New Proton Drive mobile apps are open source 

Share this page

We’re excited to announce that we’ve open-sourced the Proton Drive Android and iOS apps’ code. This means the code for all Proton apps out of beta, including all Proton Drive apps, is now available for anyone to examine. You can verify for yourself that these are doing exactly what we claim. 

You can find the code for the Proton Drive mobile apps on the Proton Drive apps GitHub(new window).

The code for every Proton Mail and Proton Calendar app, as well as the Proton Drive web app is on the Proton Mail GitHub(new window)

You can find the code for all Proton VPN apps on its GitHub page(new window)

Security through transparency

As an organization founded by scientists who met at CERN, we believe this level of transparency is not only essential to earning the trust of the Proton community, but it’s also how progress is made. By publishing our apps’ code, we make it available to the online network of security experts and white hat hackers. 

Their close scrutiny of our apps, which we incentivize through our Bug Bounty Program, ensures that any potential vulnerabilities are swiftly discovered and resolved. This approach of ‘security through transparency’ translates to better security and privacy for your personal information. 

Proton Drive apps have passed independent security audits

As part of making the Proton Drive mobile apps open source, we also subjected them to an independent security audit by Securitum(new window). Securitum is a respected European IT security company that has conducted security audits and tests for many of Europe’s largest companies. 

These reports allow you to get an expert assessment of our apps’ security if you don’t have the time or inclination to examine the code for yourself.

According to their report, Securitum found no outstanding vulnerabilities in our Android or iOS apps.

Read the security audit for the Proton Drive iOS app

Read the security audit for the Proton Drive Android app

You can also find the latest security audit reports for all Proton services on our community page explaining why we prioritize open-source code.

A better internet begins with open source 

We’ve been supporters of the open-source community ever since we made the Proton Mail web app open source in 2015. 

We maintain two of the most popular open-source cryptographic libraries, OpenPGP.js(new window) and GopenPGP,(new window) that make it easier for more developers to add secure encryption to their own apps and secure more data. 

We’ve also contributed to multiple open-source projects over the years through our Lifetime Account Charity Fundraiser, including WireGuard(new window), Qubes OS(new window), GrapheneOS(new window), and Tails(new window).

We believe this system of open development and peer review leads to better, more secure programs that keep all of our information secure. Thank you to the Proton community for enabling our work, and we invite you to contribute to our code yourself on GitHub. 

Keep your files private, share them securely
Get Proton Drive free

Share this page

Anant Vijay

Anant is the senior product manager on Proton Drive. Before joining Proton, he had over 5 years of experience building tech product with majority of that time spent working in Silicon Valley. He holds master's degree in business from the Warwick Business School in the UK.

Related articles

If you’ve ever uploaded a file or a video online to share with someone, chances are you’ve used a cloud storage service.  Unlike traditional forms of data storage (such as hard drives), cloud storage uses servers in off-site locations to store data,
Phishing scams try to trick you into revealing sensitive data or downloading malware, often leading to identity theft, credit card fraud, or other cybercrime. Learn all about phishing and how to prevent it. With billions of phishing emails sent dail
Around 50% of all emails contain trackers that spy on your email activity — over 160 billion messages sent every day. Here’s how they work and how to block them. Working silently in the background, email trackers not only monitor how you respond to
With over 33 million registered users and more than 100,000 business customers, LastPass is one of the world’s most popular password managers. After an escalating series of highly-damaging disclosures over the last few months, LastPass has now admitt
Email headers are the hidden part of emails containing vital information to identify and authenticate messages. Learn how to read them to spot spam and stay secure. Have you received an unexpected email from a strange address? Is it actually from so
The United States is notoriously weak on privacy laws. With its secret surveillance courts and all-powerful spy agencies, the US has many tools to collect data on people within its jurisdiction and beyond. Recently, that power has been used to prose