<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/</link><language>en</language><feed_url>https://proton.me/feed</feed_url><item><title>How to clear your cache on iPhone and free up storage space</title><link>https://proton.me/blog/how-to-clear-cache-iphone</link><guid isPermaLink="true">https://proton.me/blog/how-to-clear-cache-iphone</guid><description>Cache accumulates and takes up precious storage space. Here’s how to clear cache on iPhone across browsers, apps, and system data.</description><pubDate>Tue, 05 May 2026 17:16:12 GMT</pubDate><content:encoded>
&lt;p&gt;If your &lt;a href=&quot;https://proton.me/blog/iphone-storage&quot;&gt;iPhone&lt;/a&gt; feels sluggish or you’re dismissing “&lt;a href=&quot;https://proton.me/blog/iphone-storage-full&quot;&gt;Storage Almost Full&lt;/a&gt;” warnings despite deleting apps, your cache might be part of the problem. Browsers and apps save temporary data to help things load faster, but over time, it accumulates and works against you, causing issues like iPhone slowdowns and app crashes.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/android-vs-ios-security&quot;&gt;iOS&lt;/a&gt; doesn’t make it obvious, but we’ll show you where to look and how to clear cache for the biggest offenders, such as your browser and apps like &lt;a href=&quot;https://proton.me/blog/instagram-anonymous-story-viewer&quot;&gt;Instagram&lt;/a&gt;, &lt;a href=&quot;https://protonvpn.com/blog/is-tiktok-safe&quot;&gt;TikTok&lt;/a&gt;, and &lt;a href=&quot;https://protonvpn.com/blog/youtube-alternatives&quot;&gt;YouTube&lt;/a&gt;.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#safari&quot;&gt;Safari cache&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#chrome&quot;&gt;Chrome cache&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#app&quot;&gt;App cache&lt;/a&gt;
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;a href=&quot;#whatsapp&quot;&gt;WhatsApp&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#tiktok&quot;&gt;TikTok&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#instagram&quot;&gt;Instagram&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#offload-delete&quot;&gt;Offload or delete apps&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#system&quot;&gt;System cache&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#more-space&quot;&gt;Get more space&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;&lt;a href=&quot;#faq&quot;&gt;Frequently asked questions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;safari&quot;&gt;How to clear Safari cache on iPhone&lt;/h2&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Go to &lt;strong&gt;Settings → Apps&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Find and tap on &lt;strong&gt;Safari&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Clear History and Website Data&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Choose &lt;strong&gt;All History &lt;/strong&gt;for a full clear.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Clear History &lt;/strong&gt;to confirm.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1248&quot; height=&quot;1748&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1248,h_1748,c_scale/f_auto,q_auto/v1777991308/wp-pme/clear-safari-cache-iphone/clear-safari-cache-iphone.png?_i=AA&quot; alt=&quot;iPhone settings showing how to clear Safari history&quot; class=&quot;wp-post-130085 wp-image-130216&quot; style=&quot;width:400px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;140 KB&quot; data-optsize=&quot;22 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;84.7&quot; data-version=&quot;1777991308&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1777991308/wp-pme/clear-safari-cache-iphone/clear-safari-cache-iphone.png?_i=AA 1248w, https://res.cloudinary.com/dbulfrlrz/images/w_214,h_300,c_scale/f_auto,q_auto/v1777991308/wp-pme/clear-safari-cache-iphone/clear-safari-cache-iphone.png?_i=AA 214w, https://res.cloudinary.com/dbulfrlrz/images/w_731,h_1024,c_scale/f_auto,q_auto/v1777991308/wp-pme/clear-safari-cache-iphone/clear-safari-cache-iphone.png?_i=AA 731w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1076,c_scale/f_auto,q_auto/v1777991308/wp-pme/clear-safari-cache-iphone/clear-safari-cache-iphone.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1097,h_1536,c_scale/f_auto,q_auto/v1777991308/wp-pme/clear-safari-cache-iphone/clear-safari-cache-iphone.png?_i=AA 1097w&quot; sizes=&quot;auto, (max-width: 1248px) 100vw, 1248px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;This will clear your browsing history, cookies, and cached files. Your &lt;a href=&quot;https://proton.me/blog/saved-passwords&quot;&gt;saved passwords&lt;/a&gt; and bookmarks will remain. Note that you will be signed out of websites.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;chrome&quot;&gt;How to clear Chrome cache on iPhone&lt;/h2&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open the &lt;strong&gt;Chrome &lt;/strong&gt;app.&lt;/li&gt;



&lt;li&gt;Tap the &lt;strong&gt;three-dot menu ⋮ &lt;/strong&gt;in the bottom right corner.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Delete browsing data&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1237&quot; height=&quot;2514&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1237,h_2514,c_scale/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA&quot; alt=&quot;iPhone settings showing how to clear Chrome cache&quot; class=&quot;wp-post-130085 wp-image-130237&quot; style=&quot;width:400px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;320 KB&quot; data-optsize=&quot;47 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.3&quot; data-version=&quot;1777991388&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA 1237w, https://res.cloudinary.com/dbulfrlrz/images/w_148,h_300,c_scale/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA 148w, https://res.cloudinary.com/dbulfrlrz/images/w_504,h_1024,c_scale/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA 504w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1561,c_scale/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_756,h_1536,c_scale/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA 756w, https://res.cloudinary.com/dbulfrlrz/images/w_1008,h_2048,c_scale/f_auto,q_auto/v1777991388/wp-pme/delete-cache-chrome-iphone-step-3/delete-cache-chrome-iphone-step-3.png?_i=AA 1008w&quot; sizes=&quot;auto, (max-width: 1237px) 100vw, 1237px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ol start=&quot;4&quot; class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Set the &lt;strong&gt;Time range&lt;/strong&gt; to &lt;strong&gt;All Time &lt;/strong&gt;for a full clear.&lt;/li&gt;



&lt;li&gt;Select &lt;strong&gt;Browsing data &lt;/strong&gt;and&lt;strong&gt; &lt;/strong&gt;then &lt;strong&gt;Cached images and files&lt;/strong&gt;. You can also include &lt;strong&gt;Cookies, site data &lt;/strong&gt;to clear more data.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Delete data&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1260&quot; height=&quot;1345&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1260,h_1345,c_scale/f_auto,q_auto/v1777991449/wp-pme/delete-chrome-cache-on-iphone-step-6/delete-chrome-cache-on-iphone-step-6.jpg?_i=AA&quot; alt=&quot;iPhone settings showing how to delete Chrome cache&quot; class=&quot;wp-post-130085 wp-image-130258&quot; style=&quot;width:400px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;93 KB&quot; data-optsize=&quot;31 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;66.8&quot; data-version=&quot;1777991449&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1777991449/wp-pme/delete-chrome-cache-on-iphone-step-6/delete-chrome-cache-on-iphone-step-6.jpg?_i=AA 1260w, https://res.cloudinary.com/dbulfrlrz/images/w_281,h_300,c_scale/f_auto,q_auto/v1777991449/wp-pme/delete-chrome-cache-on-iphone-step-6/delete-chrome-cache-on-iphone-step-6.jpg?_i=AA 281w, https://res.cloudinary.com/dbulfrlrz/images/w_959,h_1024,c_scale/f_auto,q_auto/v1777991449/wp-pme/delete-chrome-cache-on-iphone-step-6/delete-chrome-cache-on-iphone-step-6.jpg?_i=AA 959w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_820,c_scale/f_auto,q_auto/v1777991449/wp-pme/delete-chrome-cache-on-iphone-step-6/delete-chrome-cache-on-iphone-step-6.jpg?_i=AA 768w&quot; sizes=&quot;auto, (max-width: 1260px) 100vw, 1260px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Clearing cookies will sign you out of websites.&lt;/p&gt;



&lt;p&gt;If you’re using a different browser, like Firefox or Brave, look for options labeled &amp;#8220;Privacy,&amp;#8221; &amp;#8220;Data,&amp;#8221; or &amp;#8220;Clear Browsing Data&amp;#8221; in the app&amp;#8217;s settings.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;app&quot;&gt;How to clear app cache on iPhone&lt;/h2&gt;



&lt;p&gt;Apps also store their own cached data on your iPhone. Unlike Safari, there’s no single place in iOS to clear app cache. Some apps let you do it from within their settings, while others require you to delete and reinstall entirely.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;whatsapp&quot;&gt;How to clear WhatsApp cache on iPhone&amp;nbsp;&lt;/h3&gt;



&lt;p&gt;WhatsApp doesn’t have a single button to clear all cache, so you have to free up space from each chat separately:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open &lt;strong&gt;WhatsApp&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Go to &lt;strong&gt;Settings &lt;/strong&gt;→ &lt;strong&gt;Storage and Data&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Tap on &lt;strong&gt;Manage storage&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Select a chat to view cached files and delete them.&lt;/li&gt;
&lt;/ol&gt;



&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;tiktok&quot;&gt;How to clear TikTok cache on iPhone&amp;nbsp;&lt;/h3&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open &lt;strong&gt;TikTok&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Go to your profile and tap on the &lt;strong&gt;three-line menu icon &lt;/strong&gt;on the top right.&lt;/li&gt;



&lt;li&gt;Tap on &lt;strong&gt;Settings and privacy, &lt;/strong&gt;and select &lt;strong&gt;Free up space&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Tap &lt;strong&gt;Clear &lt;/strong&gt;on the cache row.&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1170&quot; height=&quot;1643&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1170,h_1643,c_scale/f_auto,q_auto/v1777993406/wp-pme/iphone-tiktok-clear-cache/iphone-tiktok-clear-cache.jpg?_i=AA&quot; alt=&quot;iPhone settings show how to clear TikTok cache&quot; class=&quot;wp-post-130085 wp-image-130301&quot; style=&quot;width:400px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-version=&quot;1777993406&quot; data-seo=&quot;1&quot; data-filesize=&quot;225 KB&quot; data-optsize=&quot;73 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;67.7&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1777993406/wp-pme/iphone-tiktok-clear-cache/iphone-tiktok-clear-cache.jpg?_i=AA 1170w, https://res.cloudinary.com/dbulfrlrz/images/w_214,h_300,c_scale/f_auto,q_auto/v1777993406/wp-pme/iphone-tiktok-clear-cache/iphone-tiktok-clear-cache.jpg?_i=AA 214w, https://res.cloudinary.com/dbulfrlrz/images/w_729,h_1024,c_scale/f_auto,q_auto/v1777993406/wp-pme/iphone-tiktok-clear-cache/iphone-tiktok-clear-cache.jpg?_i=AA 729w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1078,c_scale/f_auto,q_auto/v1777993406/wp-pme/iphone-tiktok-clear-cache/iphone-tiktok-clear-cache.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1094,h_1536,c_scale/f_auto,q_auto/v1777993406/wp-pme/iphone-tiktok-clear-cache/iphone-tiktok-clear-cache.jpg?_i=AA 1094w&quot; sizes=&quot;auto, (max-width: 1170px) 100vw, 1170px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;instagram&quot;&gt;How to clear Instagram cache on iPhone&lt;/h3&gt;



&lt;p&gt;Some apps like Instagram don’t have a cache option, but there are alternative solutions:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Open the &lt;strong&gt;Settings &lt;/strong&gt;app.&lt;/li&gt;



&lt;li&gt;Go to &lt;strong&gt;General&lt;/strong&gt; → &lt;strong&gt;iPhone storage&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Find and tap on &lt;strong&gt;Instagram&lt;/strong&gt;. You can choose from
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Offload App&lt;/strong&gt;: This removes the app while keeping local data, such as settings and documents.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Delete App&lt;/strong&gt;: This removes the app and its local data.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1260&quot; height=&quot;1653&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1260,h_1653,c_scale/f_auto,q_auto/v1777991557/wp-pme/delete-offload-instagram-on-iphone/delete-offload-instagram-on-iphone.jpg?_i=AA&quot; alt=&quot;iPhone settings show how to delete or offload the Instagram app&quot; class=&quot;wp-post-130085 wp-image-130279&quot; style=&quot;width:400px&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-version=&quot;1777991557&quot; data-seo=&quot;1&quot; data-filesize=&quot;170 KB&quot; data-optsize=&quot;67 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;60.6&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1777991557/wp-pme/delete-offload-instagram-on-iphone/delete-offload-instagram-on-iphone.jpg?_i=AA 1260w, https://res.cloudinary.com/dbulfrlrz/images/w_229,h_300,c_scale/f_auto,q_auto/v1777991557/wp-pme/delete-offload-instagram-on-iphone/delete-offload-instagram-on-iphone.jpg?_i=AA 229w, https://res.cloudinary.com/dbulfrlrz/images/w_781,h_1024,c_scale/f_auto,q_auto/v1777991557/wp-pme/delete-offload-instagram-on-iphone/delete-offload-instagram-on-iphone.jpg?_i=AA 781w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1008,c_scale/f_auto,q_auto/v1777991557/wp-pme/delete-offload-instagram-on-iphone/delete-offload-instagram-on-iphone.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1171,h_1536,c_scale/f_auto,q_auto/v1777991557/wp-pme/delete-offload-instagram-on-iphone/delete-offload-instagram-on-iphone.jpg?_i=AA 1171w&quot; sizes=&quot;auto, (max-width: 1260px) 100vw, 1260px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;If you’ve deleted the app, you can reinstall Instagram from the App Store and log back in. After offloading, look for the faded Instagram icon on your homescreen and tap on it to reinstall app data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot; id=&quot;offload-delete&quot;&gt;Offload or delete app to clear cache&lt;/h3&gt;



&lt;p&gt;For apps without a built-in cache option, you have two choices:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Offload app: &lt;/strong&gt;Removes the app while keeping local data, such as settings and documents. When you reinstall the app, local data is restored. This doesn’t free up much space but is less disruptive.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Delete app: &lt;/strong&gt;Removes the app and its local data, so you can use a fresh installation. Your account isn&amp;#8217;t affected, and you&amp;#8217;ll just need to log back in after reinstalling the app.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;system&quot;&gt;How to clear system cache on iPhone&lt;/h2&gt;



&lt;p&gt;System cache, also known as system data on iPhone, includes caches, logs, and temporary files that your iPhone stores to run smoothly. Unlike browser or app cache, there is no direct way to clear it from within iOS.&lt;/p&gt;



&lt;p&gt;A restart does help with clearing temporary memory, though, which can fix minor glitches and reclaim a tiny amount of storage. Here’s how to restart your iPhone:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Press and hold the &lt;strong&gt;side button &lt;/strong&gt;(the power button) and either &lt;strong&gt;volume button &lt;/strong&gt;simultaneously&lt;strong&gt; &lt;/strong&gt;until the power off slider appears.&lt;/li&gt;



&lt;li&gt;Drag the slider to turn off your iPhone.&lt;/li&gt;



&lt;li&gt;Wait for about 30 seconds.&lt;/li&gt;



&lt;li&gt;Press and hold the &lt;strong&gt;side button &lt;/strong&gt;until the Apple logo appears.&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;If system data is eating up a large chunk of storage, you’ll need to clear your browser cache and &lt;a href=&quot;https://docs.google.com/document/d/1P2p7TlkyIkgY-EJU3RjFMnxTCid0ok6W2vNttrjxb_c/edit?tab=t.0#heading=h.xcypbh99unf8&quot;&gt;app cache&lt;/a&gt;. An alternative method is to clear system data by &lt;a href=&quot;https://www.reddit.com/r/iphone/comments/zzoqdj/psa_the_proper_way_to_delete_or_shrink_iphone/&quot;&gt;setting your iPhone’s date to the future&lt;/a&gt;, though this isn&amp;#8217;t an official fix.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;more-space&quot;&gt;Get more space on iPhone with secure cloud storage&lt;/h2&gt;



&lt;p&gt;Cache builds over time, but so do &lt;a href=&quot;https://proton.me/drive/photo-storage&quot;&gt;photos&lt;/a&gt; and videos. When media files start accumulating, your iPhone storage fills up quickly. Clearing cache helps free up some space, but it eventually rebuilds. And deleting personal memories just to keep your phone functional shouldn’t be an option.&lt;/p&gt;



&lt;p&gt;Backing up your photos to secure &lt;a href=&quot;https://proton.me/drive&quot;&gt;cloud storage&lt;/a&gt; means you don’t have to make that trade-off. Proton Drive offers a privacy-first approach to storing photos, videos, &lt;a href=&quot;https://proton.me/drive/docs&quot;&gt;documents&lt;/a&gt;, and other files so you don’t have to worry about running out of space on your iPhone. We’ve made it easy and safe with &lt;a href=&quot;https://proton.me/support/enable-photo-backup&quot;&gt;automatic backups&lt;/a&gt; of photos and videos, and &lt;a href=&quot;https://proton.me/drive/file-sharing&quot;&gt;file sharing&lt;/a&gt; outside of Apple’s ecosystem.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/drive/security&quot;&gt;Proton Drive&amp;#8217;s end-to-end encryption&lt;/a&gt; keeps your files truly private and accessible only to those you choose. With apps for iPhone, iPad, and Mac, your files are always within reach — even if your phone is lost or stolen.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot; id=&quot;faq&quot;&gt;Frequently asked questions about iPhone cache&lt;/h2&gt;



&lt;div class=&quot;schema-faq wp-block-yoast-faq-block&quot;&gt;&lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1777987285559&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;What is the difference between cache and cookies?&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;Cache saves pieces of content from websites and apps, so that they load faster when you return. Cookies are browser-specific and store details like your login status and site preferences. &lt;br&gt;&lt;br&gt;When you clear cache, it means your browser or app has to redownload content to your device, and you might even notice it taking longer to load. Clearing cookies removes your website preferences and signs you out across the web. Most browsers let you clear one without the other.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1777987407968&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;What is cache on iPhone?&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;Cache is like a cheat sheet your iPhone keeps for itself. When you visit a website or use an app, bits of content and data get saved locally so that your phone can skip a full download next time. It helps things load and open faster, so you’re not stuck on a loading screen for too long.&lt;br&gt;&lt;br&gt;The problem is that this cheat sheet grows endlessly. Every site and app adds to it, and iOS does not automatically purge it. This is where the cache becomes an unwieldy storage hog that limits your iPhone&amp;#8217;s performance and functionality.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1777987468665&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;When should you clear cache on iPhone?&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;You should not clear iPhone cache regularly, but only when storage is getting full or as a troubleshooting step when apps don’t function properly. Doing it too often can make your iPhone load things slowly, as it has to re-download content it would normally pull from storage.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1777987339292&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;Will clearing cache delete passwords?&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;No. Your saved passwords live in iCloud Keychain or your password manager; clearing cache will not touch them. However, clearing cookies will sign you out of websites, so make sure your logins are saved to your password manager before you clear them.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1777987363612&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;How do you clear cookies on iPhone?&lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;You can follow the steps above to clear cache on iPhone, which also includes cookies. To delete cookies without clearing history, go to &lt;strong&gt;Settings&lt;/strong&gt; → &lt;strong&gt;Safari&lt;/strong&gt; → &lt;strong&gt;Advanced&lt;/strong&gt; → &lt;strong&gt;Website Data&lt;/strong&gt;, then tap &lt;strong&gt;Remove All Website Data&lt;/strong&gt;, or swipe left on individual sites to delete specific cookies.&lt;/p&gt; &lt;/div&gt; &lt;div class=&quot;schema-faq-section&quot; id=&quot;faq-question-1777987311634&quot;&gt;&lt;strong class=&quot;schema-faq-question&quot;&gt;Do iPhone app cleaners work? &lt;/strong&gt; &lt;p class=&quot;schema-faq-answer&quot;&gt;iPhone app cleaners can help with some things, like finding duplicate photos, but they can&amp;#8217;t actually clear cache from other apps. Apple doesn&amp;#8217;t let apps access each other&amp;#8217;s data, so a cleaner app has no way to reach the cached files in other apps. If an app claims it can clear your cache for you, take that with a grain of salt.&lt;/p&gt; &lt;/div&gt; &lt;/div&gt;
</content:encoded><category>Privacy guides</category><author>Elena Constantinescu</author></item><item><title>Proton Mail now supports post-quantum encryption</title><link>https://proton.me/blog/introducing-post-quantum-encryption</link><guid isPermaLink="true">https://proton.me/blog/introducing-post-quantum-encryption</guid><description>Proton Mail now supports post-quantum encryption, helping protect new encrypted emails against future quantum threats.</description><pubDate>Tue, 05 May 2026 11:55:05 GMT</pubDate><content:encoded>
&lt;p&gt;The quantum era is no longer a distant thought experiment. Quantum computers — advanced computing systems designed to solve complex problems that classical computers cannot — are not yet capable of breaking the &lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;encryption&lt;/a&gt; that protects &lt;a href=&quot;https://proton.me/mail&quot;&gt;email&lt;/a&gt; today. But the risk is real enough that security teams, standards bodies, and technology providers are already preparing for what comes next by adopting &lt;a href=&quot;https://proton.me/blog/post-quantum-encryption&quot;&gt;post-quantum encryption&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Post-quantum protection is now an optional upgrade in Proton Mail&lt;/strong&gt;, available on all plans including free. Once enabled, Proton Mail can generate and use post-quantum-ready keys for new encrypted emails to protect your personal messages and business communications against today&amp;#8217;s threats and a future where current public-key cryptography may no longer be enough.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small bg-purple-500 text-white hover:text-white focus:text-white&quot; href=&quot;https://account.proton.me/mail/encryption-keys#pqc-optin&quot;&gt;Enable post-quantum protection now&lt;/a&gt;&lt;/div&gt;



&lt;p class=&quot;has-text-align-center&quot;&gt;Don&amp;#8217;t use Proton Mail yet? &lt;a href=&quot;https://account.proton.me/start&quot;&gt;Create a free account&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What’s changing in Proton Mail&lt;/h2&gt;



&lt;p&gt;Proton Mail has long used OpenPGP with &lt;a href=&quot;https://proton.me/blog/elliptic-curve-cryptography&quot;&gt;ECC (Elliptic Curve Cryptography)&lt;/a&gt; and RSA (Rivest-Shamir-Adleman) keys to protect &lt;a href=&quot;https://proton.me/blog/encrypted-email&quot;&gt;encrypted email&lt;/a&gt;, which remain secure against the computers of today. But large-scale quantum computers could break those schemes using algorithms such as Shor’s algorithm, a quantum computing technique designed to solve the kinds of mathematical problems that make RSA and ECC secure.&lt;/p&gt;



&lt;p&gt;To prepare for that future, &lt;strong&gt;Proton Mail now supports encryption keys that withstand post-quantum cryptography (PQC)&lt;/strong&gt;. Find out &lt;a href=&quot;https://proton.me/support/mail-post-quantum-protection&quot;&gt;how to enable post-quantum protection in Proton Mail&lt;/a&gt; with just a few simple steps.&lt;/p&gt;



&lt;p&gt;Enabling PQC helps protect new encrypted emails going forward. It does not retroactively re-encrypt the emails already in your mailbox, for now. As with existing keys, PQC keys can still be managed in familiar ways. You can generate more PQC keys later, and those keys can be marked obsolete or compromised just like RSA or ECC keys.&lt;/p&gt;



&lt;p&gt;As part of this work, we are also &lt;strong&gt;adding support for OpenPGP v6&lt;/strong&gt;, the newer framework that enables modern algorithm support, including post-quantum cryptography.&lt;/p&gt;



&lt;p&gt;We are also standardizing quantum-safe encrypted email across the open email ecosystem, including with projects such as Thunderbird, so these protections can work between providers — not just within Proton — and help people stay safe no matter which email service they use.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why prepare now for post-quantum attacks?&lt;/h2&gt;



&lt;p&gt;The quantum era may not be here yet, but an attacker can collect encrypted data today and keep it for the future, hoping to decrypt it once quantum capabilities improve and proliferate. That is one reason the migration has already started across the industry, even before practical quantum attacks exist.&lt;/p&gt;



&lt;p&gt;The most important security transitions usually start before the wider public is paying attention. By the time they become obvious to everyone, the organizations that waited are already behind.&lt;/p&gt;



&lt;p&gt;With post-quantum cryptography support in Proton Mail, we are taking a proactive step to help protect encrypted email against the threats of tomorrow, without compromising the privacy guarantees that matter today.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small bg-purple-500 text-white hover:text-white focus:text-white&quot; href=&quot;https://account.proton.me/mail/encryption-keys#pqc-optin&quot;&gt;Enable post-quantum protection now&lt;/a&gt;&lt;/div&gt;



&lt;p class=&quot;has-text-align-center&quot;&gt;Don&amp;#8217;t use Proton Mail yet? &lt;a href=&quot;https://account.proton.me/start&quot;&gt;Create a free account&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;&lt;/p&gt;
</content:encoded><category>Proton Mail</category><author>Anant Vijay Singh</author></item><item><title>A practical password policy template for organizations</title><link>https://proton.me/business/blog/password-policy-template</link><guid isPermaLink="true">https://proton.me/business/blog/password-policy-template</guid><description>Get a free strong password policy and learn how to prevent risky habits and protect your business from breaches.</description><pubDate>Tue, 28 Apr 2026 10:48:59 GMT</pubDate><content:encoded>
&lt;p&gt;Your organization can no longer afford to leave password security up to individual team members. Despite their best intentions, humans default to convenient but risky habits, such as saving credentials in browsers, spreadsheets, or sticky notes.&lt;/p&gt;



&lt;p&gt;A strong password policy establishes a clear, enforceable standard for how passwords are created, stored, shared, reviewed, and protected across your organization. A modern policy reduces credential-based risk, supports compliance, and brings consistency to access security across systems, teams, and workflows.&lt;/p&gt;



&lt;p&gt;This isn’t something businesses can afford to ignore. Verizon&amp;#8217;s 2025 Data Breach Investigations Report found that credential abuse accounted for 22% of leading initial attack vectors in confirmed breaches. The cost of poor credential security also surfaces in operational disruption, regulatory exposure, reputational damage, and the prolonged downtime that follows when teams scramble to recover lost or compromised access.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;In addition to creating a password policy, your organization needs systems and tools that make secure habits easy to adopt. Rules are not enough to ensure operational security because, where friction exists, even well-intentioned professionals will take shortcuts. The goal is to make password hygiene the path of least resistance.&lt;/p&gt;



&lt;p&gt;The password policy template below can help your business stay grounded in current best practices and NIST-aligned guidance. You can adapt it into an internal policy, security handbook, or governance control for organizations that need something more practical than general advice.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Password policy template (sample)&lt;/h2&gt;



&lt;figure class=&quot;wp-block-table&quot;&gt;&lt;table class=&quot;has-fixed-layout&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Section&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Policy requirement (example language)&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;&lt;strong&gt;Implementation notes&lt;/strong&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;This policy applies to all employees, contractors, vendors, and third parties who access company systems or data using password-based authentication. It covers all systems, including SaaS platforms, cloud services, internal tools, endpoints, and administrative environments.&lt;/td&gt;&lt;td&gt;Ensure no systems or user groups fall outside scope. Include vendors and shared environments.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;User responsibilities&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;All users must create, store, and manage passwords in accordance with this policy. Users must not share credentials, reuse passwords, or store them in unapproved locations. Suspected credential compromise must be reported immediately.&lt;/td&gt;&lt;td&gt;Include in onboarding and security training.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Management responsibilities&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Managers must ensure timely communication of onboarding, role changes, and offboarding to enable proper access control and credential updates.&lt;/td&gt;&lt;td&gt;Tie into HR workflows.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;IT and security responsibilities&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;IT and security teams are responsible for enforcing this policy, approving password management tools, monitoring compliance, and responding to credential-related incidents.&lt;/td&gt;&lt;td&gt;Assign clear ownership internally.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Password length&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Passwords must meet the following minimum lengths: 15 characters (standard accounts), 16 characters (privileged accounts), and 20 characters (shared or service accounts where feasible).&lt;/td&gt;&lt;td&gt;Systems should support long passwords (ideally up to 64 characters.)&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Password creation&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Passwords must be randomly generated using the organisation’s approved &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;. User-created passwords based on patterns, personal data, or predictable structures are not permitted.&lt;/td&gt;&lt;td&gt;Proton Pass for Business can automate the creation of strong, random passwords.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Password uniqueness&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Passwords must be unique for every account, system, and service. Reuse across work systems, personal accounts, or client environments is strictly prohibited.&lt;/td&gt;&lt;td&gt;Enforce through tooling and training, not just memory.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Password strength testing&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Passwords must not be weak, reused, or previously exposed in known data breaches.&lt;/td&gt;&lt;td&gt;Use systems that support breached password detection where possible.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Prohibited practices&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;The following are prohibited: password reuse; use of personal or company-related terms; predictable patterns; storing passwords in plain text; sharing credentials via email, chat, or notes.&lt;/td&gt;&lt;td&gt;Keep this section explicit to remove ambiguity.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Multi-factor authentication (MFA)&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;MFA must be enabled on all systems that support it, particularly for email, identity providers, remote access, financial systems, HR platforms, and administrative accounts.&lt;/td&gt;&lt;td&gt;Prioritize high-risk systems first.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Password storage&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;All credentials must be stored only in the organisation’s approved password manager. Storage in browsers or local tools is not permitted unless centrally managed and approved.&lt;/td&gt;&lt;td&gt;Proton Pass for Business provides encrypted vaults with controlled access.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Prohibited storage methods&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Passwords must not be stored in spreadsheets, documents, email drafts, ticketing systems, shared drives, or personal notes.&lt;/td&gt;&lt;td&gt;Audit for these regularly as they’re very common.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Password sharing&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Passwords must not be shared through informal channels. Where sharing is required, it must occur through approved secure systems that support access control, auditing, and revocation.&lt;/td&gt;&lt;td&gt;Proton Pass for Business enables secure credential sharing without exposing the password itself.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Shared accounts&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Shared or service account credentials must have a designated owner, limited access, secure storage, and regular review. Credentials must be rotated when personnel changes occur or compromise is suspected.&lt;/td&gt;&lt;td&gt;Prefer individual accounts where possible.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Training and awareness&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;All users must complete password and credential security training at onboarding and periodically thereafter. Training must include password management, MFA use, &lt;a href=&quot;https://proton.me/blog/what-is-phishing&quot;&gt;phishing&lt;/a&gt; awareness, and &lt;a href=&quot;https://proton.me/business/blog/incident-response&quot;&gt;incident reporting&lt;/a&gt;.&lt;/td&gt;&lt;td&gt;Keep training practical and up-to-date.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Incident response&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Any suspected or confirmed credential compromise must be reported immediately. Affected credentials must be reset, sessions revoked, and access reviewed. Incidents must be documented.&lt;/td&gt;&lt;td&gt;Response speed matters more than perfection.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Reporting requirements&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Users must report suspected credential exposure through the designated reporting channel. No disciplinary action will result from good-faith reporting.&lt;/td&gt;&lt;td&gt;Encourages early reporting.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Monitoring and logging&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Authentication activity must be logged where feasible, including login attempts, credential changes, and privileged access. Logs should be reviewed periodically for anomalies.&lt;/td&gt;&lt;td&gt;Focus on high-risk systems first.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Offboarding and access revocation&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Upon role change or termination, access must be removed immediately. Shared credentials must be reviewed and rotated where necessary.&lt;/td&gt;&lt;td&gt;Essential, as this is one of the most common failure points for organizations.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Compliance alignment&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;This policy supports organizational compliance with recognised frameworks such as NIST and ISO 27001 access control requirements.&lt;/td&gt;&lt;td&gt;Useful for audits and governance.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Enforcement&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;Failure to comply with this policy may result in retraining, access restrictions, or disciplinary action depending on severity.&lt;/td&gt;&lt;td&gt;Apply consistently.&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;&lt;strong&gt;Review cycle&lt;/strong&gt;&lt;/td&gt;&lt;td&gt;This policy must be reviewed at least annually or following significant changes in systems, risks, or regulatory requirements.&lt;/td&gt;&lt;td&gt;Assign an owner for updates.&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/figure&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is a password policy? Definition, purpose and objectives&lt;/h2&gt;



&lt;p&gt;A password policy is a formal set of rules that defines how credentials are created, managed, stored, and protected across an organization’s systems.&lt;/p&gt;



&lt;p&gt;The concept of a password policy sounds simple but the impact is broad. It’s much more than just mandating the use of a &lt;a href=&quot;https://proton.me/business/pass/pricing&quot;&gt;business password manager&lt;/a&gt; for business credentials. In modern organizations, password policies serve as the foundation of identity security.&lt;/p&gt;



&lt;p&gt;Without a consistent policy governing how credentials are handled across systems, password practices tend to become fragmented, and organizations gradually lose visibility over how access is actually being managed.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;The purpose of a strong password policy&lt;/h3&gt;



&lt;p&gt;A well-defined password policy addresses security gaps by setting clear expectations for how credentials should be handled across your organization. It establishes consistent standards for password creation, storage, sharing, and lifecycle management.&lt;/p&gt;



&lt;p&gt;Password policies also play an important role in governance and compliance. Security frameworks such as the &lt;a href=&quot;https://pages.nist.gov/800-63-3/&quot;&gt;NIST Digital Identity Guidelines&lt;/a&gt; and standards like &lt;a href=&quot;https://www.iso.org/standard/27001&quot;&gt;ISO 27001&lt;/a&gt; emphasize the importance of strong authentication practices as part of modern access control.&lt;/p&gt;



&lt;p&gt;Organizations that handle sensitive data, particularly personal information, financial records, or proprietary business information, are increasingly expected to demonstrate that access to those systems is governed by documented security controls.&lt;/p&gt;



&lt;p&gt;With a password policy, your organization defines the minimum requirements for creating, storing, sharing, and managing passwords used to access company systems, services, devices, applications, and data.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;What should a password policy do?&lt;/h3&gt;



&lt;p&gt;A password policy document is intended to:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Reduce password-related security incidents&lt;/li&gt;



&lt;li&gt;Prevent password reuse and insecure storage practices&lt;/li&gt;



&lt;li&gt;Require secure password creation and management practices&lt;/li&gt;



&lt;li&gt;Support secure access across employees, vendors, and systems&lt;/li&gt;



&lt;li&gt;Strengthen audit readiness and access governance&lt;/li&gt;



&lt;li&gt;Define response procedures for compromised credentials&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Together, these objectives help ensure that password security is treated as an operational standard rather than an informal expectation.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Password policy: scope, roles, and responsibilities&lt;/h2&gt;



&lt;p&gt;A strong password policy should make two things explicit. First, it should clearly define which users, systems, and data must adhere to the policy.&lt;/p&gt;



&lt;p&gt;Second, it should clarify who is responsible for following, implementing, and maintaining those standards across your organization.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Define the scope of your password policy&lt;/h3&gt;



&lt;p&gt;In modern organizations, access is rarely limited to full-time employees on internal networks. Contractors, vendors, and service providers may all require access to corporate systems, so the policy should extend to everyone interacting with company systems or data through password-based authentication.&lt;/p&gt;



&lt;p&gt;It should also apply across the entire technology environment, including:&amp;nbsp;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Cloud platforms&lt;/li&gt;



&lt;li&gt;SaaS tools&lt;/li&gt;



&lt;li&gt;Internal systems&lt;/li&gt;



&lt;li&gt;Development environments&lt;/li&gt;



&lt;li&gt;Administrative consoles&lt;/li&gt;



&lt;li&gt;Shared operational accounts &lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;This is important because attackers rarely distinguish between primary and secondary systems when looking for entry points.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Define roles and responsibilities within your password policy&lt;/h3&gt;



&lt;p&gt;Without clear ownership, password management becomes fragmented. Employees assume IT handles security automatically, while IT assumes users follow best practices independently. Effective credential security requires coordination across your organization.&lt;/p&gt;



&lt;p&gt;While employees and contractors maintain password security in their day-to-day interactions with systems, managers oversee access governance during onboarding, role changes, and offboarding. IT and security teams will be responsible for implementing technical controls and monitoring compliance. System owners will also ensure standards are enforced within the applications and environments they manage.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Password policy guidelines on minimum password length and entropy requirements&lt;/h2&gt;



&lt;p&gt;Password length is one of the most important factors in determining the strength of a credential. Longer passwords dramatically increase the number of possible combinations an attacker would need to test during a &lt;a href=&quot;https://proton.me/blog/what-is-brute-force-attack&quot;&gt;brute-force attack&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;In fact, &lt;a href=&quot;https://pages.nist.gov/800-63-4/sp800-63b.html&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener nofollow&quot;&gt;NIST recommends&lt;/a&gt; prioritizing password length over strict composition rules. Rather than forcing users to include specific combinations of symbols, numbers, and uppercase letters, modern policies focus on ensuring passwords are sufficiently long and screened against known compromised credentials.&lt;/p&gt;



&lt;p&gt;Accordingly, organizations should also ensure that their systems support longer, more complex passwords wherever technically feasible. Doing so allows security teams to adopt stronger credential standards over time and ensures your organization is prepared to meet evolving security requirements in the future.&lt;/p&gt;



&lt;p&gt;A strong password should meet or exceed these key requirements:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Sufficient length&lt;/strong&gt; to resist brute-force and automated cracking attempts&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Unique to a single account or service&lt;/strong&gt;, preventing credential reuse across systems&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Difficult to guess&lt;/strong&gt;, avoiding personal information, company references, or predictable patterns&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Random or highly unpredictable&lt;/strong&gt;, ideally generated by an approved password manager&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Not previously exposed in known data breaches&lt;/strong&gt; or present in common password lists&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Note that passwords based on names, birthdays, company terms, or simple keyboard patterns can often be cracked quickly using automated password-cracking tools, regardless of length. See our detailed guide on &lt;a href=&quot;https://proton.me/blog/nist-password-guidelines&quot;&gt;strong password requirements&lt;/a&gt; for individuals and businesses alike.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Password randomness and complexity&lt;/h3&gt;



&lt;p&gt;Modern security frameworks recommend generating passwords randomly rather than asking users to invent them manually. Random passwords generated by approved password management tools provide significantly stronger protection because they avoid predictable patterns and can be created at lengths that are impractical to remember.&lt;/p&gt;



&lt;p&gt;For example, you can use the secure password generator and secure credential management practices built into Proton Pass. Together, these tools help generate strong, unpredictable passwords while addressing common challenges around password storage, sharing, and lifecycle management.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;The following minimum requirements can be included in a password policy to discourage weak or reused passwords:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Standard user account passwords must be at least 15 characters long.&lt;/li&gt;



&lt;li&gt;Privileged or administrator account passwords must be at least 16 characters long.&lt;/li&gt;



&lt;li&gt;Shared or service account credentials should be at least 20 characters long where technically feasible.&lt;/li&gt;



&lt;li&gt;Systems should support passwords of at least 64 characters where possible.&lt;/li&gt;



&lt;li&gt;Long &lt;a href=&quot;https://proton.me/blog/what-is-passphrase&quot;&gt;passphrases&lt;/a&gt; may be used where supported and appropriate.&lt;/li&gt;



&lt;li&gt;Passwords must meet the organization’s approved strength and screening requirements before use.&lt;/li&gt;
&lt;/ul&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Use of unique passwords per system or service&lt;/h3&gt;



&lt;p&gt;Password reuse is one of the most common causes of credential-based security incidents. When the same password is used across multiple services, a single breach can expose access to several systems at once.&lt;/p&gt;



&lt;p&gt;Attackers routinely exploit this behavior using a technique known as &lt;a href=&quot;https://proton.me/blog/what-is-credential-stuffing-attack&quot;&gt;credential stuffing&lt;/a&gt;, where stolen usernames and passwords from one service are automatically tested across other platforms.&lt;/p&gt;



&lt;p&gt;For this reason, uniqueness is a non-negotiable requirement. Each account, service, and system should have its own password that is never reused elsewhere.&lt;/p&gt;



&lt;p&gt;Managing dozens or hundreds of unique passwords would be unrealistic without the support of secure password management tools. &lt;a href=&quot;https://proton.me/business/blog/enterprise-password-manager&quot;&gt;Enterprise password management&lt;/a&gt; tools make this requirement practical by generating strong passwords automatically and storing them securely, allowing employees to maintain unique credentials without relying on memory.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Multi-factor authentication (MFA) requirements&lt;/h2&gt;



&lt;p&gt;Multi-factor authentication (MFA) is one of the most effective ways to reduce the risk of unauthorized access, particularly in environments where credentials may be exposed through phishing, &lt;a href=&quot;https://protonvpn.com/blog/what-is-malware&quot;&gt;malware&lt;/a&gt;, or external data breaches.&lt;/p&gt;



&lt;p&gt;MFA works by requiring users to verify their identity through at least two independent factors before gaining access to an account. These include:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Something the user &lt;strong&gt;knows&lt;/strong&gt; (a password)&lt;/li&gt;



&lt;li&gt;Something they &lt;strong&gt;have&lt;/strong&gt; (such as a security key, authentication app, or mobile device)&lt;/li&gt;



&lt;li&gt;Something they &lt;strong&gt;are&lt;/strong&gt; (&lt;a href=&quot;https://proton.me/blog/what-is-biometric-data&quot;&gt;biometric&lt;/a&gt; authentication such as fingerprint or facial recognition).&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Because attackers rarely have access to all of these factors simultaneously, MFA significantly reduces the likelihood that stolen credentials alone can be used to compromise an account.&lt;/p&gt;



&lt;p&gt;Guidelines from organizations such as NIST and CISA &lt;a href=&quot;https://ndisac.org/dibscc/implementation-and-assessment/top-10-high-value-controls/multi-factor-authentication/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener nofollow&quot;&gt;strongly encourage&lt;/a&gt; the use of multi-factor authentication wherever password-based access is used, particularly for systems that contain sensitive data or provide administrative privileges.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Baking MFA into your password policy&lt;/h3&gt;



&lt;p&gt;Your organization can further strengthen MFA adoption by using tools that make two-factor authentication easier to deploy and manage across accounts. For instance, Proton Pass can store and autofill time-based &lt;a href=&quot;https://proton.me/blog/one-time-password&quot;&gt;one-time passwords&lt;/a&gt; (TOTP) alongside saved credentials, simplifying login workflows while keeping authentication data encrypted.&lt;/p&gt;



&lt;p&gt;For organizations that prefer to separate authentication factors, Proton also offers a dedicated &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;Proton Authenticator app&lt;/a&gt;, which generates secure six-digit verification codes and can sync them across devices using end-to-end encryption. The authenticator works offline and is open source, allowing organizations to implement MFA across business accounts while maintaining transparency and strong privacy protections&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Secure password sharing practices&lt;/h2&gt;



&lt;p&gt;Although many security guidelines advise against sharing passwords altogether, real-world business environments still require it. Service accounts, vendor access, and emergency procedures may occasionally require multiple authorized users to access the same credentials.&lt;/p&gt;



&lt;p&gt;When sharing occurs informally, such as through email, chat, or verbal communication, credentials become exposed and difficult to control. Once shared through these channels, there is typically no reliable way to track who has access or revoke it later.&lt;/p&gt;



&lt;p&gt;Password policies should therefore define how and when sharing is permitted. In most organizations, it should only occur through approved credential management tools that provide access controls, auditing, and the ability to revoke access when necessary.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Offboarding and access revocation procedures&lt;/h2&gt;



&lt;p&gt;When employees change roles, leave the organization, or vendor relationships end, access must be reviewed and adjusted promptly. Failure to revoke credentials in a timely manner is one of the most common sources of unauthorized access.&lt;/p&gt;



&lt;p&gt;A strong password policy should integrate with onboarding and offboarding processes, ensuring that access privileges are updated immediately to reflect role changes or departures, including disabling accounts, rotating shared credentials, and revoking unnecessary system access.&lt;/p&gt;



&lt;p&gt;If multiple individuals had access to a shared service account, the password should be rotated as soon as personnel changes occur to prevent former employees or contractors from retaining access after their accounts have been disabled.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Bridge the gap between password policy and human habits&lt;/h2&gt;



&lt;p&gt;Password policies are only effective if people follow them.&lt;/p&gt;



&lt;p&gt;In most organizations, failures don’t happen because policies are missing; they happen because the policies aren’t embedded into everyday workflows. Employees take shortcuts when processes are unclear, tools are inadequate, or expectations are not reinforced.When implemented properly (and in combination with a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;), a strong password policy replaces informal habits with consistent controls, reduces credential-related risk, and makes secure access management part of everyday operations, not merely an afterthought.&lt;/p&gt;
</content:encoded><category>For business</category><author>Kate Menzies</author></item><item><title>Google has a price for you. We found it.</title><link>https://proton.me/blog/what-is-your-data-worth-to-google</link><guid isPermaLink="true">https://proton.me/blog/what-is-your-data-worth-to-google</guid><description>Proton analyzed 54,000 profiles using real ad auction data to determine your worth to Google. How valuable is your data?</description><pubDate>Tue, 28 Apr 2026 09:58:06 GMT</pubDate><content:encoded>
&lt;p&gt;Proton analyzed over 54,000 demographic profiles using 2025 ad auction data to estimate what advertisers pay to reach different types of Americans. The range is much wider than you might expect.&lt;/p&gt;



&lt;p&gt;The average American generates about &lt;strong&gt;$1,605 a year&lt;/strong&gt; in advertising value. A 35- to 44-year-old man in Bozeman, MT, without children, using a desktop and making high-value corporate searches, generates an estimated &lt;strong&gt;$17,929.30&lt;/strong&gt;. An 18- to 24-year-old father in Fort Smith, AR, using an Android phone and making low-value searches, generates &lt;strong&gt;$31.05&lt;/strong&gt;.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s a &lt;strong&gt;577x difference&lt;/strong&gt; between two people using the same free service.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;614&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_614,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA&quot; alt=&quot;Infographic how much representative individuals may be worth in ad revenue&quot; class=&quot;wp-post-123634 wp-image-124622&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;621 KB&quot; data-optsize=&quot;82 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;86.8&quot; data-version=&quot;1777386445&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_614,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_180,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_461,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_922,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1229,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_941,c_scale/f_auto,q_auto/v1777386445/wp-pme/01infographics-1/01infographics-1.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Here&amp;#8217;s a look at how we assembled our latest report: &lt;strong&gt;&lt;a href=&quot;https://drive.proton.me/urls/ZEW51DB8NM#fHbOnuoATY0v&quot;&gt;The Price of Free Google&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How we built this&lt;/h2&gt;



&lt;p&gt;We constructed a matrix of over &lt;strong&gt;54,000 profiles&lt;/strong&gt; varying four variables: &lt;strong&gt;age&lt;/strong&gt;, &lt;strong&gt;gender&lt;/strong&gt;, &lt;strong&gt;location&lt;/strong&gt;, and &lt;strong&gt;device type&lt;/strong&gt;. To each profile, we assigned what we call &lt;strong&gt;&amp;#8220;search archetypes&amp;#8221;&lt;/strong&gt; — realistic search behavior based on life stage. A 30-something without children is statistically more likely to search for investment accounts and B2B software. A 60-something is more likely to query Medicare supplements and retirement planning. We modeled these behavioral patterns across each demographic group rather than applying a flat search assumption.&lt;/p&gt;



&lt;p&gt;We then applied real advertising auction benchmarks to each archetype. The cost-per-click figures reflect live market rates drawn from aggregated, anonymized pricing data across active campaigns — what advertisers actually pay to reach these demographics in Google&amp;#8217;s auction system.&lt;/p&gt;



&lt;p&gt;One caveat: this analysis estimates advertiser demand for access to a given profile. It does not reflect the exact revenue Google receives from any individual user. What the model reveals is the ceiling, the maximum price the market places on your attention.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The key numbers&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;$1,605:&lt;/strong&gt; average annual ad value of a U.S. user&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;$760:&lt;/strong&gt; median annual ad value&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;$17,929.30:&lt;/strong&gt; maximum estimated annual value (35–44-year-old man, Bozeman, MT, desktop, high-value corporate searches)&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;$31.05:&lt;/strong&gt; minimum estimated annual value (18–24-year-old father, Fort Smith, AR, Android, low-value searches)&lt;/li&gt;



&lt;li&gt;The top &lt;strong&gt;10%&lt;/strong&gt; of profiles: heavy desktop users — generate &lt;strong&gt;43%&lt;/strong&gt; of all advertiser value&lt;/li&gt;



&lt;li&gt;Over a decade, the average American represents roughly &lt;strong&gt;$16,050&lt;/strong&gt; in ad value; the most monetized profiles approach &lt;strong&gt;$180,000&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;665&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_665,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA&quot; alt=&quot;Infographic showing the huge disparity in US users&amp;#039; ad value.&quot; class=&quot;wp-post-123634 wp-image-124643&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;1 MB&quot; data-optsize=&quot;150 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.4&quot; data-version=&quot;1777386456&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_665,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_195,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_499,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_997,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1329,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_1018,c_scale/f_auto,q_auto/v1777386456/wp-pme/02infographics-1/02infographics-1.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;The gap between mean ($1,605) and median ($760) shows how a small number of high-value profiles pull the average up. The business model runs on premium outliers.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What exactly determines your value to Google?&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Children&lt;/h3&gt;



&lt;p&gt;Non-parents are worth approximately 17% more on average, with the gap widening during peak earning years. Once a profile is flagged as a parent, it gets shifted from $6-per-click wealth management ads to $2-per-click ads for minivans and preschools. The highest-value profiles in the dataset are not defined by a single trait, but by a combination of signals pointing to spending power and commercial intent — and none of them are parents.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Device&lt;/h3&gt;



&lt;p&gt;A desktop user is worth 4.9x more than the same person on Android. An iPhone user is worth 2.7x more than on Android. Advertisers treat device type as a proxy for income and purchase intent. Desktop signals professional context and transaction readiness. iPhone signals premium consumer spending. Android signals lower expected conversion. The same person carries a different price depending solely on what they&amp;#8217;re searching on.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Age&lt;/h3&gt;



&lt;p&gt;Advertiser value peaks between 35 and 44. By 65, average value drops to $511. Older Americans don&amp;#8217;t disappear from the ecosystem — they&amp;#8217;re reassigned to a narrower set of high-spend categories: Medicare supplemental insurance, pharmaceuticals, and financial products targeting dependency. Lower general value, more aggressive targeting from a smaller slice of advertisers.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The geography of value&lt;/h2&gt;



&lt;p&gt;Ad value is partly set by zip code. Google&amp;#8217;s auction is driven by local service providers — lawyers, real estate agents, financial planners — bidding against each other for local clicks. The more competitive the local market, the higher the floor price for everyone in it.&lt;/p&gt;



&lt;p&gt;The two highest-value individual profiles in the dataset both come from the top of the market list: Bozeman, MT and Edmond, OK. In Bozeman, the influx of remote tech workers and outdoor recreation spending has made it one of the most fiercely contested local ad markets in the country, despite its size. Edmond&amp;#8217;s density of high-CPC professional services makes it the top-ranked market overall.&lt;/p&gt;



&lt;p&gt;At the bottom, cities across the Rust Belt and Appalachia reflect the inverse: lower median incomes and fewer competing local advertisers mean less bidding pressure, and lower prices for local attention.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Top 10 most valuable U.S. ad markets&lt;/h3&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Edmond, OK&lt;/li&gt;



&lt;li&gt;Bozeman, MT&lt;/li&gt;



&lt;li&gt;Naperville, IL&lt;/li&gt;



&lt;li&gt;Santa Fe, NM&lt;/li&gt;



&lt;li&gt;Durham, NC&lt;/li&gt;



&lt;li&gt;Bellevue, WA&lt;/li&gt;



&lt;li&gt;Silver Spring, MD&lt;/li&gt;



&lt;li&gt;Baton Rouge, LA&lt;/li&gt;



&lt;li&gt;Washington, DC&lt;/li&gt;



&lt;li&gt;Colorado Springs, CO&lt;/li&gt;
&lt;/ol&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Top 10 least valuable U.S. ad markets&lt;/h3&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;West Valley City, UT&lt;/li&gt;



&lt;li&gt;Lowell, MA&lt;/li&gt;



&lt;li&gt;Fort Smith, AR&lt;/li&gt;



&lt;li&gt;Gulfport, MS&lt;/li&gt;



&lt;li&gt;Greensboro, NC&lt;/li&gt;



&lt;li&gt;Evansville, IN&lt;/li&gt;



&lt;li&gt;Buffalo, NY&lt;/li&gt;



&lt;li&gt;Toledo, OH&lt;/li&gt;



&lt;li&gt;Wheeling, WV&lt;/li&gt;



&lt;li&gt;Parkersburg, WV&lt;/li&gt;
&lt;/ol&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;544&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_544,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA&quot; alt=&quot;Top 10 most and least valuable US ad markets&quot; class=&quot;wp-post-123634 wp-image-124664&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;605 KB&quot; data-optsize=&quot;109 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;82&quot; data-version=&quot;1777386467&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_544,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_159,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_408,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_815,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1087,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_832,c_scale/f_auto,q_auto/v1777386467/wp-pme/03infographics-1/03infographics-1.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why lock-in has a price&lt;/h2&gt;



&lt;p&gt;Over 10 years, the average American represents roughly &lt;strong&gt;$16,050&lt;/strong&gt; in ad value. The most monetized profiles approach &lt;strong&gt;$180,000&lt;/strong&gt;. With 1.8 billion active Gmail users, the long-term value of keeping users in the ecosystem is enormous, and it scales with every additional year of behavioral data.&lt;/p&gt;



&lt;p&gt;Every cross-product integration, every friction point on data export, every feature built to increase daily engagement is backed by this math.&lt;/p&gt;



&lt;p&gt;Google&amp;#8217;s advertising mechanics have always been deliberately opaque. The data shows why: users are considered money-generating assets, assigned a value and targeted accordingly. Every feature built to increase engagement, every product designed to deepen lock-in, serves that extraction.&lt;/p&gt;



&lt;p&gt;Most people would not knowingly hand a corporation hundreds of thousands of dollars over a lifetime to process their email. But that is what the system is built to collect.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Children and the ad ecosystem&lt;/h2&gt;



&lt;p&gt;The ad ecosystem begins categorizing users when behavioral signals appear. For children growing up online, that process starts early — first school searches, first health queries, first location data feed the profiling system before most kids understand how it works.&lt;/p&gt;



&lt;p&gt;Proton Mail&amp;#8217;s &lt;a href=&quot;https://proton.me/mail/born-private&quot;&gt;&lt;strong&gt;Born Private&lt;/strong&gt;&lt;/a&gt; lets parents opt a child into an end-to-end encrypted environment from the start, keeping their data out of the auction entirely.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;No data, no auction&lt;/h2&gt;



&lt;p&gt;The alternative is clear: use services that have no financial incentive to monitor you.&lt;/p&gt;



&lt;p&gt;Proton Mail and Proton Drive encrypt data before it reaches the server. We cannot scan emails, build a profile, or sell access to your attention. Funded by subscriptions rather than behavioral tracking, Proton has no use for the data that makes you worth $17,000 a year to an advertiser.&lt;/p&gt;



&lt;p&gt;Take away the data, and the auction collapses.&lt;/p&gt;
</content:encoded><category>Opinion</category><author>Edward Komenda</author></item><item><title>Proton 2026 spring and summer roadmaps</title><link>https://proton.me/blog/2026-spring-summer-roadmaps</link><guid isPermaLink="true">https://proton.me/blog/2026-spring-summer-roadmaps</guid><description>Find out updates and new features you can expect for the Proton ecosystem in the Spring and Summer of 2026.</description><pubDate>Fri, 24 Apr 2026 15:46:23 GMT</pubDate><content:encoded>
&lt;p&gt;Privacy-focused alternatives to Big Tech services have never been more important. In the last year, we&amp;#8217;ve significantly built out the Proton ecosystem with more essential tools, including a private &lt;a href=&quot;https://lumo.proton.me/about&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://lumo.proton.me/about&quot;&gt;AI&lt;/a&gt; chat assistant, &lt;a href=&quot;https://proton.me/blog/authenticator-app&quot;&gt;2FA app&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/blog/sheets-proton-drive&quot;&gt;encrypted spreadsheets&lt;/a&gt;, along with new features for our existing products. Our new &lt;a href=&quot;https://proton.me/meet&quot;&gt;private video calling platform&lt;/a&gt; and &lt;a href=&quot;https://proton.me/business/mail/appointment-scheduling&quot;&gt;appointment scheduling tool&lt;/a&gt; are also now available in a new &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Workspace&lt;/a&gt; plan, a privacy-first suite for business users.&lt;/p&gt;



&lt;p&gt;We aim to accelerate this pace of development in 2026, focusing heavily on improvements to our existing services. Our product roadmap for the first half of 2026 includes new features and improvements throughout the Proton ecosystem.&lt;/p&gt;



&lt;p&gt;As always, our development strategy is rooted in the feedback you give us through our &lt;a href=&quot;https://protonmail.uservoice.com/&quot;&gt;user feedback platform&lt;/a&gt;, on &lt;a href=&quot;https://x.com/ProtonPrivacy&quot;&gt;social media&lt;/a&gt;, and directly to our team. Because Proton is 100% community supported, your input is critical, so please continue to share your thoughts with us.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Proton Mail&lt;/h2&gt;



&lt;p&gt;Your mailbox will be getting new updates that make it easier to manage and organize your emails.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Find what you need with category view&lt;/h3&gt;



&lt;p&gt;To help you take control of your inbox, our new category view automatically categorizes your emails to make it easier to find what you&amp;#8217;re looking for. You can choose to categorize by different types: Primary, Social, Promotions, Newsletters, Transactions, and Updates. Categories are enabled by default, but you can turn them on or off in your settings and control notifications, so your inbox stays organized without extra setup.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Manage all your email inboxes from Proton Mail&lt;/h3&gt;



&lt;p&gt;Working from one inbox makes it much easier to handle emails. To support people who have multiple inboxes with other providers and are in the process of switching to Proton, we&amp;#8217;re evolving our Forwarding feature. Soon, you&amp;#8217;ll be able to send and receive emails from your existing Gmail email address directly from your new Proton Mail inbox.&lt;/p&gt;



&lt;p&gt;While you settle into your Proton Mail account and your old Gmail account is still active, you&amp;#8217;ll be able to reply to and send emails from your new Proton Mail inbox without needing to visit your previous provider. Support for more email providers is coming soon.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Content search is coming to mobile&lt;/h3&gt;



&lt;p&gt;Your Proton Mail mobile app is about to become more powerful: Content searching will help you find emails on your mobile app by searching their full body text as well as their subject lines. This enhanced search capability helps you find things faster without changing how search works from a privacy perspective: Your queries stay on your device, keeping your communications, receipts, attachments, and other data completely confidential.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Proton Calendar&lt;/h2&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Your next-gen calendar with new features&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Proton Calendar is being completely rewritten from scratch to deliver a modern, secure experience that includes long-awaited capabilities like offline mode. We&amp;#8217;ll be working on this all year, but we&amp;#8217;re already rolling out immediate improvements like appointment booking pages and the ability to set Proton Calendar as your default calendar on Android.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Proton VPN&lt;/h2&gt;



&lt;p&gt;Between &lt;a href=&quot;https://protonvpn.com/blog/censorship-2025&quot;&gt;online censorship&lt;/a&gt; and concerns around &lt;a href=&quot;https://proton.me/blog/age-verification-operating-system&quot;&gt;age verification&lt;/a&gt; systems collecting personal data, VPNs have never been so important. Protecting your privacy should be easy and accessible to all, which is why we&amp;#8217;re focusing on making Proton VPN faster, more reliable, and more consistent across platforms.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Unlocking the next generation of performance&lt;/h3&gt;



&lt;p&gt;As we mentioned in our &lt;a href=&quot;https://protonvpn.com/blog/fall-winter-recap-2025-2026&quot;&gt;fall and winter recap&lt;/a&gt; in 2025, we&amp;#8217;ve been working on a new client-side &lt;a href=&quot;https://protonvpn.com/blog/what-is-wireguard&quot;&gt;WireGuard®&lt;/a&gt; codebase. This new codebase means a more reliable and censorship-resistant Proton VPN: Your Proton VPN apps will be faster and more reliable, with improved anti-censorship capabilities, and fewer disconnects and dropouts. Beta testing will be available in the coming months for Windows, Android, macOS, iOS, iPadOS, and Linux.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;A sleeker and more private Proton VPN Linux app&lt;/h3&gt;



&lt;p&gt;We&amp;#8217;re planning to make the user experience smoother when you&amp;#8217;re using Proton VPN between devices or platforms. Our team is currently working on visual updates for the Linux GUI app that will give you a more consistent experience between apps on different platforms. The modern, sleek UI you know for other platforms will soon be available for Linux. These improvements are coming alongside long-awaited support for the Stealth protocol as part of the new WireGuard codebase. By helping mask VPN traffic, Stealth will make Proton VPN on Linux more private, harder to detect, and better equipped to work on networks that try to restrict or block VPN use.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Stay connected, your way&lt;/h3&gt;



&lt;p&gt;Last year, we introduced improved connection preferences that allowed you to exclude specific countries and cities from Fastest Country and Random connections permanently for Android. You can set your preferences once, and then your VPN will always pick from locations that actually work for you. Soon, we&amp;#8217;re making the same connection preferences available for Windows.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Proton Pass&lt;/h2&gt;



&lt;p&gt;Keeping your digital identity safe and organized requires a versatile and convenient password manager. That means more storage options and robust autofill capabilities, and new ways to organize and share sensitive information.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Even smarter autofill&lt;/h3&gt;



&lt;p&gt;Last year, autofill in Proton Pass became more useful with quality of life updates including &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1r3u7om/credit_card_autofill_now_available_on_proton_pass/&quot;&gt;credit card autofill&lt;/a&gt;, &lt;a href=&quot;https://proton.me/support/pass-autotype&quot;&gt;auto-type&lt;/a&gt;, and &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1mo9wla/proton_pass_now_supports_http_basic_auth/&quot;&gt;HTTP Basic Auth&lt;/a&gt;. In the first half of 2026, more improvements are coming for autofill.&lt;/p&gt;



&lt;p&gt;iFrame autofill will help your Proton Pass app detect login fields on websites with more complicated layouts, such as online banking or enterprise tools. URL matching, one of our most requested features, will allow Proton Pass to suggest information for the exact website you&amp;#8217;re visiting so you won&amp;#8217;t need to search for it.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Easier organizing with folders&lt;/h3&gt;



&lt;p&gt;We&amp;#8217;ve been working on the cryptography model that protects your credentials in Proton Pass, which is a prerequisite to offering folders within your vaults. Soon, you&amp;#8217;ll be able to sort your items within custom folders, opening up new possibilities for organizing and secure sharing. Your passwords, your notes, your aliases, and more can be organized into categories of your choosing for easier and faster retrieval.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;&lt;strong&gt;Put your SSH keys to work across devices&lt;/strong&gt;&lt;/h3&gt;



&lt;p&gt;Working between multiple devices can be complex when you’re a developer. You can already store your SSH keys in Proton Pass, and soon you’ll be able to use them with an SSH agent to simplify authentication in your Git and SSH workflows. No more manual syncing when you switch devices, plus added security and convenience with biometric unlock for terminal-based authentication.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/blog/pass-roadmap-spring-summer-2026&quot;&gt;Read Proton Pass&amp;#8217;s spring and summer roadmap&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Proton Drive&lt;/h2&gt;



&lt;p&gt;Ease of use and core functionality are our key focuses for Proton Drive this spring and summer. We&amp;#8217;ll be making improvements to Proton Drive that&amp;#8217;ll help you upload and download files and photos faster, and work more easily across multiple Proton apps for increased productivity.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Proton Drive is 70% faster and it&amp;#8217;s just getting started&lt;/h3&gt;



&lt;p&gt;Earlier this year, we gave you a &lt;a href=&quot;https://proton.me/blog/drive-sdk-january-2026&quot;&gt;progress update&lt;/a&gt; about Proton Drive SDK. This project will give you faster and better Proton Drive apps, no matter which platform you&amp;#8217;re using.&lt;/p&gt;



&lt;p&gt;Since January, you may have noticed that uploading and downloading files and photos on Proton Drive has become significantly faster. Thanks to the progress in building our SDK, downloading shared files is 70% faster and uploading to a shared folder is 30% faster whether you have a Proton Account or not.&lt;/p&gt;



&lt;p&gt;In the coming months, we&amp;#8217;ll improve performance further and make features more consistent across all of the Proton Drive apps. We&amp;#8217;ll be able to add document and folder sync on macOS, which we know many people are eager for. We&amp;#8217;re also working on the highly anticipated Linux app.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Proton Sheets and Proton Docs improvements are in the works&lt;/h3&gt;



&lt;p&gt;For Proton Docs and Proton Sheets, our focus is on building out their feature and collaboration set, so you can move more of your existing files and workflows out of Big Tech apps.&lt;/p&gt;



&lt;p&gt;Since we released Sheets in late 2025, we&amp;#8217;ve consistently been making &lt;a href=&quot;https://www.reddit.com/r/ProtonDrive/comments/1q8gu5q/a_happy_new_sheets_update/&quot;&gt;updates&lt;/a&gt; and releasing &lt;a href=&quot;https://www.reddit.com/r/ProtonDrive/comments/1r3t8v8/sheets_update_feb_2026_locales_hidden_sheets/&quot;&gt;new features&lt;/a&gt;. We&amp;#8217;ll continue to focus on making improvements to Sheets that give you more power over how you create and manage your spreadsheets.&lt;/p&gt;



&lt;p&gt;For Proton Docs, we&amp;#8217;ll focus on usability and collaboration features. These updates are essential because they make it easier for you to get work done, whether it&amp;#8217;s a solo project or a group effort. Soon you&amp;#8217;ll be able to create a table of contents for your Proton Docs, and more updates are coming soon. This will also include shared Drive, one secure, shared storage space giving improved collaboration capabilities to families and businesses.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Enhanced ecosystem integration&lt;/h3&gt;



&lt;p&gt;We understand that as you move toward privacy-focused apps, you&amp;#8217;re moving away from an existing, fully integrated Big Tech ecosystem. To make the transition easier for you, we&amp;#8217;re focusing on building our own integrated ecosystem. To make working between different Proton apps more fluid, we&amp;#8217;re investigating how we can build closer integration between our tools for faster workflows. We&amp;#8217;ll be introducing new integration features in the coming months.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/drive-2026-q1-recap&quot;&gt;Read Proton Drive&amp;#8217;s Q1 recap&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Lumo AI&lt;/h2&gt;



&lt;p&gt;AI assistants shouldn&amp;#8217;t advertise products to you, collect your data, or share it with third parties and governments. But those are precisely the risks presented by Big Tech AIs. We developed Lumo last year to provide people and businesses with a private alternative that never trains AI models using your data. Since introducing Lumo, we&amp;#8217;re building out tools that make it smarter and better at helping you or your team save time.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;A new Lumo update, coming soon&lt;/h3&gt;



&lt;p&gt;We&amp;#8217;re planning to release an update for Lumo that will introduce significant new capabilities. Right now, we&amp;#8217;re working on faster speed and performance, and improved mobile apps and additional new features: Watch this space.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Get more done with a desktop Lumo app&lt;/h3&gt;



&lt;p&gt;Lumo is available on any web browser and mobile device, but we&amp;#8217;re developing a desktop app to supercharge your productivity. Lumo for desktop will give you a seamless experience, allowing you to move quickly between your native work tools: email, web, chat apps, and your personal AI assistant. It can be a hub for everything you&amp;#8217;re working on, where you can store all your projects and conversations in one encrypted place, and get more context-aware answers for your queries.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;A private AI assistant for your platform&lt;/h3&gt;



&lt;p&gt;For most organizations, building a private AI tool isn&amp;#8217;t a feasible. So we&amp;#8217;re releasing a Lumo API that will let you add Lumo to your product or software, no matter the size of your platform.&lt;/p&gt;



&lt;p&gt;Lumo API offers what Big Tech AI chatbots don&amp;#8217;t: a private and secure AI assistant that gives you the benefits of AI without the privacy concerns. Instead of compromising on security, you can build Lumo into your workflows for fully private and trustworthy AI support. With the API, you can also make it easier to use Lumo within other platforms, helping you work smarter and faster.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Moving beyond Big Tech with you, our community&lt;/h2&gt;



&lt;p&gt;Everything we&amp;#8217;ve released in the last year, including our new products and every new feature for our core services, has been possible because of your support. As an independent, European alternative to Big Tech, we see building a private ecosystem of apps as a reclamation of our rights to privacy on the internet and a reminder that there&amp;#8217;s a better way to build tech: for people, not profit.&lt;/p&gt;



&lt;p&gt;Your investment in our mission is what helps us make better products. Feedback is invaluable to our teams, so let us know in our&amp;nbsp;&lt;a href=&quot;https://lemmy.world/c/protonprivacy&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;forums&lt;/a&gt;&amp;nbsp;and on &lt;a href=&quot;https://discord.com/invite/proton&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Discord&lt;/a&gt;, &lt;a href=&quot;https://x.com/ProtonPrivacy&quot;&gt;X&lt;/a&gt;, &lt;a href=&quot;https://bsky.app/profile/proton.me&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Bluesky&lt;/a&gt;, &lt;a href=&quot;https://www.facebook.com/Proton&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Facebook&lt;/a&gt;, &lt;a href=&quot;https://www.linkedin.com/company/protonprivacy/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;LinkedIn&lt;/a&gt;, &lt;a href=&quot;https://www.threads.net/@protonprivacy&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Threads&lt;/a&gt;, &lt;a href=&quot;https://t.me/proton_privacy&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Telegram&lt;/a&gt;, &lt;a href=&quot;https://www.reddit.com/r/ProtonMail/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Reddit&lt;/a&gt;, and &lt;a href=&quot;https://protonmail.uservoice.com/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;UserVoice&lt;/a&gt;, or leave us a review in the App Store or Play Store. Thank you for helping us build a more private internet, and we&amp;#8217;ll see you in the fall for our next roadmap updates.&lt;/p&gt;
</content:encoded><category>Lumo AI</category><category>Product updates</category><category>Proton Calendar</category><category>Proton Drive</category><category>Proton Mail</category><category>Proton Pass</category><author>Andy Yen</author></item><item><title>Proton Pass spring and summer 2026 roadmap</title><link>https://proton.me/blog/pass-roadmap-spring-summer-2026</link><guid isPermaLink="true">https://proton.me/blog/pass-roadmap-spring-summer-2026</guid><description>Take a look at the new features we&apos;re planning for Proton Pass in spring and summer, and catch up on our latest releases.</description><pubDate>Fri, 24 Apr 2026 15:39:36 GMT</pubDate><content:encoded>
&lt;p&gt;Proton Pass is an essential tool for managing credentials and protecting your identity, but it has become much more than that. Now you can use it even for specialized purposes, whether that&amp;#8217;s segmenting access to information among teams or managing developer workflows.&lt;/p&gt;



&lt;p&gt;This year, we&amp;#8217;re continuing to expand the ways you can use Proton Pass, for teams, individuals, and families.&lt;/p&gt;



&lt;p&gt;Our latest updates and upcoming features focus on improving usability, adding more control and flexibility to sharing, enhancing the autofill experience, and providing new tools for developers. Proton Pass is becoming more capable and convenient, all without raising prices or compromising on our values of privacy and transparency.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What we launched in fall and winter 2025&lt;/h2&gt;



&lt;p&gt;We know that everyone uses Proton Pass differently. For it to be as useful to as many people as possible, we focused on a few core areas last year.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Improved usability and more convenience&lt;/h3&gt;



&lt;p&gt;When you&amp;#8217;re using Proton Pass, the app should help you get your admin done and make your tasks easier. That&amp;#8217;s why we focused on improving usability and convenience.&lt;/p&gt;



&lt;p&gt;We introduced improvements for autofill, including &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1r3u7om/credit_card_autofill_now_available_on_proton_pass/&quot;&gt;credit card autofill&lt;/a&gt;, &lt;a href=&quot;https://proton.me/support/pass-autotype&quot;&gt;auto-type&lt;/a&gt;, and &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1mo9wla/proton_pass_now_supports_http_basic_auth/&quot;&gt;HTTP Basic Auth&lt;/a&gt; to handle non-standard login dialogs. &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1q5f30k/rightclick_menu_now_available_in_proton_pass/&quot;&gt;Right-click menu&lt;/a&gt; and &lt;a href=&quot;https://proton.me/support/pass-offline-access&quot;&gt;offline mode&lt;/a&gt; also gave you more options to tailor Proton Pass for your specific needs.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Enhanced security for your browser extension&lt;/h3&gt;



&lt;p&gt;As a privacy-first business, our tools have to give our users the best protection possible for their sensitive data. We made Pass Monitor accessible through your Proton Pass browser extension so that it&amp;#8217;s easier to spot and change your weak and reused passwords and get notifications if you&amp;#8217;re affected by a data breach.&lt;/p&gt;



&lt;p&gt;Additional privacy updates included the ability to choose a set period of time after which copied passwords are cleared from your &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1pczvtw/proton_pass_133_here_are_some_new_features/&quot;&gt;clipboard&lt;/a&gt;, and being able to create and use passkeys in &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/comments/1noftlc/proton_pass_now_supports_passkeys_in_safari/&quot;&gt;Safari&lt;/a&gt; with the Proton Pass extension.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Secure secret management for developers&lt;/h3&gt;



&lt;p&gt;To make it a more capable solution for developers who are managing software development, we introduced &lt;a href=&quot;https://proton.me/blog/proton-pass-cli&quot;&gt;Proton Pass CLI&lt;/a&gt; which enables engineers to access secrets via the terminal.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://protonpass.github.io/pass-cli/get-started/configuration/&quot;&gt;Personal Access Tokens (PATs)&lt;/a&gt; are now supported in the Proton Pass CLI. PATs provide precise control over the secrets that scripts or AI agents have access to within the CLI. You can manage access more easily by granting scoped access to specific vaults to third-party applications or scripts, making Proton Pass a natural fit for managing secrets across your automation and tooling.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Greater access control for teams&lt;/h3&gt;



&lt;p&gt;Organizations rely on Proton Pass for a lot more than password management, including access management and enforcing security policies for tens, hundreds, or even thousands of users. We focused on making access management easier and faster for admins, while also providing more granular control over security policies.&lt;/p&gt;



&lt;p&gt;Groups now make it easier to organize team members or projects, defining access controls at scale. You can share access to vaults and items at the group level rather than the individual level for faster and easier sharing without compromising on security. This simplifies sharing and access management for admins, who can also choose group owners within their organization. Admins can also create policies to ensure that email aliases and secure links are used responsibly and in line with your business&amp;#8217;s security policies.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What’s coming this spring and summer&lt;/h2&gt;



&lt;p&gt;Our focus for the first half of 2026 is to make continual improvements to our core offerings, improving the flexibility and convenience that Proton Pass can offer you. We&amp;#8217;re also committed to introducing new features:&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Organize your data your way with folders&lt;/h3&gt;



&lt;p&gt;Folders will be a significant building block for Proton Pass that will go beyond just helping you organize your items. Introducing folders will require some rethinking of our cryptography model, which we&amp;#8217;re currently working on. Eventually, you&amp;#8217;ll also be able to share folders and subfolders just like your vaults and individual items, giving you another flexible way to share access.&lt;/p&gt;



&lt;p&gt;Folders will be available in the coming months. As well as creating vaults, you&amp;#8217;ll be able to create dedicated folders and subfolders to organize crucial information for quick retrieval: you can organize by project, by team, by year, or whatever else you need.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Simplify SSH workflows with the SSH agent&lt;/h3&gt;



&lt;p&gt;The default SSH agent built into your OS isn’t built for convenience and flexibility, so &lt;strong&gt;we’re launching an SSH agent that will let you work with the SSH keys stored in your vaults while keeping them automatically in sync wherever you work.&lt;/strong&gt; You can already keep your SSH keys in Proton Pass, and with the SSH agent, you&amp;#8217;ll be able to use them for your Git and SSH workflows, simplifying authentication and making it easier to work across several computers.&lt;/p&gt;



&lt;p&gt;Keeping your SSH keys in Proton Pass lets you use them on multiple devices without needing to manually sync them, saving time and effort as you work. Git workflows are much easier when you can simply use biometric unlock for committing or signing, adding an extra layer of security and convenience to terminal-based authentication.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Do even more with your Proton Pass browser extension&lt;/h3&gt;



&lt;p&gt;We&amp;#8217;re going to continue focusing on making Proton Pass a powerful assistant for you on your web browser.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;To speed up your browsing, biometric unlock is coming to the Proton Pass extension&lt;/strong&gt;&lt;strong&gt;.&lt;/strong&gt; It&amp;#8217;ll be available for macOS and Chromium first, with other browsers and OS released gradually. You&amp;#8217;ll be able to use your fingerprint or face ID to unlock your account instead of using your master password or PIN code for added convenience. Your account will remain just as secure while saving you time logging in.&lt;/p&gt;



&lt;p&gt;We&amp;#8217;re also making improvements to autofill in your Proton Pass browser extension. &lt;strong&gt;iFrame autofill&lt;/strong&gt; will detect autofill opportunities in websites and apps with more complicated layouts, like banking apps. &lt;strong&gt;URL&lt;/strong&gt;&lt;strong&gt; matching&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;will allow you to configure autofill exactly the way you want, allowing Proton Pass to suggest information for the exact website you&amp;#8217;re visiting, a highly requested update.&lt;/p&gt;



&lt;p&gt;Because you always need access to your vaults, &lt;strong&gt;offline mode for browser extensions&lt;/strong&gt; is also coming soon. Offline mode is already available for your web, desktop, and mobile Proton Pass apps, so this will keep your vaults accessible when you&amp;#8217;re not connected to the internet, no matter which app you&amp;#8217;re using. If you&amp;#8217;re traveling or if you&amp;#8217;ve simply lost connection, you won&amp;#8217;t be cut off from the valuable information you need.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Much more than a password manager&lt;/h2&gt;



&lt;p&gt;Everything we&amp;#8217;re developing for Proton Pass makes it easier and more convenient for you to protect your online accounts and organize your digital life. Expanding the core features and capabilities available helps us make Proton Pass a valuable tool for anyone and everyone, at home or at work.&lt;/p&gt;



&lt;p&gt;We couldn&amp;#8217;t make these updates without the valuable guidance of our community, and we want to hear from you: What would you like to see released for Proton Pass? Tell us what works for you and what you need on &lt;a href=&quot;https://www.reddit.com/r/ProtonPass/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Reddit&lt;/a&gt; or &lt;a href=&quot;https://protonmail.uservoice.com/forums/953584-proton-pass-authenticator&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;UserVoice&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Together, we’ll make an internet where your identity is secure and your privacy is protected by default.&lt;/p&gt;
</content:encoded><category>Product updates</category><category>Proton Pass</category><author>Son Nguyen Kim</author></item><item><title>Meta is using employee behavioral data for AI training</title><link>https://proton.me/business/blog/meta-ai-training-employee-data</link><guid isPermaLink="true">https://proton.me/business/blog/meta-ai-training-employee-data</guid><description>Meta is tracking employees and using behavioral data to train AI while planning layoffs. Are workers helping build their own replacements?</description><pubDate>Thu, 23 Apr 2026 16:55:20 GMT</pubDate><content:encoded>
&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/meta-ai-facebook-camera-roll&quot;&gt;Meta&lt;/a&gt; is reportedly preparing to capture US-based employee behavior — including mouse movements, clicks, keystrokes, and screen snapshots — to help train its AI systems to navigate software the way humans do.&lt;/p&gt;



&lt;p&gt;Dubbed the Model Capability Initiative (MCI), according to &lt;a href=&quot;https://www.reuters.com/sustainability/boards-policy-regulation/meta-start-capturing-employee-mouse-movements-keystrokes-ai-training-data-2026-04-21/&quot;&gt;Reuters&lt;/a&gt;, the program is part of Meta’s broader push to build AI agents that can autonomously perform computer-based tasks, from navigating dropdown menus to using keyboard shortcuts.&lt;/p&gt;



&lt;p&gt;Meta said it will protect &lt;a href=&quot;https://proton.me/blog/sensitive-information&quot;&gt;sensitive information&lt;/a&gt; but didn’t clarify what data qualifies as sensitive material, how that protection would work, or whether it would extend to third-party information that employees may handle on the job.&lt;/p&gt;



&lt;p&gt;The move comes as Meta prepares to cut 10% of its workforce starting May 20, with more layoffs reportedly expected later this year.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The new AI gold rush is behavioral data&lt;/h2&gt;



&lt;p&gt;AI companies have already burned through huge amounts of public internet data, and Meta’s MCI is an example of these companies going deeper in their pursuit of the latest AI training fodder: &lt;a href=&quot;https://arxiv.org/html/2505.03315v1&quot;&gt;behavioral data&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Behavioral data refers to the digital traces people leave behind as they move through systems: the clicks, keystrokes, pauses, corrections, shortcuts, and navigation patterns that show how a task actually gets done. It is valuable to companies because it captures not just the output of work, but the process behind it — something that AI systems currently struggle to process and replicate.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/blog/disable-windows-recall&quot;&gt;Microsoft Recall&lt;/a&gt; follows the same logic by taking snapshots of what a person does on their computer, with Microsoft presenting it as a form of productivity tracking software, not an AI training pipeline. But it still shows how comfortable &lt;a href=&quot;https://proton.me/blog/big-tech-government-requests-parenting&quot;&gt;Big Tech&lt;/a&gt; has become with turning highly detailed behavioral traces into something systems can record and learn from. In workplace settings, features framed as optional can become hard to refuse when employers control company policy and shape the power dynamics around consent.&lt;/p&gt;



&lt;p&gt;In Meta&amp;#8217;s case, MCI seems like another building block in a broader push to capture more intimate and revealing forms of &lt;a href=&quot;https://proton.me/blog/personal-data&quot;&gt;personal data&lt;/a&gt;. The company is already using all &lt;a href=&quot;https://proton.me/blog/meta-ai-ads&quot;&gt;Meta AI interactions&lt;/a&gt; across &lt;a href=&quot;https://proton.me/blog/turn-off-meta-ai-facebook&quot;&gt;Facebook&lt;/a&gt;, &lt;a href=&quot;https://proton.me/blog/instagram-anonymous-story-viewer&quot;&gt;Instagram&lt;/a&gt;, &lt;a href=&quot;https://proton.me/blog/is-whatsapp-safe&quot;&gt;WhatsApp&lt;/a&gt;, and the rest of its ecosystem for product improvement, AI training, and &lt;a href=&quot;https://proton.me/blog/meta-scam-ads&quot;&gt;targeted ads&lt;/a&gt; in places that don&amp;#8217;t have strong privacy protections like the &lt;a href=&quot;https://proton.me/business/gdpr&quot;&gt;GDPR&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Tracking employees can make work worse&lt;/h2&gt;



&lt;p&gt;Another problem with Meta tracking employees for AI training is that it can &lt;a href=&quot;https://www.nature.com/articles/s44271-024-00102-8&quot;&gt;make work worse&lt;/a&gt;. Like click tracking software, it treats keystrokes and mouse movements as meaningful signals. But even with more advanced AI layered on top, those are still poor stand-ins for actual performance, particularly in knowledge work where critical thinking, planning, connecting ideas across functions, and solving problems often look invisible from the outside.&lt;/p&gt;



&lt;p&gt;Once workers know those signals are being captured — especially if they suspect they could one day be replaced by the AI agents they are helping refine — it creates a perverse incentive to optimize for looking busy, or even to deliberately distort their behavior instead of doing meaningful work. Surveillance and mistrust become the workplace norm.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A privacy-first infrastructure matters&lt;/h2&gt;



&lt;p&gt;Platforms built around extraction make every interaction start to look like data waiting to be monetized, optimized, or fed back into another system. When AI is involved, that system may be used to study you, imitate you, and eventually displace you.&lt;/p&gt;



&lt;p&gt;Privacy-first services matter because the less data a company can access, the less room it has for this kind of mission creep. Strong protections like &lt;a href=&quot;https://proton.me/learn/encryption/types-of-encryption/what-is-end-to-end&quot;&gt;end-to-end encryption&lt;/a&gt; help limit what a platform can see in the first place, while &lt;a href=&quot;https://proton.me/community/open-source&quot;&gt;open-source code&lt;/a&gt; adds transparency by allowing independent scrutiny of how those systems actually work. Together, they help protect the trust of both employees and customers.&lt;/p&gt;
</content:encoded><category>For business</category><category>Privacy news</category><author>Elena Constantinescu</author></item><item><title>Simplify team password sharing with groups for Proton Pass</title><link>https://proton.me/blog/pass-groups</link><guid isPermaLink="true">https://proton.me/blog/pass-groups</guid><description>You can now organize your team members and simplify team password sharing with groups in Proton Pass. Find out how to create a group</description><pubDate>Thu, 23 Apr 2026 14:56:57 GMT</pubDate><content:encoded>
&lt;p&gt;Sharing in Proton Pass is flexible by design. Whether you need to share a single item or an entire vault, or grant temporary or permanent access, there&amp;#8217;s an option to do so securely from your Proton Pass account. &lt;strong&gt;Today we&amp;#8217;re introducing groups in business plans&lt;/strong&gt; to give you more control over your team&amp;#8217;s sharing and improve collaboration.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Admins for most multi-user Proton Pass plans can create groups that organize team members by category, such as by team, department, or project.&lt;/strong&gt; Once you&amp;#8217;ve created a group, you can control access to credentials by assigning those groups to specific vaults and items. Instead of sharing items or vaults individually, access is managed at the group level, making it easier to scale up or down as you need.&lt;/p&gt;



&lt;p&gt;Groups are available in Pass Professional and the VPN and Pass Professional bundle.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/support/proton-pass-groups&quot;&gt;Create your first group.&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What you can do with groups&lt;/h2&gt;



&lt;p&gt;Groups make it easier to manage access and share items or vaults at scale. Instead of providing or revoking access one user at a time, you can create groups, add members, and assign permissions to all members at once.&lt;/p&gt;



&lt;p&gt;As an admin, you can:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Create structure within your business&lt;/strong&gt; by organizing users into groups based on teams, departments, projects, or roles.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Save time&lt;/strong&gt; by assigning access to vaults and items at the group level instead of sharing individually.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Reduce manual work&lt;/strong&gt; by managing access centrally through group membership.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Streamline onboarding and offboarding&lt;/strong&gt; by adding or removing users from groups.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Within your organization, team members can:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Create items and share them directly with groups for easier collaboration.&lt;/li&gt;



&lt;li&gt;Belong to multiple groups, inheriting access (to items or vaults) from all assigned groups and never wasting time chasing access to the tools and systems they need to get work done.&lt;/li&gt;



&lt;li&gt;Always have access to the latest passwords and data shared with the groups they belong to, no matter which device or platform they&amp;#8217;re using.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Put an end to unnecessary access&lt;/h2&gt;



&lt;p&gt;Protecting sensitive data within your business is easier when you team members have access to what they need and nothing more.&lt;/p&gt;



&lt;p&gt;This is known as the &amp;#8220;principle of least privilege,&amp;#8221; and it&amp;#8217;s one of the core principles of &lt;a href=&quot;https://proton.me/business/blog/zero-trust-security&quot;&gt;zero trust security&lt;/a&gt;. Zero trust is a cybersecurity framework that means a system never assumes anyone&amp;#8217;s identity or access rights, and will verify every time access is attempted.&lt;/p&gt;



&lt;p&gt;When it comes to sensitive data such as financial records or customer details, access must be limited strictly to those who need access. Otherwise, &lt;a href=&quot;https://proton.me/business/blog/insider-threat&quot;&gt;insider threats&lt;/a&gt; proliferate — &lt;a href=&quot;https://www.ibm.com/think/insights/83-percent-organizations-reported-insider-threats-2024&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;83% of businesses&lt;/a&gt; reported accidental or malicious data breaches caused by their own employees in 2024. If you&amp;#8217;re not taking care to ensure that access is limited strictly to those who need it, and regularly removing legacy accounts for ex-employees, your valuable business data is at risk.&lt;/p&gt;



&lt;p&gt;Groups make it simple to define who can access what within your network. Working with the principle of least privilege is difficult and prone to errors when you&amp;#8217;re managing access at the user level. But working at the group level gives you a much clearer picture of access rights within your organization, making it easier and quicker to enforce properly structured access rights.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Simplify onboarding and offboarding&lt;/h2&gt;



&lt;p&gt;Introducing a new team member can be time-consuming and error prone, from assigning equipment to ensuring they have access to the tools and systems they&amp;#8217;ll need for their role. A team member can get to work faster when the appropriate access is designated from day one. Adding them to a group is the most efficient and reliable way to set up their role and permissions within your network.&lt;/p&gt;



&lt;p&gt;Groups also make offboarding easier and safer. Old accounts for former employees and contractors increase your attack surface and risk leaving &amp;#8220;ghost access&amp;#8221; to accounts they&amp;#8217;re no longer authorized to see.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Easier team password sharing for faster work&lt;/h2&gt;



&lt;p&gt;Sharing credentials, WiFi passwords, payment details, and notes is a daily necessity in the modern workplace.&lt;/p&gt;



&lt;p&gt;Vaults in Proton Pass are the ideal location to centralize the information and make it available to your team across multiple devices. But without proper access controls, sensitive information can still leak.&lt;/p&gt;



&lt;p&gt;Groups reduce this risk and also ensure that members always have access to the latest version of credentials; if a password is changed by one user, it&amp;#8217;s updated in real time for all other users.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/pass-secure-link-sharing&quot;&gt;Secure links&lt;/a&gt; are still available for one-off and temporary sharing, but group access permissions will prevent unauthorized sharing, reducing errors and protecting your network.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;See Proton Pass in action&lt;/h2&gt;



&lt;p&gt;Proton Pass was designed to help everyone take control of their passwords, but businesses have unique collaboration needs and heightened risks. Small businesses are especially targeted by hackers, with &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;one in four experiencing a cyberattack&lt;/a&gt; in the last year.&lt;/p&gt;



&lt;p&gt;Swiss IT management firm GILAI and the French managed office provider Morning have enabled security and collaboration by switching to Proton Pass.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/pass/customer/gilai&quot;&gt;See how Proton Pass met GILAI&amp;#8217;s rigorous security standards &lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/pass/customer/morning&quot;&gt;Read about how Proton Pass powers Morning&amp;#8217;s business model &lt;/a&gt;&lt;/p&gt;



&lt;p&gt;Groups is the next step in making Proton Pass for Business the ideal tool for password management, access control, and collaboration. If you&amp;#8217;re interested in finding out more about Proton Pass for Business, &lt;a href=&quot;https://proton.me/business/contact?pd=pass&quot;&gt;contact our sales team&lt;/a&gt; for more information.&lt;/p&gt;
</content:encoded><category>Product updates</category><category>Proton Pass</category><author>Son Nguyen Kim</author></item><item><title>We must keep age verification from killing anonymity online</title><link>https://proton.me/blog/keep-age-verification-from-killing-anonymity-online</link><guid isPermaLink="true">https://proton.me/blog/keep-age-verification-from-killing-anonymity-online</guid><description>Powerful forces are exploiting parents’ fears to strengthen their toxic business models. Here’s how we stop them.</description><pubDate>Thu, 23 Apr 2026 11:57:59 GMT</pubDate><content:encoded>
&lt;p&gt;Online threats to children are real, but the headlong pursuit of age verification that we&amp;#8217;re seeing around the world is unacceptable in its approach and far too broad in scope — and we simply can’t afford to get this wrong.&lt;/p&gt;



&lt;p&gt;To be clear, parents’ concerns are valid and sincere. Few people would argue that kids should have unfettered access to adult material, to self-harm how-tos, to social media platforms that manipulate them and expose them to abuse.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;But it’s the very depth of those worries that is being cynically exploited. &lt;a href=&quot;https://proton.me/blog/age-verification-explained&quot;&gt;Age verification&lt;/a&gt; as is currently being proposed in country after country would mean the death of anonymity online.&lt;/p&gt;



&lt;p&gt;And we know exactly who stands to gain: The same tech giants who built the privacy nightmare that the internet is today.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;When data gets collected, it will get out&lt;/h3&gt;



&lt;p&gt;The business of age-gating the internet has come a long way since the days of “Check this box if you’re over 18.” Now people are sending in passports and videos and even fingerprints. And what’s happened? The same thing that’s always happened: That data gets leaked.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/discord-age-verfication-breach&quot;&gt;Look at Discord&lt;/a&gt;. Last October, the chat platform beloved by gamers acknowledged that hackers had accessed the records, including photos of government IDs, of more than 70,000 users being held by a third-party vendor it had hired to enforce age verification.&amp;nbsp;&amp;nbsp;&lt;/p&gt;



&lt;p&gt;And this will keep happening. The more sensitive data you stockpile in privately held databases, the bigger a target it becomes for criminals. If a social platform or dating app without expertise is ordered to collect it, they’re easy prey. Thousands of companies may manage to do it right, but some of them will surely fail. (Remember &lt;a href=&quot;https://protonvpn.com/blog/doxing&quot;&gt;Ashley Madison&lt;/a&gt;?)&lt;/p&gt;



&lt;p&gt;Even if you outsource age verification to a “specialist” third party, that’s no silver bullet, as Discord discovered. When age checks are a company’s sole business, the company may develop greater skill in shielding the data from hackers, but it also becomes an even more appealing target. And because it lacks other income streams, it needs to offset its costs somehow — and the temptation to monetize that data, to sell it, becomes hard to resist.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;There are no heroes here&lt;/h3&gt;



&lt;p&gt;Governments cannot be trusted to come to the rescue. The European Union just unveiled a mobile app to check people&amp;#8217;s ages, and it took hackers a matter of hours — &lt;a href=&quot;https://proton.me/blog/eu-age-verification-app-hacked&quot;&gt;one claimed only two minutes&lt;/a&gt; — to discover fatal flaws.&lt;/p&gt;



&lt;p&gt;Calls are also growing for Big Tech to step in. Make Apple and Google and Microsoft do it, people say. With their control over operating systems, they can require IDs and block access to kids at the device level, right? And just a few weeks ago, &lt;a href=&quot;https://proton.me/blog/apple-uk-age-verification-iphone&quot;&gt;Apple announced a plan in the UK&lt;/a&gt; to do exactly that.&lt;/p&gt;



&lt;p&gt;But these companies have built their empires on collecting data and on &lt;a href=&quot;https://proton.me/blog/apple-lawsuit&quot;&gt;preferencing their own products&lt;/a&gt; to disadvantage competitors. They’ve &lt;a href=&quot;https://proton.me/tech-fines-tracker&quot;&gt;paid billions in fines&lt;/a&gt; for doing it. If they’re given even more power to decide who can download what, and track who is doing what, does anyone seriously believe they won’t abuse that power?&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Leads to ID verification for adults&lt;/h3&gt;



&lt;p&gt;Online privacy has always been tenuous. But with age verification, we’re on the cusp of, once and for all, requiring ID for every single person going online, for any reason, legal or not, adult or not. And that should terrify us all.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;While no business can simply disregard the laws in its jurisdiction, Big Tech companies have demonstrated that they will collude with governments on an industrial scale. They cooperate with &lt;a href=&quot;https://proton.me/blog/big-tech-data-requests-surge&quot;&gt;hundreds of thousands of data requests&lt;/a&gt; from governments every year, many never seen by a judge, and that number is only growing.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;What’s more, they are known to &lt;a href=&quot;https://www.bbc.com/news/articles/c708y1egzlko&quot;&gt;cave to state pressure and ban apps&lt;/a&gt;. If every Apple account in the UK is tied to a government-issued ID, how long will it be before every other country expects the same? Once you’re using these collected IDs to block access based on age, it’s a short leap to blocking access based on nationality or other factors as well.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;How long before China demands the names of every person who downloaded a certain app? How long before lists of “undesirables” are sent to the tech giants, with orders to be blocked from the internet entirely? Is this really a road we’re prepared to go down?&lt;/p&gt;



&lt;p&gt;When online anonymity is stripped away, whistle-blowers keep their mouths shut. People in desperate need of help don&amp;#8217;t ask for it. And democracy itself suffers, as those would seek to hold their government accountable don&amp;#8217;t always want to do so with their real name attached.&amp;nbsp;&amp;nbsp;&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Power needs to shift, but not to Big Tech&lt;/h3&gt;



&lt;p&gt;Technology companies should never become gatekeepers for every adult on the internet, but they must still do their part. They must direct their design firepower toward improving parental-control features at both the app and device levels. These should be obvious and easy to use, not an afterthought scattered across hidden menus. This puts the power and authority to protect children firmly where it belongs: with parents.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;We cannot accept a world where every adult is expected to hand over ID as the price of going online. The scope of places where age verification is required must be strictly confined to areas like pornography and social media, where the potential for harm is greatest.&lt;/p&gt;



&lt;p&gt;And if as a society we conclude that a narrowly drawn age-verification system is both necessary and inevitable, it must be done right. Checks must be conducted entirely client-side, on the user’s device. They should rely on facial scans, not uploaded IDs, that are instantly discarded once processed. The answer to the binary question of whether the user is “of age” must be fully anonymized, divorced from any identifying information, and transmitted entirely under end-to-end encryption. And the code that underpins the system must be open-source, allowing the public to be certain that these expectations are being met.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Never forget what the real threats are&lt;/h3&gt;



&lt;p&gt;These requirements are non-negotiable, because the only way to guarantee that age-verification data will not be stolen, shared, or abused is to not collect it at all. We certainly cannot entrust it to the same giants that have a proven track record of exploiting our private information. Or to faceless new companies with incentives to misbehave. Or to governments that, let’s face it, have their own history of &lt;a href=&quot;https://www.wired.com/story/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever/&quot;&gt;failing to protect user information&lt;/a&gt; or &lt;a href=&quot;https://bigdata.fairness.io/database-abuse/#:~:text=However%2C%20the%20availability%20of%20personal%20data%20can,(signals%20intelligence)%20system%20to%20inappropriately%20track%20individuals&quot;&gt;abusing it themselves&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;And bit by bit, we need to tackle the real root cause of so much of the harm we see online: The advertising- and attention-based business model that gives almost every company an incentive to spy, to track, and to keep everyone, and especially kids, &lt;a href=&quot;https://www.nytimes.com/2026/03/25/technology/social-media-trial-verdict.html&quot;&gt;hooked on their products&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Meta, the parent of Facebook, has been &lt;a href=&quot;https://tboteproject.com/&quot;&gt;strongly lobbying&lt;/a&gt; in favor of age verification for years, but not out of concern for children. They want to lift any responsibility from their shoulders, so they can keep targeting adults with their toxic products. Age verification should not distract us from the real danger to children and adults alike.&lt;/p&gt;



&lt;p&gt;Given all the online threats out there, the desire to “do something” to protect kids is understandable, even laudable. But with age verification, we’re at risk of locking in and reinforcing all the worst aspects of the internet. And the end of the road for all these good intentions is a hellish place indeed.&lt;/p&gt;
</content:encoded><category>Opinion</category><category>Proton news</category><author>Andy Yen</author></item><item><title>Survey shows Nordic countries are fed up with US tech</title><link>https://proton.me/blog/nordic-alternative-us-tech-survey</link><guid isPermaLink="true">https://proton.me/blog/nordic-alternative-us-tech-survey</guid><description>We asked 4,000 people in Nordic countries what they think of US tech. Turns out they&apos;re not fans.</description><pubDate>Thu, 23 Apr 2026 11:55:17 GMT</pubDate><content:encoded>
&lt;p&gt;Citizens of Denmark, Sweden, Norway, and Finland are becoming increasingly critical of US tech companies and worried about their outsize power in Europe. Much like their neighbors to the south, consumers in the Nordic countries believe Europe has become overly dependent on Big Tech companies answerable to Washington and think it&amp;#8217;s time to find alternatives.&lt;/p&gt;



&lt;p&gt;A new Proton survey of 4,000 people living in Nordic countries found that &lt;strong&gt;around 83% believe Europe is reliant on US apps and services&lt;/strong&gt;, and &lt;strong&gt;85% find this reliance concerning&lt;/strong&gt;.&lt;/p&gt;



&lt;p&gt;In our earlier &lt;a href=&quot;https://proton.me/blog/european-alternative-us-tech-survey&quot;&gt;study of 3,000 people&lt;/a&gt; across the UK, France, and Germany, we discovered that 73% believed their societies were far too dependent on US tech companies. Recently, the &lt;a href=&quot;https://techcrunch.com/2026/04/10/france-to-ditch-windows-for-linux-to-reduce-reliance-on-us-tech/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;French government said it was dropping Windows&lt;/a&gt; and other US services, and &lt;a href=&quot;https://www.politico.eu/article/germany-france-us-tech-dominance/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Germany&lt;/a&gt; and &lt;a href=&quot;https://apnews.com/article/europe-digital-sovereignty-big-tech-9f5388b68a0648514cebc8d92f682060&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;other countries&lt;/a&gt; are also seeking European digital sovereignty. The de-Americanization trend is clear.&lt;/p&gt;



&lt;p&gt;But what about the Nordic countries? Perhaps unsurprisingly, they were just as worried, if not more so.&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Nordic citizens are more likely to want to switch to European tech services than people in other European countries are.&lt;/strong&gt;&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;64% of those who follow the news say that tensions between the US and Europe have changed how they feel about using US tech apps and services&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Data sovereignty and pro-European sentiment are the strongest motivators for people in Nordic countries when choosing European tech.&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Geopolitical tensions between the United States and the Nordic countries have skyrocketed since January. President Trump threatened to invade &lt;a href=&quot;https://www.politico.com/news/2026/01/06/trump-says-his-greenland-fixation-is-about-national-security-europeans-are-skeptical-00712149&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Greenland&lt;/a&gt;, a Danish territory. Greenland&amp;#8217;s Prime Minster Jens Frederik-Nielsen has continually pushed back on US aggression and &lt;a href=&quot;https://www.reuters.com/world/europe/greenland-prime-minister-rebuffs-trump-remarks-nato-tensions-rise-2026-04-09/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;called on NATO&lt;/a&gt; to defend it against invasion. Subsequently, Trump &lt;a href=&quot;https://www.reuters.com/business/aerospace-defense/trump-threatens-nato-exit-scaling-up-tensions-with-allies-2026-04-01/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;threatened to end the US military alliance&lt;/a&gt; with Europe.&lt;/p&gt;



&lt;p&gt;Amid this turbulence, consumer attitudes toward US tech are changing. Our survey investigates how the current political landscape is shaping the attitudes of citizens in Nordic countries.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Resistance to US tech is strongest in Nordic countries&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;85% of Danish respondents believe Europe is very or extremely dependent on US technology companies, with 87% expressing concern about this dependence&lt;/li&gt;



&lt;li&gt;78% of Norwegian respondents believe Europe is very or extremely dependent on US technology companies, with 84% expressing concern about this dependence&lt;/li&gt;



&lt;li&gt;82% of Swedish respondents believe Europe is very or extremely dependent on US technology companies, with 81% expressing concern about this dependence&lt;/li&gt;



&lt;li&gt;86% of Finnish respondents believe Europe is very or extremely dependent on US technology companies, with 89% expressing concern about this dependence&lt;/li&gt;
&lt;/ul&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;565&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_565,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120834&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;374 KB&quot; data-optsize=&quot;55 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.4&quot; data-version=&quot;1776759860&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_565,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_166,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_424,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_847,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1130,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_865,c_scale/f_auto,q_auto/v1776759860/wp-pme/1_12083445191/1_12083445191.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;People in Nordic countries are even more concerned about over-reliance on US tech than their European counterparts. This is unsurprising, given the contentious standoff between Denmark and the United States over Greenland.&lt;/p&gt;



&lt;p&gt;It has become obvious to most consumers that anything you do using US tech will never be private. Cloud storage, email, and messaging apps operating out of the US capture activity that can potentially be shared with the NSA, even when users are based in another country. This is thanks to agreements such as &lt;a href=&quot;https://protonvpn.com/blog/5-eyes-global-surveillance&quot;&gt;Five Eyes, Nine Eyes, and Fourteen Eyes&lt;/a&gt;, which allow intelligence gathering across borders.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/us-warrantless-surveillance&quot;&gt;Section 702&lt;/a&gt; of the Foreign Intelligence Surveillance Act (FISA) has also allowed the US to surveil foreigners overseas without suspecting terrorism or requiring approval from a court since 2008. Europeans&amp;#8217; communications including emails, phone calls, text messages and more can be demanded from American companies from intelligence agencies.&lt;/p&gt;



&lt;p&gt;People in Nordic countries and their European neighbors don&amp;#8217;t want to be subject to unwarranted surveillance, and they&amp;#8217;re getting less comfortable with sending money abroad to companies that constantly flout data regulations.&lt;/p&gt;



&lt;p&gt;The Nordic countries also have a healthy software industry of their own, with many newer organizations pursuing alternative strategies to their US counterpart. Rather than focusing on personal data collection or social media, these new software companies are focusing on solutions for specific, less digitized industries such as construction, regulation enforcement, and real estate. As this industry grows and resistance to US tech increases, Nordic countries are clearly more interested in finding or even building alternatives.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Nordic sentiment is strongly influenced by the news&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;67% of Danish respondents of those who follow the news state that growing tensions between the US and Europe motivate them to prefer European services.&lt;/li&gt;



&lt;li&gt;65% of Norwegian respondents of those who follow the news state that growing tensions between the US and Europe motivate them to prefer European services.&lt;/li&gt;



&lt;li&gt;65% of Swedish respondents of those who follow the news state that growing tensions between the US and Europe motivate them to prefer European services.&lt;/li&gt;



&lt;li&gt;60% of Finnish respondents of those who follow the news state that growing tensions between the US and Europe motivate them to prefer European services.&lt;/li&gt;
&lt;/ul&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120856&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;352 KB&quot; data-optsize=&quot;50 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.9&quot; data-version=&quot;1776760159&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760159/wp-pme/danes/danes.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120877&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;355 KB&quot; data-optsize=&quot;44 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.5&quot; data-version=&quot;1776760149&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760149/wp-pme/nords/nords.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120898&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;352 KB&quot; data-optsize=&quot;20 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;94.4&quot; data-version=&quot;1776760141&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760141/wp-pme/swedes/swedes.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120919&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;348 KB&quot; data-optsize=&quot;54 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;84.5&quot; data-version=&quot;1776760133&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760133/wp-pme/finns/finns.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;Globally, the US&amp;#8217;s behavior on the world stage has drawn sharp criticism in recent months. Trump&amp;#8217;s threats of leaving NATO have &lt;a href=&quot;https://www.politico.eu/article/donald-trump-anger-nato-allies-europe-united/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;united&lt;/a&gt; member countries in opposition. Even within the US itself, protests have broken out against the administration, acts of violence by ICE agents, and the invasion of Iran.&lt;/p&gt;



&lt;p&gt;US tech is deeply entwined with the US government. When Trump&amp;#8217;s second term began, Big Tech leaders took their place at the inauguration to signal their willingness to work with the administration. &lt;a href=&quot;https://proton.me/business/blog/openai-data-breach&quot;&gt;OpenAI&amp;#8217;s&lt;/a&gt; close and changing &lt;a href=&quot;https://www.bbc.com/news/articles/c3rz1nd0egro&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;relationship with&lt;/a&gt; the &lt;a href=&quot;https://www.bbc.com/news/articles/c3rz1nd0egro&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;US military&lt;/a&gt; and DHS officials&amp;#8217; &lt;a href=&quot;https://www.404media.co/border-patrol-agent-recorded-raid-with-metas-ray-ban-smart-glasses/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;unsanctioned use&lt;/a&gt; of Meta&amp;#8217;s Ray-Ban smart glasses are just two recent examples of the blurring boundary between Big Tech&amp;#8217;s surveillance platforms and government operations.&lt;/p&gt;



&lt;p&gt;Clashing values are likely a driving force behind the change in perception toward American tech. When people in Nordic countries see that Meta &lt;a href=&quot;https://techcrunch.com/2026/03/31/meta-was-finally-held-accountable-for-harming-teens-now-what/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;endangers child safety&lt;/a&gt;, or that Google doesn&amp;#8217;t keep their &lt;a href=&quot;https://proton.me/blog/is-google-photos-safe&quot;&gt;photos private&lt;/a&gt;, this reinforces the idea that these companies don&amp;#8217;t share the Nordic values of building a healthy society and conducting business ethically.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Desire for secure European tech is growing&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If a European app or online service could match the price, features, and usability of an American app or service, 71% of Danes would prefer companies based in Europe&lt;/li&gt;



&lt;li&gt;If a European app or online service could match the price, features, and usability of an American app or service, 75% of Norwegians would prefer companies based in Europe&lt;/li&gt;



&lt;li&gt;If a European app or online service could match the price, features, and usability of an American app or service, 67% of Swedes would prefer companies based in Europe&lt;/li&gt;



&lt;li&gt;If a European app or online service could match the price, features, and usability of an American app or service, 74% of Finns would prefer companies based in Europe&lt;/li&gt;
&lt;/ul&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120940&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;316 KB&quot; data-optsize=&quot;39 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.7&quot; data-version=&quot;1776760125&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760125/wp-pme/6_12094033b96/6_12094033b96.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;Once again, people in Nordic countries are more likely to prefer European tech if they had access to tech of equal quality. Much like their European neighbors, Nordic respondents are keen to find alternatives to the American tools they&amp;#8217;re already using.&lt;/p&gt;



&lt;p&gt;Interest in building the &lt;a href=&quot;https://eurostack.eu/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;EuroStack&lt;/a&gt; has significantly grown in recent year, for obvious reasons. The European Commission has issued more than &lt;a href=&quot;https://proton.me/tech-fines-tracker&quot;&gt;$7 billion in fines&lt;/a&gt; to Google, Apple, and Meta since the start of 2024, which the White House is positioning as over-regulation that will ultimately prevent the EU from benefiting from AI.&lt;/p&gt;



&lt;p&gt;When asked which features would encourage them to choose a European app or service, respondents said they want products that protect their privacy with local laws and support their own economies.&lt;/p&gt;



&lt;p&gt;In Denmark:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;49% want to support the European economy&lt;/li&gt;



&lt;li&gt;48% want their data stored under European laws&lt;/li&gt;



&lt;li&gt;47% want greater trust when it comes to processing personal data&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In Norway:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;55% want stronger data-privacy protections overall&lt;/li&gt;



&lt;li&gt;54% want their data stored under European laws&lt;/li&gt;



&lt;li&gt;53% want greater trust when it comes to processing personal data&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In Sweden:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;49% want their data stored under European laws&lt;/li&gt;



&lt;li&gt;47% want stronger data-privacy protections overall&lt;/li&gt;



&lt;li&gt;47% want to support the European economy&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;In Finland:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;57% want greater trust when it comes to processing personal data&lt;/li&gt;



&lt;li&gt;52% want stronger data-privacy protections overall&lt;/li&gt;



&lt;li&gt;51% want to support the European economy&lt;/li&gt;
&lt;/ul&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;2400&quot; height=&quot;1364&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_2400,h_1364,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120961&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;324 KB&quot; data-optsize=&quot;34 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;89.6&quot; data-version=&quot;1776760519&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760519/wp-pme/2_120961930c3/2_120961930c3.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 2400px) 100vw, 2400px&quot; /&gt;&lt;/figure&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-120982&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;335 KB&quot; data-optsize=&quot;26 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;92.2&quot; data-version=&quot;1776760508&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760508/wp-pme/4_120982d9990/4_120982d9990.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-121003&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;317 KB&quot; data-optsize=&quot;20 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;93.6&quot; data-version=&quot;1776760498&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760498/wp-pme/5_121003adaf3/5_121003adaf3.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-121024&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;327 KB&quot; data-optsize=&quot;42 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87&quot; data-version=&quot;1776760487&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760487/wp-pme/3_12102441f3e/3_12102441f3e.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Nordic countries are ready to make a change&lt;/h2&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;65% of Danish respondents agree that people in Europe should rely more on European technology companies for everyday apps and services&lt;/li&gt;



&lt;li&gt;66% of Norwegian respondents agree that people in Europe should rely more on European technology companies for everyday apps and services&lt;/li&gt;



&lt;li&gt;62% of Swedish respondents agree that people in Europe should rely more on European technology companies for everyday apps and services&lt;/li&gt;



&lt;li&gt;69% of Finnish respondents agree that people in Europe should rely more on European technology companies for everyday apps and services&lt;/li&gt;
&lt;/ul&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;582&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117345 wp-image-121045&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;299 KB&quot; data-optsize=&quot;35 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;88.3&quot; data-version=&quot;1776760474&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_582,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_171,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_436,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_873,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1164,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_891,c_scale/f_auto,q_auto/v1776760474/wp-pme/agree/agree.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;Around two-thirds of Nordic respondents say they want more buy-in from Europeans for homegrown technology. To make this happen, we need to understand what&amp;#8217;s at stake if Europe continues to rely on US tech.&lt;/p&gt;



&lt;p&gt;US Big Tech companies have created not just a technological monopoly, but also a global surveillance apparatus. This apparatus is being used to dominate international markets, control political narratives, and invade the privacy of citizens everywhere.&lt;/p&gt;



&lt;p&gt;Breaking up with Big Tech itself isn&amp;#8217;t that simple, given the enormous monopolies US companies hold. Denmark is refusing to sign &lt;a href=&quot;https://www.politico.eu/article/denmark-declared-war-against-big-tech-digital-sovereignty/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;licensing deals&lt;/a&gt; with Meta and Google, building its own Danish Press Collective Management Organization (DPCMO) to empower the country&amp;#8217;s media ecosystem. However, the country has also hosted a &lt;a href=&quot;https://datacenters.google/locations/fredericia-denmark/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google data center&lt;/a&gt; since 2020. We&amp;#8217;re watching sentiments towards US tech change in real time, and consumer attitudes will likely affect the directions that governments choose to take.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;There&amp;#8217;s never been a better time to switch to European tech&lt;/h2&gt;



&lt;p&gt;Now that there&amp;#8217;s a groundswell of desire for better European tech, a change is possible. Once Europeans and people in Nordic countries know exactly what&amp;#8217;s at risk when they keep relying on Google, Meta, and Microsoft, they know they want to protect themselves against this surveillance. In the past, there haven&amp;#8217;t been European tech options that could compete with US tech — but that&amp;#8217;s changing.&lt;/p&gt;



&lt;p&gt;Surveillance isn&amp;#8217;t automatically built into every tech product — that&amp;#8217;s a deliberate choice made by US companies that people around the world have now come to expect from every service. But everything from email to video calls to AI chatbots can actually be private (and should be.)&lt;/p&gt;



&lt;p&gt;Proton operates out of Switzerland, giving people in every country around the world Swiss regulatory data protection and access to end-to-end encryption that prevents international surveillance. We understand what&amp;#8217;s at stake if the US continues to dominate the world with Big Tech; that&amp;#8217;s why we&amp;#8217;ve built an ecosystem that competes with those services without compromising on data privacy. By choosing &lt;a href=&quot;https://proton.me/learn/european-alternatives&quot;&gt;European alternatives&lt;/a&gt; like Proton, it&amp;#8217;s possible to both support the European economy and protect your own personal data.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/business/europe-tech-watch&quot;&gt;Learn the specific risks to businesses relying on US tech&lt;/a&gt;&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Shone</author></item></channel></rss>