ProtonBlog(new window)

When we launched Proton Drive two months ago, we wanted to create a truly private and secure cloud storage service. An encrypted cloud that allows anyone on the internet to safely store, access, and share their files without worrying about unauthorized access. 

At the start of this month, Proton Drive surpassed one million files uploaded per day, and we’re doubling our efforts to deliver additional features and enhancements as quickly as possible!

It’s not the number itself but what it represents that is meaningful. It means every day, there are a million photos, documents, and other files protected against data breaches, government surveillance and overreach, and the privacy abuse of Big Tech. It means a million files are now under the complete control of their owners (end-to-end encryption means not even we can access any of the files on Proton Drive), giving you freedom, autonomy, and peace of mind online. 

The future is private

Achieving this milestone less than two months after launch is a show of support not just for Proton Drive’s technology(new window), but also for our mission. The fact that so many of you want to safeguard your files with the highest level of security shows great promise for the future of the internet. As the internet becomes more private, all of society will benefit. 

Proton Drive is currently available as a web app and our mobile apps will be available for everyone by the end of the year. The desktop apps will follow next year. We’ve listened to your feedback and have worked hard to shorten our release cycle for Proton Drive. Thanks to your unwavering support, we’re able to build Proton Drive even faster, and we look forward to delivering many new features and enhancements in the coming months. You can check out the Proton Drive roadmap here(new window)

A big thank you to the community

All we do is only possible with the support of Proton’s steadfast and fast-growing community. The feedback that hundreds of thousands of you gave during the beta period, and continuing on to today, has been instrumental in helping us build the service you want.

Because we’re ultimately here to serve you (and not advertisers or investors), we encourage you to have a say in shaping and developing Proton Drive. We’ve recently launched new social media channels for Proton Drive so you can talk to us more directly. You can find us on Reddit(new window) and Twitter(new window).

Some very interesting discussions have already taken place on the Proton Drive community channels — join the conversation! We’re looking forward to shaping the future of Proton Drive together with you.

Keep your files private, share them securely
Get Proton Drive free

Related articles

In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv
Social engineering is a common hacking tactic involving psychological manipulation used in cybersecurity attacks to access or steal confidential information. They then use this information to commit fraud, gain unauthorized access to systems, or, in