ProtonBlog
paypal and custom signatures

New Features: PayPal Support and Signatures for Addresses

Since we released paid plans last month, many users have supported us by upgrading to paid plans(new window). Proton Mail does not serve ads or abuse your privacy, so revenue from paid plans is essential for Proton Mail to continue operating(new window). When paid accounts were launched, credit card was the only accepted payment method. Now for the first time, we are accepting PayPal for upgrades to paid accounts.

PayPal Support

Proton Mail has had a contentious history with PayPal(new window), starting when PayPal froze funds during our crowdfunding campaign. Since then, we have been told that PayPal has improved their policies so we are willing to give PayPal another chance. However, the fees for PayPal are much higher, and we are still a bit wary of PayPal so credit card is still our preferred payment method. To pay with PayPal, simply select PayPal as the payment method from our payment page when upgrading your account.

protonmail paypal support(new window)

Signatures for Custom Domain Addresses

Proton Mail Paid account users have the ability to add custom domain addresses, or additional Proton Mail address(new window) to their primary account. Starting in version 3.1.4 we’ve added the ability to edit and customize the Display Name and Signature for each address in your account.

custom domain signatures edit(new window)

To edit your addresses, simply go to Settings –> Addresses and click on Edit Identity

Sign up for a free email account here.

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Is WeTransfer safe?
  • Privacy basics
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi