Proton

Our top priority has always been the security of our community, which is why we are happy to announce our partnership with Bug Bounty Switzerland(nouvelle fenêtre) and our new private bug bounty program made up of expert ethical hackers and security researchers.

Bug Bounty Switzerland has successfully led some of Switzerland’s largest bug bounty programs and public scrutiny initiatives. Thousands of security researchers have participated in their programs to secure Swiss companies, public sector organizations, and critical infrastructure. They will manage our private bug bounty program and help us build an even stronger security community around our products. 

We invite all sophisticated hackers and researchers with experience searching for, identifying, and addressing advanced hacks and techniques used by nation-states, criminal organizations, or other bad actors to apply for this program. We are specifically looking for demonstrated expertise in the following areas:

  • Finding vulnerabilities in mail and communication systems
  • Compromising encryption techniques
  • Compromising backend APIs
  • Hacking mobile applications, Windows, Linux, or Apple systems
  • Researching VPN technology

Proton will reward people for reporting vulnerabilities in our products. Key focus areas include:

  • Vulnerabilities that will compromise a Proton user’s personal data
  • Compromising Proton’s encryption (password leaks, private keys, etc.)
  • The ability to demonstrate unauthorized access to customer data (such as email, calendar, etc.)
  • Demonstrating EOP, sensitive information disclosure, or availability vulnerabilities in Proton products
  • Compromising Proton API or server infrastructure
  • Demonstrating the ability to compromise applications running on mobile devices, Windows, Linux, and Apple

Proton strives to maintain the highest software security standards for our products, and we pride ourselves on our ability to adapt and use the best security practices within our software development life cycle. We are committed to working closely with qualified security researchers to ensure that our products are as secure as possible. If you are interested in participating in this bounty program, you can apply at https://www.bugbounty.ch/proton(nouvelle fenêtre).

Articles similaires

A stylized icon resembling the Google Photos logo with a dark triangular warning sign containing an exclamation mark, representing Google Photos safety issues
en
Is Google Photos secure to share private pictures? Here's how its protections can fall short — and other options for safer photo sharing.
how to change your email address
en
Learn how to change your email address across email services, including Gmail, Yahoo, Outlook, and iCloud without risking your data.
Who is responsible for protecting CUI?
en
  • Guides vie privée
This article breaks down CUI, the parties responsible for marking and guarding it, and what goes into keeping it secure.
The cover image for a Proton Pass blog about how to change your Facebook password settings. The image shows the Facebook icon with a password field beneath it and a tick at the end of the password field
en
Here's a step-by-step guide for how to change or reset your Facebook password settings — and how to create a strong password you'll remember with Proton Pass.
A Gantt chart showing progress through the product roadmaps.
en
  • Nouveautés produits
We're sharing the roadmaps for all our services so you can see what's coming and give us your feedback.
A laptop with a Gantt chart, representing the Proton Drive roadmap for spring 2025
en
  • Nouveautés produits
  • Proton Drive
This spring, we're adding long-awaited features in Proton Drive, like albums, folder sync on macOS, and new Docs formatting tools. See more.