ProtonBlog(new window)

After receiving suspicious bids in our original fundraiser, we’re putting the rare Proton username X back up for auction along with the X@ email address on all the Proton domains (proton.me, protonmail.com, protonmail.ch, and pm.me)! However this time, we’re using a new format to mitigate potentially suspicious bids. 

The blind auction runs until Sunday, January 21, at 6 PM CET. This time, to participate in the auction, you’ll need to fill out a form (linked below) with your maximum bid and your contact email address. The minimum bid is USD $10,000. Bids made below this amount will be disregarded.

At the end of the auction, we’ll contact the highest bidder to inform them they won the opportunity to purchase the X username and receive a complimentary goodie box. The X username is also transferable and comes with the right of resale, allowing you to gift or resell it whenever you like.  

It’s important to note that this username does not include a paid Proton plan.

If the highest bidder fails to complete the purchase for whatever reason, we’ll contact the person with the next highest bid, and so on. 

Read our auction’s terms and conditions(new window)

Supporting the fight for a better world

All the proceeds from this auction will go to support the organizations listed in our 2023 Lifetime Account Charity Fundraiser(new window), which the X username was originally a part of. This money will enable these worthy organizations to continue their fight for privacy, freedom, and human rights. As always, thank you for your support. Your generosity is driving positive change around the world.

Chroń swoją prywatność z kontem Proton
Utwórz bezpłatne konto

Powiązane artykuły

Is WeTransfer safe?
en
  • Podstawy ochrony prywatności
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
en
  • Podstawy ochrony prywatności
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
en
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
en
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
en
  • Podstawy ochrony prywatności
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
en
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi