An illustration of four locks.

EU citizens’ rights are under threat from anti-encryption proposals

January 28th, 2021 in Articles & News

In December 2020, The Council of the European Union released a five-page resolution that called for the EU to pass new rules to govern the use of end-to-end encryption in Europe. We strongly oppose this resolution because it foreshadows an attack on encryption. We were not the only European-based end-to-end encrypted service that was alarmed …

An illustration of Big Tech monetization

How Big Tech monetizes the whole internet, not just their own platforms

October 29th, 2020 in Articles & News

The saying goes that if you aren’t paying for a product, you are the product. As a Facebook, Google, or Twitter user, it’s easy to think of yourself as the customer. But there’s a reason why you get access to these attractive and user-friendly services for free.  These companies make money by spying on you, …

An illustration of ProtonMail's public keys.

Proton is secure against batch GCD attacks

October 23rd, 2020 in Security

This summer, we conducted a security audit to determine whether Proton is susceptible to an attack against public key cryptography, known as a batch GCD attack. As a result of our analysis, we can confirm that none of our users is vulnerable to this attack. The attack exploits faulty sources of randomness when it comes …

Import Assistant ProtonMail

ProtonMail launches Import Assistant for quick email migration

October 22nd, 2020 in Articles & News

We’re happy to announce that you can now use Import Assistant in beta to safely transfer your messages and folders to ProtonMail’s end-to-end encrypted email service.  Import Assistant is initially accessible to all ProtonMail users with paid plans directly from the web app and it requires no installation or download. In the future, it will …

Illustration of cloud storage

Centralized vs peer-to-peer (P2P) file storage

October 8th, 2020 in Security

In 2017, hackers stole the private financial records of some 156 million people from servers belonging to Equifax, while the 2018 Facebook-Cambridge Analytica scandal revealed how personal data belonging to up to 87 million Facebook users was harvested without their consent. A litany of high-profile data breaches has led to a growth of interest in …

Illustration of Big Tech monopolies

The US congressional antitrust report is a win for privacy

October 7th, 2020 in Articles & News

Late Tuesday night, a US congressional subcommittee investigating the major tech companies for anti-competitive practices released its much-anticipated report. The document, over 400 pages long, describes an internet that is highly centralized around gigantic platforms that abuse their monopoly power to the detriment of internet users. This report by the House Judiciary Subcommittee on Antitrust, …

Illustration of BGP hijacking

Statement regarding BGP hijacking on September 29

October 1st, 2020 in Articles & News

At Proton, we strive to plan for all contingencies that might affect our service. Our efforts paid off on Tuesday, September 29 (around 4 AM Wednesday morning, Australia time), allowing us to turn a very serious incident into a minor inconvenience for some of our users. As far as we currently understand the situation, this …

Proton 4.0 is now in beta

Proton V4 web beta brings persistent single sign-on in huge step toward full integration

September 30th, 2020 in Releases

Today, we are marking a major milestone in our mission to expand privacy online with the launch of a new beta version of ProtonMail for web that includes crucial new features like Single Sign-On and persistent sessions (“remember me”).  Today’s updates create the foundation of a fully integrated, private, and encrypted ecosystem covering all basic …

An illustration of an encrypted flash drive.

How to secure data on your external hard drives and USB peripherals

September 8th, 2020 in Security

USB peripherals (commonly known as “flash drives”), memory cards, and external hard drives all make backing up and sharing your data simple. And they are becoming more critical as modern-day schooling, work, and life are increasingly awash in data. But what happens if you lose or misplace one of these devices? In many cases, the …

Temporary TLS certificate update for September 2020

September 4th, 2020 in Security

UPDATE Sept. 15, 2020: SwissSign has dealt with the DDoS attack and has taken measures to prevent similar outages in the future. Therefore, we are using them again as our certificate authority. We have updated the fingerprints at the bottom of this article. Proton has recently begun using Let’s Encrypt instead of SwissSign as the …

ProtonDrive

The ProtonDrive security model

August 31st, 2020 in Encryption, Security

This article documents ProtonDrive’s security model by showing how it uses end-to-end encryption to protect your sensitive data. While somewhat technical, this document is meant to be accessible to a general audience and attempts to explain how ProtonDrive works in plain language. ProtonDrive is in the final stages of development before our beta launch later …

An illustration of the Chinese government monitoring Hong Kong citizens.

Chinese government builds new Great Firewall around Hong Kong

July 6th, 2020 in Articles & News

The governing body of Hong Kong rushed approval of Article 43, which grants sweeping powers to Hong Kong law enforcement, including the ability to intercept private communications and censor online media without a warrant. These regulations specify the powers that the Hong Kong government can take under the National Security Law that was passed by …

Get your secure email account
Create Account

Proton Technologies AG

Route de la Galaise 32
1228 Plan-les-Ouates, Geneva, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com