Proton

Latest articles

Illustration of a brain and a shield with the letters AI in the center
  • Opinion
Big Tech companies are building AI aligned with their surveillance capitalism business model. We need a privacy-first and responsible AI alternative today.
  • For business
Content filtering is used by businesses and other organizations to block employees or customers from access to certain online content.
Why a dedicated IP address
  • For business
A static IP address is a fixed internet protocol address that’s guaranteed not to change for as long as you lease it.
Dedicated IPs
  • For business
VPNs are used by businesses worldwide to improve their security, ensure compliance, and more.
Meta accused of bypassing Apple’s tracking rules
  • Privacy news
A former Meta employee alleges the company used internal tracking methods to bypass Apple’s privacy rules and inflate ad metrics.
How to write a genuine "Welcome to the team" email (+ 20 templates)
  • For business
“Welcome to the team” messages can fall flat. Write the best onboarding email with these 20 creative templates that will make new hires feel valued from day one.
10 'I hope this email finds you well' alternatives
  • For business
These modern email greetings are far more interesting than the cliché phrase, "I hope this email finds you well".
Should security cost your privacy?
  • Privacy news
Former CIA officer Andrew Bustamante and Cato’s Jennifer Huddleston debate what privacy means today and how it shapes security, rights, and the internet.
The WhatsApp logo split in two, symbolizing WhatsApp security and privacy risks
  • Privacy news
WhatsApp's ex-security chief is suing Meta over privacy and security concerns, adding to recent whistleblower claims. Find out how safe WhatsApp is.
A robot, family photos, and a warning sign, representing AI privacy concerns
  • Privacy guides
Find out the main artificial intelligence privacy concerns, from data collection and bias to deepfakes and surveillance, and how to protect yourself.
Map of the United States with six images of hacked computers
  • Privacy news
China-supported hackers have been monitoring US internet infrastructure for years. Now US security experts suspect they might have stolen data from everyone in the US.