ProtonBlog(new window)
Illustration of Proton Mail Bridge open source

We are one step closer to fully open sourcing all our apps. Proton Mail Bridge joins iOS and the web app as open source software, and it has also passed an independent security audit.

Trust and transparency are core values of Proton Mail. We want you to know who is on our team(new window) and how we protect your privacy(new window). Similarly, we want you to be able to see the code that makes up our apps and keeps your data safe. That’s why we have prioritized making all our apps open source.

You can view the code(new window) for Proton Mail Bridge for macOS, Windows, and Linux on our GitHub page.

Download Proton Mail Bridge

Why open source matters

Our effort to open source all Proton apps began in 2015 with our Proton Mail web app(new window), followed by our iOS app(new window). Earlier this year, we open sourced all of the Proton VPN apps(new window). And most recently, we published the code for our Android app(new window), which means all Proton apps that are out of beta are open source.

Proton Mail Bridge is a desktop application that allows you to fully integrate your Proton Mail account with any IMAP and SMTP email client, including Outlook, Thunderbird, or Apple Mail. Open sourcing the code lets anyone verify how the encryption process takes place through Bridge as the emails are transferred between your Proton Mail account and your desktop email app.

Security experts can now examine the Bridge code and submit any findings via our bug bounty program(new window). By leveraging the entire IT security community, we are making it more likely that potential vulnerabilities are quickly discovered and fixed.

A better Internet is possible with open source

Open sourcing all our apps is the culmination of our development approach.

We have long been an active member and supporter of the open source community. We contributed to the development of the open source VPN protocol WireGuard(new window), and we maintain two of the largest cryptographic libraries on the Internet, OpenPGPjs(new window) and GopenPGP(new window).

Because Proton is rooted in scientific rigor, transparency, and peer review, we believe in the open source ethos of showing your work. Users can verify our code and see how it works at any time. This leads to more secure and reliable digital products that integrate feedback from all our users and impact our whole community.

In the same spirit of transparency, we have contracted the information security firm SEC Consult to conduct an independent security audit, and we are publishing their full report here.

You can also read our article describing the Bridge security model(new window). Raw code is only useful if you know how to read it. Providing this technical documentation helps more people understand the security features of Bridge.

Thank you for your support

All of this is possible because of our community. You allow us to continue prioritizing open source projects and furthering the Proton mission to build a safer Internet.

Make sure to check our blog and follow us on social media for more product updates.

You can get a free secure email account from Proton Mail here.

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.


Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Sécurisez votre messagerie, protégez votre vie privée
Obtenir Proton Mail gratuitement

Articles similaires

Une communication sécurisée et fluide est la base de toute entreprise. Alors que de plus en plus d’organisations sécurisent leurs données avec Proton, nous avons considérablement élargi notre écosystème avec de nouveaux produits et services, de notre
what is a brute force attack
En matière de cybersécurité, un terme qui revient souvent est l’attaque par force brute. Une attaque par force brute est toute attaque qui ne repose pas sur la finesse, mais utilise plutôt la puissance de calcul brute pour craquer la sécurité ou même
Note : les liens dans cet article renvoient à des contenus en anglais. La section 702 du Foreign Intelligence Surveillance Act est devenue tristement célèbre comme justification juridique permettant à des agences fédérales telles que la NSA, la CIA
En réponse au nombre croissant de fuites de données, Proton Mail propose une fonctionnalité aux abonnés payants appelée surveillance du dark web. Notre système vérifie si vos identifiants ou autres données ont été divulgués sur des marchés illégaux e
Votre adresse e-mail est votre identité en ligne et vous la partagez chaque fois que vous créez un nouveau compte pour un service en ligne. Cette solution est pratique, mais elle expose votre identité au cas où des pirates parviendraient à accéder au
proton pass f-droid
Notre mission chez Proton est de contribuer à l’avènement d’un internet qui protège votre vie privée par défaut, sécurise vos données et vous donne la liberté de choix. Aujourd’hui, nous franchissons une nouvelle étape dans cette direction avec le l