Proton
Illustration of Proton Mail Bridge open source

We are one step closer to fully open sourcing all our apps. Proton Mail Bridge joins iOS and the web app as open source software, and it has also passed an independent security audit.

Trust and transparency are core values of Proton Mail. We want you to know who is on our team(new window) and how we protect your privacy(new window). Similarly, we want you to be able to see the code that makes up our apps and keeps your data safe. That’s why we have prioritized making all our apps open source.

You can view the code(new window) for Proton Mail Bridge for macOS, Windows, and Linux on our GitHub page.

Download Proton Mail Bridge

Why open source matters

Our effort to open source all Proton apps began in 2015 with our Proton Mail web app(new window), followed by our iOS app(new window). Earlier this year, we open sourced all of the Proton VPN apps(new window). And most recently, we published the code for our Android app(new window), which means all Proton apps that are out of beta are open source.

Proton Mail Bridge is a desktop application that allows you to fully integrate your Proton Mail account with any IMAP and SMTP email client, including Outlook, Thunderbird, or Apple Mail. Open sourcing the code lets anyone verify how the encryption process takes place through Bridge as the emails are transferred between your Proton Mail account and your desktop email app.

Security experts can now examine the Bridge code and submit any findings via our bug bounty program(new window). By leveraging the entire IT security community, we are making it more likely that potential vulnerabilities are quickly discovered and fixed.

A better Internet is possible with open source

Open sourcing all our apps is the culmination of our development approach.

We have long been an active member and supporter of the open source community. We contributed to the development of the open source VPN protocol WireGuard(new window), and we maintain two of the largest cryptographic libraries on the Internet, OpenPGPjs(new window) and GopenPGP(new window).

Because Proton is rooted in scientific rigor, transparency, and peer review, we believe in the open source ethos of showing your work. Users can verify our code and see how it works at any time. This leads to more secure and reliable digital products that integrate feedback from all our users and impact our whole community.

In the same spirit of transparency, we have contracted the information security firm SEC Consult to conduct an independent security audit, and we are publishing their full report here(new window).

You can also read our article describing the Bridge security model(new window). Raw code is only useful if you know how to read it. Providing this technical documentation helps more people understand the security features of Bridge.

Thank you for your support

All of this is possible because of our community. You allow us to continue prioritizing open source projects and furthering the Proton mission to build a safer Internet.

Make sure to check our blog and follow us on social media for more product updates.

You can get a free secure email account from Proton Mail here.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.


Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Proteja sus correos electrónicos y su privacidad
Obtenga Proton Mail gratis

Artículos relacionados

en
People and companies are generally subject to the laws of the country and city where they are located, and those laws can change when they move to a new place. However, the situation becomes more complicated when considering data, which can be subjec
en
Your online data is no longer just used for ads but also for training AI. Google uses publicly available information to train its AI models, raising concerns over whether AI is even compatible with data protection laws. People are worried companies
en
iPhone stores passwords in iCloud Keychain, Apple’s built-in password manager. It’s convenient but has some drawbacks. A major issue is that it doesn’t work well with other platforms, making it hard for Apple users to use their passwords and passkeys
en
There are many reasons you may need to share passwords, bank details, and other highly sensitive information. But we noticed that many people do this via messaging apps or other methods that put your data at risk. In response to the needs of our com
en
  • Novedades de privacidad
Large language models (LLMs) trained on public datasets can serve a wide range of purposes, from composing blog posts to programming. However, their true potential lies in contextualization, achieved by either fine-tuning the model or enriching its p
is Google Docs secure
en
Your online data is incredibly valuable, particularly to companies like Google that use it to make money through ads. This, along with Google’s numerous privacy violations, has led many to question the safety of their information and find alternative