Proton

Now that the Proton Mail Campaign(nieuw venster) has raised over $250,000 for protecting online privacy, some people have asked us, how much do we need to raise to accomplish our stretch goals?

In the table below, we have outlined our goals, and the amount of money that would be necessary to turn these goals into reality.

20140626125233-igg-stretch-goals(nieuw venster)

We hope to get enough funding to at least build out the Android and iOS versions of Proton Mail. This would require us to raise double our current funding of $250,000. The money would go towards the additional servers we need to support the load from app users, and hiring additional developers to join our team to speed up development of the apps. We intend to build these features even if the funding targets are not met, but with more funding, we’ll be able to build in all these features faster and help everyone better protect their privacy.

Ensuring security and privacy for all requires constant innovation as every day, there are powerful organizations working on new ways to deprive us of this fundamental human right. Any additional funding we receive puts us in a much stronger position to meet these challenges.

As history has shown time and time ago, freedom and privacy go hand in hand, as one simply cannot have one without the other. Please share our campaign, and let people know why privacy matters.

http://igg.me/projects/protonmail(nieuw venster)

Gerelateerde artikelen

en
If you use multiple Google accounts and want to learn how to change your default Google account once and for all, this guide will help.
A person and a shield on a computer screen, suggesting how Proton parents guide their kids on online privacy
en
See how Proton parents guide their kids on online privacy to raise critical thinkers in a world built for surveillance and manipulation.
A photo icon and synchronization symbol overlaying a cloud, representing automatic photo backup to the cloud
en
See how to back up photos while protecting your privacy using encrypted cloud storage that shields you from scanning, tracking, and profiling.
Learn the best professional email sign-offs, common mistakes to avoid, and real-world examples.
en
Struggling with how to end an email? Learn about the best professional email sign-offs, common mistakes to avoid, and real-world examples.
A phone screen with a speech bubble with a phone number in it
en
Your email address and passwords aren't the only information hackers can use to scam you. Here's what someone can do with your phone number — and how to protect it.
A web application screen with an unlock icon in the bottom right corner
en
Your best defense against a data breach could be improving your web application security: Find out how Proton Pass can help.