ProtonBlog(new window)

Earlier today, we released Proton Mail 2.0 to the world(new window). We are happy to announce that we are also releasing Proton Mail 2.0 as open source software! From the beginning, we have been strong proponents of open source software and the core cryptography libraries that we develop and use have been open source from day one(new window).

Today, we are happy to take the next step and completely open source our webmail interface. This means all the Proton Mail code that runs on your computer is now available for inspection. We hope that by opening up our platform, we will encourage additional contributors to help us make Proton Mail the world’s most secure email service.

Our move to open source has actually been coming for a long time. While it would have also been possible to open source Proton Mail 1.x, we felt that such a move was not appropriate given that the code was intended to be deprecated. By open sourcing Proton Mail 2.0, we are open sourcing the future of Proton Mail. As we continue to expand our private email service with mobile apps, you can look forward to more open source announcements as our code base matures.

Proton Mail 2.0 can be viewed online on Github at the link below. As a nod to our CERN and MIT roots, we are releasing under the permissive MIT license. Let us know if you do something cool with our code.

https://github.com/ProtonMail/WebClient(new window)

We welcome all feedback at security@proton.me and look forward to continuing to improve Proton Mail with your help!

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv