Proton

Proton Mail launches the world’s first encrypted contacts manager

Starting today, the new contacts manager is available to all of Proton Mail’s five million users around the world.

The development and launch of this feature was driven by the feedback that the company received from many of its users in the investigative journalism space. “Last year, we had the unique opportunity to meet with many of our users in the field at the Second Asian Investigative Journalism Conference in Kathmandu, Nepal, and one message that we heard over and over again was the need for better ways to protect sources,” says Proton Mail co-founder Dr. Andy Yen, “the new encrypted contacts manager today is the result of over one year of research and development into how we can best meet the needs of the thousands of activists, journalists, and dissidents who rely on Proton Mail to protect their privacy.”

In addition to protecting sensitive contact details with zero-access encryption (meaning that Proton Mail itself cannot decrypt the data, and cannot reveal the private email contact details to third parties), Proton Mail’s new contact manager also utilizes digital signatures to verify the integrity of contacts data.

“Combining encryption with digital signatures provides powerful protection that guarantees not only the privacy, but also the authenticity of the contacts saved in Proton Mail, and reduces the need to trust Proton Mail, as even we cannot access or change this information without your knowledge,” says Dr. Yen. In line with standard company practice, the software behind Proton Mail’s encrypted contacts manager is fully open source.

For more details about Proton Mail’s encrypted contacts manager, please refer to our launch blog post here: https://proton(new window).me/news/encrypted-contacts-manager

Proton Mail’s media kit can be found here: https://proton.me/media/kit(new window)

About Proton Mail

Proton Mail is headquartered in Geneva, Switzerland, near CERN (the European Organization for Nuclear Research) where the founding team met in 2013. Every day, the Proton Mail team, brought together by a shared vision of protecting civil liberties, works to advance Internet security and privacy. Since its inception, Proton Mail’s infrastructure has been located exclusively in Switzerland, under the protection of some of the world’s strongest privacy laws.

Media inquiries: media@proton.me

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

How to delete all photos from Google Photos
Using Google Photos to store and share your pictures means allowing the company to see, analyze, and process them. Many people concerned about their privacy have taken steps to move away from the Google ecosystem, despite the company’s efforts to hid
Proton Wallet
  • Product updates
  • Proton news
  • Proton Wallet
WHAT IS PROTON WALLET? Our long-term vision is for Proton Wallet to be a digital wallet that gives you full control of your digital assets. While the type of assets that you can hold in Proton Wallet may evolve over time as we add more capabilities
  • Privacy guides
Bitcoin is an innovative payment network that leverages peer-to-peer transactions to remove the need for a central bank. Bitcoin has revolutionized the core principles of value exchange by showing that a network of fully independent nodes can operate
Proton Wallet is a digital asset wallet that currently supports self-custody on-chain Bitcoin. In this article, we review the key features and security architecture that make Proton Wallet a private and secure wallet that is as easy to use as email.
proton scribe
Most of us send emails every day. Finding the right words and tone, however, can take up a lot of time. Today we’re introducing Proton Scribe, a smart, privacy-first writing assistant built right into Proton Mail that helps you compose and improve yo
People and companies are generally subject to the laws of the country and city where they are located, and those laws can change when they move to a new place. However, the situation becomes more complicated when considering data, which can be subjec