protonmail bridge for linux

ProtonMail launches Bridge for Linux

April 1st, 2020 in Articles & News

We are excited to announce that starting today, you can use Bridge to connect your ProtonMail account with your desktop email app on the Linux operating system. ProtonMail Bridge is a desktop app available to all paying subscribers that integrates ProtonMail’s strong privacy and security features, such as zero-access encryption and end-to-end encryption, with your …

How to protect your data as COVID-19 scams soar

March 31st, 2020 in Articles & News

As the world is grappling with a sharp rise in the number of COVID-19 cases, fraudsters are trying to capitalize on the state of panic and even the goodwill of others. More than 1,400 coronavirus-related domains were registered over the past three months, many used for phishing scams, misinformation, or as an interface for fraudulent …

Illustration of someone working from home.

Working from home: A security guide from ProtonMail’s IT security experts

March 30th, 2020 in Security

Working from home is one of the many massive societal changes that COVID-19 has forced upon the world. Millions of people are now handling sensitive work data outside their office for the first time. It can be hard enough to keep data secure in the office, where there are IT security officers to monitor the …

An illustration of Zoom's attendee attention tracking.

Using Zoom? Here are the privacy issues you need to be aware of

March 20th, 2020 in Privacy

Zoom has seen a flood of new users as the COVID-19 outbreak forces more and more employees to transition to working from home. Zoom’s big selling point is its near-frictionless video calls. However, new users should be aware of the company’s privacy practices. By looking through its privacy policy and some of its support documents, …

An illustration of political campaigns sharing voter data.

Political campaigns and your personal data

March 13th, 2020 in Privacy

During this American presidential election campaign season, politicians have scored points calling out tech companies for abusing the personal data of their users. Yet many political campaigns are engaged in very similar practices.  Political campaigns are now sophisticated data operations that collect mass amounts of personal information from their supporters and potential voters. Their methodology …

Illustration of alternative routing

Introducing alternative routing to prevent censorship of Proton apps

March 12th, 2020 in Releases

We’re announcing today a new anti-censorship system that can help users access our website if their government, ISP, or network administrator has blocked Proton services. The alternative routing feature is not yet deployed as of writing, but in the coming weeks, we plan to release it across all of our mobile and desktop applications. With …

Illustration of vulnerability disclosure

ProtonMail’s responsible vulnerability disclosure policy

March 5th, 2020 in Security

Our mission at ProtonMail is to make online safety accessible to everyone. Millions of people depend on our products to secure their communications and keep their information private. In order to make this high level of security accessible to all Internet users, we must work to integrate ProtonMail seamlessly with third-party products, from web browsers …

Illustration of a user using DKIM keys to stop a hacker spoofing their email.

Introducing DKIM key management, a new feature to protect against domain name impersonation

February 27th, 2020 in Releases

It is now harder for hackers and spammers to impersonate ProtonMail users that have custom domain email addresses. We have introduced the DKIM key management in beta, which allows you to manually rotate your DKIM keys. This is part of our continuing effort to make it more difficult for attackers to impersonate our users’ custom …

why users pay for protonmail

Privacy isn’t free. Here’s why that’s a good thing.

February 25th, 2020 in Privacy

Every once in a while, we are asked the question, why should I pay for ProtonMail when I can use Gmail for free? Or why should I pay for ProtonMail when there are cheaper email services available? This is actually a good question worthy of a deeper discussion.  Google isn’t actually free First, it’s important …

An illustration of cryptojacking.

How to keep your devices safe from cryptojacking

February 19th, 2020 in Security

Cryptojacking made headlines back in 2017 when hackers hit a series of high profile websites (including several operated by the UK and Australian governments). Whenever somebody visited an infected site, the hackers were able to hijack the visitor’s computer and use its processing power to mine cryptocurrency. Unfortunately, while the media covered the attacks at …

illustration of email surveillance

What the latest email spying scandal means for user privacy

February 14th, 2020 in Articles & News

On Monday, Vice’s Motherboard broke yet another story revealing the extent to which companies are monetizing their users. Reporter Joseph Cox’s investigation revealed how Edison, an email productivity app, is scraping users’ personal inboxes for purchase receipts and shipment tracking updates. Using this data, the company can create “detailed behavior patterns” for its users, selling …

An illustration of different smart devices that make up the Internet of Things.

The privacy risks of the Internet of Things

February 11th, 2020 in Privacy

The Internet of Things has come a long way since the turn of the century when it was a buzzword used by futurists and entrepreneurs. Although not yet as ubiquitous as some predicted a decade ago, Internet-connected devices have crept into many aspects of our daily lives. Now, with everything from vacuum cleaners to climate …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com