month, making this the perfect time to assess your security. We’re sharing some of our most important cybersecurity guides to...

We’re launching Proton Drive, the encrypted cloud storage for everyone

0
We’re launching Proton Drive the encrypted cloud storage for everyone privacy matters. Since we launched Proton Mail in 2014 as the world’s first encrypted...

Why you need a private email service

0
Why you need a private email service. Private email is not just about blocking prying eyes or avoiding creepy online ads. Privacy is a...

Proton web’s journey from polyrepo to monorepo

0
Last year at Proton, we migrated from a polyrepo architecture to a monorepo architecture to make it easier to manage the packages that are...

WFH – Watched from Home: Office 365 and workplace surveillance creep

0
Imagine your performance at work was assessed directly from the amount of e-mails sent, the amount of time consumed editing a document, or the...

Twilio Incident: What Signal Users Need to Know

0
Twilio Incident: What Signal Users Need to Know. Recently Twilio, the company that provides Signal with phone number verification services, suffered a phishing attack....

Denmark bans use of Chromebook and Google Workspace in schools

0
For a long time, the Danish Data Protection Authority has focused on the use of Chromebooks and Google Workspace (formerly G Suite for Education)...

S.A.R. Levels and our mobile phones

0
Today, when we want to buy a mobile phone, tablet, wireless music headset… We worry a lot about color, size, design, price… But we...
Accounts-milestone

Proton reaches 70 million accounts

0
In 2010, Mark Zuckerburg dismissed privacy as a social norm that had outlived its usefulness. Fortunately for us all, he was wrong. In the...

Why you should stop using SMS

0
Short Message Service (SMS), also known simply as text messaging, has been with us since the birth of mobile phones (the first-ever text message...

Your schedule is worth protecting

0
Your calendar is a record of your life. Proton Calendar helps keep it private.

The safest way to store or share your files

0
Proton Drive is an end-to-end encrypted Swiss vault for your files, ensuring that nobody except those authorized by you can access your data.

Welcome to the updated Proton VPN

0
Today, we’re thrilled to present one of the biggest updates to Proton VPN since we set out to revolutionize the VPN industry in 2017....

An updated Proton is coming

0
Earlier this year, we shared how Proton’s services will evolve to better serve you. This evolution is vital as it will allow us to address several...

Fighting for privacy through advocacy

0
Advocacy is an essential part of what we do at Proton because it is integral to our vision of building a better internet where...

Evolving privacy for the future

0
A few weeks ago, we shared the results of the Proton 2022 community survey. While the quantitative results shared previously were interesting, a deeper look...

Proton and SimpleLogin are joining forces

0
At Proton, we are fighting for a better internet where privacy is the default. This is a challenging and important mission that requires a...

The new ProtonMail iOS app is here!

0
We are excited to introduce the biggest redesign of our mobile app ever with the new ProtonMail app for iOS! Available for all, it...

The women leading the fight for a better internet 

0
This International Women’s Day, we’re taking the opportunity to talk to some of the world’s top female pioneers in data privacy and security. Here...

Proton is coming to London

0
We are excited to announce Proton is expanding to London. Community is everything for Proton, and serving the global Proton user base is our overriding objective. From the beginning, the UK has always been one of the countries with the largest Proton communities, and we are grateful for all the support we have received.

EARN IT is a dangerous law that could be used to...

0
EARN IT is a dangerous law that could be used to break encryption. On 2 July 2020, the Senate Judiciary Committee voted to approve...

Security experts declare all Proton apps secure after they pass their...

0
Security experts declare all Proton apps secure after they pass their pentests. At Proton, transparency is one of our core principles. Simply put, people...

Congress must empower the FTC to deliver the privacy US citizens...

0
US citizens, conditioned to expect inaction from Congress, have increasingly turned elsewhere for swift action on today’s pressing issues, including when it comes to...

ProtonMail: Safer Internet Day: A quick guide to staying safe and...

0
ProtonMail: Safer Internet Day. A quick guide to staying safe and private online Since our launch in 2014, our vision has been to build...
The 10 biggest privacy wins from 2021

The 10 biggest privacy wins from 2021

0
The 10 biggest privacy wins from 2021 As we come to the end of Data Privacy Week, it’s important to take stock of our progress....
Help your friends and family be more private this Data Privacy Week

Help your friends and family be more private

0
Help your friends and family be more private Your personal data is the currency of the digital age. With every click, swipe, and like, you...
What is Incognito mode and is it really private?

What is Incognito mode and is it really private?

0
What is Incognito mode and is it really private? Incognito mode, or Private Browsing, is a privacy setting in your browser that lets you surf...
US data protection: Online habits and data breaches

US data protection: Online habits and data breaches

0
US data protection: Online habits and data breaches Our survey reveals US online data protection habits and how common data breaches are. As an organization building...

A breakdown of a DKIM replay attack

0
On 1 December 2021, we began receiving sporadic reports of delivery failures from protonmail.com addresses to Gmail. This corresponded with a dramatic decline in...

Privacy Decrypted #6: How to read a privacy policy

0
Privacy policies explain how organizations collect and secure your personal information, but few people read them. Here’s how to quickly check a privacy policy...

What is AES encryption?

0
What is AES encryption? AES is a fast, efficient, and secure encryption standard. Certified by the National Institute of Standards and Technology (NIST), AES is...

How to delete your Amazon account

0
How to delete your Amazon account Whether you’ve had enough of Big Tech companies monetizing your personal data or just found somewhere else to shop,...

What is bloatware and is it a security risk?

0
What is bloatware and is it a security risk? Bloatware is unwanted software pre-installed on new PCs, laptops, and mobile devices by the device manufacturer,...

Privacy Decrypted #5: How HTTPS keeps you safe (but not private)

0
Privacy Decrypted #5: How HTTPS keeps you safe (but not private) HTTPS is the backbone that keeps everyone safe and secure on the internet. However,...

What is an SSID and should you hide yours?

0
An SSID is the name of a wireless network. Learn how SSIDs work, how to find your SSID, and whether it’s better to broadcast...

Which countries have the most digital freedom?

0
Digital freedom is something that much of society takes for granted, but, unfortunately, online liberty doesn’t exist for everyone. Your ability to use a...

What is PPTP?

0
The Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol used to secure the connection between your device and a VPN server. One of the...

Swiss court ruling strengthens privacy for email providers

0
Since the founding of Proton in 2014, we have fought to advance privacy and freedom around the world. We do this not only through...

Privacy Decrypted #4: Understanding anonymity vs. privacy

0
Anonymity is not the same thing as privacy, and confusing these related but different concepts can weaken your online threat model.

Privacy Decrypted #3: Can encryption be broken?

0
Privacy services often rely on strong encryption to protect privacy and confidentiality. Some terms that you have heard probably include AES, RSA, or maybe...

What is end-to-end encryption and how does it work?

0
End-to-end encryption is the most secure way to communicate privately and securely online. By encrypting messages at both ends of a conversation, end-to-end encryption...

Proton launches new bug bounty program with partner Bug Bounty Switzerland

0
Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty...

Privacy Decrypted #2: How to use ProtonMail more anonymously

0
Privacy and anonymity are often tossed about as synonymous terms but they are actually related ideas that represent different things.

Privacy Decrypted #1: What is a threat model?

0
In its broadest sense, threat modeling is the systematic analysis of potential risks and attack vectors, with the aim of developing effective defenses against...

My mobile phone does things for me

0
Today we think that our mobile phones have a certain "artificial intelligence", without doing anything we offer us certain services. The clearest example would...

What is the HASH code?

0
When we create a document, there are many details that we can obtain from it. The metadata gives us a lot of information about...

Google, the privacy of a 13-year-old teenager and her parents

0
Sometimes when I ask someone "do you think your privacy is safe?" The answer in general is "no". This is a common and normal...

Double factor authentication: what is it and why is it recommended...

0
Everyone wants security in their private life, our data is very important, our privacy is important and therefore, it must be protected. There are...