ProtonBlog(new window)

Bug Fixes

  • Fixed a bug preventing MailBox decryption in Firefox 28
  • Fixed a rare bug preventing certain usernames being used
  • Reworked pagination arrows to prevent useless page clicks
  • Clarified wording for updating your password
  • Various styling updates for tablet and mobile

New Features

  • Messages are now dated to your local timezone settings

Known Issues

  • Multiple attachments not properly supported
  • Internet Explorer not yet supported
  • Safari is not yet fully supported
  • Mobile and Tablet not yet fully supported
  • Emails cannot be sent to Yahoo, Proton Mail is not yet on the whitelist
  • Spam filtering of incoming unencrypted emails not yet working
Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers
sensitive information
We all have sensitive personal information we’d all rather not share, whether it’s documents, photographs, or even private video. This article covers how to handle sensitive information or records, and what you can do to keep private information priv