Proton

Privatsphäre-Richtlinien

en
  • Privatsphäre-Richtlinien
WhatsApp may be secure but it’s not private. Learn about the best alternatives to WhatsApp that genuinely respect your privacy.
Illustration of cloud storage
en
  • Privatsphäre-Richtlinien
What are the pros and cons of a centralized vs. P2P cloud storage? Learn more about our storage model and how we protect your privacy.
  • Privatsphäre-Richtlinien
Flash-Laufwerke und externe Festplatten sind praktisch, aber nicht immer sicher. Wir erklären, wie du deine USB-Laufwerke verschlüsseln und deine Daten schützen kannst.
An illustration of protesters protecing their privacy.
en
  • Privatsphäre-Richtlinien
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
  • Privatsphäre-Richtlinien
Erfahre alles über TLS/SSL-Zertifikate, die digitalen Dateien, die zur Authentifizierung und Sicherung von Datenübertragungen im Internet beitragen.
Illustration of changing email provider
en
  • Privatsphäre-Richtlinien
Changing your email provider may seem as daunting as changing your name. Our tips on what to consider when making the switch and step-by-step guides make the transition gradual and painless.
An illustration of COVID-19 contact tracing apps.
en
  • Privatsphäre-Richtlinien
Many countries are turning to contact tracing apps to fight COVID-19. These represent grave threats to privacy if they are not designed properly.
An illustration of anonymized data.
en
  • Privatsphäre-Richtlinien
Many companies say they anonymize your data, but some don’t do it properly. Studies have shown it’s fairly easy to re-identify you from your information.
en
  • Privatsphäre-Richtlinien
Email scams trying to steal data and money are rising as criminals seek to profit from the COVID-19 pandemic. Here are some common scams and how to stay safe.
An illustration of political campaigns sharing voter data.
en
  • Privatsphäre-Richtlinien
Political campaigns are as driven by personal data as Google or Facebook. And these campaigns often share your data with third parties.
An illustration of cryptojacking.
en
  • Privatsphäre-Richtlinien
Cryptojacking has made dozens of media headlines. But what is cryptojacking? And how can you keep your devices safe? We have a helpful guide.