Proton blog
- Privacy deep dives
- Privacy deep dives
Latest articles
(new window)You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers
We all have sensitive personal information we’d all rather not share, whether
it’s documents, photographs, or even private video. This article covers how to
handle sensitive information or records, and what you can do to keep private
information priv
Social engineering is a common hacking tactic involving psychological
manipulation used in cybersecurity attacks to access or steal confidential
information.
They then use this information to commit fraud, gain unauthorized access to
systems, or, in
Proton news
(new window)At Proton, we have always been highly disciplined, focusing on how to best
sustain our mission over time. This job is incredibly difficult. Everything we
create always takes longer and is more complex than it would be if we did it
without focusing on
We’re excited to announce that Proton Pass supports passkeys for everyone,
allowing you to manage and use passkeys across all devices seamlessly. Passkeys
are an easy and secure alternative to traditional passwords that can help
prevent phishing atta
In 2014, Proton Mail was introduced as a web app, revolutionizing how we think
about email privacy.
Today, we’re excited to broaden the horizons of secure communication by
launching the Proton Mail desktop app. Anyone can now use the new Proton Mail
Privacy news
(new window)A cyberattack on national public employment service France Travail has exposed
the personal data of as many as 43 million people.
The latest breach is the second major cybersecurity attack to happen in France
in the past month, raising concerns abo
Last year, Big Tech companies (Alphabet, Amazon, Apple, Meta, and Microsoft)
received about $3.04 billion in fines for breaking laws on both sides of the
Atlantic. As of seven days and three hours into 2024, they had already earned
enough revenue to
With Microsoft’s rollout of the new Outlook for Windows, it appears the company
has transformed its email app into a surveillance tool for targeted advertising.
Everyone talks about the privacy-washing campaigns of Google and Apple as they
mine your
Privacy basics
(new window)You likely know you should store and manage your passwords safely. However, even
if you are using a password manager, there’s a chance the one you’re using isn’t
as secure as it could be. In this article we go over the threats some password
managers
We all have sensitive personal information we’d all rather not share, whether
it’s documents, photographs, or even private video. This article covers how to
handle sensitive information or records, and what you can do to keep private
information priv
Social engineering is a common hacking tactic involving psychological
manipulation used in cybersecurity attacks to access or steal confidential
information.
They then use this information to commit fraud, gain unauthorized access to
systems, or, in
Privacy deep dives
(new window)- Privacy deep dives
We recently announced that Proton Pass now supports passkeys for everyone across
all devices.
Universal compatibility is a unique approach to implementing passkeys,
unfortunately. Even though passkeys were developed by the FIDO Alliance and the
Worl
- Privacy deep dives
Apple’s marketing team has built a powerful association between the iPhone and
privacy. The company’s ad campaigns claim that “what happens on your iPhone,
stays on your iPhone.” And, “Privacy. That’s iPhone.”
But Apple’s lawyers are telling a diffe
- Privacy deep dives
There’s a saying that data is the new oil because of how valuable it is to the
digital economy. But what’s the value of your data, personally? Depending where
you live, information about you could be worth at least several hundred dollars
a year to F
Opinion
(new window)- Opinion
If there were still doubts over whether Apple is an abusive monopolist, they
were emphatically dismissed this week. Apple’s new app store policy that it
claims will bring it into compliance with Europe’s Digital Markets Act is a
textbook case of mali
It has recently become fashionable among “privacy” companies based outside of
Switzerland to attack the notion of “Swiss privacy”. Such assertions usually
take the line of “Switzerland is not special because it also has X, Y, Z”, and
then draw a fals
Proton’s encryption is open source and available for public inspection. Because
we use open standards, the encryption that Proton utilizes is also publicly
discussed and debated as part of the IETF standardization process. That’s why it
is always sur
For business
(new window)Businesses are increasingly dealing with the fallout from cybercrime: The number
of attacks is on the rise and the damage done is growing exponentially. One of
the most common vulnerabilities for organizations are their passwords. Since
they are your
- For business
In 2023, we significantly expanded the Proton ecosystem, introducing many new
encryption tools and features, including a password manager and apps for Proton
Drive. While these captured headlines, behind the scenes we also added new
features for busi
Cybersecurity attacks are on the rise, and more and more it’s small businesses
that are being targeted.
Cybercrime is a multi-billion dollar industry that encompasses a broad range of
threats, from fraud to credential theft. Most of these attacks or