ProtonBlog(new window)

Update: We no longer use Google Analytics for metrics used to better serve our users. We’re instead using a self hosted version of Matomo. For more details about our analytics and logging policies, please visit our privacy policy(new window).

Many people have asked us why a service that promises users are anonymous is using Google Analytics. First, we just want to be very clear that Google Analytics is only used on our home page and our blog. It is NOT used on any of the back-end pages that users view when checking their email.

That being said, our use of Google Analytics is not contrary to our mission to keep users anonymous. Like any web service, we do need to have some analytics as this provides important information on users demographics that allow us to better serve Proton users. For example, by looking at aggregate information like geographic distribution, we can better prioritize which languages we should support next. Then, a view of the most popular resolutions and browsers used to access Proton Mail allows us to decide which browser support to prioritize based on what most users want.

However, typically if you want to collect these aggregate statistics without the use of third party tools like Google Analytics, it is necessary to analyze server side logs. But to keep users anonymous, we perform minimal logging on our servers. Basically, we don’t have any logs that allow us to link a particular account to a certain IP address. So it is because of the fact that we have no logs that we need to use Google Analytics.

The main identification information that Google has via analytics is which IP addresses visit our home page. This itself is not any special information because your ISP would also have this information and it is impossible to tie this information to any specific account because Proton Mail has no logs on our end that would allow a third party to match an IP with an account.

Protect your privacy with Proton
Create a free account

Related articles

Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage