ProtonBlog(new window)

Proton Mail BETA v2.0 is finally here! This is by far our biggest update ever. Unlike our other updates, 2.0 is a completely new system, so we will only announce the big changes. There are countless smaller improvements that you need to see for yourself!

If you run into issues with Proton Mail 2.0, the older 1.x version of Proton Mail, is no longer available.


New Features Summary

Composer


(new window)
(new window)

The new composer has been implemented to allow improved efficiency while using Proton Mail. The composer allows for multiple messages to be under composition at one time. As well as being able to navigate through your inbox while composing a message.

Interface


Screen Shot 2015-08-12 at 6.32.37 PM(new window)

We want Proton Mail to be the easiest email service you have ever used, with that comes customizations. With 2.0, you are now able to rearrange the user interface to your liking, as well as setting images in messages to display by default. This includes switching between the popup and maximized composer modes shown previously.

Logging


(new window)
Screen Shot 2015-08-12 at 6.36.16 PM(new window) Screen Shot 2015-08-12 at 6.36.00 PM(new window)

Logging is an optional feature that offers Proton Mail users the ability to detect suspicious account activity. It provides details into past logins, including the time it occurred in Basic Logging, and the IP address of the login with Advanced Logging. This information will only be logged if turned on by the user. By default, Proton Mail does NOT log.


Version 2.0 Release Notes

New Features

  • Updated Design – A fresh update on the classic Proton Mail design. Redesigned login, composer window, settings page and message view.
  • Drag and drop messages – You can now drag and drop messages from your inbox to the folders and labels in the sidebar to move them.
  • Signature Editor – You can now have custom HTML email signatures.
  • Contacts Manager – You can now export contacts, and search them quickly.
  • Encrypted emails to non-Proton Mail users now also encrypt attachments. Non-Proton Mail users can also reply to these messages and send encrypted attachments as well.
  • New Composer – Brand new composer window with 2 modes: Popup and Maximized. You can have multiple popup composer windows open at once and can minimize them.
  • PublicKey Export – Download your PublicKey for use in other PGP compatible services – For technical PGP users, you can now export your public key to send to friends and to verify messages manually.
  • Authentication logs – You now have the ability to log access attempts to your account for security reasons. This feature is off by default and must be manually turned on.

Bug Fixes

Improvements

  • Many performance enhancements (rewritten in AngularJS)
  • Sync across multiple devices (mobile and web)

Known Issues

  • Custom themes no longer work. We will bring this back in a future release.

Finally, we’re happy to announce that iOS and Android mobile app beta will begin on August 20th, 2015. We will be making an official announcement soon so check back for updates.

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in