Proton
An image showing Proton Drive's open-source code in GitHub

At Proton, our commitment to transparency and privacy has always guided how we develop our services. We believe you must be able to investigate and verify apps for yourself if you want to make an informed decision about what happens to your data. Today, we’re proud to announce that all Proton Drive apps are now fully open source, including the Proton Drive desktop apps.

This milestone underscores our mission to build privacy-first solutions that you can trust. By making all our apps open source, we empower our community and the broader security sphere to inspect, verify, and trust the protections we’ve built into Proton Drive to safeguard your data.

You can find the source code for all Proton Drive apps.

Review the code for all Proton apps.

Why open source matters

Making our apps open source is one way we demonstrate our belief that privacy shouldn’t require blind trust. By providing full access to our source code, we enable anyone to verify that our apps function as promised, delivering the security and privacy we claim.

Sharing our apps’ source code publicly also allows us to leverage the security community to quickly find, identify, and resolve potential vulnerabilities rather than rely on security through obscurity. Developers, security researchers, privacy advocates, and anyone who is interested can inspect any Proton Drive app. This transparency strengthens the security of our services and gives our users full confidence in how their data is protected.

We believe that open-source code is one of the keys to building a better internet where privacy is the default. In addition to making our apps open source, we maintain two of the most popular open-source cryptographic libraries (OpenPGP.js(nueva ventana) and GopenPGP(nueva ventana)) that make it easier for developers to secure their apps with strong encryption. We also regularly support open-source projects with our Lifetime Account Charity Fundraiser, such as WireGuard®, Qubes OS, and Tails.

Get involved

We believe that the privacy and security of the internet is a collective effort. By making our code freely available, we’re empowering everyone to contribute to the future of online privacy and security. Explore our code on GitHub(nueva ventana), participate in our Bug Bounty Program, and join us in building a more private and secure internet.

Thank you for your support

We are deeply grateful for the trust and support of our global community. Your feedback and engagement have been instrumental in helping Proton grow and achieve this milestone.

If you haven’t yet tried Proton Drive, now is the perfect time. Download the Proton Drive desktop apps and experience secure, encrypted file storage built on transparency and trust.

Artículos relacionados

The cover image for a Proton Pass blog about brushing scams, which shows a package with a warning sign above it
en
A brushing scam means your personal data has leaked online. Learn how to protect yourself with hide-my-email aliases and dark web monitoring.
An encryption lock breaking
en
Apple turned off its end-to-end encryption in the UK in response to a government notice. We look at what this means and how people in the UK can protect their data.
Image showing Google, Apple, and Meta as apps that allow surveillance
en
Big Tech companies - Apple, Google, and Meta - have built a mass surveillance machine that the government can easily tap into.
Proton symbol for protecting user privacy after Apple disabled ADP in the UK
en
Apple dropped ADP for UK users, leaving data unprotected by end-to-end encryption. See why E2EE matters and how to keep your data safe.
The cover image for a Proton Pass blog about how to find your saved passwords on Android, which shows a phone screen, an Android icon, and three password fields
en
If you're using an Android device, here's how you can find the saved passwords on your phone and how Proton Pass can help you organize them more securely.
Email verification: How to check whether an email address is legit
en
Find out how to verify an email address to ensure it’s legitimate, protect your communications, and avoid scams or phishing attempts.