Proton

We’re excited to announce that we’ve open-sourced the Proton Drive Android and iOS apps’ code. This means the code for all Proton apps out of beta, including all Proton Drive apps, is now available for anyone to examine. You can verify for yourself that these are doing exactly what we claim. 

You can find the code for the Proton Drive mobile apps on the Proton Drive apps GitHub(new window).

The code for every Proton Mail and Proton Calendar app, as well as the Proton Drive web app is on the Proton Mail GitHub(new window)

You can find the code for all Proton VPN apps on its GitHub page(new window)

Security through transparency

As an organization founded by scientists who met at CERN, we believe this level of transparency is not only essential to earning the trust of the Proton community, but it’s also how progress is made. By publishing our apps’ code, we make it available to the online network of security experts and white hat hackers. 

Their close scrutiny of our apps, which we incentivize through our Bug Bounty Program, ensures that any potential vulnerabilities are swiftly discovered and resolved. This approach of ‘security through transparency’ translates to better security and privacy for your personal information. 

Proton Drive apps have passed independent security audits

As part of making the Proton Drive mobile apps open source, we also subjected them to an independent security audit by Securitum(new window). Securitum is a respected European IT security company that has conducted security audits and tests for many of Europe’s largest companies. 

These reports allow you to get an expert assessment of our apps’ security if you don’t have the time or inclination to examine the code for yourself.

According to their report, Securitum found no outstanding vulnerabilities in our Android or iOS apps.

Read the security audit for the Proton Drive iOS app(new window)

Read the security audit for the Proton Drive Android app(new window)

You can also find the latest security audit reports for all Proton services on our community page explaining why we prioritize open-source code.

A better internet begins with open source 

We’ve been supporters of the open-source community ever since we made the Proton Mail web app open source in 2015. 

We maintain two of the most popular open-source cryptographic libraries, OpenPGP.js(new window) and GopenPGP,(new window) that make it easier for more developers to add secure encryption to their own apps and secure more data. 

We’ve also contributed to multiple open-source projects over the years through our Lifetime Account Charity Fundraiser, including WireGuard(new window), Qubes OS(new window), GrapheneOS(new window), and Tails(new window).

We believe this system of open development and peer review leads to better, more secure programs that keep all of our information secure. Thank you to the Proton community for enabling our work, and we invite you to contribute to our code yourself on GitHub. 

Keep your files private, share them securely
Hanki Proton Drive ilmaiseksi

Related articles

en
Cyberattacks aren’t always executed through sophisticated methods like man-in-the-middle (MITM) attacks on public WiFi. Sometimes, they rely on something as simple as looking over your shoulder.  Shoulder surfing attacks are when someone watches you
en
Proton prioritizes our community’s privacy and data security in every aspect of our business.  To further demonstrate our commitment, we underwent a rigorous external audit and – on May 2, 2024 – received our ISO 27001 certification.  As an organiz
en
Anyone with an iPhone can now enjoy Proton Drive’s secure and private photo backup capabilities. This feature is gradually rolling out to the Proton community and will be available to everyone by the end of this week. Smartphones have made us all am
en
From the very beginning, Proton has always been a different type of organization. This was probably evident from the way in which we got started via a public crowdfunding campaign that saw 10,000 people donate over $500,000 to launch development. As
en
Your online data is valuable. While it might feel like you’re browsing the web for free, you’re actually paying marketing companies with your personal information. Often, even when you pay for services, these companies still collect and profit from y
en
Password spraying attacks pose a major risk to individuals and organizations as a method to breach network security by trying commonly used passwords across numerous accounts. This article explores password spraying attacks, explaining their methods