Proton

Guides vie privée

An illustration of different smart devices that make up the Internet of Things.
en
  • Guides vie privée
The number of IoT (Internet of Things) devices will reach 38 billion in 2020, opening up a massive opportunity for privacy breaches.
illustration of biometric authentication
en
  • Guides vie privée
Biometric authentication is everywhere, from smartphones to offices and more. Here's how to be safe while using physical characteristics as your password.
en
  • Guides vie privée
Android is one of Google’s most important tools for collecting data on users. This guide will help you improve your privacy on Android devices.
  • Guides vie privée
Utiliser le bon navigateur web est crucial pour protéger votre vie privée. Découvrez les navigateurs web les plus sécurisés pour éviter le suivi en ligne.
illustration of protonmail ios security recommendation
en
  • Guides vie privée
Activate Touch ID, Face ID, or PIN protection in the Proton Mail iOS app for added protection against malware and warrantless device searches.
Data breach prevention illustration
en
  • Guides vie privée
This post explains the steps you should take to prevent your data from being exposed in a breach, including using aliases and end-to-end encryption.
  • Guides vie privée
Découvrez ce qu'est le chiffrement PGP, son fonctionnement, son degré de sécurité et la manière la plus simple de sécuriser vos e-mails en l'utilisant.
Proton Mail for Journalist
en
  • Guides vie privée
Proton Mail supports independent journalism. Our encrypted messages let journalists protect their sources and whistleblowers safely report wrongdoing.
en
  • Guides vie privée
In this article, we tell you how to create a strong password and the best way to keep it safe.
en
  • Guides vie privée
A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked.
Internet privacy
en
  • Guides vie privée
Increase your online privacy with this one-stop guide. It includes simple steps to keeping companies and hackers away from your data.