Proton

Security experts declare all Proton apps secure after they pass their security audit

At Proton, transparency is one of our core principles. Simply put, people cannot make informed decisions without knowing how their data is secured, which is why we have made all our apps open source. This “security through transparency” approach means our apps consistently face rigorous scrutiny, and it also means that any potential vulnerabilities are swiftly found and resolved.

However, raw code is not understandable for everyone, so we also commission independent security experts to audit our code and share their results. Even if you do not understand how to run a security audit yourself, you can see what experts in the field discovered.

Security experts inspect Proton apps

In September 2021, Securitum inspected all Proton apps as part of their security audit. We are happy to announce that their tests uncovered no major issues or security vulnerabilities.

You can read their letters of attestation by service below:

Securitum(new window) is a leading European IT security company, handling security audits and tests for many of Europe’s largest companies. They also handled the security audit of the new Proton Mail and Proton Calendar(new window) in early 2021.

Read our most recent security audit reports

Transparency is the key to trust

As an organization founded by former scientists and physicists who met at the European Organization for Nuclear Research (CERN), we believe peer review is essential to ensure your result is sound. We apply the same approach to Proton. We want you to be able to examine our work for yourselves and read experts’ audits before you entrust us with your data.  

You can find the code for all of Proton’s apps on the Proton Mail GitHub(new window) and Proton VPN GitHub(new window).

If you have questions or comments about the latest security audits, share them with us! Join the conversation on Twitter(new window) and Reddit(new window).

Update 29 March 2022: This article was republished using the term “security audit” instead of “penetration test” to stay consistent with past practice.

Schütze deine Privatsphäre mit Proton
Kostenloses Konto erstellen

Verwandte Artikel

How to delete all photos from Google Photos
en
Using Google Photos to store and share your pictures means allowing the company to see, analyze, and process them. Many people concerned about their privacy have taken steps to move away from the Google ecosystem, despite the company’s efforts to hid
Proton Wallet
WAS IST PROTON WALLET? Unsere langfristige Vision ist es, dass Proton Wallet eine digitale Geldbörse wird, die dir die volle Kontrolle über deine digitalen Vermögenswerte gibt. Während die Arten von Vermögenswerten, die du in Proton Wallet halten ka
  • Privatsphäre-Richtlinien
Bitcoin ist ein innovatives Zahlungsnetzwerk, das Peer-to-Peer-Transaktionen nutzt, um die Notwendigkeit einer Zentralbank zu beseitigen. Bitcoin hat die Kernprinzipien des Wertaustauschs revolutioniert, indem es zeigt, dass ein Netzwerk vollständig
Proton Wallet ist ein digitales Asset-Wallet, das derzeit Selbstverwahrung für On-Chain Bitcoin unterstützt. In diesem Artikel werden die Hauptmerkmale und die Sicherheitsarchitektur von Proton Wallet untersucht, die es zu einem privaten und sicheren
proton scribe
Die meisten von uns schicken täglich E-Mails. Die richtigen Worte und den passenden Ton zu finden, kann jedoch viel Zeit in Anspruch nehmen. Heute stellen wir Proton Scribe vor, einen intelligenten, datenschutzorientierten Schreibassistenten, der dir
Menschen und Unternehmen unterliegen in der Regel den Gesetzen des Landes und der Stadt, in der sie sich befinden, und diese Gesetze können sich ändern, wenn sie an einen neuen Ort ziehen. Die Situation wird jedoch komplizierter, wenn man Daten betra