Proton

Proton Mail

Illustration of Proton Mail in iOS
en
  • Actualizaciones del producto
  • Proton Mail
iPhone and iPad users can now change their default email app from Apple’s Mail to secure and private Proton Mail.
An illustration of Proton Mail's public keys.
en
  • Actualizaciones del producto
  • Proton Mail
The batch GCD algorithm can extract secret keys from large databases of public keys. Proton Mail is secure against this vulnerability.
en
  • Actualizaciones del producto
  • Proton Mail
Proton Mail has temporarily changed its certificate authority to Let’s Encrypt, a nonprofit certificate authority run by the Internet Security Research Group.
An illustration of the multi-account feature for iOS.
en
  • Actualizaciones del producto
  • Proton Mail
Multi-account support is now available on the new version of Proton Mail iOS. Access all your Proton Mail accounts on the go with your iOS device.
An illustration of the Proton Mail Android app going open source.
en
  • Actualizaciones del producto
  • Proton Mail
Our Proton Mail Android app is open source. We are committed to transparency and contributing to the open source and privacy tech community.
illustration of Proton Mail Android client security
en
  • Actualizaciones del producto
  • Proton Mail
Our Android security model explains what our app does to secure Proton users’ data. This article outlines how we handle data and mitigate potential attacks.
Illustration of Proton Mail Bridge open source
en
  • Actualizaciones del producto
  • Proton Mail
Our Bridge app is now open source for macOS, Windows, and Linux. Find links to the code and an independent security audit report.
Illustration of the Bridge security model
en
  • Actualizaciones del producto
  • Proton Mail
You can use Proton Mail Bridge with IMAP/SMTP email clients. Here we explain the Bridge security architecture and how it protects your data.
protonmail bridge for linux
en
  • Actualizaciones del producto
  • Proton Mail
Proton Mail Linux users can now connect their email accounts with the Thunderbird client.
Illustration of vulnerability disclosure
en
  • Actualizaciones del producto
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.
Illustration of a user using DKIM keys to stop a hacker spoofing their email.
en
  • Actualizaciones del producto
  • Proton Mail
DKIM key management lets users rotate their keys manually, making it harder for attackers to spoof their email address.