ProtonBlog(new window)

The Proton Localization Community is a volunteer initiative started in January 2017 that aims to give people access to Proton products and features in all major languages.

We’re actively developing our ecosystem of end-to-end encrypted products (Proton Mail, Proton Calendar, Proton VPN(new window), Proton Drive, and Proton Pass, with more to come), and our mission remains unchanged: We stand for a privacy-friendly and free internet that’s accessible to everyone, everywhere. We believe that privacy and free access to information are fundamental rights.

The Proton’s community includes members from over 150 countries. Providing a multilingual experience is critical to fulfilling our mission.

With the help of volunteer and professional translators, we’ve made all our products and the main pages of our website available in all major languages, but we still need help.

If you’re a native speaker of a language other than English and would like to help make Proton products available in that language, sign up to be a volunteer translator. Please note that you’ll need to fill out the form in English.

If your application to be a volunteer translator is accepted, you will:

  • Access our online translation platform.
  • Access our forum dedicated to the Proton localization community with all the resources you need.
  • Enjoy yearly rewards as a thank you from the Proton Localization team.

We hope you’ll join the Proton localization community to help make Proton products available to your fellow citizens in their native language!

The Proton Localization team

Protect your privacy with Proton
Create a free account

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers