ProtonBlog(new window)

We are happy to announce the release of Proton Mail v1.04. As usual, please completely clear your browser cache to make sure you load the latest version of Proton Mail.

Bug Fixes

  • Forwarded attachment is now taken into the calculation of storage usage.
  • Improved the JS code of the compose editor, so it’s faster to adjust the window size as user types in the message.
  • Email header is now appropriately displayed.
  • Messages in outbox can be printed correctly now.
  • A few UI improvements.

New Features

  • Email notification is in place.
  • A first level of incoming and unencrypted outgoing spam filter is implemented.
  • Better support of multiple languages – more encodings are supported.
  • You can now mark a message as “Starred” in display message page.

Known Issues

  • Multiple attachments not properly supported
  • Older browser versions are not fully supported, please use the latest browser versions.
  • Mobile and Tablet not yet fully supported
  • Emails cannot be sent to Yahoo, this is a problem on the Yahoo end, we are working with them to resolve this.
Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage