ProtonBlog(new window)

Improve your secure email service by joining our back-end code audit

To ensure the security of Proton Mail’s secure email service, we are looking for more back-end security auditors.

At Proton Mail, our internal security team has always worked closely with our user community to ensure the security of our secure email service. Proton Mail’s strong security is partially due to the dozens of security contributors(new window) who have audited our security either through penetration tests, or review of our open source code(new window). Less well known is the fact that we also routinely provide access to our back-end code and API specifications to security auditors from around the world who request access.

Proton Mail Backend Code Release

While we have been providing access to backend code for years, today we would like to make this officially part of Proton Mail’s security contributor programme. If you are a security expert, you can request Github access to Proton Mail’s backend code and API specs by emailing security@proton.me. We welcome all efforts to make Proton Mail as secure as possible and we hope that this will encourage more security experts to participate as Proton Mail security contributors. If you find a flaw, it is also possible to get a reward through our bug bounty program(new window).

Help Develop the Encrypted Email Service of the Future!

In addition to getting access to our code to search for security leaks or flaws, it is also possible to join the project and actively contribute code. Like any open source project, we have always welcomed pull requests from people outside of our team and will merge them after appropriate code review. Even though it is not widely publicized, over the past two years, over a dozen different people have joined our Organization on Github and participated in writing code for Proton Mail.

We always welcome interested developers who wish to contribute code to Proton Mail or OpenPGPjs(new window). In addition to the visibility of participating in a high profile project, you will also get to work on the cutting edge of security, cryptography, and optimizing user experience with the latest technologies. You will also have the opportunity to interact with the rest of our community and help us build the most highly requested features(new window). If you are interested in building the future of secure email, you can write contact@proton.me to get in touch with our team and develop with us on Github.

Protect your privacy with Proton
Create a free account

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers