Latest articles
We all have sensitive personal information we’d all rather not share, whether
it’s documents, photographs, or even private video. This article covers how to
handle sensitive information or records, and what you can do to keep private
information priv
Social engineering is a common hacking tactic involving psychological
manipulation used in cybersecurity attacks to access or steal confidential
information.
They then use this information to commit fraud, gain unauthorized access to
systems, or, in
- Privacy basics
WhatsApp is the world’s leading messaging app, trusted by billions of people
around the globe to send and receive messages. However, is WhatsApp safe for
sending private photos? Or are there better ways to share photos online
privately? Let’s find ou
- Privacy basics
With the advent of passkeys, plenty of people are predicting the end of
passwords. Is the future passwordless, though? Or is there room for both types
of authentication to exist side-by-side?
At Proton, we are optimistic about passkeys and have int
- Proton news
At Proton, we have always been highly disciplined, focusing on how to best
sustain our mission over time. This job is incredibly difficult. Everything we
create always takes longer and is more complex than it would be if we did it
without focusing on
- Privacy basics
If you’re on any Apple device, you’re familiar with the iCloud Keychain, the
Apple password manager. It’s a handy tool that stores passwords for you and
helps you manage your logins.
For a program that stores all your most sensitive data in one pla
- Privacy deep dives
We recently announced that Proton Pass now supports passkeys for everyone across
all devices.
Universal compatibility is a unique approach to implementing passkeys,
unfortunately. Even though passkeys were developed by the FIDO Alliance and the
Worl
- Privacy basics
Your private videos are for your eyes only. However, not all cloud storage
services are good at storing videos securely, let alone privately. In this
article we explain what you can do to keep file sharing companies from having
access to the videos y
Many email services, citing security reasons, require a phone number for
identity verification. This creates an unfortunate paradox in which you must
give up a highly sensitive piece of personal data to Big Tech.
But there are simple ways to create
- Privacy basics
Protecting a folder with a password is a simple yet effective way of securing
files. You may wonder whether you can password-protect a folder in Google Drive.
We explain what access controls Google Drive offers and what you can do to
improve your sec
We’re excited to announce that Proton Pass supports passkeys for everyone,
allowing you to manage and use passkeys across all devices seamlessly. Passkeys
are an easy and secure alternative to traditional passwords that can help
prevent phishing atta