ProtonBlog(new window)

We’re excited to introduce the new Proton Mail Feedback Forum(new window) where you can give us feedback and suggestions on new features that you want to see in Proton Mail. Since the beginning, we have built Proton Mail with usability as our main goal, and we’ve worked hard to make sure that each comment and suggestion is a part of our development process. Now you can vote, comment and post new ideas for Proton Mail to develop in the future through the Feedback Forum. FeedbackForumYou can access the Feedback Forum(new window) directly from the Knowledge Base(new window) through the “Request Feature” button, as well as on the footer of our Homepage. To give feedback, simply type out your idea in the “Enter your Idea” form. You can vote on ideas other users have submitted and see how many votes each idea has received. In general, we will try to build the features which are the most requested. In order to avoid duplicates, we suggest trying to search first before submitting a new feature to ensure that it has not been submitted already.

We’re happy to have found a new way to include your voice in our development and we look forward to getting your feedback. With your help, we hope to make Proton Mail even better and easier to use.

Protect your privacy with Proton
Create a free account

Related articles

In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in