Opens profile photo
Follow
Click to Follow ProtonPrivacy
Proton
@ProtonPrivacy
Empowering you to choose a better internet where privacy is the default. Protect yourself online with , , and .
Geneva, Switzerlandproton.meJoined October 2013

Proton’s Tweets

Pinned Tweet
Proton is a community-led organization. You asked for a browser extension -- and we listened. We’re excited to announce it’s now available in beta on Chromium- and Firefox-based browsers for supporters of our paid plans: protonvpn.com/blog/browser-e
Quote Tweet
We’re launching the #ProtonVPN browser extension in beta for paid plan supporters. 🥷 Protect your browser traffic without affecting other apps 🦸 Connect to different servers on different browsers 🕵️ Use VPN on devices where you don't have admin rights protonvpn.com/blog/browser-e
Graphic of the Proton VPN Browser Extension on a laptop.
12
160
We should let Bob know about 's Schedule send and let him manage his time better, . 😃
Quote Tweet
Don't be like Bob. Skip the wait with #ProtonMail's 🕐Schedule send feature. You can also: 🔄Undo send 💣Send self-destructing emails Learn more: proton.me/blog/schedule-. What do you use this feature for? Follow @_workchronicles for more comics.
Comic book.
Image 1: Bob types on his computer, and says "Yes! Done". It's daylight outside.
Image 2: Bob says: "Now, for the wait."
Image 3: Bob is looking outside. It's still daylight.
Image 4: It's nighttime now. Bob says: "It's time." and send an email on his computer.
Image 5: Next day. Bob's manage tells Bob: "Bob I got your email late night."
Image 6: Manager continues: "Thanks for going the extra mile on this project!" Bob answers: "Always."

Caption below the comic:
"Hello. I make comics about work. Follow me on Instagram / Twitter / Facebook" 
Work Chronicles
2
101
Whatever you have in #Gmail today can be used against you tomorrow. #BigTech and US-based companies are a data gold mine for law enforcement. Proton's encrypted services are based in Switzerland, protected by some of the world's strongest #privacy laws.
11
282
When you need to share sensitive documents online, you face the risk of them being obtained by a malicious third-party. and can help you significantly reduce this risk:
Quote Tweet
From your bank statements and travel documents, to your company’s financial data and customer details – you can easily make sure they don’t become exposed on the internet. Here are some ways to protect your sensitive documents when exchanging them online 🧵👇 (1/6)
Show this thread
An image of an open envelope with an icon resembling a lock, and the text: "4 ways to send sensitive information via email".
67
#ProtonVPN’s mission is to defend internet freedom around the world. All users can now access independent news site via dedicated high speed servers: protonvpn.com/blog/deutsche-. #vpn
Quote Tweet
We've partnered with @DeutscheWelle to defend independent media around the world. Now all #ProtonVPN users can bypass government censorship and connect to #DeutscheWelle news sites via dedicated high speed servers. Read more about that here: protonvpn.com/blog/deutsche- #vpn
Proton + DW (Proton logo on top, followed by  a "plus" sign, followed by the Deutsche Welle logo).
4
141
Write emails when it suits you and send them when it’s best for your recipients. We'll take care of the rest:
Envelope (email symbol) with a timer in the top left corner, standing for email scheduling.
Quote Tweet
An envelope (symbol of email), with a timer in the top left corner.
Now you can plan your emails with "Schedule send", available on the Proton Mail web & iOS apps. Write emails when it suits you and send them when it’s best for your recipients. We'll take care of the rest, so that you can focus on what matters most: proton.me/blog/schedule-.
110
#Privacy backslides as democracy scores decline worldwide. We'll keep defending freedom and provide privacy-first services to keep your data away from gov’t eyes. A pertinent analysis on the rise of digital authoritarianism by of :
1
103
If you think your public information is irrelevant, think again. :) Watch this video of hacking someone with 'nothing to hide' through #socialengineering. 's loses $2500 worth of hotel points and gets stuck in a middle seat on a five hour flight.
Quote Tweet
Ask A Hacker: "Rachel, is it actually a big deal if I Google my name and my email address or phone number pop up. Why could that matter for someone like me?" It can matter because many services you trust still use knowledge based authentication (KBA -- info like email… Show more
Show this thread
Embedded video
3:31
82.1K views
4
274
In the past year, we've allocated over 100,000 € towards relief efforts in🇺🇦 #Ukraine and we remain committed to supporting our community there. If you are a paid user in UA and are unable to pay for your #Proton subscription, you can still request credits from our support team.
13
145
When it comes to email, everyone has their own preference. Proton Mail Bridge lets you access your inbox using your preferred desktop email client. Bridge now uses a new IMAP library, Gluon, which vastly improves its performance & stability: proton.me/mail/bridge.
The text: "Have you connected your Proton Mail inbox to your preferred desktop email app?" surrounded by the logos of 3 desktop email apps: Mozilla Thunderbird, Microsoft Outlook, and Apple Mail.
Quote Tweet
An image of a desktop with the Proton Mail Bridge logo on it and smaller logos of Mozilla Thunderbird, Apple Mail and Microsoft Outlook surrounding it.
We’re excited to announce major performance and stability improvements to Proton Mail Bridge. It's now faster and easier to use your encrypted #ProtonMail inbox with your favorite email client, such as @Outlook, @mozthunderbird, #AppleMail. Learn more: proton.me/blog/new-proto.
11
142
Digital signatures are yet another aspect of the protection provides for your files. You can use Proton Drive on the web and mobile apps: proton.me/drive/download.
Quote Tweet
Along with encryption, Proton Drive also uses digital signatures to warn you if your files were tampered with. You can learn how this works, and what you should do if you see such warning, in this article: proton.me/support/drive-. #digitalsignature #cloudstorage #cybersecurity
A sheet with binary code, the logo of Proton Drive in the top left, and a lock icon in the bottom right.
7
72
In your work, do you face similar "hard problems?" How do you deal with them? Let us know what you think in the comments!
Quote Tweet
The second post of our engineering blog series tackles a tricky challenge - email content search. Encryption underlies all things Proton, however, it can sometimes hinder basic functionalities. Email content search is perhaps the most painfully obvious one. (1/2)
Show this thread
2
50