Proton blog

Introducing Identities for all Proton Pass users and biometric login on desktop apps for Pass Plus users
  • Product updates
  • Proton Pass
Identities in Proton Pass puts you in control of your digital identity
Read more about Identities in Proton Pass puts you in control of your digital identity

What to do if you get a 'compromised passwords' iPhone notification: Proton explains how to find and change your compromised passwords, and protect yourself against data leaks. image shows a phone screen with a notification saying 'Compromised password - The password for your account has appeared in a data leak, putting your acc...'
Gotten a 'compromised passwords' iPhone notification? We explain how to change compromised passwords and prevent your data being leaked online.
The Kaspersky ban raises security and privacy concerns, but you can protect your data by switching to the Proton ecosystem.
How to free up storage space on iPhone.
Need to free up space on iPhone? Read this article and learn how to manage apps and use cloud backups to clear storage on iPhone.
Introducing Identities for all Proton Pass users and biometric login on desktop apps for Pass Plus users
Enhance your productivity and make using the internet easier with Identities and biometric authentication in Proton Pass
Proton Wallet
  • Product updates
  • Proton news
  • Proton Wallet
Proton Wallet is an easy-to-use self-custodial wallet that makes financial freedom attainable for everyone.
This article reviews the key features and security architecture that make Proton Wallet a private and secure wallet that is as easy to use as email.
Proton Wallet
  • Product updates
  • Proton news
  • Proton Wallet
Proton Wallet is an easy-to-use self-custodial wallet that makes financial freedom attainable for everyone.
proton scribe
With Proton Scribe, your team will save time writing emails, and you'll protect your business data by reducing the need to expose it to AI assistants.
In May 2024, Proton received an ISO 27001 certification, highlighting our commitment to security and user privacy. Here’s what comes next.
The Kaspersky ban raises security and privacy concerns, but you can protect your data by switching to the Proton ecosystem.
AI offers incredible productivity gains, often at the cost of privacy. Is it possible to build AI that protects privacy? We explain how it can be done.
Data harvesters are reaching into virtually every part of your digital life through the little-known surveillance hardware industry.
  • For business
  • Privacy guides
If you use Microsoft 365 and Outlook for your healthcare business, you may want to consider an alternative to help achieve HIPAA compliance.
Check out our simple explainer on the basics of Bitcoin wallets, how they work, and the features of different types.
Proton reviews popular photo sharing services and reviews the best way to share family photos online privately. Image shows three illustrated photographs with silhouettes of people on them.
The best way to share photos online with family — and keep them private — might not be via iCloud, Google, or social media. But there's a secure alternative.
Google is defying the EU Commission and refusing to give people more control over how they use their Android phones.
Big Tech companies want to chain your passkey to their products. Enter Proton Pass, which allows you to manage and use passkeys across all devices seamlessly.
Apple responds to the EU’s DMA with extortionary fees, scare screens, and general contempt. The European Commission must respond.
  • For business
  • Privacy guides
If you use Microsoft 365 and Outlook for your healthcare business, you may want to consider an alternative to help achieve HIPAA compliance.
This guide will offer an overview of PCI compliance, who is required to comply, and how to secure email containing cardholder data.
What is shadow IT? Proton explains shadow IT risks and shares shadow IT examples. Image shows an illustrated purple computer screen showing six app icons, two of which have red alert notifications in the corners
Find out how to identify shadow IT risks and help your workers collaborate in a single, secure IT environment.