Proton

Privacy guides

How to protect your inbox from an email extractor
  • Privacy guides
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
  • Privacy guides
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
A graphic interpretation of a block of how many gigabytes in a terabyte
  • Privacy guides
Learn how many GB are in a TB and discover the best way to securely store and share your files — no matter their size.
  • Privacy guides
Learn how to unsend an email, how it’s useful for personal or business emails, and how Proton Mail can help.
laptop showing Bitcoin price climbing
  • Privacy guides
Learn what a Bitcoin wallet does and the strengths and weaknesses of custodial, self-custodial, hardware, and paper wallets.
pixel tracking: here's how to tell which emails track your activity
  • Privacy guides
Discover what pixel tracking is and how it works, how to spot emails that track you, and how to block these hidden trackers.
Infostealers: What they are, how they work, and how to protect yourself
  • Privacy guides
Discover insights about what infostealers are, where your stolen information goes, and ways to protect yourself.
The cover image for a blog explaining what password encryption is and how Proton Pass helps users with no tech experience benefit from it
  • Privacy guides
Password encryption sounds complicated, but anyone can benefit from it. We explain what it is and how it’s built into Proton Pass for everyone to use.
why are my emails going to spam
  • Privacy guides
Why do some emails go to spam? This article explores practical solutions to improve your email deliverability and avoid the spam folder.
  • Privacy guides
Find out how a password manager works, what it does, and how Proton Pass keeps your private information secure.
An illustration of a laptop with chains and a padlock on the screen to represent a ransomware attack
  • Privacy guides
A ransomware attack is a serious threat for an organization. Here's what they are, how to avoid them, and 11 of the most well-known incidents.