ProtonBlog(new window)

Proton launches new bug bounty program with partner Bug Bounty Switzerland

Share this page

Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland(new window) and our new private bug bounty program made up of expert ethical hackers and security researchers.

Bug Bounty Switzerland has successfully led some of Switzerland’s largest bug bounty programs and public scrutiny initiatives. Thousands of security researchers have participated in their programs to secure Swiss companies, public sector organizations, and critical infrastructure. They will manage our private bug bounty program and help us build an even stronger security community around our products. 

We invite all sophisticated hackers and researchers with experience searching for, identifying, and addressing advanced hacks and techniques used by nation-states, criminal organizations, or other bad actors to apply for this program. We are specifically looking for demonstrated expertise in the following areas:

  • Finding vulnerabilities in mail and communication systems
  • Compromising encryption techniques
  • Compromising backend APIs
  • Hacking mobile applications, Windows, Linux, or Apple systems
  • Researching VPN technology

Proton will reward people for reporting vulnerabilities in our products. Key focus areas include:

  • Vulnerabilities that will compromise a Proton user’s personal data
  • Compromising Proton’s encryption (password leaks, private keys, etc.)
  • The ability to demonstrate unauthorized access to customer data (such as email, calendar, etc.)
  • Demonstrating EOP, sensitive information disclosure, or availability vulnerabilities in Proton products
  • Compromising Proton API or server infrastructure
  • Demonstrating the ability to compromise applications running on mobile devices, Windows, Linux, and Apple

Proton strives to maintain the highest software security standards for our products, and we pride ourselves on our ability to adapt and use the best security practices within our software development life cycle. We are committed to working closely with qualified security researchers to ensure that our products are as secure as possible. If you are interested in participating in this bounty program, you can apply at https://www.bugbounty.ch/proton(new window).

Protect your privacy with Proton
Create a free account

Share this page

Proton Team(new window)

We are scientists, engineers, and specialists from around the world drawn together by a shared vision of protecting freedom and privacy online. Proton was born out of a desire to build an internet that puts people before profits, and we're working to create a world where everyone is in control of their digital lives.

Related articles

Can you password-protect a folder in Google Drive?
Protecting a folder with a password is a simple yet effective way of securing files. You may wonder whether you can password-protect a folder in Google Drive. We explain what access controls Google Drive offers and what you can do to improve your sec
Proton Pass now supports passkeys on all devices and plans
We’re excited to announce that Proton Pass supports passkeys for everyone, allowing you to manage and use passkeys across all devices seamlessly. Passkeys are an easy and secure alternative to traditional passwords that can help prevent phishing atta
what is a passkey?
Passkeys are a new way to secure your online accounts using cryptographic keys instead of passwords. They offer a high level of convenience and security, and are a real game-changer in the way we access and secure sites. What is a passkey, though, an
Apple’s marketing team has built a powerful association between the iPhone and privacy. The company’s ad campaigns claim that “what happens on your iPhone, stays on your iPhone.” And, “Privacy. That’s iPhone.” But Apple’s lawyers are telling a diffe
A cyberattack on national public employment service France Travail has exposed the personal data of as many as 43 million people.  The latest breach is the second major cybersecurity attack to happen in France in the past month, raising concerns abo
If I share a folder in Google Drive, can anybody see my other folders
Google Drive makes it easy to share files and folders, but you may have wondered at some point whether the people you’ve shared a folder with can see your other folders. We answer this question below and also share some tips for truly secure link sha
In 2014, Proton Mail was introduced as a web app, revolutionizing how we think about email privacy. Today, we’re excited to broaden the horizons of secure communication by launching the Proton Mail desktop app. Anyone can now use the new Proton Mail