Proton blog
- For business
Introducing seamless productivity features for Proton Mail and Proton Calendar
(new window)- Privacy basics
Latest articles
(new window)- For business
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
- Privacy basics
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
- Privacy deep dives
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as
the legal justification allowing federal agencies like the NSA, CIA, and FBI to
perform warrantless wiretaps, which sweep up the data of hundreds of thousands
of US citi
Proton news
(new window)Your email address is your online identity, and you share it whenever you create
a new account for an online service. While this offers convenience, it also
leaves your identity exposed if hackers manage to breach the services you use.
Data breaches
Our mission at Proton is to help usher in an internet that protects your privacy
by default, secures your data, and gives you the freedom of choice.
Today we’re taking another step in this direction with the launch of our open
source password manage
At Proton, we have always been highly disciplined, focusing on how to best
sustain our mission over time. This job is incredibly difficult. Everything we
create always takes longer and is more complex than it would be if we did it
without focusing on
Privacy news
(new window)A cyberattack on national public employment service France Travail has exposed
the personal data of as many as 43 million people.
The latest breach is the second major cybersecurity attack to happen in France
in the past month, raising concerns abo
Last year, Big Tech companies (Alphabet, Amazon, Apple, Meta, and Microsoft)
received about $3.04 billion in fines for breaking laws on both sides of the
Atlantic. As of seven days and three hours into 2024, they had already earned
enough revenue to
With Microsoft’s rollout of the new Outlook for Windows, it appears the company
has transformed its email app into a surveillance tool for targeted advertising.
Everyone talks about the privacy-washing campaigns of Google and Apple as they
mine your
Privacy basics
(new window)- Privacy basics
On the subject of cybersecurity, one term that often comes up is brute force
attack. A brute force attack is any attack that doesn’t rely on finesse, but
instead uses raw computing power to crack security or even the underlying
encryption.
In this a
- Privacy basics
In response to the growing number of data breaches, Proton Mail offers a feature
to paid subscribers called Dark Web Monitoring. Our system checks if your
credentials or other data have been leaked to illegal marketplaces and alerts
you if so. Often
You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers
Privacy deep dives
(new window)- Privacy deep dives
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as
the legal justification allowing federal agencies like the NSA, CIA, and FBI to
perform warrantless wiretaps, which sweep up the data of hundreds of thousands
of US citi
- Privacy deep dives
We recently announced that Proton Pass now supports passkeys for everyone across
all devices.
Universal compatibility is a unique approach to implementing passkeys,
unfortunately. Even though passkeys were developed by the FIDO Alliance and the
Worl
- Privacy deep dives
Apple’s marketing team has built a powerful association between the iPhone and
privacy. The company’s ad campaigns claim that “what happens on your iPhone,
stays on your iPhone.” And, “Privacy. That’s iPhone.”
But Apple’s lawyers are telling a diffe
Opinion
(new window)- Opinion
If there were still doubts over whether Apple is an abusive monopolist, they
were emphatically dismissed this week. Apple’s new app store policy that it
claims will bring it into compliance with Europe’s Digital Markets Act is a
textbook case of mali
It has recently become fashionable among “privacy” companies based outside of
Switzerland to attack the notion of “Swiss privacy”. Such assertions usually
take the line of “Switzerland is not special because it also has X, Y, Z”, and
then draw a fals
Proton’s encryption is open source and available for public inspection. Because
we use open standards, the encryption that Proton utilizes is also publicly
discussed and debated as part of the IETF standardization process. That’s why it
is always sur
For business
(new window)- For business
Secure, seamless communication is the foundation of every business. As more
organizations secure their data with Proton, we’ve dramatically expanded our
ecosystem with new products and services, from our password manager to Dark Web
Monitoring for cr
Businesses are increasingly dealing with the fallout from cybercrime: The number
of attacks is on the rise and the damage done is growing exponentially. One of
the most common vulnerabilities for organizations are their passwords. Since
they are your
- For business
In 2023, we significantly expanded the Proton ecosystem, introducing many new
encryption tools and features, including a password manager and apps for Proton
Drive. While these captured headlines, behind the scenes we also added new
features for busi