ProtonBlog(new window)

We’re happy to announce the launch of the Official Proton Mail Shop! Official Proton Mail T-shirts, mugs, and other merchandise are now available for immediate shipment!

Visit the Proton Mail Shop(new window)

Back in 2014 when Proton Mail had our initial crowdfunding campaign(new window), over 1000 members of the Proton Mail community pitched in to support us by purchasing a T-shirt. In the two years since, we have continued to receive requests to bring Proton Mail T-shirts back, and to also provide other merchandise. We have been quite busy in the past two years, but now, due to popular demand, we are finally launching the Proton Mail Shop.

Proton Mail has grown through the support of users who have donated, upgraded to paid plans(new window), or helped to spread awareness about the importance of privacy. With the Proton Mail shop, you can now support Proton Mail financially while also get some cool products at the same time.

To start, we are offering official Proton Mail sweaters, shirts, artwork, phone cases, mugs, hats and tote bags. We plan to offer more variations as well as brand new products in 2017.

T-shirt and Merchandise Design Competition

Since Proton Mail is powered by the community, we also want you to have input into what items we sell in our shop. If you have suggestions for what products to offer, or what text to print on the shirts and other items, please send us your suggestions at shop@proton.me.

Furthermore, if you are a graphics designer and have a concept for a new T-shirt or other item that we should offer, feel free to also send us your proposed design. Next year, we will allow the community to vote on submitted designs and put the most popular ones into production.

Shipping Information and Privacy

We have partnered with Shopify and ThePrintful to power our shop. None of the shipping or payment information you enter is linked to your Proton Mail account – the shop is entirely separated. Currently accepted payment methods include Credit Card, PayPal, and Apple Pay.

Our shop can ship globally, and there are a wide variety of shipping options. The items are produced and fulfilled from the United States as we were unable to find a suitable European producer who can ship worldwide. This means that it does take some time to ship the items to Europe and Asia.

Any questions can be directed to shop@proton.me. You can visit the official Proton Mail shop at the link below. Thanks again for your support and Happy Holidays!

Visit the Proton Mail Shop(new window)

Protect your privacy with Proton
Create a free account

Related articles

In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in