illustration of ProtonMail free speech

Freedom is a human right, and we are committed to defending it even when others won’t

October 21st, 2019 in Privacy

Since we launched in 2014, ProtonMail has been the preferred email service provider for activists around the world. Protecting freedom of speech and democracy is, after all, one of the main reasons we created ProtonMail in the first place. Normally, this would not be of particular interest to anyone: we have always believed that all …

Illustration of why ProtonMail is trustworthy

Why should you trust ProtonMail?

September 24th, 2019 in Privacy

This is a challenging question to answer, but it is also a fair one, so we wanted to share our views about this in a blog post. In general, we strive to make our service require as little trust as possible. We encrypt data in a way that does not allow us to decrypt it, …

Don’t be fooled by Google’s fake privacy

July 2nd, 2019 in Privacy

Google recently generated a flurry of coverage about its supposed privacy pivot, including an op-ed in The New York Times by chief executive Sundar Pichai. “We feel privileged that billions of people trust products like Search, Chrome, Maps, and Android to help them every day,” Pichai wrote. It’s not that we necessarily trust Google. It’s …

Gmail confidential mode is not secure or private

June 20th, 2019 in Privacy

Without end-to-end encryption, Gmail confidential mode is little more than a marketing strategy. Learn why privacy experts call Google’s privacy features “misleading.” When we launched ProtonMail nearly five years ago, we pioneered a new kind of email service: one that gives you control of your own data. All emails are end-to-end encrypted and zero-access encrypted, …

Update on the question of voluntary real-time surveillance

May 29th, 2019 in Privacy

Updated on September 12, 2019. As the blog post referenced by this post has been removed, this post no longer serves a purpose so we have removed it. To remove any doubt, we confirm that ProtonMail has not and does not engage in voluntary real-time surveillance on behalf of law enforcement. We also confirm that …

Small businesses are big targets for hackers, but they still aren’t prepared

March 7th, 2019 in Privacy, Security

Data breaches that make the news usually involve massive corporations with vast datasets. But small businesses must also prevent cyberattacks and data breaches, and most don’t feel prepared. “We lost $10,000 due to a cyberattack on our mainframe in which a hacker was able to access financial data.” “An email was sent from a banking …

How long should my password be?

February 13th, 2019 in Privacy, Security

A strong password doesn’t have to be 30 characters long. But if you’re using an eight-character password, you have a good chance of being hacked. This article will help you understand how long your password should be. For decades, information security experts have tried to get people to create stronger passwords by requiring a minimum …

privacy-rights-and-anti-terror-laws

Preserving privacy rights in anti-terror laws

January 21st, 2019 in Privacy

Terrorist content has no place on any online platform, but we must also preserve our fundamental human rights even as we prevent terrorists and other criminals from abusing the Internet. Our mission is to promote security, privacy, and freedom on the Internet. That encompasses technical solutions, such as ProtonMail and ProtonVPN, but also policy solutions. …

Internet privacy

The ProtonMail guide to taking control of your online privacy

December 6th, 2018 in Privacy, Security

Improve your online privacy with this comprehensive guide, developed by the ProtonMail team. Here, we’ll help you determine your threat model and take steps to achieve online privacy that meets your needs. Updated July 2019 Total Internet privacy is impossible, but you can get close by adjusting your online behavior — and a few of …

Privacy vs. security: Why the widespread use of encryption is essential to national security

November 2nd, 2018 in Privacy, Security

Law enforcement officials continue to lobby against encryption, saying it makes catching criminals and preventing terrorism more difficult. But they’re getting the ‘privacy vs. security’ debate fundamentally wrong. Here’s why. Four years ago, the Pew Research Center, a US think tank, asked hundreds of cybersecurity experts to weigh in on a simple question: “By 2025, …

How to protect your phone or computer when crossing borders

September 20th, 2018 in Privacy

Border agents have broad powers to search people crossing borders, including their phones and laptops.But there are ways to protect your data when crossing international borders if you understand the technology and the law. Crossing an international border is often a stressful experience. It becomes all the more stressful if you are pulled aside for …

What is the dark web? The good and bad of the Internet’s most private corner

August 27th, 2018 in Privacy

You may have heard the dark web is a place for drug dealers and hitmen. That’s correct, but there’s more to it than that. In this article, find out what is the dark web, how to access it, and what you might find there. The dark web is a part of the Internet that requires …

Get your secure email account
Create Account

Proton Technologies AG

Chemin du Pré-Fleuri, 3
CH-1228 Plan-les-Ouates, Genève, Switzerland

For support inquiries, please visit
protonmail.com/support

For security related discussions
security@protonmail.com