Proton

At Proton, transparency is one of our core principles. Simply put, people cannot make informed decisions without knowing how their data is secured, which is why we have made all our apps open source. This “security through transparency” approach means our apps consistently face rigorous scrutiny, and it also means that any potential vulnerabilities are swiftly found and resolved.

However, raw code is not understandable for everyone, so we also commission independent security experts to audit our code and share their results. Even if you do not understand how to run a security audit yourself, you can see what experts in the field discovered.

Security experts inspect Proton apps

In September 2021, Securitum inspected all Proton apps as part of their security audit. We are happy to announce that their tests uncovered no major issues or security vulnerabilities.

You can read their letters of attestation by service below:

Securitum(nouvelle fenêtre) is a leading European IT security company, handling security audits and tests for many of Europe’s largest companies. They also handled the security audit of the new Proton Mail and Proton Calendar in early 2021.

Read our most recent security audit reports

Transparency is the key to trust

As an organization founded by former scientists and physicists who met at the European Organization for Nuclear Research (CERN), we believe peer review is essential to ensure your result is sound. We apply the same approach to Proton. We want you to be able to examine our work for yourselves and read experts’ audits before you entrust us with your data.  

You can find the code for all of Proton’s apps on the Proton Mail GitHub(nouvelle fenêtre) and Proton VPN GitHub(nouvelle fenêtre).

If you have questions or comments about the latest security audits, share them with us! Join the conversation on Twitter(nouvelle fenêtre) and Reddit(nouvelle fenêtre).

Update 29 March 2022: This article was republished using the term “security audit” instead of “penetration test” to stay consistent with past practice.

Articles similaires

A badge representing ISO 27001 certification for file sharing
en
What is ISO 27001 secure file collaboration? Learn about ISO 27001 certification and how to maintain ISO 27001 compliance for your business.
The cover image for a Proton Pass blog about pretexting scams. The image shows an open envelope with a warning sign, a briefcase symbol, and a face mask
en
Pretexting scams can be fatal for small businesses: Find out how to protect yourself with Proton Pass for Business
en
  • Entreprises
  • Nouveautés produits
  • Proton Drive
Discover the latest Proton Drive updates designed to help you collaborate and enhance your workflow without compromising security.
An iPhone and an iPad syncing
en
Here's how to sync iPhone and iPad securely using an encrypted ecosystem that keeps your data private and easy to access on all your devices.
Bitcoin as inflation increases
en
  • Actualités vie privée
Bitcoin has disinflationary characteristics that potentially make it an effective hedge against inflationary forces.
A cover image for a Proton Pass blog about how to turn your google autofill settings off for passwords. The image shows an autofill toggle being switched off
en
Your Google autofill settings can be customized, but is Google Password Manager safe? Here's what you need to know before you allow autofill in Chrome.