Proton

Aktualizacje produktów

Proton 4.0 is now in beta
en
  • Aktualizacje produktów
We’re making Proton tools even more seamlessly connected, letting you sign in once to access your inbox, calendar, cloud storage, and more.
en
  • Aktualizacje produktów
  • Proton Mail
Proton Mail has temporarily changed its certificate authority to Let’s Encrypt, a nonprofit certificate authority run by the Internet Security Research Group.
en
  • Aktualizacje produktów
  • Proton Drive
Learn how Proton Drive uses end-to-end encryption to protect your photos, documents, and other sensitive data.
An illustration of the multi-account feature for iOS.
en
  • Aktualizacje produktów
  • Proton Mail
Multi-account support is now available on the new version of Proton Mail iOS. Access all your Proton Mail accounts on the go with your iOS device.
An illustration of the Proton Mail Android app going open source.
en
  • Aktualizacje produktów
  • Proton Mail
Our Proton Mail Android app is open source. We are committed to transparency and contributing to the open source and privacy tech community.
illustration of Proton Mail Android client security
en
  • Aktualizacje produktów
  • Proton Mail
Our Android security model explains what our app does to secure Proton users’ data. This article outlines how we handle data and mitigate potential attacks.
Illustration of Proton Mail Bridge open source
en
  • Aktualizacje produktów
  • Proton Mail
Our Bridge app is now open source for macOS, Windows, and Linux. Find links to the code and an independent security audit report.
Illustration of the Bridge security model
en
  • Aktualizacje produktów
  • Proton Mail
You can use Proton Mail Bridge with IMAP/SMTP email clients. Here we explain the Bridge security architecture and how it protects your data.
protonmail bridge for linux
en
  • Aktualizacje produktów
  • Proton Mail
Proton Mail Linux users can now connect their email accounts with the Thunderbird client.
Illustration of alternative routing
en
  • Aktualizacje produktów
Proton provides anti-censorship measures to help users bypass DNS blocks. This article explains how these systems work.
Illustration of vulnerability disclosure
en
  • Aktualizacje produktów
  • Proton Mail
This document describes the vulnerability disclosure policy our security team follows when we discover flaws in third-party products.