Proton

Nejnovější články

illustration of Proton Mail Android client security
en
  • Aktualizace produktu
  • Proton Mail
Our Android security model explains what our app does to secure Proton users’ data. This article outlines how we handle data and mitigate potential attacks.
Illustration of Proton Mail Bridge open source
en
  • Aktualizace produktu
  • Proton Mail
Our Bridge app is now open source for macOS, Windows, and Linux. Find links to the code and an independent security audit report.
Illustration of the Bridge security model
en
  • Aktualizace produktu
  • Proton Mail
You can use Proton Mail Bridge with IMAP/SMTP email clients. Here we explain the Bridge security architecture and how it protects your data.
Illustration of Proton Mail Covid-19 response
en
  • Novinky Proton
Proton is offering extra storage, free business email accounts, and other resources to support our community through the coronavirus pandemic.
protonmail bridge for linux
en
  • Aktualizace produktu
  • Proton Mail
Proton Mail Linux users can now connect their email accounts with the Thunderbird client.
en
  • Průvodce ochranou soukromí
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
Illustration of someone working from home.
en
  • Pro firmy
COVID-19 has forced companies to transition to working from home. We created a guide to help employees and administrators stay safe online.
An illustration of Zoom's attendee attention tracking.
en
  • Novinky o soukromí
If you’re using Zoom while working from home, you should be aware of Zoom's privacy policies, including its “attention tracking” tool.
An illustration of political campaigns sharing voter data.
en
  • Průvodce ochranou soukromí
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
Illustration of alternative routing
en
  • Aktualizace produktu
Proton provides anti-censorship measures to help users bypass DNS blocks. This article explains how these systems work.
Illustration of vulnerability disclosure
en
  • Aktualizace produktu
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.