Don’t be fooled by Google’s fake privacy

July 2nd, 2019 in Privacy

Google recently generated a flurry of coverage about its supposed privacy pivot, including an op-ed in The New York Times by chief executive Sundar Pichai. “We feel privileged that billions of people trust products like Search, Chrome, Maps, and Android to help them every day,” Pichai wrote. It’s not that we necessarily trust Google. It’s …

Gmail confidential mode is not secure or private

June 20th, 2019 in Privacy

Without end-to-end encryption, Gmail confidential mode is little more than a marketing strategy. Learn why privacy experts call Google’s privacy features “misleading.” When we launched ProtonMail nearly five years ago, we pioneered a new kind of email service: one that gives you control of your own data. All emails are end-to-end encrypted and zero-access encrypted, …

Response to false statements on law enforcement surveillance made by Martin Steiger

May 29th, 2019 in Privacy

Earlier today, a Swiss lawyer named Martin Steiger published a factually incorrect article about ProtonMail on his blog, alleging, among other things, that “ProtonMail voluntarily offers assistance for real-time surveillance.” Martin Steiger’s claim is factually incorrect, and Mr. Steiger is also aware that this claim is false. Not only have we informed him multiple times …

Small businesses are big targets for hackers, but they still aren’t prepared

March 7th, 2019 in Privacy, Security

Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared. “We lost $10,000 due to a cyberattack on our mainframe in which a hacker was able to access financial data.” “An email was sent from a banking …

How long should my password be?

February 13th, 2019 in Privacy, Security

A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked. This article will help you understand how long your password should be. For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum …

privacy-rights-and-anti-terror-laws

Preserving privacy rights in anti-terror laws

January 21st, 2019 in Privacy

Terrorist content has no place on any online platform, but we must also preserve our fundamental human rights even as we prevent terrorists and other criminals from abusing the Internet. Our mission is to promote security, privacy, and freedom on the Internet. That encompasses technical solutions, such as ProtonMail and ProtonVPN, but also policy solutions. …

Internet privacy

The ProtonMail guide to taking control of your online privacy

December 6th, 2018 in Privacy, Security

Improve your online privacy with this comprehensive guide, developed by the ProtonMail team. Here, we’ll help you determine your threat model and take steps to achieve online privacy that meets your needs. Updated July 2019 Total Internet privacy is impossible, but you can get close by adjusting your online behavior — and a few of …

Privacy vs. security: Why the widespread use of encryption is essential to national security

November 2nd, 2018 in Privacy, Security

Law enforcement officials continue to lobby against encryption, saying it makes catching criminals and preventing terrorism more difficult. But they’re getting the ‘privacy vs. security’ debate fundamentally wrong. Here’s why. Four years ago, the Pew Research Center, a US think tank, asked hundreds of cybersecurity experts to weigh in on a simple question: “By 2025, …

How to protect your phone or computer when crossing borders

September 20th, 2018 in Privacy

Border agents have broad powers to search people crossing borders, including their phones and laptops.But there are ways to protect your data when crossing international borders if you understand the technology and the law. Crossing an international border is often a stressful experience. It becomes all the more stressful if you are pulled aside for …

What is the dark web? The good and bad of the Internet’s most private corner

August 27th, 2018 in Privacy

You may have heard the dark web is a place for drug dealers and hitmen. That’s correct, but there’s more to it than that. In this article, find out what is the dark web, how to access it, and what you might find there. The dark web is a part of the Internet that requires …

browsing history privacy

ISPs are selling your private browsing history. Here’s how to prevent it.

March 24th, 2017 in Privacy

Updated on January 31, 2019 Thanks to the passage of S.J.Res.34 in 2017, Internet service providers can sell and share users’ browsing history with advertisers. Here is our analysis of this law and the steps you should take to protect your privacy. US lawmakers voted in favor of allowing Internet service providers (ISP) like Verizon, …

Internet Censorship – Why it matters and what we’re doing about it

March 10th, 2017 in Privacy

March 12, 2017 is World Day Against Cyber Censorship (WDACC). Originally created by Reporters Without Borders and Amnesty International in 2008, the day seeks to draw attention to the issue of Internet censorship. If you logged into your ProtonMail account on Friday, you may have noticed that our login page is slightly different, with a …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com