Proton

Privacy guides

A family photo, a location pin, a camera, and a clock, symbolizing the risks of EXIF data for your personal photos
  • Privacy guides
EXIF data in your photos can reveal more than you think, including your location. Learn how to protect your privacy before sharing online.
Most 'one time email' services aren't secure, but this alternative is
  • Privacy guides
One time email services aren't as safe as you think — but there's a better way. Learn more about simple, secure alternatives to disposable email addresses.
A computer, a smartphone, and a progress bar labeled "Storage", representing how to get more storage on any device
  • Privacy guides
See how to get more storage on PC, Mac, iPhone, iPad, Android in this step-by-step guide with tips to clean files, upload to cloud, and more.
A smartphone, the Android logo, Gemini AI, and an off toggle, representing how to turn off Gemini on Android
  • Privacy guides
Learn how to turn off Gemini on Android, what the Google AI can see, its privacy risks, and how to limit its reach across your device.
Proxy VPN
  • Privacy guides
A VPN is a special type of proxy. We look at what a proxy is and provide an overview of the different kinds of proxy that are available (including VPNs).
Three envelopes, with the middle one showing a newsletter inside, symbolizing inbox decluttering
  • Privacy guides
Learn how to organize your inbox and reduce email clutter using folders, labels, spam protection, custom filters, aliases, and more.
A smartphone receiving a suspicious text - AKA a smishing attack
  • Privacy guides
Phishing and smishing attacks keep evolving, but do you know the difference? Learn how to tell them apart and protect yourself from smishing.
A digitized face on the internet, representing erasure.
  • Privacy guides
After ransom-seekers sent the police to his house, one man embarked on a journey to erase himself online. Find out how he did it.
An ID card with a user profile and a wallet, suggesting data brokers
  • Privacy guides
Learn what data brokers are and how they turn your life into a dataset for profit without your knowledge, consent, or compensation.
the cover image for a blog about what to do to prevent your email address appearing on the dark web. the image shows an email address on a computer screen with a fishing hook piercing the top of the password field
  • Privacy guides
Has your email address been compromised? Here's how to find out if your email address has been leaked on the dark web — and what to do if so.
Why email aliases are better than fake email addresses for privacy and security
  • Privacy guides
Using a fake email generator often isn't secure or private. Here's how you can use an email alias instead to keep your personal email safe.