ProtonBlog(new window)

UDPATE 5/19/2014: Due to very high demand, we have had to temporarily halt new user signups as we increase server capacity and security. For more information, click here(new window).

The long wait and anticipation is finally over! Today, we’re happy to announce the launch of Proton Mail’s public beta. Now, any member of the general public can get a Proton Mail Beta account instantly. No more waiting for an invitation.

We will continue to work hard on further developing and improving Proton Mail from both a security and usability standpoint and would like to thank all of our several thousand users so far for their help and support. Every bug report that has been submitted has helped us to improve the product. You can keep up to date with our progress on our Twitter(new window) and also by viewing our Release Notes(new window).

As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, Proton Mail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world.

Take back your online privacy now by creating a Proton Mail account.(new window)

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in