An illustration of content scanning that could happen under EARN IT.

EARN IT is a dangerous law that could be used to break encryption

August 4th, 2020 in Encryption

We recently wrote about a proposed law in the United States known as the Lawful Access to Encrypted Data Act (LAED Act), which would basically ban encryption by requiring companies to build a backdoor. But this is not the only effort underway in the US Congress that attempts to destroy privacy as we know it. …

An illustration of the Chinese government using TikTok to watch its users.

TikTok and the privacy perils of China’s first international social media platform

July 23rd, 2020 in Privacy

TikTok, the video-sharing platform owned by the Chinese social media giant ByteDance, is one of the most popular social media services in the world, with an estimated 800 million users. However, its zealous data collection, use of Chinese infrastructure, and its parent company’s close ties to the Chinese Communist Party make it a perfect tool …

An illustration of law enforcement breaking through encryption.

The Lawful Access to Encrypted Data Act wants to ban strong encryption

July 22nd, 2020 in Encryption

The United States Congress is considering a law that would destroy online privacy as we know it and essentially outlaw the most secure American tech products, such as Signal. The law would ban end-to-end encryption for large companies and require developers to break their own products at the request of law enforcement agencies. The bill …

An illustration of protesters protecing their privacy.

The Proton guide to privacy at protests

June 17th, 2020 in Privacy

From Hong Kong to Minneapolis, protesters around the world are standing up for their human rights. The right to peaceful assembly and protest are bedrocks of democracy, and we support everyone’s ability to exercise these rights. We created ProtonMail to protect people’s privacy and freedom from encroaching surveillance. For this reason, activists around the world …

Illstration of the surveillance represented by user data requests.

Massive corporate databases become government tools of surveillance

June 16th, 2020 in Privacy

The number of data requests the US government sent to Google has increased 510% since 2010. US government requests to Facebook have also increased 364% since the beginning of 2013. The databases of private companies are increasingly being used to monitor individuals with little transparency into the process. In 2013, when Edward Snowden revealed the …

An illustration of COVID-19 contact tracing apps.

What you need to know about contact tracing apps and privacy

May 15th, 2020 in Privacy

Nearly all public health experts say we will have to employ testing and tracing on a massive scale to combat the spread of COVID-19. This has led a number of countries and tech companies to develop coronavirus contact tracing apps for smartphones. The idea is that such an app would allow someone who tested positive …

An illustration of anonymized data.

The truth about anonymized data

April 30th, 2020 in Privacy

Many companies that handle personal information reassure their users by saying that all the data is “anonymized.” If you don’t know any better, that sounds reassuring. However, the method most companies use to anonymize data and the size of modern databases make it easy for attackers to re-identify individuals. From medical records to cell phone …

An illustration of the multi-account feature for iOS.

Out of beta: Switch between multiple accounts in ProtonMail iOS

April 29th, 2020 in Releases

UPDATE July 21, 2020: Multi-account support for iOS has exited beta and is now available to all our iOS users. Version 1.12 of ProtonMail iOS lets you manage multiple ProtonMail accounts on your phone without needing to log in and log out repeatedly. This makes it perfect for business owners, freelancers, or anyone else who …

An illustration of the ProtonMail Android app going open source.

All ProtonMail apps are now open source, as Android joins the list!

April 23rd, 2020 in Articles & News

Starting today, every app you use to access your ProtonMail inbox is open source and has passed an independent security audit. One of our guiding principles is transparency. You deserve to know who we are, how our products can and cannot protect you, and how we keep your data private. We believe this level of …

Illustration of ProtonMail Bridge open source

ProtonMail Bridge is now open source!

April 15th, 2020 in Articles & News

We are one step closer to fully open sourcing all our apps. ProtonMail Bridge joins iOS and the web app as open source software, and it has also passed an independent security audit. Trust and transparency are core values of ProtonMail. We want you to know who is on our team and how we protect …

Illustration of someone working from home.

Working from home: A security guide from ProtonMail’s IT security experts

March 30th, 2020 in Security

Working from home is one of the many massive societal changes that COVID-19 has forced upon the world. Millions of people are now handling sensitive work data outside their office for the first time. It can be hard enough to keep data secure in the office, where there are IT security officers to monitor the …

An illustration of Zoom's attendee attention tracking.

Using Zoom? Here are the privacy issues you need to be aware of

March 20th, 2020 in Privacy

Zoom has seen a flood of new users as the COVID-19 outbreak forces more and more employees to transition to working from home. Zoom’s big selling point is its near-frictionless video calls. However, new users should be aware of the company’s privacy practices. By looking through its privacy policy and some of its support documents, …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com