Proton

Privacy guides

What are the alternatives to age verification?
  • Privacy guides
Explore alternatives to online age verification, from parental controls to zero-knowledge proofs, and how they can protect children without exposing personal data.
What age verification actually means (and why the term is misleading)
  • Privacy guides
What is age verification? Learn how age verification systems, software, and age checks work, including age estimation, age filters, and privacy risks.
a purple illustrated phone screen with a white Android logo on it, 4 other phone screens sit behind it and an X icon is on the right corner
  • Privacy guides
Find out how to stop apps running in background Android processes, and read our tips to keep your phone more secure.
An image showing a purple illustrated speech bubble containing a key icon with a password field in the bottom right corner
  • Privacy guides
Discover how passkeys work, why they beat passwords on security and usability, and when you still need a password.
The @ (at) sign and an open letter, representing what is an email address
  • Privacy guides
What is an email address, really? Discover how it works, what makes one valid, and simple tips to keep yours private.
Which mobile OS is more secure?
  • Privacy guides
We take an in-depth look at whether Android or iOS is more secure. It's a complex question with nuances on both sides.
an image showing eavesdropping between two purple cartoon mobile phones
  • For business
  • Privacy guides
Eavesdropping attacks can be levied at individuals and businesses, but how do they work? We explain how to protect against them
The ChatGPT and Lumo logos, representing a private ChatGPT alternative
  • Privacy guides
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
  • Privacy guides
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.
Illustration of a hand holding a megaphone in the air
  • Privacy guides
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
  • Privacy guides
Your phone can be hacked just like your computer, but how can you tell? Find out how to know if your phone is compromised.