ProtonBlog
Proton Mail Classic Theme

The 3.0 version of Proton Mail brought many changes, such as a new column layout to go along with the existing row layout. Many other changes, such as improved cryptography to support public/private key encryption with custom domains, are largely invisible to the user. Thus, the new look is the most noticeable change to the user experience.

Overall the new theme has been well received, but some people have written us to say that they prefer the original Proton Mail look. It is possible to switch the theme of your secure mailbox to the original theme by going to Settings –> Appearance and selecting “Load Classic Theme” at the bottom of the page. If you also set the inbox layout in Row mode, then Proton Mail 3.0 will look almost identical to Proton Mail 2.0.

The classic theme is favored by some because it has a higher contrast than the standard theme. If you feel the standard theme doesn’t have enough contrast, we recommend trying the Classic Theme. In the coming months, we will be releasing additional themes for Proton Mail, but if you can’t wait, it also possible to modify the CSS to build your own theme. We recommend doing this only if you know what you are doing however, as this could break your inbox if done improperly.

Secure your emails, protect your privacy
Get Proton Mail free

Related articles

Is WeTransfer safe?
  • Privacy basics
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi