all-in-one privacy solution":["Proton Unlimited est une solution tout-en-un respectueuse de la vie privée"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Aucune publicité, le respect de la vie privée comme règle absolue"],"People before profits":["Les individus passent avant les profits"],"Security through transparency":["Notre engagement de transparence"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["Les meilleures offres ${ BLACK_FRIDAY } de Proton Mail"],"The world’s only community- supported email service":["La seule messagerie au monde soutenue par la communauté"]},"specialoffer:limited":{"${ hours } hour":["${ hours } heure","${ hours } heures"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Temps restant : ${ hoursLeft }, ${ minutesLeft }, ${ secondsLeft }"],"${ minutes } minute":["${ minutes } minute","${ minutes } minutes"],"${ seconds } second":["${ seconds } seconde","${ seconds } secondes"],"Limited time offer":["Offre à durée limitée"]},"specialoffer:listitem":{"Create multiple addresses":["Créez plusieurs adresses"],"Hide-my-email aliases":["Alias « hide-my-email »"],"Quickly unsubscribe from newsletters":["Désabonnez-vous rapidement des newsletters"],"Use your own domain name":["Utilisez votre propre nom de domaine"]},"specialoffer:logos":{"As featured in":["Ils en parlent"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Choisissez une messagerie électronique chiffrée qui protège votre vie privée"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Offre Proton Mail Black Friday - Jusqu'à 40 % de réduction"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Obtenez jusqu'à 40 % de réduction sur les abonnements Proton Mail à l'occasion du Black Friday. Profitez d'offres exceptionnelles sur nos abonnements de messagerie électronique sécurisée et chiffrée de bout en bout."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Offre Black Friday Proton Mail | Jusqu'à 40 % de réduction"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["* Facturé ${ TOTAL_SUM } pour la première année"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*Facturé ${ TOTAL_SUM } pour les 2 premières années"],"30-day money-back guarantee":["Garantie satisfait ou remboursé pendant 30 jours"],"Billed at ${ TOTAL_SUM } for the first 2 years":["Facturé ${ TOTAL_SUM } pour les 2 premières années"],"Billed at ${ TOTAL_SUM } for the first year":["Facturé ${ TOTAL_SUM } pour la première année"],"You save ${ SAVE_SUM }":["Vous économisez ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["-${ DISCOUNT }"],"${ PERCENT_OFF } off":["-${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["J'adore mon ProtonMail"],"My favorite email service":["Ma messagerie électronique préférée"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Merci Proton de nous garder en sécurité dans l'univers complexe d'internet."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Vous avez ce pour quoi vous payez. Avec les Big Tech, si vous ne payez rien, vous êtes utilisé. J'ai arrêté d'utiliser Gmail et je suis passée @ProtonMail"]},"specialoffer:time":{"Days":["Jours"],"Hours":["Heures"],"Min":["Min"]},"specialoffer:title":{"And much more":["Avec en plus"],"Make your inbox yours":["Votre boite de réception sur mesure"],"Safe from trackers":["À l'abri des traqueurs"],"Stay organized":["Bien organisé"],"Black Friday email deals":["Offres Black Friday pour la messagerie électronique"],"Don’t just take our word for it":["Ce qu'en disent nos utilisateurs"],"Our story":["Notre histoire"],"Transfer your data from Google in one click":["Transférez vos données depuis Google en un clic"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_SERVERS } serveurs répartis dans plus de ${ TOTAL_COUNTRIES } pays, la possibilité de connecter jusqu'à 10 appareils, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et d'autres fonctionnalités."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Partagez facilement votre calendrier avec votre famille, vos amis ou collègues et consultez des calendriers externes."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Comprend la prise en charge de 1 domaine de messagerie personnalisé, de 10 adresses e-mail, de 10 alias « hide-my-email », du partage de calendriers et bien d'autres fonctionnalités."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Comprend la prise en charge de 3 domaines de messagerie personnalisés, de 15 adresses e-mail, d'un nombre illimité d'alias « hide-my-email », du partage de calendriers et bien d'autres fonctionnalités."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Jusqu'à 25 calendriers, des applications mobiles, la sécurité avec le chiffrement de bout en bout, l'importation de calendrier en un clic depuis Google..."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Nous rencontrons actuellement des problèmes avec le service Proton VPN."],"Learn more":["En savoir plus"]},"Status banner":{"Learn more":["En savoir plus"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["Nous rencontrons actuellement des problèmes avec le service ${ issues[0] }."],"We are experiencing issues with one or more services at the moment.":["Nous rencontrons actuellement des problèmes avec un ou plusieurs services."]},"suggestions":{"Suggestions":["Suggestions"]},"Support":{"Sub category":["Sous-catégorie","Sous-catégories"]},"Support article":{"${ readingTime } min":["${ readingTime } minute","${ readingTime } minutes"],"Category":["Catégorie","Catégories"],"Didn’t find what you were looking for?":["Vous ne trouvez pas ce que vous cherchez ?"],"General contact":["Contact - Général"],"Get help":["Obtenir de l'aide"],"Legal contact":["Contact - Juridique"],"Media contact":["Contact - Média"],"Partnerships contact":["Contact - Partenariats"],"Reading":["Lecture"]},"Support categories":{"Browse Proton product support":["Parcourez le support produit Proton"]},"Support category":{"There is no article in this category yet.":["Il n'y a pas encore d'article dans cette catégorie."]},"Support troubleshooting":{"--- Select ---":["--- Sélectionner ---"],"App version":["Version de l'application"],"Browser":["Navigateur"],"Check if this helps":["Vérifiez si cela vous aide."],"Choose a category for your question":["Choisissez une catégorie pour votre question"],"Choose a product":["Choisir un produit"],"Did this solve your issue ?":["Cela a-t-il résolu votre problème ?"],"Faster assistance is just a few clicks away — please make your selections":["Il suffit de quelques clics pour obtenir une assistance plus rapide, faites votre sélection."],"No, contact support":["Non, contacter le support"],"Proton account":["Compte Proton"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Nous vous remercions pour votre commentaire."],"Troubleshooting":["Dépannage"],"What can we help with ?":["Comment pouvons-nous vous aider ?"],"Yes":["Oui"]},"support_modal_search_query":{"Search query":["Recherche"]},"support_search_button":{"Search":["Rechercher"]},"support_search_i_am_looking_for":{"I'm looking for":["Je recherche des informations sur..."]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Pour que le problème soit résolu plus rapidement, vous pouvez le signaler à partir de l'application Bridge : Aide > Signaler un bug."],"Information":["Informations"]},"SupportForm:option":{"Account Security":["Sécurité du compte"],"Contacts":["Contacts"],"Custom email domain":["Domaine de messagerie personnalisé"],"Email delivery and Spam":["Distribution des messages et indésirables/spam"],"Encryption":["Chiffrement"],"Login and password":["Identifiant et mot de passe"],"Merge aliases and accounts":["Fusion des alias et des comptes"],"Migrate to Proton":["Migration vers Proton"],"Notifications":["Notifications"],"Other":["Autre"],"Plans and billing":["Abonnements et facturation"],"Proton for Business":["Proton for Business"],"Sign up":["Inscription"],"Storage":["Espace de stockage"],"Users, addresses, and identities":["Utilisateurs, adresses et identités"]},"SupportForm:optionIntro":{"Select a topic":["Choisissez un sujet"]},"swiss_baseed_feature":{"Swiss based":["Basé en Suisse"]},"Testimonial":{"Awards":["Récompenses"],"Customers":["Clients"],"Featured":["Ils en parlent"],"Go to testimonial source":["Accéder aux commentaires"],"Reviews":["Avis"],"Videos":["Vidéos"]},"Text":{"Find the plan that's right for you":["Trouvez l'abonnement adapté à vos besoins"],"If you need help, check out our ${ supportLink }.":["Si vous avez besoin d'aide, consultez notre ${ supportLink }."],"The page you’re looking for might have been removed, or it could be an\nold link.":["La page recherchée a peut-être été retirée ou le lien utilisé n'est plus valide."]},"Title":{"On this page":["Sur cette page"],"Related articles":["Articles similaires"],"Share ${ thisPage }":["Partagez ${ thisPage }"],"Thank you!":["Merci !"],"this page":["cette page"]},"Tooltip":{"More information":["Plus d'informations"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Créez jusqu'à 20 calendriers chiffrés personnalisés et partageables. Ajoutez jusqu'à 5 calendriers d'amis, de membres de votre famille, de collègues ou d'organisations."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_SERVERS } serveurs répartis dans plus de ${ TOTAL_COUNTRIES } pays, la vitesse VPN la plus élevée, ${ TOTAL_VPN_CONNECTIONS } connexions VPN, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et d'autres fonctionnalités."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Accédez aux contenus bloqués et naviguez en toute confidentialité. Comprend plus de ${ TOTAL_SERVERS } serveurs répartis dans plus de ${ TOTAL_COUNTRIES } pays, la vitesse VPN la plus élevée, 10 connexions VPN, l'accès aux services de streaming dans le monde entier, un bloqueur de logiciels malveillants et de publicités et d'autres fonctionnalités."]},"version_history_label":{"Version history":["Historique des versions"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Conservez jusqu'à ${ versionHistoryNumber } versions de chaque fichier pendant ${ years } ans."]},"vpn_features_link":{"View VPN plans":["Voir les abonnements VPN"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Accédez aux contenus bloqués et naviguez en toute confidentialité"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
The Lawful Access to Encrypted Data Act wants to ban strong encryption | Proton
The United States Congress is considering a law that would destroy online privacy as we know it and essentially outlaw the most secure American tech products, such as Signal. The law would ban end-to-end encryption for large companies and require developers to break their own products at the request of law enforcement agencies.
The stated purpose of the law is to give police and security agencies the ability to quickly access information contained on a suspect’s encrypted device. The LAED Act targets all data that is encrypted, both in transit and at rest. So not only would a tech company be forced to help the FBI break into a smartphone seized from a suspect, but it would also have to build a way to let officials monitor end-to-end encrypted communications, including whoever the suspect is talking to.
This bill reopens the door to the kind of government surveillance that led us to create Proton back in 2014. Make no mistake: This bill puts the privacy and security of everyone at risk, not only suspected criminals. If a back door exists, no one is safe.
What is the Lawful Access to Encrypted Data Act?
This law would require any American company with more than 1 million users in the US to be able to decrypt its users’ data and present it to law enforcement. It would apply to operating systems, messaging apps, videoconference apps, email providers, and cloud storage apps, as well as any device that has at least 1 GB of memory.
This bill also attacks the encryption system that keeps the entire Internet secure. The LAED Act would require a backdoor to HTTPS, the system that secures almost all websites with TLS encryption, so that law enforcement could access encrypted metadata. Without HTTPS, attackers can trace your online activity from site to site. If HTTPS were to be broken it would fundamentally alter how the Internet worked.
How would the LAED Act work?
The LAED Act would supplement the ways law enforcement agencies get permission to access private information. Currently, if authorities want to access data at rest (such as a photo on your computer) they need a search warrant, and if they want to access data in motion (such as text messages being sent over the Internet) they need permission for a wiretap.
Under the LAED Act, if law enforcement wants to decrypt a device to access data at rest, they would need to get a court order requiring technical assistance from the service provider in addition to the standard search warrant. The LAED Act would set a comically low bar to require decryption: All the police have to do is prove there are “reasonable grounds to believe” decrypting a device will help in the execution of their search warrant. In other words, if the authorities can prove that it is reasonable to expect that decrypting a device will yield useful information, then a judge must order that the device be decrypted and the service or device provider in question must decrypt their product.
Example: Under the LAED Act, police could require Apple to decrypt a suspect’s phone so that it can access the data it holds (presuming it can convince a judge that there are “reasonable grounds to believe” it contains useful information).
To give law enforcement access to data in transit, the LAED Act would add the word “decrypt” right into the technical assistance a service provider must perform if it is served with a wiretap warrant. A wiretap warrant lets law enforcement get access to the content of a message or conversation. This new wording would force any service provider that is served with a wiretap to undo its encryption and present the plaintext content of the messages in question to law enforcement.
Example: Under the LAED Act, law enforcement could require WhatsApp to decrypt a conversation so it can read messages exchanged between suspects so long as it can get a wiretap warrant.
The LAED Act also embeds this “decrypting” language directly into warrants that give police access to the metadata of text messages or emails, known as pen register/tap-and-trace warrants. So police would be able to see who sent the message and who received it.
This act would effectively require any American company that offers E2EE to redesign its product so that it can be decrypted.
If there is a service that does not yet have a known decryption method, the LAED Act lets law enforcement agencies issue an “assistance capability directive.” In short, this requires a company to develop (or maintain) a way around encryption. And this can be applied to any company, not just ones that meet the 1 million user threshold.
The bill even created a prize competition to incentivize researchers to develop new ways to break secure cryptography.
How would the LAED Act affect you?
As a Proton user, your data would remain secure. Because we are a Swiss company and store all your data on servers in data centers in Switzerland, Proton Mail is not subject to US laws. Any request from foreign law enforcement needs to be approved by a Swiss authorities. This means that even if this bill became law, we would be able to continue providing end-to-end encryption(new window) and zero-access encryption(new window) to our users, ensuring their messages stay secure and private.
However, if this bill is passed, the Internet’s overall security would dramatically decrease. Storing any personal data on your smartphone or conducting business online would become much riskier. As long as there is a backdoor in encryption, it is simply a matter of time before hackers discover it and exploit it.
LAED would also have immediate, concrete impacts. Companies might deploy weaker encryption on their products in the US. The ban on end-to-end encryption in the US means that if WhatsApp and Signal want to keep their encryption, they would likely have to remove their apps from the US versions of the App Store and Google Play. The encryption used on Apple’s iMessage and Android, iOS, macOS, and Windows devices would all have to be redesigned with backdoors.
Given the United States’ role in tech development, this law could also have a profound impact on the use and application of strong encryption around the world. If US companies develop the ability to build backdoors into existing secure encryption systems, that technology will be in high demand worldwide, especially by authoritarian governments.
The LAED Act must be stopped
This is an explicit attack on encryption that rejects the advice of virtually every security researcher. The problem, as we have stated again and again, is that any encrypted platform with a backdoor is fundamentally insecure. There is no such thing as a backdoor that only lets the good guys in. If there is a vulnerability, eventually, someone will find it and exploit it.
Once these vulnerabilities are built into platforms, the key to exploiting them will become the number one target of every hacker. Keeping these keys secure would be almost impossible. The US government has failed at this task in the past, like when a group known as the Shadow Brokers(new window) stole and published CIA hacking tools.
If every communications service has a backdoor, then the entire premise of the Internet as we know it collapses: The Internet and all the knowledge-sharing, self-expression, and economic transactions it enables could not function without encryption. If people are afraid that hackers will read their emails or steal their credit card numbers, the Internet will become useless.
This law is also indicative of a disturbing trend that is sweeping Western democracies. It is simple to trace the “assistance capability directive” in the LAED Act to the “technical assistance notices” in Australia’s Assistance and Access Law(new window), which was inspired by the UK’s Investigatory Powers Act(new window). All of these laws whittle away at their citizens’ rights and the security of the Internet. Seeing such a law passed and enforced in the US could encourage other countries to pass their own version of the LAED Act.
What you can do
The LAED Act is currently sitting in the Committee on the Judiciary. It has not faced a floor vote in either the Senate or the House of Representatives. You can monitor its progress here(new window).
If you are concerned about your privacy, you can also sign up for a free email account(new window) with Proton Mail. This account will also give you access to the free version of Proton VPN(new window), which you can use to encrypt your online browsing.
We also urge everyone to read the bill itself along with other explainers of how the bill will work. The Electronic Frontier Foundation(new window) has a helpful analysis of the bill.
If you are an American who is worried about your right to privacy, you should call or write to your representatives in Congress and tell them you are against the LAED Act. By voicing your support for strong encryption, you will be contributing to the fight to keep the Internet secure, private, and free.
We also provide a free VPN service(new window) to protect your privacy.Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.
Google is one of the biggest obstacles to privacy. The Big Tech giant may offer
quick access to information online, but it also controls vast amounts of your
personal or business data.
Recently, more people are becoming aware of the actual price you
If you’re a United States citizen or permanent resident, you have a Social
Security number (SSN). This number is the linchpin of much of your existence,
linked to everything from your tax records to your credit cards. Theft is a
massive problem, whic
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Les fuites de données sont de plus en plus courantes. Lorsque vous vous
inscrivez à un service en ligne, vous fournissez des informations personnelles
précieuses pour les pirates, telles que des adresses e-mail, des mots de passe,
des numéros de télé