Proton

UDPATE 5/19/2014: Due to very high demand, we have had to temporarily halt new user signups as we increase server capacity and security. For more information, click here.

The long wait and anticipation is finally over! Today, we’re happy to announce the launch of Proton Mail’s public beta. Now, any member of the general public can get a Proton Mail Beta account instantly. No more waiting for an invitation.

We will continue to work hard on further developing and improving Proton Mail from both a security and usability standpoint and would like to thank all of our several thousand users so far for their help and support. Every bug report that has been submitted has helped us to improve the product. You can keep up to date with our progress on our Twitter(new window) and also by viewing our Release Notes(new window).

As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, Proton Mail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world.

Take back your online privacy now by creating a Proton Mail account.(new window)

Related articles

A book and a smart phone with an education app filled with trackers that reports data to data brokers.
en
Roughly 90% of Ed Tech apps and websites were found to have trackers. We explain how you can protect your child’s privacy from this surveillance. 
en
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.