ProtonBlog(new window)

Introducing Contact Groups, an easy way to reach more people in Proton Mail

Ever coordinated a social event, a parents group, or a team of colleagues at work? For those moments when you want everyone on the same page, you want a feature like Contact Groups to help you stay organized. Today we’re happy to announce Contact Groups as part of Proton Mail version 3.15(new window).

Contact Groups is a feature for paid users that allows you to create and name groups, add and remove contacts from your groups, and quickly send emails to everyone in a group.

You can create and edit your groups from the web within the Contact Group section

(new window)

… or from the contact details view, where you can assign the selected contact address to a group. You can add up to 100 contacts in a Contact Group.

(new window)

When you want to send an email to a Contact Group, just open your Composer and start typing the name of the group in the “To” field. It will appear as a suggestion. Then click on the group, or press the “Tab” or “Enter” keys.

(new window)

If you then decide to remove one or more users from the group, you can do so right from the Composer by clicking or tapping on the group. From there, a window will pop up showing the members of the group, where you can deselect those you wish to remove.

Note: Any contacts you deselect in the Composer will not receive the current email but will remain in the group.

(new window)

From that same popup window, you can check whether emails to a Contact Group are encrypted and/or signed, depending on the lock icon that appears next to the email address. Contacts not using end-to-end encryption(new window) will not have a lock next to their email address.

contact group interface 5(new window)

A final thing to note: If you create Contact Groups as a paid user and subsequently downgrade your account to free, you will still be able to see your groups. But you will not be able to edit them, send messages to them, or create new ones. (Unless you upgrade(new window) again.)

Contact Groups is one more way we’re making email privacy and email productivity go hand in hand.

Thank you for your support as we work to develop new features and bring online privacy and security to more people around the world.

Best Regards,
The Proton Mail Team 

Sign up and get a free secure email(new window) account from Proton Mail.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support!

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in