How an encrypted email app automatically secures your everyday personal data

September 3rd, 2021 in Encryption

Email is full of private, personal, and everyday data. Letters to friends and colleagues, shopping receipts, calendar events, flight confirmations: email is a continuous stream of data. From days to decades, that everyday data adds up and tells a story. Most people think of their inbox as private, but it’s important to ask how this …

Why open-source encryption is better for your privacy

August 20th, 2021 in Encryption

From the creation of the Android mobile operating system to powering the first interplanetary helicopter, open-source projects have been critical to the development of new technologies. In a recent survey of enterprise developers, 85% already use open-source code in their organizations, and over 90% will continue adopting open-source projects and technologies.  As open-source projects continue …

What is the best encryption for emails?

July 2nd, 2021 in Encryption

Email is a great way to stay connected with the people and organizations you care about, but it is also a technology prone to data breaches and cyberattacks. In 2017, the email provider Yahoo revealed that over three billion user accounts were compromised in major breaches between 2013 and 2016.  As unencrypted emails pose a …

An illustration of the EU anti-encryption proposal.

EU’s resolution on encryption foreshadows likely anti-encryption push

December 15th, 2020 in Encryption

On Dec. 14, 2020, the Council of the European Union, which is made up of government ministers from the 27 EU member countries, released a vague, five-page resolution that calls for new rules to govern the use of encryption in Europe. The resolution, titled “The Council Resolution on Encryption,” is non-binding and does not provide …

ProtonDrive

The Proton Drive security model

August 31st, 2020 in Encryption, Security

This article documents Proton Drive’s security model by showing how it uses end-to-end encryption to protect your sensitive data. While somewhat technical, this document is meant to be accessible to a general audience and attempts to explain how Proton Drive works in plain language. Proton Drive is in the final stages of development before our …

An illustration of content scanning that could happen under EARN IT.

EARN IT is a dangerous law that could be used to break encryption

August 4th, 2020 in Encryption

We recently wrote about a proposed law in the United States known as the Lawful Access to Encrypted Data Act (LAED Act), which would basically ban encryption by requiring companies to build a backdoor. But this is not the only effort underway in the US Congress that attempts to destroy privacy as we know it. …

An illustration of law enforcement breaking through encryption.

The Lawful Access to Encrypted Data Act wants to ban strong encryption

July 22nd, 2020 in Encryption

The United States Congress is considering a law that would destroy online privacy as we know it and essentially outlaw the most secure American tech products, such as Signal. The law would ban end-to-end encryption for large companies and require developers to break their own products at the request of law enforcement agencies. The bill …

An image of ProtonMail's open source encryption libraries.

OpenPGP.js and GopenPGP are easier to test with other encryption suites

June 18th, 2020 in Encryption

As part of our mission to make security, privacy, and freedom accessible to all, we maintain two open source cryptography libraries that make it easier for developers to apply strong encryption in their projects. We have been the maintainers of OpenPGP.js since 2016 and GopenPGP since 2019, meaning we are responsible for ensuring these repositories …

An illustration of Kazakhstan government surveillance

Kazakhstan’s aggressive mass surveillance technique explained

August 1st, 2019 in Encryption

Aug. 7, 2019 update: The government has reversed its surveillance strategy, claiming the whole program was a “test” that is now complete, according to Reuters. If you installed a government root certificate on your device, you may now uninstall it without consequence. We have provided instructions in this article below for how to do so …

ProtonMail now offers elliptic curve cryptography for advanced security and faster speeds

April 25th, 2019 in Encryption

For several months, we have been working to implement support for new cryptographic methods in ProtonMail that give users a faster experience with equal or better security. Today, we’re excited to announce that elliptic curve cryptography is now available in all our applications for web, mobile, and desktop (Bridge). For reasons we explain below, elliptic …

australia assistance and access

Australia’s vague anti-encryption law sets a dangerous new precedent

December 7th, 2018 in Articles & News, Encryption

On Thursday, the Australian government and its Labor partners rammed a shockingly invasive anti-encryption law through Parliament, over the objections of experts, businesses, and civil rights groups. The Assistance and Access (A&A) law requires tech companies to help law enforcement agencies break into individuals’ encrypted data. Using secret warrants, the government can even compel a …

protonmail-openpgpjs-v4-0-release-notes

Open source cryptography takes a step forward with the release of OpenPGPjs 4.0

August 30th, 2018 in Encryption

The goal of our OpenPGPjs project is to make public-key cryptography not only available to users, but also to the global developer community. We believe the widespread availability of open-source and secure cryptography libraries is a prerequisite of the privacy revolution. OpenPGPjs version 4.0 introduces streaming cryptography. This makes it possible for users of the …

Get your secure email account
Create Account

Proton Technologies AG

Route de la Galaise 32
1228 Plan-les-Ouates, Geneva, Switzerland

Abuse: abuse@protonmail.com
For legal/police inquiries
click here

For support inquires please visit:
protonmail.com/support