ProtonBlog(new window)

We are happy to announce the release of Proton Mail v1.13. As usual, please clear your browser cache(new window) or log out and log back in if you encounter any problems.

New Features

  • Use native crypto.api functionality in browsers that support it.
  • Drag and drop attachments now allows for faster uploading of attachments and support for multiple attachments.
  • Drag and drop added for importing contacts
  • Added spam and anti-virus filtering.
  • We now support sending of plain-text emails along with HTML emails in our outgoing messages
  • Added the ability to embed images in emails
  • Rebased CSS files to SCSS for future custom theming with community themes
  • It is now possible to receive emails sent to username@proton.me
  • New layout for mobile
  • The current folder is now highlighted in the sidebar when viewing a message


Bug Fixes

  • Fixed buggy notification system that alert users when they receive new emails

Improvements

  • Reworked auto-saving of messages to be faster and more stable
  • Improved parsing for ICS calendar formats
  • Removed Google Analytics and replaced it with a local Piwik installation
  • Updated inbox user interface
  • Upgraded editor for composing messages

Known Issues

  • Temporarily removed view Original Messages features, this will return in v1.14 after some optimizations.
  • Account creation on mobile devices is unreliable.
  • Encrypted attachments not yet enabled.

Security Fixes

A big thanks to Kacper Rybczyński(new window) and Mazin Ahmed(new window) for their help in security testing version 113! Several security issues were identified and fixed on the dev branch prior to release.

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers