ProtonBlog(new window)

Now that the Proton Mail Campaign(new window) has raised over $250,000 for protecting online privacy, some people have asked us, how much do we need to raise to accomplish our stretch goals?

In the table below, we have outlined our goals, and the amount of money that would be necessary to turn these goals into reality.

20140626125233-igg-stretch-goals(new window)

We hope to get enough funding to at least build out the Android and iOS versions of Proton Mail. This would require us to raise double our current funding of $250,000. The money would go towards the additional servers we need to support the load from app users, and hiring additional developers to join our team to speed up development of the apps. We intend to build these features even if the funding targets are not met, but with more funding, we’ll be able to build in all these features faster and help everyone better protect their privacy.

Ensuring security and privacy for all requires constant innovation as every day, there are powerful organizations working on new ways to deprive us of this fundamental human right. Any additional funding we receive puts us in a much stronger position to meet these challenges.

As history has shown time and time ago, freedom and privacy go hand in hand, as one simply cannot have one without the other. Please share our campaign, and let people know why privacy matters.

http://igg.me/projects/protonmail(new window)

Protect your privacy with Proton
Create a free account

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers