ProtonBlog(new window)

Dear Early Adopters,

A lot of progress has been made since our last waiting list update(new window).  Our major infrastructure upgrades(new window) went smoothly and have made Proton Mail even more reliable, secure, and ready to take in more users than ever before.  We are pleased to announce that we have sent out close to 300,000 invites in the last several months!

For users who signed up on the waiting list before January 15th 2015, the wait is now over. If you signed up before January 15th, you should have received an invitation email. Unfortunately, it is possible this invite email was lost in your spam folder or dropped by your current email service provider (AOL.com for instance has had some issues lately). If you registered for Proton Mail before January 15th and are still waiting, please kindly email us at contact@proton.me with your username or outside email so we can try resending your invite.

For our new friends who only found out about Proton Mail recently, your wait will not be as long! We are inviting new users every week and will very soon, almost surely, approach instant access. The next several months will be very exciting as we will be deploying some long-awaited features and announce some more good news. Thanks again for your patience and support as we improve Proton Mail!

Proteja su privacidad con Proton
Crear una cuenta gratuita

Artículos relacionados

en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
en
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
en
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
en
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
en
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
en
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches