ProtonBlog

Since Proton Mail beta was launched 3 days ago, we have been met with a overwhelming response from around the world. In fact, the response was a little too overwhelming as we have completely maxed out our server capacity. As a result, we are sad to announce that we need to temporarily close the beta signups.

When we launched Proton Mail, we did not anticipate that there would be so much interest in our service. We thought we had enough resources in place to support over 1 month of user signups. Never could we have imagined that we would hit that limit in around 60 hours.

Over the next couple days, we will work on expanding our server capacity, and further improving our security. Since our launch, we have had several offers to help us with a full security audit and as those results come in, we will also be taking steps to further improve the security of Proton Mail.

Because of the overwhelming demand for Proton Mail, we are also looking for additional developers to help us build Proton Mail. If you are a developer or security expert who would like to work with us on Proton Mail, we invite you to email us at contact@proton.me

To our current beta users, we thank you very much for taking the time to try out Proton Mail and giving us your suggestions. We also appreciate your bug reports so you should also keep those coming! As we are still in beta, bugs will inevitably come up, but we promise to continue improving Proton Mail and that is not possible without your help and support.

And to the millions of people out there who want a higher level of privacy in their communications, you can sign up to Proton Mail.

As we expand capacity, we will begin inviting people off the waiting list, we thank you for your patience!

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Is WeTransfer safe?
  • Privacy basics
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi