Proton Profile picture
May 7, 2020 4 tweets 2 min read Read on X
Happy #WorldPasswordDay! Don't forget your security is only as strong as the weakest link. We have several resources to help you understand how passwords can be compromised and what you should do to protect them. Image
First of all, should you use a "password" or a "passphrase"? The answer is that it depends. Learn about the password vs. passphrase debate: protonmail.com/blog/protonmai…
Next, explore the considerations behind how long your password should be. It turns out, even some long passwords can be hacked, so "length" is not synonymous with "secure." protonmail.com/blog/how-long-…
And finally, here are our three steps to create a strong password:
1. Use a password manager.
2. Generate unique, random passwords for all your accounts.
3. Use a long passphrase for passwords you must memorize.
More details: protonmail.com/blog/how-to-cr…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Proton

Proton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @ProtonPrivacy

Dec 16
If like many across the world you'll soon be off and looking for something to do, here’s your annual privacy & security tune-up.

Cue a looooong thread to bookmark for when you’re ready to lock it down.

If you've already done all of this, you dropped this: 👑

1/15
Audit your browser extensions

Why?

People add extensions to their browsers for many different reasons.

They will often have wide-ranging permissions, meaning they could access and track your online activity.

Not useful? bin it!

Even if it is, proceed with caution.

2/15
Enable 2FA for anything that matters

Why?

Authenticating with 1 factor, like a password, leaves you vulnerable.

Why would you just use one key to get into your house when you can have the security of two? Especially when that 2nd can be hard-to-fake like biometrics.

3/15
Read 15 tweets
Dec 2
The GrapheneOS team has said that “France isn’t a safe country for open source privacy projects,” pointing to what it describes as the expectations of encryption backdoors.

Last week, it announced it has removed all servers from France.



1/5
This raises some questions: what is GrapheneOS, why do people use it, and what's up with France? 🇫🇷

For the first question: GrapheneOS is a nonprofit, open-source, and Android-based operating system used by many people seeking better privacy, security, & control.

2/5
It offers no bloatware, Google lock-in, forced apps, or background data collection, as well as advanced privacy & security.

GrapheneOS has also begun to end its relationship with hosting provider, OVHCloud.

There are open questions on if OVH can guarantee data sovereignty.

3/5
Read 5 tweets
Nov 24
Security researchers say a design flaw in WhatsApp’s contact-lookup feature has enabled what they call the “largest data leak in history”, exposing billions of phone numbers without breaking encryption.

Normally the lookup process would incur rate limits, normally...

1/5 Image
But in this case, they were able to run through 7k phone numbers /second (and session), using 63bn numbers generated by their tool.

None of this required decrypting a single message.

They confirmed 3.5bn phone numbers, more than the number officially stated by WhatsApp.

2/5
More than 57% of the active accounts they grabbed had a profile picture; two thirds of this group had images containing human faces.

~29% had text in their profile which could be used to discover more about them, such as their sexuality, political views, or drug use.

3/5
Read 5 tweets
Oct 28
As 2025 winds down, we’re continuing to build tools that let you take control of your digital life without compromising privacy.

Our latest roadmap reflects your feedback and our mission: to empower you, not exploit you.

Here’s a peek at what’s coming next 👇

1/4
✉️ Mail & Calendar

Smarter inboxes will use Category View to automatically sort emails while staying private.

🌐 VPN

We will add free servers in 5 additional countries (Mexico, Canada, Switzerland, Norway, and Singapore) - better speeds, more coverage.

2/4
📁 Drive

Shared Drives are coming, allowing you to collaborate securely with teams or family in one encrypted space.

🔒 Pass

Folders and subfolders in Proton Pass will help you keep your files and credentials organized.

3/4
Read 4 tweets
Oct 23
Europe outsourced its digital backbone for decades.

Today, that choice has become a strategic liability.

New Nordic snapshots show how deep that dependency runs in 🇩🇰Denmark, 🇫🇮Finland, 🇮🇸Iceland, 🇳🇴Norway, and Sweden🇸🇪.

Let's talk about it! ⬇️ Image
Baseline: 74% of Europe’s publicly listed companies depend on US tech for email/security (the gateway to cloud, docs, identity, and security).

Nordics Stats

🇩🇰DK: 89% → 9 sectors at 100%; consumer staples distribution & retail 0%

🇫🇮 FI: 92% → 16 sectors at 100%; household & personal products 50%

🇮🇸IS: 97% → 16 sectors at 100%; household & personal products 50%

🇳🇴NO: 96% → 17 sectors at 100%; media & entertainment 75%

🇸🇪SE: 91% → 9 sectors at 100%; banks 27%

Read the full study: proton.me/business/europ…Image
When your company relies on US tech companies, you're not just outsourcing tech.

You're exposing your organization to strategic risks that are out of your control:

→ AI models trained on your company’s data
→ CLOUD Act–enabled surveillance
→ No say over data location
→ Critical sectors exposed to geopolitics
Read 5 tweets
Oct 17
How much do you know about the most advanced censorship system in the world?

Framed as protection against "Western influence", China's Great Firewall controls the political + economic narrative for China's 700M+ users (a quarter of all internet users).

1/8
But it doesn't stop there...

A massive leak of 100,000+ documents has revealed that a Chinese company, Geedge Networks, is exporting GFW-style tech to authoritarian regimes worldwide.

Recipients include Kazakhstan, Ethiopia, Pakistan, Myanmar, & others.

2/8
Leaked job ads from them seek English speakers to work in Pakistan, Malaysia, Bahrain, Algeria, and India, all of which have track records of censorship.

One co-founder of Geedge Networks is Fang Binxing - known as the “Father of the Great Firewall.”

3/8
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(