Proton
An image showing Proton Drive's open-source code in GitHub

At Proton, our commitment to transparency and privacy has always guided how we develop our services. We believe you must be able to investigate and verify apps for yourself if you want to make an informed decision about what happens to your data. Today, we’re proud to announce that all Proton Drive apps are now fully open source, including the Proton Drive desktop apps.

This milestone underscores our mission to build privacy-first solutions that you can trust. By making all our apps open source, we empower our community and the broader security sphere to inspect, verify, and trust the protections we’ve built into Proton Drive to safeguard your data.

You can find the source code for all Proton Drive apps.

Review the code for all Proton apps.

Why open source matters

Making our apps open source is one way we demonstrate our belief that privacy shouldn’t require blind trust. By providing full access to our source code, we enable anyone to verify that our apps function as promised, delivering the security and privacy we claim.

Sharing our apps’ source code publicly also allows us to leverage the security community to quickly find, identify, and resolve potential vulnerabilities rather than rely on security through obscurity. Developers, security researchers, privacy advocates, and anyone who is interested can inspect any Proton Drive app. This transparency strengthens the security of our services and gives our users full confidence in how their data is protected.

We believe that open-source code is one of the keys to building a better internet where privacy is the default. In addition to making our apps open source, we maintain two of the most popular open-source cryptographic libraries (OpenPGP.js(nueva ventana) and GopenPGP(nueva ventana)) that make it easier for developers to secure their apps with strong encryption. We also regularly support open-source projects with our Lifetime Account Charity Fundraiser, such as WireGuard, Qubes OS, and Tails

Get involved

We believe that the privacy and security of the internet is a collective effort. By making our code freely available, we’re empowering everyone to contribute to the future of online privacy and security. Explore our code on GitHub(nueva ventana), participate in our Bug Bounty Program, and join us in building a more private and secure internet.

Thank you for your support

We are deeply grateful for the trust and support of our global community. Your feedback and engagement have been instrumental in helping Proton grow and achieve this milestone.

If you haven’t yet tried Proton Drive, now is the perfect time. Download the Proton Drive desktop apps and experience secure, encrypted file storage built on transparency and trust.

Artículos relacionados

The cover image for a Proton Pass blog explaining how a family password manager can save parents time - the image shows three password fields on top of each other with a security shield shape containing two adult figures and one child figure
en
Tired of resetting passwords for your family? Find out how a family password manager can help you save time on password admin.
what does bcc mean in email
en
  • Guías de privacidad
What is BCC in email language? Here's what BCC means, how it works, and when and why you might want to use it.
President Trump is now at the head of the US warrantless surveillance machine
en
President Trump now controls of the US government's warrantless surveillance machine. We look at how it works and how to defend yourself.
en
See our predictions for the internet in 2025, from AI cyberattacks to DIY surveillance.
he cover image for a blog explaining how to see and manage your saved passwords easily in Proton Pass
en
Saving passwords in a password manager can help you stay safe online, but how can you see all your saved passwords in one place? Find out with Proton Pass.
Email password 101: Fully secure your inbox with 2 simple tools
en
Learn how to secure your email password and inbox with strong passwords, 2FA, passkeys, and tips to prevent data breaches and unauthorized access.