ProtonBlog(new window)

Yesterday, Co-Founders Wei Sun and I had a brief opportunity to meet with renowned security expert Bruce Schneier(new window) at MIT. Bruce was around to give a talk for the MIT IEEE/ACM Joint Seminar Series and we were on campus to meet with a couple MIT based security experts.

Bruce is not just an expert on internet security, but as the author of many books, he’s also an expert on communicating the need for security to a broader audience. While technical aspects were of course discussed, one of the key questions we asked Bruce was how do we convince the average person to care about security and privacy.

The insight we got from Bruce was that people do in fact care. If one was to pull 10 random people off the street and ask them if they care about privacy and would like more privacy online, 10 out of 10 would say yes. The problem is really the inconvenience that comes with internet privacy. Simply put, people sacrifice privacy and security for convenience, and the only way to win this battle is to make security easy.

This is what we are trying very hard to accomplish at Proton Mail. Unlike other solutions out there, the idea behind Proton Mail from the very beginning was that it could NOT be any harder to use than Gmail or Hotmail. Despite the additional months of work required to accomplish this, we feel that in the end, it is worth the effort because ultimately, an easier to use solution IS more secure simply because it will allow more people to embrace security.

Proton Mail Co-Founder Andy Yen with security guru Bruce Schneier(new window)
Proton Mail Co-Founder Andy Yen with security guru Bruce Schneier

Protect your privacy with Proton
Create a free account

Related articles

Is WeTransfer safe?
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi