ProtonBlog(new window)
Illustration of email encryption

Why end-to-end email encryption matters

Share this page

You need an email address to exist at all in the online world. Signing up for YouTube, Facebook, Twitter, Reddit, or any other online service requires one. It’s also our go-to method of communication for online banking, purchasing, and business deals. As a result, over half the world’s adult population(new window) uses email, and we trust it with a great deal of our personal information. However, your email is not always as safe or as private as you might think.

Email is interoperable, meaning that Gmail accounts can communicate with Yahoo accounts which can communicate with Proton Mail accounts and so on. Unfortunately, that also means that if you email someone who uses an email service with poor privacy protections (like Gmail), your messages may be subject to its privacy policies, regardless of what email service you use.

All major email providers will give some level of protection against eavesdropping or tampering of their users’ emails, but most do not provide the maximum privacy and security available. We believe that everyone deserves email privacy and security, and that means ensuring that no one else has access to your emails, and that is why we protect your emails with end-to-end encryption (E2EE).

What is end-to-end encrypted email?

When you send an email, your message is routed from server to server until it reaches your recipient’s inbox. All major email providers use TLS (Transport Layer Security), which provides an encrypted route for your email as it is sent between servers. This keeps your message private while it is in transit.

However, with TLS encryption, your emails are decrypted once they reach your email provider’s server rather than upon reaching your recipient’s device. This gives email providers that only use TLS access to all the messages stored on their servers.

By comparison, end-to-end encrypted email is inaccessible to anyone but the intended recipient, making it much more secure. End-to-end encrypted email is encrypted at the source (your device)(new window) and only decrypted once it reaches its endpoint (the recipient’s device).

As only the two ends of the conversation are able to access and read end-to-end encrypted email messages, your email provider, ISPs, and government bodies are unable to access the information enclosed.

However, end-to-end email encryption only works if both people are using PGP(new window) or the same E2EE email service, such as Proton Mail. (We use PGP encryption to ensure Proton Mail users can communicate privately with other PGP users who share their public key, even if they don’t use Proton Mail.) If you email someone who uses an email service that only uses TLS (such as Gmail), your messages will be subject to its privacy policies and accessible by that email provider, even if you email them from a Proton Mail account.

To navigate these privacy issues, we use both end-to-end encryption and zero-access encryption(new window) to protect your emails. You can also use our ‘Encrypt for Outside’ function to send end-to-end encrypted messages to users who do not have an E2EE email service  —  these messages are password protected and expire after 28 days.

Why should email providers use end-to-end encryption?

Although TLS allows email services to securely transport your emails, there are considerable privacy and security risks involved if your emails are not end-to-end encrypted. Emails that are not sent using end-to-end encryption can be decrypted by the email provider.

Less vulnerable to attack

As most email providers hold all of your messages on their servers, any hacker that is able to penetrate those servers will also have access to all of your information and the information of everyone else whose emails are stored on that server. 

The most recent and perhaps most serious breach of this kind is the Microsoft Exchange hack(new window), though there is a long history of email server hacks, with victims including Yahoo(new window), Sony(new window), and even the NSA(new window).

Data privacy

Email providers such as Google are known for gathering huge amounts of data on their users. Although Google stopped scanning emails for advertising purposes back in 2017, Gmail’s bots can still access your emails’ content for other purposes, such as applying labels to your emails and communicating with other Google apps. When users install ‘add-ons’ to their Gmail account, they are also sometimes unknowingly giving up their entire inbox to be read by third-party developers(new window).

Perhaps more worryingly, data that is stored unencrypted on an email provider’s server can be seized during legal proceedings or investigations. Depending on the data protection laws that your home country has in place, there can be low thresholds to making these types of data requests(new window). Once a data request is made, email providers often have no choice but to comply.

Essentially, whether by brute force or legal compliance, if your email provider does not store your emails with end-to-end encryption, you cannot control who can access your information.

Protect your privacy online

At Proton Mail, we’re creating trusted ways for people to stay in control of their information at all times. We believe that everyone deserves privacy online and that the internet should serve the interests of all people rather than selling your data to the highest bidder.

Online privacy is much more than encrypted email, but it’s a good place to start. You can sign up for a free secure email account here. With a Proton Mail account, you can also send private emails to non-Proton Mail accounts using our Encrypt for Outside(new window) option. For further privacy online, we also have a free secure VPN(new window) that protects your internet browsing activity.

All of Proton Mail’s user data is stored exclusively in European countries with strong privacy protections, such as Switzerland. This means that unlike other email providers, Proton Mail does not fall under the jurisdiction of intrusive anti-privacy laws and cannot be coerced into working with the NSA.


End-to-end email encryption FAQ

How does end-to-end encrypted email work?

End-to-end email encryption (E2EE) works by using a set of keys to encrypt the email before it is sent and decrypt the message upon receipt. One key is a ‘public key’ that is used to encrypt emails that are sent to you, and the other key is a ‘private key’ that is only known to you (or your device).

The public key encrypts email messages in such a way that they are only able to be decrypted by the intended recipient, with the corresponding private key. As long as the private key is kept private, your emails remain secure.

For an in-depth guide to how E2EE works, you can read the Proton Mail guide to end-to-end encryption(new window).

What is zero-access encryption?

When someone emails your Proton Mail account from an email provider that does not use end-to-end encryption, we will immediately encrypt that email upon receiving it using your public encryption key. Once it has been encrypted with your public key, you become the only person that is able to decrypt that email on our servers. This is called zero-access encryption, and it ensures that your information remains safe, even if the Proton Mail servers were somehow breached.

How can I use end-to-end encryption for my emails?

The simplest way to ensure the emails you send are end-to-end encrypted is to use Proton Mail, as we offer end-to-end encryption as standard(new window), combined with zero-access encryption to keep your emails as private and secure as possible.

E2EE only works if those you are emailing are also using end-to-end encryption to protect their emails. If you use Proton Mail to send an email to an email account that does not use end-to-end email encryption, their email provider will be able to see those messages. So it’s best if both parties are using Proton Mail.

At Proton Mail, we have zero access to user data, so any emails you send using your Proton Mail account are inaccessible to us, and we are unable to hand over your data to any third parties. In addition, we use open source cryptographic libraries(new window), which helps ensure that the encryption algorithms we use are vetted and do not have any known security vulnerabilities.

Can end-to-end encrypted emails be hacked?

While emails with end-to-end encryption are much more secure than emails that are sent via TLS, it cannot be said that any email is “unhackable”. The best way to protect your end-to-end encrypted emails is to ensure you use a strong, unique password(new window) for your Proton Mail account.

If you repeat your password across services, it is possible that a security breach on one of those other services will result in your password being leaked. Using a strong and unique password for each of your accounts and devices means that even if one password is leaked, the rest of your accounts online remain secure. End-to-end email encryption works best when combined with other internet privacy protections such as using a VPN(new window) to protect your internet browsing activity and ensuring two-factor authentication is enabled whenever possible, in addition to using strong passwords.


Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Protect your privacy with Proton
Create a free account

Share this page

Lisa Whelan(new window)

Lisa is an activist, writer, and internet privacy advocate. A defender of the right to privacy for people everywhere, Lisa joined Proton to spread awareness and further enable freedom online.

Related articles

Can you password-protect a folder in Google Drive?
Protecting a folder with a password is a simple yet effective way of securing files. You may wonder whether you can password-protect a folder in Google Drive. We explain what access controls Google Drive offers and what you can do to improve your sec
Proton Pass now supports passkeys on all devices and plans
We’re excited to announce that Proton Pass supports passkeys for everyone, allowing you to manage and use passkeys across all devices seamlessly. Passkeys are an easy and secure alternative to traditional passwords that can help prevent phishing atta
what is a passkey?
Passkeys are a new way to secure your online accounts using cryptographic keys instead of passwords. They offer a high level of convenience and security, and are a real game-changer in the way we access and secure sites. What is a passkey, though, an
Apple’s marketing team has built a powerful association between the iPhone and privacy. The company’s ad campaigns claim that “what happens on your iPhone, stays on your iPhone.” And, “Privacy. That’s iPhone.” But Apple’s lawyers are telling a diffe
A cyberattack on national public employment service France Travail has exposed the personal data of as many as 43 million people.  The latest breach is the second major cybersecurity attack to happen in France in the past month, raising concerns abo
If I share a folder in Google Drive, can anybody see my other folders
Google Drive makes it easy to share files and folders, but you may have wondered at some point whether the people you’ve shared a folder with can see your other folders. We answer this question below and also share some tips for truly secure link sha
In 2014, Proton Mail was introduced as a web app, revolutionizing how we think about email privacy. Today, we’re excited to broaden the horizons of secure communication by launching the Proton Mail desktop app. Anyone can now use the new Proton Mail