ProtonBlog(new window)
Illstration using Proton Mail colors.

Clarification regarding Proton Mail, Belarus, and Ryanair flight 4978


On May 26, 2021, an email sent to the Minsk airport was made public by investigative journalists working with dossier.center. The email in question was not leaked or obtained from Proton Mail.

As an encrypted email service, we do not have the ability to decrypt or read user messages. However, the message is readable on the receiving server in Belarus, and that was how a copy was obtained, as evidenced by the screenshots published by journalists. The only email sent to Belarus was published by dossier.center to demonstrate that the “bomb threat” was sent after Ryanair flight 4978 was redirected. It was never published by Proton.

Due to the usage of Proton Mail by Belarusian citizens to protect their privacy, attempts have been made by the Lukashenko government to block access to Proton Mail since summer 2020. We condemn these actions and also the recent actions involving Ryanair flight 4978. We are supporting European authorities in their investigations, as we are legally obligated to do so on the basis of an official request from the Swiss government.

***

Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Protect your privacy with Proton
Create a free account

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers