<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>The Proton Blog</title><description>News from the front lines of privacy and security</description><link>https://proton.me/</link><language>en</language><feed_url>https://proton.me/feed</feed_url><item><title>How an activist infiltrated two US militias and covered his digital tracks</title><link>https://proton.me/blog/militia-infiltration-video</link><guid isPermaLink="true">https://proton.me/blog/militia-infiltration-video</guid><description>In the first video of our Witness Protection series, find out how one anonymous activist infiltrated some of the most dangerous militias in the US.</description><pubDate>Wed, 22 Apr 2026 18:56:00 GMT</pubDate><content:encoded>
&lt;p&gt;For two years, a lone activist went undercover inside two domestic terrorist organizations in the United States, rising through the ranks to try to gain intel and leak it to the media. His goal was ultimately to weaken them and bring them down.&lt;/p&gt;



&lt;p&gt;This mission was life or death: To undertake it and come out alive, he had to take extreme digital privacy measures. In the first episode of our new series, &lt;strong&gt;Witness Protection&lt;/strong&gt;, the activist gave us an exclusive inside account of how he infiltrated the organizations and the complex techniques he used to stay safe.&lt;/p&gt;



&lt;p&gt;Since the attack on the United States Capitol on January 6, militias have increasingly attracted Americans radicalized by what they saw as an attempt from the Democratic party to steal power. Groups all over the country mobilized, planning to use coordinated intimidation and violence to bring about their political aims.&lt;/p&gt;



&lt;p&gt;Two of the most notorious of these far-right militias were American Patriots Three Percent (AP3) and the Oath Keepers, both classified as domestic terror organizations by several monitoring organizations including the Anti-Defamation League. His goal was to take senior positions within the militias, stealing and exfiltrating intelligence which could then be shared with media outlets.&lt;/p&gt;



&lt;p&gt;Proton Mail played a crucial part in his strategy, allowing him to communicate safely with journalists using a covert technique known as &lt;strong&gt;foldering&lt;/strong&gt;. Sharing the login credentials for a burner Proton Mail account, he would save messages as drafts, never actually sending them. The recipient could then log in to the account, read the draft, and delete it. No communications ever had to be sent.&lt;/p&gt;



&lt;p&gt;After successfully infiltrating AP3 and the Oath Keepers, fracturing the groups and sending them partially underground, he&amp;#8217;s still operating in the field today. We went to extraordinary lengths to conceal his identity, using a blackout helmet, jumpsuit and gloves, and voice changer to hide any identifying details.&lt;/p&gt;



&lt;p&gt;Watch the video here:&lt;/p&gt;



&lt;figure class=&quot;wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio&quot;&gt;&lt;div class=&quot;wp-block-embed__wrapper&quot;&gt;
&lt;iframe loading=&quot;lazy&quot; title=&quot;How Extreme Privacy Kept Me Alive in a Militia&quot; width=&quot;750&quot; height=&quot;422&quot; src=&quot;https://www.youtube-nocookie.com/embed/Z0v48bME-H4?feature=oembed&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allowfullscreen&gt;&lt;/iframe&gt;
&lt;/div&gt;&lt;/figure&gt;
</content:encoded><category>Privacy guides</category><author>Kate Menzies</author></item><item><title>The rise of age verification: What governments, platforms, and devices are
changing</title><link>https://proton.me/blog/age-verification-explained</link><guid isPermaLink="true">https://proton.me/blog/age-verification-explained</guid><description>Age verification is expanding from laws to platforms and operating systems, reshaping the internet. Here’s what it means for privacy and access.</description><pubDate>Wed, 22 Apr 2026 15:35:49 GMT</pubDate><content:encoded>
&lt;p&gt;Age verification is becoming a standard part of how people access online services. What began as a policy tool aimed at restricting children’s access to certain content is now moving through platforms, devices, and national identity systems.&lt;/p&gt;



&lt;p&gt;Given the profound implications for personal privacy, Proton has been covering this shift from multiple angles: how laws are written, how companies implement them, and what happens when identity checks become embedded in everyday digital infrastructure.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What age verification actually means&lt;/h2&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/age-verification&quot;&gt;Age verification&lt;/a&gt; is often described as a simple safeguard to confirm whether someone is old enough to access a service. In practice, the term covers a wide range of systems, from self-declared birthdates to government ID checks and third-party identity services.&lt;/p&gt;



&lt;p&gt;The gap between the language and the implementation matters. As these systems expand, verification often involves collecting more &lt;a href=&quot;https://proton.me/blog/personal-data&quot;&gt;personal data&lt;/a&gt; than people may expect, including official identification documents or &lt;a href=&quot;https://proton.me/blog/what-is-biometric-data&quot;&gt;biometric signals&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more:&lt;/strong&gt;&lt;/em&gt; &lt;a href=&quot;https://proton.me/blog/age-verification&quot;&gt;What age verification actually means (and why the term is misleading)&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How age verification laws are expanding&lt;/h2&gt;



&lt;p&gt;Governments in multiple regions have introduced or proposed &lt;a href=&quot;https://proton.me/blog/age-verification-laws-chilling-effect&quot;&gt;laws requiring platforms to verify user ages&lt;/a&gt; before granting access to certain types of content or services. These policies are typically justified as child protection measures.&lt;/p&gt;



&lt;p&gt;Our reporting has focused on what happens after these laws are implemented. Requirements tend to expand over time, and enforcement often pushes platforms toward more invasive forms of identity collection. In some cases, access to online services becomes tied to verification systems that were not originally part of the product design.&lt;/p&gt;



&lt;p&gt;There are also broader effects. As verification becomes more common, it can affect how people access information online, including content that is not restricted but still routed through systems that require identity checks.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more:&lt;/strong&gt;&lt;/em&gt; &lt;a href=&quot;https://proton.me/blog/is-age-verification-safe&quot;&gt;In rush for age checks, we’re putting kids’ security at risk&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/age-verification-laws-chilling-effect&quot;&gt;What happens after age-verification laws take effect&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age verification on platforms&lt;/h2&gt;



&lt;p&gt;Platforms have begun introducing age verification systems globally in response to regulatory pressure. Discord, for example, introduced a “teen-by-default” verification approach in parts of its service.&lt;/p&gt;



&lt;p&gt;These systems require people to confirm their age before accessing certain features or content. The process often depends on external verification providers or identity submission.&lt;/p&gt;



&lt;p&gt;The security implications became more visible after a breach involving age verification data exposed tens of thousands of government IDs submitted through a platform integration. The incident highlighted the risks associated with centralizing identity documents for access control.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more: &lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;https://proton.me/blog/discord-global-age-verification&quot;&gt;Discord introduces global ‘teen-by-default’ age verification&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/discord-age-verfication-breach&quot;&gt;70,000 government IDs leaked in Discord data breach&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age checks moving into operating systems&lt;/h2&gt;



&lt;p&gt;Age verification is no longer limited to individual apps or websites. It is increasingly being integrated into operating systems and device-level settings.&lt;/p&gt;



&lt;p&gt;When &lt;a href=&quot;https://proton.me/blog/age-verification-operating-system&quot;&gt;verification moves to the OS layer&lt;/a&gt;, it changes how access control works. Instead of each app handling verification independently, the operating system can act as the gatekeeper for age-related permissions across services.&lt;/p&gt;



&lt;p&gt;Apple has begun introducing age-related verification features in the UK, where regulatory pressure has increased. This shifts part of the responsibility for identity checks from apps to device manufacturers.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more: &lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;https://proton.me/blog/age-verification-operating-system&quot;&gt;When age verification moves into your operating system&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/apple-uk-age-verification-iphone&quot;&gt;Apple’s UK age verification brings identity checks to the iPhone&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Digital identity systems and national policy&lt;/h2&gt;



&lt;p&gt;Governments are moving toward broader digital identity frameworks that could be used across services, not just for age checks.&lt;/p&gt;



&lt;p&gt;The UK’s proposed digital ID system is one example. It is framed as a way to streamline access to services and improve verification processes. Critics have raised concerns about scope expansion and the potential for identity systems to become embedded in everyday online activity.&lt;/p&gt;



&lt;p&gt;Australia has also introduced policies affecting how people access social media, with implications for identity verification and platform compliance. While these measures are focused on specific harms, they contribute to a broader trend toward identity-linked access control.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more: &lt;/strong&gt;&lt;/em&gt;&lt;a href=&quot;https://proton.me/blog/digital-id-uk-explained&quot;&gt;The UK’s new Digital ID proposal explained&lt;/a&gt;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/blog/australia-social-media-ban-privacy&quot;&gt;Australia’s world-first social media ban: Why the ban might be even worse for privacy&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Security risks in real-world systems&lt;/h2&gt;



&lt;p&gt;Age verification systems rely on sensitive personal data. In many cases, that includes government-issued identification or biometric information.&lt;/p&gt;



&lt;p&gt;Security incidents have already shown the risks involved. An age verification application used in the EU was compromised shortly after release, raising questions about how quickly these systems can be attacked once deployed. Other breaches involving platforms using identity checks have exposed large volumes of personal data.&lt;/p&gt;



&lt;p&gt;These events point to a structural issue: Systems designed to verify identity also create high-value targets for attackers.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more:&lt;/strong&gt;&lt;/em&gt; &lt;a href=&quot;https://proton.me/blog/eu-age-verification-app-hacked&quot;&gt;The EU’s age verification app was hacked in two minutes&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Alternatives to identity-based verification&lt;/h2&gt;



&lt;p&gt;There are approaches that attempt to confirm age without requiring full identity disclosure, such as on-device estimation techniques and systems designed to minimize data sharing with third parties.&lt;/p&gt;



&lt;p&gt;These models are still developing and are not widely adopted in regulation. Most current laws and implementations rely on identity verification or equivalent methods that require personal data submission.&lt;/p&gt;



&lt;p&gt;&lt;em&gt;&lt;strong&gt;Read more:&lt;/strong&gt;&lt;/em&gt; &lt;a href=&quot;https://proton.me/blog/age-verification-alternatives&quot;&gt;What are the alternatives to age verification?&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Where this shift leads&lt;/h2&gt;



&lt;p&gt;Age verification is increasingly embedded across multiple layers of the internet, from legislation to platforms to operating systems. Each layer introduces its own implementation, but the overall direction is consistent: more online access is being tied to identity checks.&lt;/p&gt;



&lt;p&gt;The practical result is a shift in how &lt;a href=&quot;https://proton.me/blog/anonymity-vs-privacy&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://proton.me/blog/anonymity-vs-privacy&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://proton.me/blog/anonymity-vs-privacy&quot;&gt;privacy, anonymity&lt;/a&gt;, and access coexist online. Systems designed for targeted protections are expanding into general infrastructure.&lt;/p&gt;



&lt;p&gt;This collection of reporting tracks that progression as it continues to unfold.&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>The EU’s age verification app was hacked in two minutes</title><link>https://proton.me/blog/eu-age-verification-app-hacked</link><guid isPermaLink="true">https://proton.me/blog/eu-age-verification-app-hacked</guid><description>The EU unveiled an age verification app and called it technically ready. Security researchers hacked it in under 2 minutes. What it means.</description><pubDate>Mon, 20 Apr 2026 17:58:03 GMT</pubDate><content:encoded>
&lt;p&gt;On Wednesday, the &lt;a href=&quot;https://commission.europa.eu/news-and-media/news/european-age-verification-app-keep-children-safe-online-2026-04-15_en&quot;&gt;European Commission unveiled a mobile app&lt;/a&gt; designed to let people prove their age online without sharing &lt;a href=&quot;https://proton.me/blog/personal-data&quot;&gt;personal data&lt;/a&gt; with platforms. EU officials said the app was ready, met the highest privacy standards, and pointed to its &lt;a href=&quot;https://proton.me/community/open-source&quot;&gt;open-source&lt;/a&gt; code as proof of transparency.&lt;/p&gt;



&lt;p&gt;Within hours, however, security researchers began picking apart the open-source code. By Thursday, security consultant Paul Moore had &lt;a href=&quot;https://x.com/Paul_Reviews/status/2044723123287666921&quot;&gt;bypassed the app&amp;#8217;s protections in under two minutes&lt;/a&gt;.&lt;/p&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-full is-resized&quot;&gt;&lt;img width=&quot;1004&quot; height=&quot;1746&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1004,h_1746,c_scale/f_auto,q_auto/v1776700209/wp-pme/eu-age-verification-app/eu-age-verification-app.png?_i=AA&quot; alt=&quot;A screenshot of the EU age verification app&quot; class=&quot;wp-post-120727 wp-image-120728&quot; style=&quot;width:400px&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;516 KB&quot; data-optsize=&quot;58 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;88.7&quot; data-version=&quot;1776700209&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1776700209/wp-pme/eu-age-verification-app/eu-age-verification-app.png?_i=AA 1004w, https://res.cloudinary.com/dbulfrlrz/images/w_173,h_300,c_scale/f_auto,q_auto/v1776700209/wp-pme/eu-age-verification-app/eu-age-verification-app.png?_i=AA 173w, https://res.cloudinary.com/dbulfrlrz/images/w_589,h_1024,c_scale/f_auto,q_auto/v1776700209/wp-pme/eu-age-verification-app/eu-age-verification-app.png?_i=AA 589w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_1336,c_scale/f_auto,q_auto/v1776700209/wp-pme/eu-age-verification-app/eu-age-verification-app.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_883,h_1536,c_scale/f_auto,q_auto/v1776700209/wp-pme/eu-age-verification-app/eu-age-verification-app.png?_i=AA 883w&quot; sizes=&quot;auto, (max-width: 1004px) 100vw, 1004px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;p&gt;Others confirmed his findings. The app&amp;#8217;s rate-limiting controls were stored in an editable file, &lt;a href=&quot;https://proton.me/blog/what-is-biometric-data&quot;&gt;biometric authentication&lt;/a&gt; could be turned off with a simple configuration change, and sensitive credentials were accessible without secure hardware protection.&lt;/p&gt;



&lt;p&gt;The Commission played down the findings, calling the release a demo version. Both Moore and French cryptographer Olivier Blazy pushed back, telling &lt;a href=&quot;https://www.politico.eu/article/eu-brussels-launched-age-checking-app-hackers-say-took-them-2-minutes-break-it&quot;&gt;Politico&lt;/a&gt; they were testing the latest version of the code when they found the flaws.&lt;/p&gt;



&lt;p&gt;Later, the Commission said the issue was fixed, but the incident still shows how vulnerable these age verification systems are.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What EU&amp;#8217;s age verification app does and what went wrong&lt;/h2&gt;



&lt;p&gt;EU&amp;#8217;s age verification app lets people &lt;a href=&quot;https://proton.me/blog/age-verification&quot;&gt;verify their age&lt;/a&gt; using a passport, a national ID, or a trusted provider like a bank. Platforms can then ask the app to check if someone is over a certain age without accessing the underlying personal data, also known as zero-knowledge proof.&lt;/p&gt;



&lt;p&gt;The implementation undermined that design. EU&amp;#8217;s age verification app stored an encrypted PIN in an editable configuration file on the device, separate from the identity vault that keeps &lt;a href=&quot;https://proton.me/blog/sensitive-information&quot;&gt;sensitive data&lt;/a&gt;. By deleting a few values and restarting the app, an attacker can set a new PIN while reusing credentials from a previous profile.&lt;/p&gt;



&lt;p&gt;The rate-limiting controls that prevent repeated guessing were stored as a simple counter in the same file, one that can be reset to zero, erasing any record of failed attempts. Biometric authentication was controlled by a single boolean flag; switching it from true to false skipped the check entirely.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Built to check ages, but not safely&lt;/h2&gt;



&lt;p&gt;After researchers used the code to expose its flaws, officials recast the app as a demo version.&lt;/p&gt;



&lt;p&gt;Several developers noted that sensitive data should have been stored in a secure enclave, hardware-level protection available on modern smartphones that makes these attacks much harder.&lt;/p&gt;



&lt;p&gt;But the vulnerabilities expose a problem that goes beyond this particular app. &lt;a href=&quot;https://proton.me/blog/is-age-verification-safe&quot;&gt;Age verification is not safe&lt;/a&gt; by design, because it requires linking a real identity to an online action. That link has to be stored somewhere, even briefly, and wherever it lives, it becomes a target for hackers, governments, and anyone who gains &lt;a href=&quot;https://proton.me/blog/unauthorized-access&quot;&gt;unauthorized access&lt;/a&gt; to the underlying data. The more centralized and reusable that link becomes, the larger the target grows.&lt;/p&gt;



&lt;p&gt;The EU&amp;#8217;s &lt;a href=&quot;https://proton.me/blog/age-verification-laws-chilling-effect&quot;&gt;age verification law&lt;/a&gt; is meant to be a single, privacy-preserving standard that replaces the legal patchwork taking shape across Member States, but the Commission&amp;#8217;s confidence that the app is ready turned out to be premature. More than 400 privacy and security researchers &lt;a href=&quot;https://www.biometricupdate.com/202603/avpa-academics-advocacy-groups-trade-letters-over-age-assurance-tech&quot;&gt;wrote to the Commission in March&lt;/a&gt; asking for a moratorium on deployment until the science on age-verification technology settles.&lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What Microsoft 365 Copilot flex routing means for EU businesses</title><link>https://proton.me/business/blog/microsoft365-copilot-flex-routing</link><guid isPermaLink="true">https://proton.me/business/blog/microsoft365-copilot-flex-routing</guid><description>Your business data is about to automatically travel outside the EU. Here&apos;s why you should opt out and how to do it.</description><pubDate>Fri, 17 Apr 2026 16:31:20 GMT</pubDate><content:encoded>
&lt;p&gt;Microsoft’s ‘data sovereignty’ promise for Europe comes with an asterisk. Starting April 17, 2026, the company will start sending Copilot data to foreign servers for processing.&lt;/p&gt;



&lt;p&gt;With the introduction of flex routing for Microsoft 365 Copilot, &lt;a href=&quot;https://proton.me/blog/llm&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Large Language Model&lt;/a&gt; (LLM) inferencing — the step where your data is actually processed — may take place in the US, Canada, or Australia when European data center capacity runs short.&lt;/p&gt;



&lt;p&gt;These changes are being applied by default. For new customer accounts created after March 25, 2026, flex routing is already on. For everyone else, it will be enabled automatically unless you opt out. (Instructions on how to do that below.)&lt;/p&gt;



&lt;p&gt;If your business is based in the European Union or the European Free Trade Association (EFTA), this isn’t a small technical update. Flex routing changes whether your AI workflows stay within the EU or leave it without your knowledge. And it highlights what &lt;a href=&quot;https://proton.me/business/blog/tech-investment-not-cost&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Big Tech&amp;#8217;s version of digital sovereignty&lt;/a&gt; really means for Europe: They&amp;#8217;re still in control.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What is flex routing?&lt;/h2&gt;



&lt;p&gt;Inferencing is the moment an AI model processes your prompt to generate a response, whether that’s summarizing a document, answering a question, or drafting content. By the time this happens, your data has already been assembled. Even if your data is stored in Europe, it may now be&amp;nbsp;processed elsewhere — automatically, under a non-EU jurisdiction.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;EU-hosted does not mean EU-processed&lt;/h2&gt;



&lt;p&gt;Microsoft makes it clear that data will remain &lt;a href=&quot;https://proton.me/learn/encryption&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;encrypted&lt;/a&gt; in transit and at rest. That might reassure some customers. But if you’re operating under frameworks like the&amp;nbsp;&lt;a href=&quot;https://proton.me/business/gdpr&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;General Data Protection Regulation&lt;/a&gt; (GDPR), the&amp;nbsp;Network and Information Security Directive (NIS2), or the&amp;nbsp;Digital Operational Resilience Act (DORA), protecting data in storage and transmission isn&amp;#8217;t enough.&lt;/p&gt;



&lt;p&gt;Processing (or inference) is where exposure can occur. And under flex routing, that point can now move.&lt;/p&gt;



&lt;p&gt;For an AI model to perform inference, data must be made accessible for computation. Your prompts, emails, files, and metadata are gathered and sent to the model. With flex routing, that package can be processed outside the EU.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Where your data is processed matters — even if it’s encrypted on the way in and out.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The burden of compliance is yours&lt;/h2&gt;



&lt;p&gt;Microsoft&amp;#8217;s decision to make flex routing a default feature is a red flag. Research shows that most people don&amp;#8217;t bother to check their defaults or update them. If data sovereignty was something the company cared about for its European customers, it would not have implemented flex routing automatically.&lt;/p&gt;



&lt;p&gt;It also puts your compliance department on notice that vendors may suddenly decide to change an important policy. You are now responsible for monitoring vendor updates, interpreting their implications, and adjusting settings to remain compliant. This may seem unfair if you selected a US-based vendor under the impression your data sovereignty was important to them.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;What EU businesses can do now&lt;/h2&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Disable flex routing. &lt;/strong&gt;If your policies require EU-only processing, don’t rely on defaults.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Sign in to the Microsoft 365 admin center as an administrator assigned the&amp;nbsp;&lt;a href=&quot;https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;AI Administrator role&lt;/a&gt;.&lt;/li&gt;



&lt;li&gt;Go to&amp;nbsp;&lt;strong&gt;Copilot&lt;/strong&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;strong&gt;Settings&lt;/strong&gt;&amp;nbsp;-&amp;gt;&amp;nbsp;&lt;strong&gt;Flexible inferencing during peak load periods&lt;/strong&gt;.&lt;/li&gt;



&lt;li&gt;Select&amp;nbsp;&lt;strong&gt;Do not allow flex routing&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Understand cross-border implications. &lt;/strong&gt;Your current setup may not meet your business requirements. Consider:
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Data transfer obligations&amp;nbsp;under GDPR and sector-specific rules&lt;/li&gt;



&lt;li&gt;Internal data residency policies&amp;nbsp;and contractual commitments&lt;/li&gt;



&lt;li&gt;Legal access and oversight&amp;nbsp;in non-EU jurisdictions&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Audit AI-specific data flows closely. &lt;/strong&gt;Most businesses know where data is stored. Fewer know where it’s processed. Start questioning:
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Where your data is processed&lt;/li&gt;



&lt;li&gt;Whether there are laws that can compel third-party data disclosure&lt;/li&gt;



&lt;li&gt;Who can access data during processing and if that can change&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Choose vendors that are transparent about how they process your data.&lt;/strong&gt; Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/lumo&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;AI assistant&lt;/a&gt; processes data exclusively on European servers and publishes detailed description of its &lt;a href=&quot;https://proton.me/blog/lumo-security-model&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;security model&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Flex routing reveals something deeper about data governance&lt;/h2&gt;



&lt;p&gt;If your vendors are based in the US, you’re relying on systems built for a different regulatory reality — one you don’t control, but still have to answer to.&lt;/p&gt;



&lt;p&gt;Software updates, support, legal policies, and pricing decisions are made in Silicon Valley or Seattle. The rules your vendor follows are set in Washington. But your business is held to European standards.&lt;/p&gt;



&lt;p&gt;That’s why more companies are starting to look at&amp;nbsp;&lt;a href=&quot;https://proton.me/learn/european-alternatives&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;European alternatives to Big Tech&lt;/a&gt;. When your infrastructure, policies, and legal framework are aligned with the region you operate in, data sovereignty becomes enforceable, not conditional.&lt;/p&gt;
</content:encoded><category>For business</category><category>Privacy news</category><author>Alanna Alexander</author></item><item><title>Your tech stack is an investment not a cost</title><link>https://proton.me/business/blog/tech-investment-not-cost</link><guid isPermaLink="true">https://proton.me/business/blog/tech-investment-not-cost</guid><description>Businesses in Europe can reduce their reliance on US tech by investing in real digital sovereignty, not Big Tech sovereignty washing.</description><pubDate>Fri, 17 Apr 2026 11:10:32 GMT</pubDate><content:encoded>
&lt;p&gt;Europe has found itself in a difficult and dangerous situation.&lt;/p&gt;



&lt;p&gt;Last August, Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/europe-tech-watch&quot;&gt;Europe tech sovereignty report&lt;/a&gt; revealed that over 74% of publicly listed European companies depend on US infrastructure for their basic tech services. Whether sending emails or running critical infrastructure in the cloud, Europe places its digital destiny in the hands of a few American service providers and the government they answer to.&lt;/p&gt;



&lt;p&gt;That report now seems prescient. Over the last few months, rifts in the North Atlantic alliance emerged over tariffs and territory, culminating in a recent threat from Washington to break apart NATO itself.&lt;/p&gt;



&lt;p&gt;As Proton CEO Andy Yen &lt;a href=&quot;https://www.youtube.com/live/-3cG3nZhIFA?si=3H_bJZB_uzK9Cm5h&amp;amp;t=10026&quot;&gt;said at a recent tech conference&lt;/a&gt; in France, &amp;#8220;If Trump wants to take Greenland, he doesn&amp;#8217;t have to use force. All he has to say is, &amp;#8216;Tomorrow Google, Apple, Microsoft, and Amazon will stop working in your country if you don&amp;#8217;t sign a contract and give me Greenland.&amp;#8217; And if that happens, they will sign within the hour.&amp;#8221;&lt;/p&gt;



&lt;p&gt;Europe&amp;#8217;s digital sovereignty seemed irrelevant as long as the post-war order held. Now that those foundations are shaking, governments are switching over to technology and cloud services they can control. The French government is &lt;a href=&quot;https://techcrunch.com/2026/04/10/france-to-ditch-windows-for-linux-to-reduce-reliance-on-us-tech/&quot;&gt;reducing its use of Microsoft Windows&lt;/a&gt;, and other European countries are taking &lt;a href=&quot;https://apnews.com/article/europe-digital-sovereignty-big-tech-9f5388b68a0648514cebc8d92f682060&quot;&gt;similar steps&lt;/a&gt;. Our recent survey found that European consumers support these moves. Nearly three-fourths of them told us in a survey that their society was far &lt;a href=&quot;https://proton.me/blog/european-alternative-us-tech-survey&quot;&gt;too dependent on the United States&lt;/a&gt; for technology.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;But what does this mean for business leaders?&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;The problem of dependency isn&amp;#8217;t just political. When your core systems rely on foreign providers, your critical systems — email, files, infrastructure — can be disrupted by economic and political decisions far away.&lt;/p&gt;



&lt;p&gt;That’s why we urge business leaders to treat their tech stack not as a cost, but as an investment in control, resilience, and long-term independence. Retooling your company is as much a practical challenge as it is a mindset shift.&lt;/p&gt;



&lt;p&gt;Here are three questions to ask yourself:&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Should I be investing?&lt;/h2&gt;



&lt;p&gt;Corporate managers face a strategic decision about their internal tools.&lt;/p&gt;



&lt;p&gt;Big Tech platforms offer convenience: They&amp;#8217;re familiar, widely adopted, and easy to justify as the safest choice. &amp;#8220;Nobody gets fired for buying IBM,&amp;#8221; as the saying goes. &lt;strong&gt;But technology isn&amp;#8217;t a commodity.&lt;/strong&gt; Your tech stack shapes how your business operates, who controls your data, and how resilient you are when circumstances change.&lt;/p&gt;



&lt;p&gt;Take for instance: In the late 2000s, the Chinese government realized it was too dependent on foreign oil. So it began to invest in the creation of a new domestic electric vehicle industry. Nearly two decades later, Chinese carmakers produce about &lt;a href=&quot;https://www.iea.org/reports/global-ev-outlook-2025/trends-in-electric-car-markets-2&quot;&gt;two out of every three&lt;/a&gt; electric vehicles sold globally.&lt;/p&gt;



&lt;p&gt;If Chinese decision makers had viewed automobiles as a cost, they would have purchased reliable gas-fueled cars from Japan or Detroit. Instead, they decided automotive tech was an investment. It paid off in the form of a powerful homegrown industry for China and affordable high-quality cars for everyone.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Your tech procurement decisions deserve deeper reflection and long-term thinking. When weighing your options, it&amp;#8217;s worth asking:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Do my service providers share my values and vision?&lt;/li&gt;



&lt;li&gt;Is my business data properly secured and confidential at all times?&lt;/li&gt;



&lt;li&gt;If geopolitical circumstances change, do I own my data?&lt;/li&gt;



&lt;li&gt;Will my tech stack be an asset or a liability when seeking new business?&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Businesses that take these questions seriously are already turning security into a competitive advantage. Our &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;2026 SMB Cybersecurity Report&lt;/a&gt; found that using secure tech was a competitive advantage for 66% of businesses. And the price you pay for those services may not be so different; indeed, it might even be cheaper to buy local.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Is it digital sovereignty washing?&lt;/h2&gt;



&lt;p&gt;First there was &lt;a href=&quot;https://www.un.org/en/climatechange/science/climate-issues/greenwashing&quot;&gt;greenwashing&lt;/a&gt;. Then there was &lt;a href=&quot;https://proton.me/blog/privacy-washing-2023&quot;&gt;privacy washing&lt;/a&gt;. Now there&amp;#8217;s digital sovereignty washing.&lt;/p&gt;



&lt;p&gt;US tech companies know digital sovereignty is important to European businesses. That&amp;#8217;s why Google and Microsoft both promote a &amp;#8220;Sovereign Cloud&amp;#8221; and a European &amp;#8220;data boundary&amp;#8221; that evokes the idea of local control. &amp;#8220;Discover a sovereign cloud without compromise,&amp;#8221; Microsoft says.&lt;/p&gt;



&lt;p&gt;It&amp;#8217;s dangerous marketing because it&amp;#8217;s not quite true. And the only thing worse than bad security is a false sense of security.&lt;/p&gt;



&lt;p&gt;You don&amp;#8217;t gain digital sovereignty just by choosing tech that processes and stores your data locally. You earn it through control — over access, usage, and the laws that ultimately apply to your data. The reality is very different from the marketing spin.&lt;/p&gt;



&lt;h3 class=&quot;wp-block-heading&quot;&gt;Sovereignty vs. sovereignty washing&lt;/h3&gt;



&lt;p&gt;Here are five clues to tell the difference:&lt;/p&gt;



&lt;ol class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If security updates and product development decisions happen overseas, then it’s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If those decisions are made within your region, under your legal and operational control, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If the software is closed source so you can&amp;#8217;t independently verify security claims, then it could be sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If the code is open to inspection and backed by independent audits, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If suppliers are subject to foreign laws such as the CLOUD Act, which allows US government surveillance even on servers physically in Europe, then it’s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If your data is governed solely by local laws with strong protections, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If geopolitical pressures could result in downtime or changes to pricing and policies, then it’s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If your operations aren’t exposed to external political pressure, then it’s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;



&lt;li&gt;If European capital flows into the US, where it funds further innovation and job creation for Americans, then it&amp;#8217;s sovereignty washing.
&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;If it strengthens your local economy and creates a cycle of reinvestment in your market, then it&amp;#8217;s actually sovereign.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;



&lt;p&gt;In the worst case, US tech companies could abandon the idea of data boundaries altogether. In April 2026, Microsoft moved precisely in that direction when it &lt;a href=&quot;https://www.linkedin.com/posts/protonprivacy_33-gdpr-fine-loading-activity-7450534472200069121-AjFj&quot;&gt;announced &amp;#8220;flex routing&amp;#8221;&lt;/a&gt; would be turned on by default for European customers, enabling offshore data processing.&lt;/p&gt;



&lt;p&gt;If your data boundary can be punctured so easily, it&amp;#8217;s sovereignty washing.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Are there European alternatives?&lt;/h2&gt;



&lt;p&gt;Europe has just woken up to the problem of US tech dependence. But that&amp;#8217;s not because it&amp;#8217;s a new problem. American tech companies have dominated the global business market since the beginning of cloud computing. Until now that has left European industry at a disadvantage.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;But over the past 10 years, this has started to change, especially when it comes to enterprise software. &lt;/strong&gt;From &lt;a href=&quot;https://european-alternatives.eu/category/cloud-computing-platforms&quot;&gt;cloud computing&lt;/a&gt; to &lt;a href=&quot;https://proton.me/business/vpn&quot;&gt;network security&lt;/a&gt;, &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;identity management&lt;/a&gt; to &lt;a href=&quot;https://proton.me/business/lumo&quot;&gt;AI chat assistants&lt;/a&gt;, European providers are reaching feature parity with global competitors.&lt;/p&gt;



&lt;p&gt;In some cases, these providers depend on US infrastructure, but not always. For example, Proton&amp;#8217;s Lumo AI runs open source models on European servers under European legal jurisdiction. That means your data stays under European control, not just physically, but legally and economically. Ironically, thanks to the GDPR and a privacy-first encryption architecture, Americans can gain more control and data privacy by outsourcing the tech stack to Europe.&lt;/p&gt;



&lt;p&gt;By choosing &lt;a href=&quot;https://proton.me/learn/european-alternatives&quot;&gt;European alternatives&lt;/a&gt; and promoting homegrown tech, you&amp;#8217;re investing in how much control your business has over its future. The next wave of entrepreneurs and developers might not flock to Silicon Valley and instead choose Paris, Munich, or Geneva. It becomes a virtuous cycle that stimulates European demand for its own products.&lt;/p&gt;



&lt;p&gt;That’s how this shift happens:&amp;nbsp;not through a top-down policy, but through a multitude of individual choices by businesses like yours.&lt;/p&gt;
</content:encoded><category>For business</category><author>Ben Wolford</author></item><item><title>Proton Drive’s strong start to 2026</title><link>https://proton.me/blog/drive-2026-q1-recap</link><guid isPermaLink="true">https://proton.me/blog/drive-2026-q1-recap</guid><description>From faster file transfers to smoother mobile photo browsing, here’s how strong Proton Drive started in 2026.</description><pubDate>Tue, 14 Apr 2026 09:51:29 GMT</pubDate><content:encoded>
&lt;p&gt;With the launch of &lt;a href=&quot;https://proton.me/blog/sheets-proton-drive&quot;&gt;Proton Sheets&lt;/a&gt; in late 2025 and, more recently, &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt;, Proton Drive took an important step toward becoming a more complete privacy-first workspace for the &lt;a href=&quot;https://proton.me/drive/file-sharing&quot;&gt;files&lt;/a&gt;, &lt;a href=&quot;https://proton.me/drive/photo-storage&quot;&gt;photos&lt;/a&gt;, &lt;a href=&quot;https://proton.me/drive/docs&quot;&gt;documents&lt;/a&gt;, and &lt;a href=&quot;https://proton.me/drive/sheets&quot;&gt;spreadsheets&lt;/a&gt; people use every day.&lt;/p&gt;



&lt;p&gt;So far in 2026, we&amp;#8217;ve focused on making that experience faster, smoother, and more practical across file storage, sharing, and collaboration. Here&amp;#8217;s a look at the changes:&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;A faster Drive through a stronger foundation&lt;/h2&gt;



&lt;p&gt;Some of the most meaningful improvements to Drive this year are about speed and reliability. Uploads and downloads are now noticeably faster, whether you&amp;#8217;re saving a file, browsing photos, downloading from a shared folder, or collaborating with others. Early this year, Proton Drive delivered &lt;strong&gt;up to 60% faster uploads on iOS, as well as up to 30% faster uploads and 70% faster downloads on web&lt;/strong&gt;. Shared workflows have improved too: &lt;strong&gt;Downloading shared files is now 70% faster, and uploading to a shared folder is 30% faster&lt;/strong&gt;, even for people without a Proton account.&lt;/p&gt;



&lt;p&gt;Behind these improvements is a stronger foundation: We’ve been rebuilding some of Drive’s most performance-intensive code into a &lt;a href=&quot;https://proton.me/blog/drive-sdk-january-2026&quot;&gt;shared SDK&lt;/a&gt; that powers core file operations across our apps. That means improvements can roll out more consistently across platforms, helping make Drive feel faster, smoother, and more dependable overall.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;More done, more easily on mobile&lt;/h2&gt;



&lt;p&gt;Some of the most meaningful user experience improvements are the ones that remove friction from everyday tasks, especially on mobile, wherever you are. We made a number of updates across the Drive mobile apps to help people get things done faster and with fewer steps:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;The photo gallery has improved on iOS and Android&lt;/strong&gt;, with quicker loading and smoother scrolling through your memories.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Saving files directly to Proton Drive is now possible on both Android and iOS&lt;/strong&gt;, making it easier to save something for later without first downloading it and uploading it again.&lt;/li&gt;
&lt;/ul&gt;


&lt;div class=&quot;wp-block-image&quot;&gt;
&lt;figure class=&quot;aligncenter size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;538&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117004 wp-image-117253&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;831 KB&quot; data-optsize=&quot;104 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;87.5&quot; data-version=&quot;1776121945&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1776121945/wp-pme/20260413-proton-sheets-locale-support-blog/20260413-proton-sheets-locale-support-blog.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;
&lt;/div&gt;


&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Document scanning is now supported on both Android and iOS&lt;/strong&gt;, so you can easily save important scans like passports directly in Proton Drive for safekeeping.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;On Android, you can upload entire folders to Proton Drive&lt;/strong&gt;, making it much faster to move lots of files in one go. That&amp;#8217;s something even Google Drive doesn&amp;#8217;t offer.&lt;/li&gt;
&lt;/ul&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;More powerful spreadsheets, still privacy-first&lt;/h2&gt;



&lt;p&gt;Spreadsheets often end up holding far more of our lives than we expect. In our &lt;a href=&quot;https://proton.me/blog/spreadsheet-survey&quot;&gt;survey&lt;/a&gt;, we found that over 70% of people use spreadsheets for budgeting and personal finance. But these files often outlive their original purpose: 67% of US respondents said they still have access to spreadsheets or shared documents they no longer need. Many are also unsure what happens to their data behind the scenes, from ad targeting and content scanning to AI training and data sharing.&lt;/p&gt;



&lt;p&gt;That is exactly why Proton Sheets matters, and why we have kept improving our end-to-end encrypted &lt;a href=&quot;https://proton.me/drive/sheets&quot;&gt;spreadsheet editor&lt;/a&gt;.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;2400&quot; height=&quot;1260&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_2400,h_1260,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA&quot; alt=&quot;&quot; class=&quot;wp-post-117004 wp-image-117349&quot; data-format=&quot;jpg&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;852 KB&quot; data-optsize=&quot;125 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;85.3&quot; data-version=&quot;1776334795&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 2400w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1776334795/wp-pme/20260413-scan-documents-on-ios-blog1_117349ef4de/20260413-scan-documents-on-ios-blog1_117349ef4de.jpg?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 2400px) 100vw, 2400px&quot; /&gt;&lt;figcaption class=&quot;wp-element-caption&quot;&gt;Image of people collaborating in a Proton Sheets encrypted spreadsheet&lt;/figcaption&gt;&lt;/figure&gt;



&lt;p&gt;Among the changes, we&amp;#8217;ve added and improved support for workflows people expect from modern spreadsheets, including:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Import, edit, and export spreadsheets as ODS (compatible with OpenOffice, LibreOffice, and others). Currently in &lt;a href=&quot;https://proton.me/support/web-beta&quot;&gt;beta&lt;/a&gt;&lt;/li&gt;



&lt;li&gt;Hidden sheets&lt;/li&gt;



&lt;li&gt;New paste special options: formula only and link only&lt;/li&gt;



&lt;li&gt;Custom formulas in conditional formatting and data validation&lt;/li&gt;



&lt;li&gt;Support for the =SWITCH formula&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;These updates help make Sheets more practical for everyday use while preserving what matters most: Your spreadsheet data remains protected by Proton’s privacy-first design.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Strong momentum for the rest of 2026&lt;/h2&gt;



&lt;p&gt;So far in 2026, our focus has been clear: making Proton Drive faster and more reliable across all platforms for the moments that matter every day. Many of these improvements came directly from listening to our community. We’re grateful for that feedback, and for the people who keep pushing us to make Proton Drive better.&lt;/p&gt;



&lt;p&gt;At the same time, we haven’t lost sight of our broader priorities for 2026, including the long-awaited Linux client. We’ll keep building on this foundation throughout the rest of the year.&lt;/p&gt;



&lt;p&gt;Thank you for supporting our mission to give people everywhere a secure, private way to store and share files without their data being exploited for profit. Tell us what you would like to see next on &lt;a href=&quot;https://protonmail.uservoice.com/forums/932839-proton-drive&quot;&gt;UserVoice&lt;/a&gt;.&lt;/p&gt;
</content:encoded><category>Product updates</category><category>Proton Drive</category><author>Anant Vijay Singh</author></item><item><title>In rush for age checks, we’re putting kids’ security at risk</title><link>https://proton.me/blog/is-age-verification-safe</link><guid isPermaLink="true">https://proton.me/blog/is-age-verification-safe</guid><description>Is age verification safe? Learn how age checks can expose children to privacy risks, scams, and data breaches.</description><pubDate>Fri, 10 Apr 2026 19:30:52 GMT</pubDate><content:encoded>
&lt;p&gt;As governments across the world charge ahead with &lt;a href=&quot;https://proton.me/blog/age-verification&quot;&gt;age-verification laws&lt;/a&gt;, a well-intentioned rush to protect children is actually putting them at risk. &lt;/p&gt;



&lt;p&gt;The goal is to shield children from harmful materials, but these laws lack sufficient safeguards to protect privacy. All it takes is a single data breach, and a law intended to protect children could end up exposing their sensitive personal information to the world.&lt;/p&gt;



&lt;p&gt;To be sure, children deserve an internet that they can navigate safely. But explicit content and predatory social media are not the only dangers online. Privacy violations, especially for the young, can also do serious harm. Especially since, as the old warning goes, “The internet is forever.”&amp;nbsp;&lt;/p&gt;



&lt;p&gt;We should not accept simply trading one risk for another.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How the risks could affect kids&lt;/h2&gt;



&lt;p&gt;To verify their ages online, users are often asked to submit government IDs, credit card numbers, selfies, or unique biometric information. When breaches happen — and they do, with depressing regularity — that sensitive data is exposed.&lt;/p&gt;



&lt;p&gt;What’s more, many companies outsource their age-verification services to a handful of third-party vendors. Those suppliers, as storehouses of the data, become all-too-tempting targets for hackers and criminals. Without sufficient policies on data minimization, usage, storage, and privacy, user data remains deeply vulnerable.&lt;/p&gt;



&lt;p&gt;In September, &lt;a href=&quot;https://www.theguardian.com/games/2025/oct/07/discord-data-breach-proof-of-age-id-leaked&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;a cyberattack compromised a third-party vendor&lt;/a&gt; for Discord, a video game chat platform, granting the attacker access to at least &lt;a href=&quot;https://discord.com/press-releases/update-on-security-incident-involving-third-party-customer-service&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;70,000 images of government-issued IDs&lt;/a&gt;, including passports and licenses.&lt;/p&gt;



&lt;p&gt;Discord had been collecting photos of IDs in compliance with the UK’s age-verification law, which took effect in July.&lt;/p&gt;



&lt;p&gt;Since the implementation of the law, the UK’s Office of Communications &lt;a href=&quot;https://www.ofcom.org.uk/siteassets/resources/documents/online-safety/research-statistics-and-data/os-standards/online-safety-in-2025-summary-of-the-technology-sectors-response-to-our-rules.pdf?v=408836&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;reported&lt;/a&gt; that “many records were not consistent” with record-keeping and review guidance. Many companies also failed to show how they were taking responsibility for online safety risks.&lt;/p&gt;



&lt;p&gt;This breach highlights the real-life consequences of online attacks. As age-verification laws gain traction on a larger scale, an emphasis should be placed on privacy. Protecting sensitive personal information makes the internet a safer place for everyone, including children.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The need for balance&lt;/h2&gt;



&lt;p&gt;The rush to prioritize age checks for minors without prioritizing secure methods of verification create additional cybersecurity risks that can put children in harm’s way. As governments make premature decisions about these technologies, they are opening a Pandora&amp;#8217;s box for hackers and cybercriminals to mine at their leisure.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Moving forward, governments and legislatures must be thoughtful about the technologies they employ and the risks they come with. Policymakers should prioritize decentralized solutions that protect minors against the real threat of cyberattacks, without compromising users’ anonymity and right to privacy. &lt;/p&gt;
</content:encoded><category>Privacy news</category><author>Edward Komenda</author></item><item><title>What are the alternatives to age verification?</title><link>https://proton.me/blog/age-verification-alternatives</link><guid isPermaLink="true">https://proton.me/blog/age-verification-alternatives</guid><description>Explore alternatives to online age verification, from parental controls to zero-knowledge proofs, and how they can protect children without exposing personal data.</description><pubDate>Fri, 10 Apr 2026 19:19:39 GMT</pubDate><content:encoded>
&lt;p&gt;With age-check systems, there isn’t a one-size-fits-all solution.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://www.cnil.fr/en/online-age-verification-balancing-privacy-and-protection-minors#:~:text=The%20CNIL%20has%20analysed%20several,satisfactorily%20meets%20these%20three%20requirements.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research suggests&lt;/a&gt; that no single method effectively protects children while also balancing concerns about privacy and access to information, but there is a way forward. Applying a broad array of common-sense measures, including parental controls and digital literacy education, can go a long way in helping guard children against potentially harmful content while remaining mindful of privacy rights and the nuanced ways young people use the internet.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Attribute-based verification&lt;/h2&gt;



&lt;p&gt;It’s not exactly an alternative to age verification, but proponents of attribute-based verification argue that it provides a more secure and private method of verifying a user’s age. That’s because it verifies only what’s necessary, such as requiring a self-declared age range rather than a government ID. But it has its limitations. Notably, any method that relies on self-declaration can be easily circumvented. It also fails to address the issue of &lt;a href=&quot;https://www.eff.org/pages/zero-knowledge-proofs-are-not-solution-age-gating-mandates&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;personal data privacy&lt;/a&gt;, as it does not prevent websites from collecting additional information, such as users’ IP addresses.&lt;/p&gt;



&lt;p&gt;Attribute-based age checks, however, store data on the user’s device. This limits the number of people with access to a user’s private data and reduces the cyberattack risks posed by other age-check methods.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Zero Knowledge Proofs&lt;/h2&gt;



&lt;p&gt;Like attribute-based verification, a zero knowledge proof (ZKP) provides a way for websites and apps to verify a user’s age without the user having to explicitly share personal data about their identity. But &lt;a href=&quot;https://www.circularise.com/blogs/zero-knowledge-proofs-explained-in-3-examples&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;ZKP isn’t an alternative to age verification&lt;/a&gt;, rather, it’s a cryptographic tool that allows websites and apps to verify information about the user in question without gaining any additional information about the user. &lt;/p&gt;



&lt;p&gt;In 2025, &lt;a href=&quot;https://blog.google/products-and-platforms/platforms/google-pay/google-wallet-age-identity-verifications/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Google announced ZKP integration&lt;/a&gt; within Google Wallet to provide age verification across multiple apps. The tech company said it would continue to use ZKP with existing partners, like Bumble, to verify users&amp;#8217; ages without revealing their identities. &lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Age-Appropriate Design Code&lt;/h2&gt;



&lt;p&gt;The Electronic Privacy Information Center’s model bill for Age-Appropriate Design Code (AACD) was designed as an alternative to the rise in age verification legislation. &lt;a href=&quot;https://epic.org/epic-model-aadc/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;The AACD gives children agency over their online experiences&lt;/a&gt; while requiring tech companies to evaluate their programs for features that put children at risk for compulsive use. &lt;/p&gt;



&lt;p&gt;Additionally, the AACD would prohibit these companies from implementing programs with high-risk features, and would provide transparency into addictive design practices. &lt;/p&gt;



&lt;p&gt;Unlike age verification legislation, the AACD places responsibility on the manufacturers of these technological platforms, rather than the users they exploit, circumventing issues around privacy and personal security.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Device- and OS-level parental controls&lt;/h2&gt;



&lt;p&gt;Parents and children can work together on a solution that best meets their needs. Device- and OS-level parental controls offer a more personalized approach to gatekeeping what kids see online.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Parents can set up their children’s devices to restrict or limit certain content. OS-level controls can be set up to limit daily screen time, require approval to install apps, and use web content filters, but the internet’s ever-changing nature means web filters can’t always keep up.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;Used in conjunction with other protective measures, however, these restrictions can act as guardrails that reduce children’s exposure to harmful content without universal age verification.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/#:~:text=Screen%20time%20is%20inversely%20correlated%20with%20parental%20controls.&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research suggests&lt;/a&gt; children who report less screen time are also the most likely to have parental controls on their devices. Yet parental controls are underutilized, according to the nonprofit &lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Family Online Safety Institute&lt;/a&gt;. &lt;/p&gt;



&lt;p&gt;Use of parental controls varies widely across device types, and they are hardly a perfect solution. Children may have access to more than one device, making time limits and content filters harder to enforce.&amp;nbsp;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Education and digital literacy&amp;nbsp;&lt;/h2&gt;



&lt;p&gt;Talking with kids about online safety can make parental controls more effective.&lt;/p&gt;



&lt;p&gt;In households that reported six or more conversations about online safety annually, both parents and children were more likely to say that parental controls effectively keep children safe online, &lt;a href=&quot;https://fosi.org/parental-controls-for-online-safety-are-underutilized-new-study-finds/#:~:text=research%20shows%20that%20open%20communication%20remains%20one%20of%20the%20most%20powerful%20tools%20parents%20have%20to%20support%20their%20children%E2%80%99s%20digital%20wellbeing.%E2%80%9D&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research found&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;And those offline lessons can be valuable tools in protecting children when they are online.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://iris.who.int/server/api/core/bitstreams/0ce56bbf-4535-405e-9bd6-e143f64ae2ba/content&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;Research&lt;/a&gt; from the World Health Organization suggests educational programs and cyberbullying prevention can work to reduce violence against children online. Programs that discuss online dangers and offline violence prevention, as well as healthy relationship skills, can help address children’s vulnerabilities to sexual abuse, harassment, and bullying, a &lt;a href=&quot;https://iris.who.int/server/api/core/bitstreams/0ce56bbf-4535-405e-9bd6-e143f64ae2ba/content&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;WHO study&lt;/a&gt; found.&lt;/p&gt;



&lt;p&gt;Parental guidance, support, and the ability to engage critically with online content all affect how a child might feel about what they see on the internet, &lt;a href=&quot;https://www.unicef.org/innocenti/media/7006/file/GKO-Summary-Report-2019.pdf&quot; target=&quot;_blank&quot; rel=&quot;noreferrer noopener&quot;&gt;research suggests&lt;/a&gt;.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;The way forward&lt;/h2&gt;



&lt;p&gt;Protecting children doesn’t require turning the entire internet into an ID checkpoint. The widespread deployment of online age checks struggles to balance legitimate child protection concerns against users’ data privacy rights. Until that balance is struck, existing measures can help kids navigate the internet confidently without surrendering sensitive personal information at every turn.&lt;/p&gt;
</content:encoded><category>Privacy guides</category><author>Edward Komenda</author></item><item><title>What small businesses still get wrong about password managers</title><link>https://proton.me/business/blog/smb-cybersecurity-report-passwords</link><guid isPermaLink="true">https://proton.me/business/blog/smb-cybersecurity-report-passwords</guid><description>Over half of SMBs use a business password manager, but they&apos;re still not reaping the full benefits. Our research suggests solutions.</description><pubDate>Fri, 10 Apr 2026 10:57:18 GMT</pubDate><content:encoded>
&lt;p&gt;The way small and medium businesses work has changed for good — but so has the way they get attacked. Teams are distributed, SaaS tools handle everything from payroll to project management, and contractors and vendors rotate in and out of systems regularly. With each new tool or employee with access, the number of potential entry points increases.&lt;/p&gt;



&lt;p&gt;That expanding attack surface matters because credential-based attacks, including phishing, account takeovers, and password theft, have become one of the most common ways businesses get breached. They work precisely because &lt;strong&gt;access has sprawled, which makes it difficult to track&lt;/strong&gt;. All an attacker has to do now is find one valid set of credentials to bypass your business’s defenses.&lt;/p&gt;



&lt;p&gt;In this context, it &lt;em&gt;should&lt;/em&gt; be encouraging that over half of small businesses now use a &lt;a href=&quot;https://proton.me/business/pass&quot;&gt;business password manager&lt;/a&gt;. But Proton&amp;#8217;s &lt;a href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;SMB Cybersecurity Report 2026&lt;/a&gt; — a global study of 3,000 SMB decision makers — found that one in four still experienced a breach last year.&amp;nbsp;&lt;/p&gt;



&lt;p&gt;All this points to a gap between how tools are adopted and how they&amp;#8217;re actually used.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How SMBs use password managers today&lt;/h2&gt;



&lt;p&gt;Most password managers are designed to do one thing well: help you remember your password. In practice, that means creating complex and unique passwords and managing them in an encrypted vault. That&amp;#8217;s meaningfully better than the norm of reusing the same credentials across accounts and platforms.&lt;/p&gt;



&lt;p&gt;But with passwords being an attacker&amp;#8217;s easiest point of entry, SMBs need password managers to do much more than just solve memory and convenience problems. They need it to secure access.&lt;/p&gt;



&lt;p&gt;Access is a far broader question. &lt;strong&gt;Do the right people have the right credentials — and would you know what they unlock or if they fell into the wrong hands?&lt;/strong&gt; And as teams grow, subscriptions stack up, and contractors cycle in and out, your organization&amp;#8217;s considerations need to shift from merely strengthening passwords to accounting for real-world security threats.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s the change most businesses don&amp;#8217;t make until something goes wrong.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Where password manager implementations go wrong&lt;/h2&gt;



&lt;p&gt;The key insight of our report was that businesses adopting password managers don&amp;#8217;t consistently use them.&lt;/p&gt;



&lt;p&gt;&lt;strong&gt;Unsafe credential sharing still persists at surprisingly high rates:&lt;/strong&gt;&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;33% share them in shared documents or spreadsheets&lt;/li&gt;



&lt;li&gt;30% share credentials via email&lt;/li&gt;



&lt;li&gt;27% share them via messaging apps&lt;/li&gt;



&lt;li&gt;25% write them down&lt;/li&gt;



&lt;li&gt;24% share them verbally&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;That&amp;#8217;s a picture of busy people taking the fastest route available at that moment. Instead of toggling over to the password manager app and sharing a new credential in its proper vault, they might paste it into Slack or an email.&lt;/p&gt;



&lt;p&gt;Workarounds feel harmless in isolation. But over time, credentials end up scattered across inboxes, chat histories, and shared documents in ways that are hard to untangle. When an employee leaves, you can&amp;#8217;t later revoke access. And updating passwords on a moment&amp;#8217;s notice after a data breach becomes impossible unless it&amp;#8217;s stored in a centralized secure location.&lt;/p&gt;



&lt;p&gt;Training to enforce security policies can help, but our research revealed even that isn&amp;#8217;t quite enough&amp;#8230;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Why security awareness training isn’t enough&lt;/h2&gt;



&lt;p&gt;Our report found that 39% of SMBs have experienced a security incident caused by human error. That statistic is easy to misread; the natural response is to assume that more careful employees means fewer incidents.&lt;/p&gt;



&lt;p&gt;But this framing misses something important: &lt;strong&gt;Security systems that depend on perfect behavior under everyday pressure will always be let down by reality.&lt;/strong&gt; Mistakes happen not because people don&amp;#8217;t care — they happen because the secure option often demands more effort and time than the typical SMB can afford. Even well-intentioned teams will find workarounds when they&amp;#8217;re resource-stretched.&lt;/p&gt;



&lt;p&gt;The lasting fix isn&amp;#8217;t more training. &lt;strong&gt;It&amp;#8217;s designing systems where the secure option is also the easy one.&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;&lt;em&gt;When sharing access safely takes no more effort than dropping a password into a chat message, people will use it.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;When the access problem gets out of control&lt;/h2&gt;



&lt;p&gt;The credential problem compounds as teams grow.&lt;/p&gt;



&lt;p&gt;Eighty-six percent of SMBs now rely on cloud-based services for day-to-day operations. That typically means credentials sprawl across project management tools, finance platforms, marketing software, file storage, and customer systems, each with its own permissions and access history.&lt;/p&gt;



&lt;p&gt;Access doesn’t just scatter across systems; it spreads across the organization, flowing between teams, external partners, contractors, and former employees who may still retain a way in.&lt;/p&gt;



&lt;p&gt;This means that in reality, credentials accumulate, old access continues to linger, and the number of people who have — or have had — the keys to your most sensitive systems scales beyond easy tracking.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Having tools isn&amp;#8217;t the same as being protected&lt;/h2&gt;



&lt;p&gt;The SMBs that experienced breaches last year weren&amp;#8217;t cutting corners: 92% were actively investing in security tools. They had password managers, encrypted email, training programs, and written policies in place. In other words, their setups looked solid on paper.&lt;/p&gt;



&lt;p&gt;What many lacked was consistent enforcement. &lt;a href=&quot;https://proton.me/authenticator&quot;&gt;Multi-factor authentication&lt;/a&gt; (MFA) was switched on but not required, password managers were deployed but not embedded into daily habits, and onboarding and offboarding processes were handled informally rather than systematically. &lt;strong&gt;We suspect, given the popularity of browser password managers, that many were not even using a centralized team platform at all — instead relying on a patchwork of less-safe options on an individual basis.&lt;/strong&gt;&lt;/p&gt;



&lt;p&gt;Each of these is a small gap that stays invisible right up until it isn&amp;#8217;t.&lt;/p&gt;



&lt;p&gt;The real measure of a security setup isn&amp;#8217;t what tools are on the list, but whether those tools hold up under the everyday pressure of how people actually work.&lt;/p&gt;



&lt;p&gt;Here are some practices to help bring this reality closer for your business:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;Use a password manager built for teams. &lt;/strong&gt;&lt;a href=&quot;https://proton.me/blog/chrome-password-manager&quot;&gt;Browser password managers&lt;/a&gt; are not only less secure, they don&amp;#8217;t have the admin tools managers need to maintain full control of your accounts. Unless you have an &lt;a href=&quot;https://proton.me/business/pass/enterprise-password-manager&quot;&gt;enterprise password manager&lt;/a&gt; that&amp;#8217;s easy to use, it&amp;#8217;s not going to cut it.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Audit who currently has access to what. &lt;/strong&gt;Check the user lists on your most sensitive tools and if any names on there come as a surprise.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Replace shared logins with individual accounts.&lt;/strong&gt; While it&amp;#8217;s easy to share logins in a password manager, it&amp;#8217;s not a best practice: Shared logins reduce visibility at the account level, making it harder to identify and react to a breach.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make multi-factor authentication a requirement.&lt;/strong&gt; MFA is one of the most effective protections available — but only when it&amp;#8217;s enforced by default, not left as an optional setting.&lt;/li&gt;



&lt;li&gt;&lt;strong&gt;Make offboarding systematic.&lt;/strong&gt; Every departure, whether it’s an employee, contractor, or vendor, should trigger an access review immediately rather than as an afterthought.&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Want to know what else you could learn from our survey of 3,000 business leaders across six key markets? Read more in our SMB Cybersecurity Report 2026. You&amp;#8217;ll learn what causes breaches and what they actually cost, where human error shows up most often, how cloud and AI adoption are creating new blind spots. It also includes practical steps for beefing up protection that hold up in real-world conditions.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/smb-cybersecurity-report&quot;&gt;Get the full report&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><author>Risa Tang</author></item><item><title>Proton Calendar now includes secure appointment scheduling</title><link>https://proton.me/business/blog/appointment-scheduling</link><guid isPermaLink="true">https://proton.me/business/blog/appointment-scheduling</guid><description>Share a public booking page where your colleagues, clients, or friends can schedule meetings based on your availability.</description><pubDate>Thu, 09 Apr 2026 11:53:31 GMT</pubDate><content:encoded>
&lt;p&gt;In the 12 years since Proton began, millions of people have joined our mission to make the internet safer and more private, including over 100,000 businesses and nonprofits. They rely on Proton&amp;#8217;s encrypted suite to protect their customers and teams, and we&amp;#8217;ve continued to add more services and plans to support them — most recently with the launch of &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt;.&lt;/p&gt;



&lt;p&gt;Today we&amp;#8217;re excited to announce the next addition to Proton Workspace with our secure &lt;a href=&quot;https://proton.me/business/mail/appointment-scheduling&quot;&gt;appointment scheduling tool&lt;/a&gt; in Proton Calendar.&lt;/p&gt;



&lt;p&gt;Whether you work with teams, run a side hustle, or take appointments from customers, you can now easily create public booking pages that show when you&amp;#8217;re available, and your clients and colleagues can book an appointment in seconds. It automatically creates a new event on your calendar and generates a private &lt;a href=&quot;https://proton.me/business/meet&quot;&gt;Proton Meet&lt;/a&gt; link where you can have a secure video call. New events are zero-access encrypted, so all the details stay between you and your contact. Not even we have access.&lt;/p&gt;



&lt;p&gt;For people dependent on platforms like Calendly, this means you no longer have to pay an extra subscription or give away calendar data to third-party services where it can be leaked or spied on. It&amp;#8217;s a perfect tool if your business is based on appointments or if you want to save time finding an available slot to meet with colleagues or friends.&lt;/p&gt;



&lt;p&gt;And it&amp;#8217;s available in our new &lt;a href=&quot;https://proton.me/business/blog/proton-workspace&quot;&gt;Proton Workspace&lt;/a&gt; plan, which combines all our business productivity tools into a single plan for complete data protection.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business/mail/pricing&quot;&gt;Try scheduling for teams&lt;/a&gt;&lt;/div&gt;



&lt;p class=&quot;has-text-align-center&quot;&gt;&lt;a href=&quot;https://proton.me/mail/pricing&quot;&gt;Explore plans for individuals&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Part of a seamless encrypted workspace&lt;/h2&gt;



&lt;p&gt;The new appointment scheduling tool is fully integrated with Proton Calendar and Proton Meet to protect your business data end to end.&lt;/p&gt;



&lt;p&gt;That&amp;#8217;s important because your team calendar contains a trove of information about you and your business activities: your location, your priorities, and your contacts. It&amp;#8217;s critical to keep that information protected from Big Tech platforms that could monetize or leak it, and from hackers who could use it against you for fraud or phishing attacks. Using a third-party booking platform spreads your information across the internet and increases your risk of a data breach, especially when those tools don&amp;#8217;t use strong encryption.&lt;/p&gt;



&lt;p&gt;Appointment scheduling bridges two fundamental business tools: Proton Calendar and the all-new Proton Meet for encrypted video calls. It&amp;#8217;s not enough for a business to be able to plan and host a secure video conference — they also need to be able to schedule it. Our appointment scheduling tool fills this gap.&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;How appointment scheduling works&lt;/h2&gt;



&lt;p&gt;Appointment scheduling is simple to set up, and it&amp;#8217;s available on all paid Proton Mail plans, Proton bundles, Meet Professional, and Proton Workspace. Teams with Workspace can create up to 25 booking pages to support multiple meeting purposes and durations.&lt;/p&gt;



&lt;figure class=&quot;wp-block-image size-large&quot;&gt;&lt;img width=&quot;1024&quot; height=&quot;538&quot; loading=&quot;lazy&quot; decoding=&quot;async&quot; src=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA&quot; alt=&quot;Depiction of the user interface that shows the booking page and how it looks to schedule an appointment&quot; class=&quot;wp-post-116956 wp-image-117006&quot; data-format=&quot;png&quot; data-transformations=&quot;f_auto,q_auto&quot; data-filesize=&quot;424 KB&quot; data-optsize=&quot;84 KB&quot; data-optformat=&quot;image/webp&quot; data-percent=&quot;80.1&quot; data-version=&quot;1775743341&quot; data-seo=&quot;1&quot; srcset=&quot;https://res.cloudinary.com/dbulfrlrz/images/w_1024,h_538,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1024w, https://res.cloudinary.com/dbulfrlrz/images/w_300,h_158,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 300w, https://res.cloudinary.com/dbulfrlrz/images/w_768,h_403,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 768w, https://res.cloudinary.com/dbulfrlrz/images/w_1536,h_806,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1536w, https://res.cloudinary.com/dbulfrlrz/images/w_2048,h_1075,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 2048w, https://res.cloudinary.com/dbulfrlrz/images/w_1568,h_823,c_scale/f_auto,q_auto/v1775743341/wp-pme/20260408-calendar-update-inline-1/20260408-calendar-update-inline-1.png?_i=AA 1568w&quot; sizes=&quot;auto, (max-width: 1024px) 100vw, 1024px&quot; /&gt;&lt;/figure&gt;



&lt;p&gt;In your Proton Calendar, just add a new booking page, give it a name, and specify the times you&amp;#8217;re available. Your booking page will have a link that you can share publicly, such as on your website, email signature, or social media profile.&lt;/p&gt;



&lt;p&gt;Whenever someone books a meeting with you, the event will instantly sync directly to your calendar (so it&amp;#8217;s not possible to double book). And your contact will receive a confirmation email. If you&amp;#8217;ve selected Proton Meet as the location for the meeting, the confirmation will include a secure meeting link.&lt;/p&gt;



&lt;p&gt;The time, description, and participants on every event are &lt;a href=&quot;https://proton.me/security/zero-access-encryption&quot;&gt;zero-access encrypted&lt;/a&gt;, meaning it&amp;#8217;s locked with your private &lt;a href=&quot;https://proton.me/learn/encryption&quot;&gt;encryption key&lt;/a&gt; and can&amp;#8217;t be accessed by Proton or anyone else.&lt;/p&gt;



&lt;p&gt;&lt;a href=&quot;https://proton.me/support/calendar-appointment-scheduling&quot;&gt;&lt;em&gt;Learn more about how to use appointment scheduling&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h2 class=&quot;wp-block-heading&quot;&gt;Power your growth with Proton Calendar&lt;/h2&gt;



&lt;p&gt;With appointment scheduling, Proton Calendar becomes more than just a way to track your schedule — it&amp;#8217;s a way to grow your business or side project. If you&amp;#8217;re a professional service provider, letting clients book meetings is a core part of your business model. But even if your business doesn&amp;#8217;t run on external meetings, the appointment scheduling tool can help you save time or be more available to your team.&lt;/p&gt;



&lt;p&gt;Appointment scheduling is perfect for:&lt;/p&gt;



&lt;ul class=&quot;wp-block-list&quot;&gt;
&lt;li&gt;Privacy-first providers like therapists, health clinics, law firms, and financial advisers&lt;/li&gt;



&lt;li&gt;Managers or executives looking to save time when setting up meetings&lt;/li&gt;



&lt;li&gt;Tutors scheduling time with students or professors hosting office hours&lt;/li&gt;



&lt;li&gt;People who work for themselves, like content creators, indie hackers, or marketplace sellers &lt;/li&gt;



&lt;li&gt;Anyone with a side project&lt;/li&gt;



&lt;li&gt;And many more business professionals&amp;#8230;&lt;/li&gt;
&lt;/ul&gt;



&lt;p&gt;Securing your meetings isn&amp;#8217;t just about protecting your own business, it&amp;#8217;s also about protecting the people you do business with. When it comes to fields like healthcare, data protection is even an ethical and legal obligation. Appointment scheduling in Proton Calendar helps you meet those obligations while signaling to your customers that your business takes security seriously.&lt;/p&gt;



&lt;div class=&quot;text-center&quot;&gt;&lt;a class=&quot;btn inline-block rounded-full font-bold btn-small btn-solid-purple&quot; href=&quot;https://proton.me/business&quot;&gt;Explore Proton Workspace&lt;/a&gt;&lt;/div&gt;
</content:encoded><category>For business</category><category>Proton Calendar</category><author>Anant Vijay Singh</author></item></channel></rss>