Proton

Guide sulla privacy

A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
en
  • Guide sulla privacy
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
A smartphone, the Android logo, Gemini AI, and an off toggle, representing how to turn off Gemini on Android
  • Guide sulla privacy
Scopri come disattivare Gemini su Android, cosa può vedere l'IA di Google, i suoi rischi per la privacy e come limitarne la portata sul tuo dispositivo.
Proxy VPN
en
  • Guide sulla privacy
A VPN is a special type of proxy. We look at what a proxy is and provide an overview of the different kinds of proxy that are available (including VPNs).
Three envelopes, with the middle one showing a newsletter inside, symbolizing inbox decluttering
en
  • Guide sulla privacy
Learn how to organize your inbox and reduce email clutter using folders, labels, spam protection, custom filters, aliases, and more.
A smartphone receiving a suspicious text - AKA a smishing attack
en
  • Guide sulla privacy
Phishing and smishing attacks keep evolving, but do you know the difference? Learn how to tell them apart and protect yourself from smishing.
A digitized face on the internet, representing erasure.
en
  • Guide sulla privacy
After ransom-seekers sent the police to his house, one man embarked on a journey to erase himself online. Find out how he did it.
An ID card with a user profile and a wallet, suggesting data brokers
en
  • Guide sulla privacy
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
the cover image for a blog about what to do to prevent your email address appearing on the dark web. the image shows an email address on a computer screen with a fishing hook piercing the top of the password field
en
  • Guide sulla privacy
Has your email address been compromised? Here's how to find out if your email address has been leaked on the dark web — and what to do if so.
Why email aliases are better than fake email addresses for privacy and security
en
  • Guide sulla privacy
Using a fake email generator often isn't secure or private. Here's how you can use an email alias instead to keep your personal email safe.
A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
  • Guide sulla privacy
Roughly 90% of Ed Tech apps and websites were found to have trackers. We explain how you can protect your child’s privacy from this surveillance. 
en
  • Guide sulla privacy
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.