ProtonBlog

Proton Mail Fights Censorship by Adding Tor Support

January 19th, 2017
Geneva, Switzerland

Proton Mail is announcing today the introduction of a Tor hidden service (onion site) which will allow users to directly connect to their encrypted email accounts through the Tor network. The move is aimed at countering actions by totalitarian governments around the world that are cutting off access to privacy tools.

The move also comes on the heels of recent events such as the Egyptian government’s move to block encrypted chat app Signal, and the passage of the Investigatory Powers Bill in the UK that mandates tracking all web browsing activity. Since Proton Mail was first launched in 2014 by scientists who met at CERN, the service has quickly become the favored email provider for journalists and activists around the world who require easy-to-use email encryption.

“Given our recent growth(new window), we realize that the censorship of Proton Mail in certain countries is inevitable and we are proactively working to prevent this” says Proton Mail Co-Founder Dr. Andy Yen, “Tor provides a way to circumvent certain Internet blocks so improving our compatibility with Tor is a natural first step.”

The development of Proton Mail’s onion site was done with advice from the Tor Project, the developers of the Tor software which is used by millions of people worldwide to safeguard their online privacy. With the launch of Proton Mail’s onion site, the Swiss company has become the largest email provider in the world to officially offer Tor support.

“Tor is an invaluable tool for protecting online freedom and guarding against state surveillance and censorship,” says Tor Project Executive Director Shari Steele, “We are always glad to see the increased adoption of Tor, and this appears to be a good example of how Tor onion services can be utilized for the public benefit.”

Anybody connected to the Tor network can now connect to Proton Mail’s onion site by visiting the following URL: https://protonirockerxow.onion(new window)

For easy access to the Tor network, Proton Mail and the Tor Project recommend using the Tor Browser.

About Proton Mail

Proton Mail is headquartered in Geneva, Switzerland, near CERN (the European Organization for Nuclear Research) where the founding team met in 2013. Every day, the Proton Mail team, brought together by a shared vision of protecting civil liberties, works to advance Internet security and privacy. Since its inception, Proton Mail’s infrastructure has been located exclusively in Switzerland, under the protection of some of the world’s strongest privacy laws.

For more information, please visit: https://proton.me(new window)

Media inquiries: media@proton.me

About Tor

The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software and has built an open and free network that helps people defend against online surveillance. Tor is used by human rights defenders, diplomats, journalists, government officials, and millions of ordinary people who value privacy and anonymity.

The Tor Project’s Mission Statement: “To advance human rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.”

Follow them on Twitter: @torproject(new window)

Media inquiries: press@torproject.org

Sichere deine E-Mails, schütze deine Privatsphäre
Proton Mail kostenlos holen

Verwandte Artikel

Is WeTransfer safe?
en
  • Grundlagen der Privatsphäre
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Grundlagen der Privatsphäre
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Datenpannen sind zunehmend alltäglich. Immer wenn du dich für einen Online-Dienst anmeldest, gibst du persönliche Informationen preis, die für Hacker wertvoll sind, wie E-Mail-Adressen, Passwörter, Telefonnummern und mehr. Leider sichern viele Online
Sichere, nahtlose Kommunikation ist das Fundament jedes Unternehmens. Da immer mehr Organisationen ihre Daten mit Proton sichern, haben wir unser Ökosystem mit neuen Produkten und Dienstleistungen erheblich erweitert, vom Passwortmanager bis zum Dark
what is a brute force attack
  • Grundlagen der Privatsphäre
Im Bereich der Cybersicherheit ist der Begriff Brute-Force-Attacke oft zu hören. Eine Brute-Force-Attacke ist jeder Angriff, der nicht auf Finesse setzt, sondern rohe Rechenkraft nutzt, um Sicherheitsmaßnahmen oder sogar die zugrundeliegende Verschlü
Abschnitt 702 des Foreign Intelligence Surveillance Act hat sich als berüchtigte rechtliche Rechtfertigung etabliert, die es Bundesbehörden wie der NSA, CIA und FBI erlaubt, Überwachungen ohne richterlichen Beschluss durchzuführen, wodurch die Daten