ProtonBlog

We’re excited to introduce the new Proton Mail Feedback Forum(new window) where you can give us feedback and suggestions on new features that you want to see in Proton Mail. Since the beginning, we have built Proton Mail with usability as our main goal, and we’ve worked hard to make sure that each comment and suggestion is a part of our development process. Now you can vote, comment and post new ideas for Proton Mail to develop in the future through the Feedback Forum. FeedbackForumYou can access the Feedback Forum(new window) directly from the Knowledge Base(new window) through the “Request Feature” button, as well as on the footer of our Homepage. To give feedback, simply type out your idea in the “Enter your Idea” form. You can vote on ideas other users have submitted and see how many votes each idea has received. In general, we will try to build the features which are the most requested. In order to avoid duplicates, we suggest trying to search first before submitting a new feature to ensure that it has not been submitted already.

We’re happy to have found a new way to include your voice in our development and we look forward to getting your feedback. With your help, we hope to make Proton Mail even better and easier to use.

Protect your privacy with Proton
Create a free account

Related articles

Is WeTransfer safe?
  • Privacy basics
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi