ProtonBlog

Earlier today, we released Proton Mail 2.0 to the world. We are happy to announce that we are also releasing Proton Mail 2.0 as open source software! From the beginning, we have been strong proponents of open source software and the core cryptography libraries that we develop and use have been open source from day one.

Today, we are happy to take the next step and completely open source our webmail interface. This means all the Proton Mail code that runs on your computer is now available for inspection. We hope that by opening up our platform, we will encourage additional contributors to help us make Proton Mail the world’s most secure email service.

Our move to open source has actually been coming for a long time. While it would have also been possible to open source Proton Mail 1.x, we felt that such a move was not appropriate given that the code was intended to be deprecated. By open sourcing Proton Mail 2.0, we are open sourcing the future of Proton Mail. As we continue to expand our private email service with mobile apps, you can look forward to more open source announcements as our code base matures.

Proton Mail 2.0 can be viewed online on Github at the link below. As a nod to our CERN and MIT roots, we are releasing under the permissive MIT license. Let us know if you do something cool with our code.

https://github.com/ProtonMail/WebClient(new window)

We welcome all feedback at security@proton.me and look forward to continuing to improve Proton Mail with your help!

Sichere deine E-Mails, schütze deine Privatsphäre
Proton Mail kostenlos holen

Verwandte Artikel

What to do if someone steals your Social Security number
en
If you’re a United States citizen or permanent resident, you have a Social Security number (SSN). This number is the linchpin of much of your existence, linked to everything from your tax records to your credit cards. Theft is a massive problem, whic
compromised passwords
en
  • Grundlagen der Privatsphäre
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
en
  • Grundlagen der Privatsphäre
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Grundlagen der Privatsphäre
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Datenpannen sind zunehmend alltäglich. Immer wenn du dich für einen Online-Dienst anmeldest, gibst du persönliche Informationen preis, die für Hacker wertvoll sind, wie E-Mail-Adressen, Passwörter, Telefonnummern und mehr. Leider sichern viele Online
Sichere, nahtlose Kommunikation ist das Fundament jedes Unternehmens. Da immer mehr Organisationen ihre Daten mit Proton sichern, haben wir unser Ökosystem mit neuen Produkten und Dienstleistungen erheblich erweitert, vom Passwortmanager bis zum Dark