Proton

Privacy guides

  • Privacy guides
In this article, we examine the LastPass data breach and consider the lessons that can be drawn from it.
what are email headers
  • Privacy guides
Learn what email headers are, what they contain, and how to read them to keep your inbox secure and spam-free.
how to encrypt files
  • Privacy guides
If you have sensitive files or just want to keep your data private, here’s how to encrypt files on Windows, Mac, Android, and iOS.
what is two factor authentication (2fa)
  • Privacy guides
Learn what 2FA is, how it works, and why you should use it wherever you can to protect your privacy and security online.
  • Privacy guides
Cloud storage lets you share large files quickly, back up your data, and more. Read on to find out if you should use cloud storage.
how to password protect pdf header image
  • Privacy guides
PDFs often contain sensitive information. Here’s how to protect PDFs with a password and securely share them with anyone.
can emails be traced
  • Privacy guides
Email providers, ISPs, and law enforcers have ways to trace and track you through your emails. Here’s how to stay private online.
what is ciphertext
  • Privacy guides
Learn all about ciphertext (encrypted text) and how it protects your privacy and secures online communications, including encrypted email.
  • Privacy guides
We explain the different types of encryption for cloud storage, and why end-to-end encryption (e2ee) is the best for your files.
  • Privacy guides
Data breaches leak millions of emails every year. Learn how to check if your email has been leaked and how you should respond.
  • Privacy guides
Jack Crompton, an engineer on our Web Core team, explains how we've enabled data recovery without compromising your privacy.