Proton

Sind Sicherheitsfragen schrecklich für die Kontosicherheit?

The cover image for a Proton blog about whether security questions are safe. The image shows two password fields, one with a shield containing a question mark and one with a triangle containing an exclamation mark
Edward Komenda

Ed ist Autor und Journalist. In den letzten 10 Jahren erschienen seine Arbeiten in großen Zeitungen und Magazinen in den USA und auf der ganzen Welt. Er hat über alles geschrieben, von Wirtschaft und Technologie bis hin zu Politik, Regierung und Kultur. Ed kam 2023 zu Proton, um Online-Privatsphäre als grundlegendes Menschenrecht zu schützen.

Verwandte Artikel

The ChatGPT and Lumo logos, representing a private ChatGPT alternative
en
ChatGPT comes with privacy and security risks for your data. But there's a private ChatGPT alternative that's safe to use.
The ChatGPT logo and a question mark, representing uncertainty about whether ChatGPT is safe to use
en
  • Privatsphäre-Leitfäden
Is ChatGPT safe to use? Learn the privacy, security, and business risks of AI assistants, what not to share, and a private alternative.
Illustration of a hand holding a megaphone in the air
en
  • Privatsphäre-Leitfäden
Protesters can expose personal information that puts them at risk. Here’s how to keep your identity private and your devices secure at a demonstration.
an image of a purple cartoon phone with an unlocked logo on the screen and a black alert icon in the top right of the screen
en
Your phone can be hacked just like your computer, but how can you tell? Find out how to know if your phone is compromised.
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks of AI products for kids.
en
An AI-powered toy left 50,000 children’s chat transcripts exposed. Here’s what the incident reveals about data collection, storage, and the risks for kids.
en
Proton’s small-business survey upends the “SMBs are unprepared” cliché, showing how leaders are investing in security and why it hasn’t fully worked.